Results 101 to 110 of about 145,910 (140)
Some of the next articles are maybe not open access.
Soil Contamination in Fadama Area in Zaria, Nigeria, Using X-ray Fluorescence Technique
Journal of the Nigerian Association of Mathematical Physics, 2011In this paper, the contamination level of thirteen elements (Si, Ca, K, V, Ti, Fe, Co. Zn, Rb, Sr, Y, Zr and Nb) from soil samples of the Fadama areas in Zaria, Nigeria were investigated with Energy Dispersive X-ray Fluorescence Technique (EDXRF) method.
R Bello+3 more
openaire +53 more sources
IEEE International Symposium on Signal Processing and Information Technology, 2018
Telemedicine has gained much popularity in recent times. It refers to the use of state of the art telecommunication and information technologies to provide medical and health care services to distant locations.
Ramsha Ahmed, Bilal Hassan, Bo Li
semanticscholar +1 more source
Telemedicine has gained much popularity in recent times. It refers to the use of state of the art telecommunication and information technologies to provide medical and health care services to distant locations.
Ramsha Ahmed, Bilal Hassan, Bo Li
semanticscholar +1 more source
International Conference on Climate Informatics, 2020
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss.
Hariharan Rajadurai, U. Gandhi
semanticscholar +1 more source
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss.
Hariharan Rajadurai, U. Gandhi
semanticscholar +1 more source
International Journal on Advanced Science, Engineering and Information Technology, 2020
Face Recognition is a well-known image analysis application in the branches of pattern recognition and computer vision. It utilizes the uniqueness of human facial characteristics for personnel identification and verification.
Salar Jamal Rashid+2 more
semanticscholar +1 more source
Face Recognition is a well-known image analysis application in the branches of pattern recognition and computer vision. It utilizes the uniqueness of human facial characteristics for personnel identification and verification.
Salar Jamal Rