Статті в журналах з теми "DIGOTA"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: DIGOTA.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "DIGOTA".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Shilkrot, Roy, Jochen Huber, Jürgen Steimle, Suranga Nanayakkara, and Pattie Maes. "Digital Digits." ACM Computing Surveys 48, no. 2 (November 21, 2015): 1–29. http://dx.doi.org/10.1145/2828993.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Adak, Nitin, and Dr S. D. Lokhande Dr. S. D. Lokhande. "An Accelerometer-Based Digital Pen for Handwritten Digit and Gesture Recognition." Indian Journal of Applied Research 3, no. 12 (October 1, 2011): 207–10. http://dx.doi.org/10.15373/2249555x/dec2013/61.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

TOVO, Maximiano Ferreira, Bernardo Gonzalez VONO, and Orivaldo TAVANO. "Comparação entre filmes radiográficos e o sistema digital Digora, no diagnóstico de lesões de cárie dentinária em superfície proximal de molares decíduos." Pesquisa Odontológica Brasileira 14, no. 4 (December 2000): 399–405. http://dx.doi.org/10.1590/s1517-74912000000400016.

Повний текст джерела
Анотація:
O estudo comparou o desempenho diagnóstico dos filmes Agfa M2 e Ektaspeed Plus e do sistema digital Digora. A amostra foi composta por 37 molares decíduos, radiografados em 50, 70 e 90 kV. As imagens de 41 superfícies proximais foram avaliadas sob condições padronizadas. Cinco recursos de edição de imagem (0,5 X, 1 X, 2 X, "Negativo" e 3D), disponíveis no software do sistema digital, foram utilizados. Após a secção dos dentes e a validação em estereomicroscopia (40 X), calculou-se a sensibilidade, especificidade, acurácia e kappa não-ponderado dos métodos. O filme Ektaspeed Plus, exposto a 50 kV, diferenciou-se devido aos valores expressos para sensibilidade, acurácia e kappa não-ponderado. A especificidade dos filmes revelou valores comparáveis. Com a utilização do sistema digital Digora, a taxa de diagnósticos positivo-verdadeiros alcançou maior valor ao ser utilizado o recurso de imagem "Negativo". A imagem comprimida (0,5 X) foi, majoritariamente, a mais específica. As acurácias médias do sistema digital Digora resultaram em valores aproximados. Ao ser utilizada a estatística kappa, não houve distinção entre os recursos de imagem obtidos com o software. O método digital foi mais sensível que os filmes, porém, estes foram mais específicos. A acurácia média do sistema digital suplantou a dos filmes. Excetuando-se o Ektaspeed Plus, em 50 kV, os filmes não alcançaram os valores de kappa demonstrados pelo sistema digital Digora. Cohen’s kappa revelou boa concordância intra-examinador (0,758). Devido aos resultados observados, o sistema digital demonstrou-se comparável ao método radiográfico convencional, no diagnóstico de lesões de cárie dentinária em superfícies proximais de molares decíduos.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ferreira Tovo, Maximiano, Juliane Bervian, Sérgio Fernando Torres Freitas, Ítalo M. Faraco Jr., and Paulo F. Kramer. "Validade do exame radiográfico digital no diagnóstico de lesões proximais em molares decíduos." Revista da Faculdade de Odontologia de Porto Alegre 44, no. 1 (June 1, 2003): 70–75. http://dx.doi.org/10.22456/2177-0018.103322.

Повний текст джерела
Анотація:
O estudo avaliou o desempenho diagnostico do filme Ektaspeed plus e do sistema digital Digora por meio de uma amostra de 37 molares decíduos. As imagens de 41 superfícies proximais foram avaliadas sob condições padronizadas e cinco recursos de edição de imagem (x0,5, xl, x2, Negativo e 3D), disponíveis no software do sistema digital, foram utilizados. Apos a secção dos dentes e a validação em estereomicroscopia (x40), calculou-se a sensibilidade, especificidade, acurácia e kappa não-ponderado dos métodos. 0 sistema digital Digora foi mais sensível que os filmes, nos dois cut-off estudados. Com o filme Ektaspeed plus, o método radiográfico convencional foi tanto ou mais específico que o sistema digital, ao diagnosticar todas as lesões e lesões dentinárias, entretanto de menor acurácia quando comparado as modalidades de imagem digital. 0 valor de kappa obtido pelo filme, assemelhou-se ao de algumas modalidades de imagem do sistema digital Digora, no diagnostico de todas as lesões, o que não ocorreu no diagnostico de lesões dentinárias. Cohen's kappa revelou boa concordância intra-examinador (0,758). Devido aos resultados observados, o sistema digital demonstrou-se comparável ao método radiográfico convencional, no diagnostico de lesões de cárie em superfícies proximais de molares decíduos.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

THAM, S., and J. A. I. GROSSMAN. "Limited Microsurgical Arteriolysis for Complications of Digital Vasospasm." Journal of Hand Surgery 22, no. 3 (June 1997): 359–61. http://dx.doi.org/10.1016/s0266-7681(97)80402-0.

Повний текст джерела
Анотація:
Twenty-two digits in seven patients with chronic digital vasospasm were surgically treated after failed medical management. All patients complained of severe ischaemic pain. Chronic digital tip ulceration was present in seven digits and dry gangrene in one. Following surgical microarteriolysis all digital ulcers healed completely. Severe digital ischaemic pain was significantly improved in all digits and completely resolved in 19 of 22 digits.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Hadidi, Mazin Al, and Rami Salim Rzouq. "Hand Written Digits Recognition Using Digital Learning Networks." IERI Procedia 2 (2012): 367–71. http://dx.doi.org/10.1016/j.ieri.2012.06.103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Nurohman, S., W. Sunarno, S. Sarwanto, and S. Yamtinah. "The Validation of Digital Analysis Tool-Assisted Real-World Inquiry (Digita-RI) as a Modification of the Inquiry-Based Learning Model in the Digital Age." Jurnal Pendidikan IPA Indonesia 10, no. 3 (September 29, 2021): 387–99. http://dx.doi.org/10.15294/jpii.v10i3.30779.

Повний текст джерела
Анотація:
Inquiry-based learning has been tested to improve conceptual understanding, reduce misconceptions, and provide students with experiences in scientific work. However, in its implementation, inquiry-based learning is often faced with scientific facts from the real world with data which hard to analyze using traditional methods. Therefore, a breakthrough is needed to overcome the weaknesses of inquiry-based learning by integrating digital analysis tools and the concept of real-world learning. This integration produces a new learning model, the Digital Analysis Tool-Assisted Real-World Inquiry (Digita-RI). This study aims to test the feasibility and practicality of the Digita-RI learning model. This Research and Development (R&D) use the steps proposed by Barg and Gall. The feasibility test of the Digita-RI model was carried out through the Focus Group Discussion (FGD) method and the assessment of the Digita-RI model book involving seven experts. The practicality test was carried out through the Think Aloud Protocol (TAP), and the assessment of the Digita-RI model guidebook involved five practitioner lecturers and six students. The results of expert, practitioner, and user assessments were analyzed using the Aiken coefficient (Aiken’s V). The results showed that Digita-RI is a feasible and practical learning model. Therefore, it can be concluded that Digita-RI has the feasibility and practicality to be used in science learning in the classroom.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yu, Xinguo, Wan Ding, Zhizhong Zeng, and Hon Wai Leong. "Reading Digital Video Clocks." International Journal of Pattern Recognition and Artificial Intelligence 29, no. 04 (May 20, 2015): 1555006. http://dx.doi.org/10.1142/s021800141555006x.

Повний текст джерела
Анотація:
This paper presents an algorithm for reading digital video clocks reliably and quickly. Reading digital clocks from videos is difficult due to the challenges such as color variety, font diversity, noise, and low resolution. The proposed algorithm overcomes these challenges by using the novel methods derived from the domain knowledge. This algorithm first localizes the digits of a digital video clock and then recognizes the digits representing the time of digital video clock. It is a robust three-step algorithm. The first step is an efficient procedure that directly identifies the region of the second digit at a very low computational cost, which replaces the traditional tedious image processing procedure of identifying the second digit region. The success of the first step mainly leverages on the novel second-pixel periodicity method. Using the acquired second digit region as input, the second step is a clock digit localization procedure. It first acquires the colors of the digits of the digital video clock and performs the color conversion. Then it localizes the remaining clock digits. Finally, the last step is a clock digit recognition procedure. It first employs an enhanced digit-sequence recognition method to robustly recognize the digits on the second; it then adopts a deep learning procedure to recognize the remaining digits. The proposed algorithm is tested on a prepared benchmark of 1000 videos that is publicly available and the experimental results show that it can read digital video clocks with a 100% accuracy at a low computational cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rodrigues, Celso A., Maria C. R. Luvizotto, Ana Liz G. Alves, Piero H. M. Teodoro, and Elisa A. Gregório. "Digital dermatitis of the accessory digits of dairy cows." Pesquisa Veterinária Brasileira 30, no. 3 (March 2010): 246–48. http://dx.doi.org/10.1590/s0100-736x2010000300010.

Повний текст джерела
Анотація:
This report characterizes the digital dermatitis (DD) lesions in the accessory digits of dairy cows and presents data on the applied therapy. Fifteen Holstein cattle with DD affecting the accessory digits of the hindlimbs from four dairy farms with previous history of DD were evaluated. Lesions were excised, the wounds were sutured, and a topical application of oxytetracycline powder covered by bandaging was associated with a single parenteral administration of long acting oxytetracycline IM (20mg/kg). Tissue samples were obtained for histopathology and transmission electronic microscopy (TEM). Lesions from all the animals were recuperated 15 days after surgical procedure. Overal, most DD lesions were papillomatous epidermal projections or wartlike verrucous lesions. Histopathologically, samples revealed hyperplasia of epidermis with hyperkeratosis, several mitoses in the stratum basale and elongated rete ridges in the superficial and middle dermis. TEM revealed long, thin spirochete-like bacteria. Morphologic features of lesions and its response to therapy were comparable to those described for DD.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ren, Z.-Y., C.-Q. Wang, Q.-S. Fan, G.-F. Shen, H. Yan, and Z.-T. Wang. "Management of Vascular Defects in Digital Replantation." Journal of Hand Surgery 20, no. 2 (April 1995): 262–63. http://dx.doi.org/10.1016/s0266-7681(05)80070-1.

Повний текст джерела
Анотація:
207 cases of digital amputation (261 digits) with vascular defects were replantated during the past two decades. The vascular defect was managed with various methods. 240 digits (92%) survived with good post-operative circulation and recovery of function. The methods of management of arterial defects were as follows: 1) Digital artery transfer from adjacent digits in 25 thumbs and three index fingers. All had survived. 2) Arterial transplantation: in 12 digits, arteries from the contralateral side or from the digits that were unsuitable for replantation were grafted to fill the arterial defects. All of these fingers survived. 3) Vein graft: superficial veins were taken to reconstruct the defects of the digital arteries in 59 digits, with 55 digits surviving and four failing. 4) Ulnar digital arterial flap of the ring finger. This technique was used in four digits with composite artery and soft tissue loss. All the cases survived. 5) Implantation of the arteries into the distal amputation parts. This was done in two digits with no arteries for anastomosis in the distal parts. The management of venous defects was as follows: 1) Transfer of veins from the adjacent digits. Five digits treated with this technique survived well. 2) Vein graft. Six digits survived but one failed. 3) A venous flap was done in six digits and all the digits survived after this procedure. 4) Arterio-venous anastomosis: this was used in 20 digits without suitable veins for anastomosis in replantation of the digit distal to the DIP joint level. 5) Replantation without venous return: a fish-mouth incision and heparin irrigation was used for venous drainage in 19 digits, with survival of 14. 6) The palmar venous system was anastomosed in 84 digits without dorsal veins for suture. 77 digits survived. 7) Venous fascial flap transfer: A composite venous fascial flap was harvested from the adjacent fingers. The flap was turned over on the side close to the injured finger to make an anastomosis of the veins with those in the distal amputated part. A skin graft was placed over the flap without a tie-over dressing. The pedicle was divided 3 weeks later. All the 16 digits with this technique survived well.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Farias Gomes, Amanda, Yuri Nejaim, Rocharles Cavalcante Fontenele, Francisco Haiter-Neto, and Deborah Queiroz Freitas. "Influence of the incorporation of a lead foil to intraoral digital receptors on the image quality and root fracture diagnosis." Dentomaxillofacial Radiology 48, no. 6 (September 2019): 20180369. http://dx.doi.org/10.1259/dmfr.20180369.

Повний текст джерела
Анотація:
Objective: To evaluate the quality of images obtained with the addition of a lead foil to intraoral digital receptors. Methods: Radiographic images of 34 single-rooted human teeth - 19 with vertical root fracture (VRF) and 15 of the control group - were obtained with and without the addition of a lead foil, using the VistaScan, Express, Digora Optime and Digora Toto systems. Images were evaluated by five observers regarding the diagnosis of VRF, using a 5-point scale. In a second moment, an observer preference analysis related to the presence of the lead foil was performed. Images of an acrylic phantom were also obtained with and without the addition of a lead foil, and the quantities of uniformity, grey value and standard deviation of grey values were obtained. Results: There were no significant differences in the VRF diagnostic values, considering the presence of the lead foil. Regarding the image quality preference, the observers preferred images acquired with the lead foil for all systems tested, but with greater values for Digora Optime (61.33%) and Express (61.33%). The presence of the lead foil did influence the image uniformity in all systems tested ( p < 0.05). Moreover, the lead foil increased the mean of grey values for Digora Optime and Express images ( p < 0.05), however it did not influence the SD in any of the digital systems ( p > 0.05). Conclusion: The addition of a lead foil to intraoral digital receptors produces a positive effect in the image quality objectively detected by means of uniformity and subjective visual preference.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

CHAUDAKSHETRIN, P., V. P. KUMAR, K. SATKU, and R. W. H. PHO. "The Arteriovenous Pattern of the Distal Digital Segment." Journal of Hand Surgery 13, no. 2 (April 1988): 164–66. http://dx.doi.org/10.1016/0266-7681_88_90129-5.

Повний текст джерела
Анотація:
By injection of eosin dye with latex into 45 cadaveric fingers we were able to demonstrate: (1) a distinct digital pulp arch formed by the ulnar and radial digital arteries over the mid-point of the terminal phalanx in 93% of digits; (2) variations in size of the proper digital arteries to each digit; (3) numerous branches from the pulp arch to the tip of each digit and (4) a constant pattern of dorsal veins over the terminal segment in 89% of digits.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Yerokun, O. M., and M. O. Onyesolu. "On the Development of Neuro-Fuzzy Expert System for Detection of Leghemoglobin (NFESDL) in Legumes." advances in multidisciplinary & scientific research journal publication 9, no. 1 (January 24, 2021): 1–14. http://dx.doi.org/10.22624/aims/digital/v9n1p1.

Повний текст джерела
Анотація:
The regular supply of affordable complete meals most especially protein from animals has been threatened. Protein sourced from animals carry too many health risks. Obesity, cancer, diabetes, etc., have been traced to the consumption of meats, most especially beef. Medical experts claim that some ailments are as a result of the chemically processed feeds given to raise animals. Therefore, an alternative to meat from plants is imperative. This led to the development of a neuro-fuzzy expert system for detection of leghemoglobin in legumes. This work utilized production rule-base technique and forward-chaining mechanisms with linguistic antecedent conditions to detect the presence of leghemoglobin in plants. To further remove clumsiness and ambiguity in the identification process, metrics/weights were obtained and attached to each morphological feature. MATLAB platform was employed for the development of the system. Class and objects were used to model the information elicited. The result is a system that detects the presence of leghemoglobin in plants. Keywords: Expert system, inference system, neuro-fuzzy, dataset, leghemoglobin
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Van Loo, Rory. "Digital Market Perfection." Michigan Law Review, no. 117.5 (2019): 815. http://dx.doi.org/10.36644/mlr.117.5.digital.

Повний текст джерела
Анотація:
Google’s, Apple’s, and other companies’ automated assistants are increasingly serving as personal shoppers. These digital intermediaries will save us time by purchasing grocery items, transferring bank accounts, and subscribing to cable. The literature has only begun to hint at the paradigm shift needed to navigate the legal risks and rewards of this coming era of automated commerce. This Article begins to fill that gap by surveying legal battles related to contract exit, data access, and deception that will determine the extent to which automated assistants are able to help consumers to search and switch, potentially bringing tremendous societal benefits. Whereas observers have largely focused on protecting consumers and sellers from digital intermediaries’ market power, sellers like Amazon, Comcast, and Wells Fargo can also harm consumers by obstructing automated assistants. Advancing consumer welfare in the automated era requires not just consumer protection, but digital intermediary protection. The Article also shows the unpredictable side of eliminating switching costs. If digital assistants become pervasive, they could gain the ability to rapidly direct millions of consumers to new purchases whenever a lower price or new innovation becomes available. Significantly accelerated consumer switching—what I call hyperswitching—does not inevitably harm society. But in the extreme it could make some large markets more volatile, raising unemployment costs or financial stability concerns as more firms fail. This new kind of disruption could pose challenges for commercial and banking regulators akin to those familiar to securities regulators, who deploy idiosyncratic tools such as a pause button for the stock market. Even if sellers prevent extreme hyperswitching, managers may strategically prepare for hyperswitching with economically costly behavior such as hoarding liquid assets or forming conglomerates to provide insurance against a sudden exodus of customers. The transaction-cost-focused literature has missed macro-level drawbacks. The regulatory architecture reflects these scholarly gaps. One set of agencies regulates automated assistants for consumer protection and antitrust violations but does not go beyond those microeconomic inquiries. Nor do they prioritize strengthening digital intermediaries. Regulators with more macroeconomic missions lack jurisdiction over automated assistants. The intellectual framework and regulatory architecture should expand to encompass both the upsides and downsides of digital consumer sovereignty.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Aziken, Grace, and Franca Egbokhare. "The Role of Working Memory in Eliciting Users Cognitive Requirements." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 57–64. http://dx.doi.org/10.22624/aims/digital/v4n4p62.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Adeyemo, F. S., Mary Daniel, and Aghedo M. "Towards an Assessment of Customer Satisfaction with Nigerian Mobile Telecoms Industry and Providers." Advances in Multidisciplinary & Scientific Research Journal Publication 5, no. 4 (December 31, 2017): 157–61. http://dx.doi.org/10.22624/aims/digital/v5n4px.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Adedibu, O., and M. E. Adeshipo. "A Review of Anomaly Detection Techniques for Intrusion Detection." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 1–10. http://dx.doi.org/10.22624/aims/digital/v6n4p1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Edemirukaye, Ukeh Orodje, and T. Simon Apeh. "Evaluation of Automated Metering With Flexible Management and Monitoring System." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 11–34. http://dx.doi.org/10.22624/aims/digital/v6n4p2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Danquah (Ph.D), Paul, Benjamin Peh, and Victor Gordon. "A simulated comparison of performance beyond inherent metrics for Open Shortest Path First (OSPF) and Exterior Gateway Routing Protocol (EIGRP)." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 35–48. http://dx.doi.org/10.22624/aims/digital/v6n4p3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Taylor, O. E., and O. M. Ata-ebirieng. "A Hybrid Agent-Based Network Monitoring Tool." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 49–56. http://dx.doi.org/10.22624/aims/digital/v6n4p4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Aziken, G. O., F. A. Egbokhare, and D. E. Akpon-Ebiyomare. "The Role of Working Memory in Eliciting Users Cognitive Requirements." Advances in Multidisciplinary & Scientific Research Journal Publication 6, no. 4 (December 31, 2018): 57–64. http://dx.doi.org/10.22624/aims/digital/v6n4p6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Adeyemo, O. A., and A. Akinselure. "A Model for Predicting Customer Value Towards Upselling in Medium and Large Scale Businesses (MLBs)." Advances in Multidisciplinary & Scientific Research Journal Publication 7, no. 1 (March 31, 2019): 1–10. http://dx.doi.org/10.22624/aims/digital/v7n1p1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Ikuomola, Aderonke. "Toward a Secured Multi-Step Permission Based Delegation Model with Chinese Wall Security Policy." Advances in Multidisciplinary & Scientific Research Journal Publication 7, no. 1 (January 31, 2019): 11–22. http://dx.doi.org/10.22624/aims/digital/v7n1p2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Ogunrinola, O. B., N. A. Olalere, G. N. Onaifoh, and E. U. Nwosu. "Minimizing the Wastage of Electrical Energy at Utilization Level." Advances in Multidisciplinary & Scientific Research Journal Publication 7, no. 1 (February 6, 2019): 23–32. http://dx.doi.org/10.22624/aims/digital/v7n1p3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Davies, E. I., and V. E. I. Anireh. "Design and Implementation of Smart Home System Using Internet of Things." Advances in Multidisciplinary & Scientific Research Journal Publication 7, no. 1 (March 9, 2019): 33–42. http://dx.doi.org/10.22624/aims/digital/v7n1p4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Chukwuedo, J. A. "Analysis of Domestic Energy Usage for Electrical Appliances in a Nigerian Metropolitan Area." Advances in Multidisciplinary & Scientific Research Journal Publication 7, no. 1 (March 18, 2019): 43–58. http://dx.doi.org/10.22624/aims/digital/v7n1p5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Zubair, Abdul Rasak. "Image as a Signal: Review of the Concept of Image Frequency Estimate." Advances in Multidisciplinary & Scientific Research Journal Publication 10, no. 1 (March 31, 2019): 73–86. http://dx.doi.org/10.22624/aims/digital/v7n1p6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Adelusi, Bamidele Samuel, and Oluwashola David Adeniji. "Analyzing the Usage of Accounting Software for Short Medium Services (SMS) using Panel Data to improve Business competitiveness of Microfinance." Advances in Multidisciplinary & Scientific Research Journal Publication 7, no. 1 (March 31, 2019): 95–110. http://dx.doi.org/10.22624/aims/digital/v7n1p8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Edom, Eunice Uchechi, Remigius Chinedu Onuegbu, and Nkechi G. Leo-Ogbonna. "Factors Influencing Job Satisfaction of Librarians in Federal University Libraries in South-East Geo-Political Zone of Nigeria." advances in multidisciplinary & scientific research journal publication 8, no. 2 (June 30, 2020): 119–28. http://dx.doi.org/10.22624/aims/digital/v8n2p8.

Повний текст джерела
Анотація:
geo-political zone of Nigeria. Two objectives and research questions respectively were stated to guide the study. Two hypotheses were also tested in the study. The study adopted a correlational design, and the population of the study was 98. Sample of the study was census which involves the use of the entire population. The instrument for data collection was researcher’s structured modified 4-point Likert rating scale. The data collected for the study were analysed using Pearson Product Moment Correlation (PPMC) technique, while the hypotheses were tested for significance statistically using Spearman Rank Correlation analysis at 0.05 level of significance. The findings of the study revealed that there is a significant relationship between staff promotion and job satisfaction of librarians in libraries of federal universities in South-East geopolitical zone of Nigeria. The findings further revealed that there is also significant relationship between staff job security and job satisfaction of librarians in libraries of federal universities in South-East geo-political zone of Nigeria. The study recommended that staff promotion should be done regularly and as at when due to motivate the librarians to work hard in their workplaces. It is also recommended that librarians job security should be guaranteed at all times to ensure that they put in their best in the performance of their official duties to the benefit of their libraries. Keywords: Job satisfaction, Librarians, Federal Universities, University libraries.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Babatunde, A. N., A. A. Oke, B. F. Balogun, T. A. AbdulRahman, and R. O. Ogundokun. "A Deep Neural Network-Based Yoruba Intelligent Chatbot System." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 2 (June 15, 2022): 69–80. http://dx.doi.org/10.22624/aims/digital/v10n2p4.

Повний текст джерела
Анотація:
Two Artificial Intelligence software systems, Bot and Chatbot have recently debuted on the internet. This initiate a communication between the user and a virtual agent. The modeling and performance in deep learning (DL) computation for an Assistant Conversational Agent are presented in this research (Chatbot). The deep neural network (DNN) technique is used to respond to a large number of tokens in an input sentence with more appropriate dialogue. The model was created to do Yoruba-to-Yoruba translations. The major goal of this project is to improve the model's perplexity and learning rate, as well as to find a blue score for translation in the same language. Kares is used to run the experiments, which is written in Python. The data was trained using a deep learning-based algorithm. With the use of training examples, a collection of Yoruba phrases with various intentions was produced. The results demonstrate that the system can communicate in basic Yoruba terms and that it would be able to learn simple Yoruba words. The study result when evaluated showed that the system had 80% accuracy rate. Keywords: Chatbot, Natural Language Processing, Deep Learning, Artificial Neural Network, Yoruba Language
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Sarumi, Jerry Abayomi, and Olumide Babatope Longe. "Towards Data Storage Security in Cloud Computing Using Hybridized Advanced Encryption Standard & Authentication Scheme." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (January 30, 2022): 25–48. http://dx.doi.org/10.22624/aims/digital/v10n1p2x.

Повний текст джерела
Анотація:
Cloud computing is at the heart of modern day computing and thus the rise in malicious attacks are increasing every day towards it. In recent times hackers have been engaging in different string concept on login fields and phishing in order to intrude cloud accounts. This research is proposed to carry out effective security mechanisms on loopholes in cloud data storage. We intend to engage the use of the Advanced Encryption Standard (AES), security Algorithms like Secure Hash Algorithm 1 & 3 (SHA1, SHA 3) and Message-Digest Algorithm (MDS) and the Standard Authentication Scheme (AS) as sure guide against phishing which when implemented can provide various login stages and codes like OTP (One Time Password) to mitigate attacks. With the application of these methods towards securing cloud computing data there will be less intrusion in accounts and loss of files. Keywords: Brute-force, Cracking, Hacking, Advanced Encryption Standard, Authentication Scheme, AES, ES, Security
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Sarumi, Jerry Abayomi, and Olumide Babatope Longe. "Towards Data Storage Security in Cloud Computing Using Hybridized Advanced Encryption Standard & Authentication Scheme." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (June 15, 2022): 25–48. http://dx.doi.org/10.22624/aims/digital/v10n2p5.

Повний текст джерела
Анотація:
Cloud computing is at the heart of modern day computing and thus the rise in malicious attacks are increasing every day towards it. In recent times hackers have been engaging in different string concept on login fields and phishing in order to intrude cloud accounts. This research is proposed to carry out effective security mechanisms on loopholes in cloud data storage. We intend to engage the use of the Advanced Encryption Standard (AES), security Algorithms like Secure Hash Algorithm 1 & 3 (SHA1, SHA 3) and Message-Digest Algorithm (MDS) and the Standard Authentication Scheme (AS) as sure guide against phishing which when implemented can provide various login stages and codes like OTP (One Time Password) to mitigate attacks. With the application of these methods towards securing cloud computing data there will be less intrusion in accounts and loss of files. Keywords: Brute-force, Cracking, Hacking, Advanced Encryption Standard, Authentication Scheme, AES, ES, Security
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Sarumi, J. A., and O. B. Longe. "Towards Data Storage Security in Cloud Computing Using Hybridized Advanced Encryption Standard & Authentication Scheme." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (March 30, 2022): 25–48. http://dx.doi.org/10.22624/aims/digital/v10n1p2.

Повний текст джерела
Анотація:
Cloud computing is at the heart of modern day computing and thus the rise in malicious attacks are increasing every day towards it. In recent times hackers have been engaging in different string concept on login fields and phishing in order to intrude cloud accounts. This research is proposed to carry out effective security mechanisms on loopholes in cloud data storage. We intend to engage the use of the Advanced Encryption Standard (AES), security Algorithms like Secure Hash Algorithm 1 & 3 (SHA1, SHA 3) and Message-Digest Algorithm (MDS) and the Standard Authentication Scheme (AS) as sure guide against phishing which when implemented can provide various login stages and codes like OTP (One Time Password) to mitigate attacks. With the application of these methods towards securing cloud computing data there will be less intrusion in accounts and loss of files. Keywords: Brute-force, Cracking, Hacking, Advanced Encryption Standard, Authentication Scheme, AES, ES, Security
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Onamade, Akintoye Abraham, Abiodun Adedayo Adediran, and Oluwafunmilola Aderannibi Adepegba. "ATM Model for a Trusted Third Party System (TTPs)." Advances in Multidisciplinary and scientific Research Journal Publication 9, no. 2 (June 30, 2021): 81–86. http://dx.doi.org/10.22624/aims/digital/v9n2p7.

Повний текст джерела
Анотація:
The history of banking transaction has been with the use of cheque books, which direct the bank to pay or transfer specific amount to the bearer – third party on behalf of account owner. Identity card (ID) is the means of authentication and the third party is asked to append his or her signature and address on the back of the cheque for the bank to grant the request. Therefore, human beings cannot do without the help of third party, for their daily activities as nature can call for such service at any time. Even today, may be as a result of sickness, people do give their ATM card and PIN to third party to withdraw money on their behalf. The negative effect of involving third party to withdraw money with an ATM card on behalf of an account owner is at alarming rate. This action to say the least is prone to many security risks which must be avoided at all costs. Therefore, a system is designed in this study to recognize the use of third party in an ATM bank transaction in order to alleviate the negative effect of using the third party. An algorithm was designed for third party ATM transaction using Bracket IDE and Xampp as programming tools. The developed system, allows a trusted third party to have access to ATM card and to withdraw money on behalf of an account owner. The account owner initiates the process through the platform created in this study by registering the third party details and the transaction to be carried out on behalf of an account owner. The system generates an OTP that allows the third party to perform a restricted transaction on behalf of the account owner. The amount to be withdrawn is embedded in the OTP generated for the third party, such that there is no checking of account balance, no withdrawal of an amount less or above amount specified in the OTP, and no money transfer. Therefore, since the system allows restricted transactions to be performed by the third party, it becomes very difficult for third party to use the privilege of performing ATM transaction against the account owner. Keywords: ATM, One Time Password (OTP), Trusted Third Party (TTP), Third Party
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Tomori, M. O., and O. F. Mustapha. "Implementation of Hybrid Controlled Vehicle Braking Method for the Design of Collision Avoidance Systems In Vehicles." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 2 (June 30, 2022): 101–8. http://dx.doi.org/10.22624/aims/digital/v10n2p7.

Повний текст джерела
Анотація:
According to data from the National Highway Transportation Safety Administration, human error is to blame for at least 90% of all car collisions. This information has intensified the focus on the design and development of collision avoidance systems in automobiles. This paper presents a semi-automated braking system to increase the accuracy of collision avoidance systems by reducing errors on the vehicle’s driver part. The methodology used combines the use of a microprocessor for analyzing data from sensors aided by servo motors, sending information to output devices for the alarm system and electric motors, and integrated circuits to implement hybridized engagement of vehicle brake. The braking system can be manually applied but can interfere and bring the vehicle to a halt once it has been determined that the driver has lost control of maneuvering the vehicle. The implemented system was able to determine the separation distances between automobiles and obstacles, give warning employing alarm set-up and engage braking at a minimum separation distance that is provided with an average response time of 0.86 s and a percentage error of 12.8% during operation. Keywords: Hybrid Controlled Vehicle Braking Method, Collision Avoidance Systems In Vehicles
Стилі APA, Harvard, Vancouver, ISO та ін.
36

David, Allenotor. "Simulation and Evaluation of a Financial Option Based Model for Cloud Resources Management." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 2 (June 30, 2022): 109–26. http://dx.doi.org/10.22624/aims/digital/v10n2p8.

Повний текст джерела
Анотація:
Cloud computing, where the use of resources is seen as a service (Resources-as-a-Service (RaaS)) has developed extensively for executing computationally resource-intensive applications. As a result, commercial services of such resources are becoming norm of the day and pricing them have become an important problem in finance. Only a few economic models have been reported for pricing cloud resources. In this paper, a novel application of financial option pricing theory to the management of distributed computing resources especially for pricing is addressed. First, the importance of finance models for the given problem is highlighted following an explain on how option theory fits well to price the distributed computing cloud resources. Various cloud resources such as memory, storage, software, and compute cycles are seen as individual commodities and pricing of the resources is done in isolation and in combination of various resources. Second, `we design and develop pricing model and generate pricing results for usage of such commodities for various resources. In the absence of cloud resource pricing benchmarks/standards, firstly, cloud resources usage is simulated in order to justify the pricing model using CloudSim toolkit. In this part of the work, the integration of a financial option-based pricing model with CloudSim framework is implemented using a cloud simulation tool to price cloud compute resources. Secondly, the model is evaluated using cloud metadata obtained from Amazon Web services. The analysis of cloud resources utilization from simulation and real cloud trace data shows the feasibility of a financial option-based model for pricing cloud resources. With a large number of experiments carried out, a justification of the pricing model is obtained by comparing a simulated system to real cloud trace data based on the spot price for the cloud resources. Keywords: Financial Option, Strike Price, CloudSim, Quality of Service, Compute Commodities
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Faye, Winner, Friday Wada, and Edith Longe. "Towards a Framework for Measuring End-User Intension Towards the GIG Economy System: A Case Study of Uber." Advances in Multidisciplinary and scientific Research Journal Publication 7, no. 4 (December 30, 2019): 51–64. http://dx.doi.org/10.22624/aims/digital/v9n2p12.

Повний текст джерела
Анотація:
Information systems has continually experienced issues with acceptance and utilization of technologies. The anticipated benefits of the deployment of an innovation cannot be ascertained if the intended population do not adopt it. The gradual rise of the gig economy has captivated the attention of scholars to dig into this new concept of labor exchange and the accruable benefits. The gig economy also known as the “On-demand economy, sharing economy, platform economy, and digital economy” has known to have increase the work force through the various on-demand jobs rendered on the platform, which has increase end-user acquire goods and services from providers through apps on smartphones and web application. The platform has virtually come to replace how they would go through the trouble of requesting for services and as such found the use of the platform to be a substitute to how they request for services. It was however established from literature that very limited research has been conducted on the gig economy and facilitating factors for the gig workers and organization were the focus of existing research thus paying little or no attention to the end-users. This paper proposed a study that seeks to understand the nature of gig economy and the factors that drives end users intention to maximize and utilize the gig economy from a developing country context (Nigeria). Keywords: Gig, Economy, Ride hailing services, Nigeria, SEM, Subscribers, consumers, disruption and Market.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

W, Faye. "Towards a Framework for Measuring End-User Intension Towards the GIG Economy System: A Case Study of Uber." Advances in Multidisciplinary and scientific Research Journal Publication 7, no. 4 (December 30, 2019): 51. http://dx.doi.org/10.22624/aims/digital/v7n4p6.

Повний текст джерела
Анотація:
Information systems has continually experienced issues with acceptance and utilization of technologies. The anticipated benefits of the deployment of an innovation cannot be ascertained if the intended population do not adopt it. The gradual rise of the gig economy has captivated the attention of scholars to dig into this new concept of labor exchange and the accruable benefits. The gig economy also known as the “On-demand economy, sharing economy, platform economy, and digital economy” has known to have increase the work force through the various on-demand jobs rendered on the platform, which has increase end-user acquire goods and services from providers through apps on smartphones and web application. The platform has virtually come to replace how they would go through the trouble of requesting for services and as such found the use of the platform to be a substitute to how they request for services. It was however established from literature that very limited research has been conducted on the gig economy and facilitating factors for the gig workers and organization were the focus of existing research thus paying little or no attention to the end-users. This paper proposed a study that seeks to understand the nature of gig economy and the factors that drives end users intention to maximize and utilize the gig economy from a developing country context (Nigeria). Keywords: Gig, Economy, Ride hailing services, Nigeria, SEM, Subscribers, consumers, disruption and Market
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Bori, Ige, Ebubechukwu Jude Uwah, Sunday Bako, Olawale James Okegbile, and Samuel Adinoyi Ayo. "Design and Performance Evaluation of a Portable Solar Water Heater." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (March 15, 2022): 49–62. http://dx.doi.org/10.22624/aims/digital/v10n1p5.

Повний текст джерела
Анотація:
This paper presents design and performance evaluation of a solar water heater (SWH) using thermosyphon principles, thereby eliminating the use of electric water pump and reducing the cost of the entire system. There are many phenomena encouraging the application of solar water heating technology such as; electric power outage, high fuel price, rapid urbanization, low cost of installations, and governmental intervention. Therefore, there is need to encourage innovation in the field of solar technology. The design of this system was done using relevant equations to obtain the required dimensions of the various components of the system. The materials were selected based on design calculations, machining, availability and material cost. During the testing process, the first three days of testing the highest outlet temperature recorded was 650C. For the last three days of testing during the dry season, the highest outlet temperature recorded was 79.3 0C. The results showed that the system performs better during the dry season when the irradiance levels are higher. The highest irradiance recorded was 940 W/m2 on the sixth day of testing. The highest efficiency recorded from the system was 68.19% on the fourth day of testing. It is hereby recommended that, sensor and a flow meter should be installed for determining water level and for easy identification of flow rate. Keywords: Solar Water Heater, Thermosyphon, Design, Development, and Performance Testing
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Coleman, Danielle. "Digital Colonialism: The 21st Century Scramble for Africa through the Extraction and Control of User Data and the Limitations of Data Protection Laws." Michigan Journal of Race & Law, no. 24.2 (2019): 417. http://dx.doi.org/10.36643/mjrl.24.2.digital.

Повний текст джерела
Анотація:
As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism. Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and resources to access untapped data on the continent. Scant data protection laws and infrastructure ownership by western tech companies open the door for exploitation of data as a resource for-profit and a myriad of uses including predictive analytics. One may believe that strengthening data protection laws will be a barrier to digital colonialism. However, regardless of their relative strength or weakness, data protection laws have limits. An analysis of Kenya's 2018 data protection bill, the General Data Protection Regulation (GDPR), and documented actions of largescale tech companies exemplifies how those limits create several loopholes for continued digital colonialism including, historical violations of data privacy laws; limitations of sanctions; unchecked mass concentration of data, lack of competition enforcement, uninformed consent, and limits to defined nation-state privacy laws.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Sarumi, J. A. "An Android-Based Image Steganography System for Concealing Data and Information Transmission Using Adaptive Image Steganography." Advances in Multidisciplinary and scientific Research Journal Publication 9, no. 2 (June 30, 2021): 19–38. http://dx.doi.org/10.22624/aims/digital/v9n2p6.

Повний текст джерела
Анотація:
The growth in the volume of information transmission and transaction over the internet has necessitated the development and enhancement of measures and techniques required to ensure the safety of critical information during transmission. with developments in mobile technologies and the adoption and diffusion of android mobile devices, research must therefore continue to explore more secured media in which information can be hidden. One of such medium is the use of image carriers referred to as steganography. In tis paper, we provide insughts into the development of an android-based Image Steganography System for concealing data and information using adaptive image steganography. The Least Significant Bit (LSB) algorithm was employed as the algorithmic sequence for the development. Preliminary results from implementation and testing showed promising results Keywords: Android, image steganography, data, information, transmission, images, security
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Abanga, Ellen Akongwin. "A Review of Internet of Things (IoT) and Security Concerns." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (December 30, 2022): 121–30. http://dx.doi.org/10.22624/aims/digital/v10n4p13.

Повний текст джерела
Анотація:
Wireless technology networks are particularly vulnerable to security attacks. Wireless communication networks are widely used in education, defense, industry, healthcare, retail, and transportation. These systems rely on wired and cellular networks. In society and industry, wireless sensor networks, actuation networks, and vehicle networks have garnered a lot of attention. The Internet of Things has gotten a lot of research attention in recent years. The Internet of Things is regarded as the internet's future. IoT will play an important role in the future, changing our lifestyles, standards, and business structures. The use of IoT in various applications is likely to skyrocket in the next years. The Internet of Things enables billions of devices, people, and services to communicate and exchange information. IoT networks are vulnerable to several security vulnerabilities as a result of the rising use of IoT devices. It is crucial to implement effective privacy and security protocols in IoT networks to guarantee, among other things, confidentiality, authentication, access control, and integrity. This paper provides a thorough analysis of the security and privacy challenges in IoT networks. Keywords: Internet of Things, Security, Security Concerns, Attacks, Networks, Internet
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Sackey, Abraham Kwaku. "Steganography Based On Random Pixel Selection for Efficient Data Hiding." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (December 30, 2022): 113–20. http://dx.doi.org/10.22624/aims/digital/v10n4p12.

Повний текст джерела
Анотація:
Advancement in technology has brought about the need for improvement in how data is stored and shared to prevent unauthorized access by third parties. Various methods including cryptography, watermarking, steganography and many others have been used in the quest to promote data safety. Currently, steganography has shown promise the most is being deployed by many. It simply involves hiding data in a media file but great success in data hiding has been chalked by this means. This paper explores the idea of steganography and its various types as well as how random pixel selection can be used to ensure efficient data hiding. Keywords: Stenography, Random Pixel Selection, Efficient Data Hiding, Security
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Obiorah ,, Philip, Friday Onuodu, and Batholowmeo Eke. "Topic Modeling Using Latent Dirichlet Allocation & Multinomial Logistic Regression." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (December 30, 2022): 99–112. http://dx.doi.org/10.22624/aims/digital/v10n4p11a.

Повний текст джерела
Анотація:
Unsupervised categorization for datasets has benefits, but not without a few difficulties. Unsupervised algorithms cluster groups of documents in an unsupervised fashion, and often output findings as vectors containing distributions of words clustered according to their probability of occurring together. Additionally, this technique requires human or domain expert interpretation in order to correctly identify clusters of words as belonging to a certain topic. We propose combining Latent Dirichlet Allocation (LDA) with multi-class Logistic Regression for topic modelling as a multi-step classification process in order to extract and classify topics from unseen texts without relying on human labelling or domain expert interpretation in order to correctly identify clusters of words as belonging to a certain topic. The findings suggest that the two procedures were complementary in terms of identifying textual subjects and overcoming the difficulty of comprehending the array of topics from the output of LDA. Keywords: Natural Language Processing; Topic Modeling; Latent Dirichlet Allocation; Logistic Regression
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Onwodi, Greg. "Smart Intrusion Prevention System for the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, FCT, Abuja, Nigeria." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (December 30, 2022): 73–78. http://dx.doi.org/10.22624/aims/digital/v10n4p10.

Повний текст джерела
Анотація:
This study examines the Smart Intrusion Prevention System for the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, Abuja. Different research methodologies for Intrusion Prevention System was analysed and the hybrid based methodology was adopted because of its incorporation of the other methodologies. Configuration of the Intrusion Prevention System was studied and implemented using software known as Mikrotik. The Mikrotik software configuration was analysed properly. Among the major findings of the study was that the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, Abuja was relatively insecure with the sophisticated breed of attackers we have now. The study therefore recommended that Nigeria Immigration Special Study Centre, Gwagwalada, Abuja should integrate a known Intrusion Prevention System software and endeavour to keep it updated at all times. Also, they can work on system design and algorithm design for secure communication over complex networks. Keywords: Intrusion Prevention System, LAN, Nigeria, Immigration, Special Study Centre, FCT, Abuja,
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Darko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.

Повний текст джерела
Анотація:
Bio Cryptography have been used to secure and protect systems for decades and a further development to employing multi modal bio cryptographic authentication in cloud security has become the best of practice to avert the problems associated with single-phased bio cryptographic techniques. Cloud security have seen improvements over time and higher data security can be achieved by using Multimodal bio cryptographic technique for data encryption and decryption to prevent the intruders from accessing the data. Application of one of the best algorithm-Bluefish to encrypt and decrypt data in the cloud. Keywords: Bi- Cryptography, Data Decryption, Data Encryption, Cloud Security, Biometrics
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Timothy, Kwaku. "Securing Critical National Infrastructure Against Hacktivist." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 33–42. http://dx.doi.org/10.22624/aims/digital/v10n4p5.

Повний текст джерела
Анотація:
The acts of hacktivists in today's modern world might have extremely negative repercussions for the order and peace of countries. Hacktivists, by the very nature of their methodology, invariably target important government installations. This research focuses mostly on investigating the myriad of approaches that may be taken to cyber-secure important national infrastructure against the maneuvers that can be carried out by hacktivists. Inferences are drawn in this study from hacktivism episodes that occurred in the past and were documented by a variety of sources, some of which may be verified. A four-point cyber security plan for important national infrastructure has been developed as a way to provide direction for the execution of cybersecurity measures by key state facilities. This scheme was inspired by the ideas presented previously. Keywords: Critical National Infrastructure, Security, Hacktivists, Cyberspace, Hacking, Cybercrime
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Joshua, Wemegah. "A Review of Various Data Security Techniques in Wireless Communication Systems." Advances in Multidisciplinary and scientific Research Journal Publication 10 (November 30, 2022): 15–24. http://dx.doi.org/10.22624/aims/digital/v10n4p3.

Повний текст джерела
Анотація:
Sensitive data is constantly being transmitted particularly over wireless communication systems due to how convenient this wireless communication systems are. However, these communication systems are generally weak in terms of privacy protection and security as a whole. This is because anyone within the perimeter of a wireless network can attempt hacking into the network without physically connecting to it. This paper will focus on the two most common data security techniques in wireless communication systems – steganography and cryptography. Steganography is the practice of hiding information in another message or physical item such that its presence cannot be detected by human examination. Cryptography on the other hand is the science of encrypting information in a way that unintended recipients cannot interpret and then decrypting the said message back into plaintext. Keywords: Cryptography, Data Encryption, Data Decryption, Steganography, Wireless Communication
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Kwaku, Timothy. "Steganalysis Method for LSB Replacement Based On Local Gradient of Image Histogram." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 1–8. http://dx.doi.org/10.22624/aims/digital/v10n4p1.

Повний текст джерела
Анотація:
Today's encryption and decryption processes rely heavily on the use of modern stenography techniques, which ultimately lead to steganalysis. Because of its enormous benefits, such as the protection of information or the transport of data, steganalysis is increasingly becoming an interesting research topic. This investigation is primarily concerned with steganalysis techniques, more specifically those that are utilized on photographic images. In this research, the many LSB steganalysis processes that are supported by previous research are investigated further, along with the outcomes of those operations. According to the findings of this research, in order for modern steganography and steganalysis techniques to be more efficient, they need to fundamentally incorporate artificial intelligence and machine learning methodologies. Keywords: Steganalysis, LSB, Replacement, Local Gradient, Image Histogram
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Okyere, Rufus Larbi. "Efficient Data Hiding Scheme Using Steganography and Cryptography Technique." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (November 30, 2022): 25–32. http://dx.doi.org/10.22624/aims/digital/v10n4p4.

Повний текст джерела
Анотація:
Transportation of information across the internet necessitates security concerns. Internally, transmission of data in organisation must also be secured, according to security standards. In a typical distribution, all traffic transferred via the public network (Internet) is secured. However, sensitive information must not be easily accessible in the event that an attacker compromises any services on the hosts and gains access to their resources. The advancement of information technology has enabled large amounts of digital data to be reliably transported through unrestrained communication channels. Today’s information world is a digital world. Data transmission over an unsecure channel is becoming a major issue of concern nowadays. And at the same time intruders are spreading over the internet and being very active. So to protect the secret data from theft, some security measures need to be taken. In order to keep the data secret various techniques have been implemented to encrypt and decrypt the secret data. Findings of this study show how steganography and cryptography techniques are used for efficient data hiding to prevent unauthorised access to confidential and sensitive information. The study present recommendation for policy and practice. Keywords: Efficiency, Data Hiding Scheme, Steganography, Cryptography, Security
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії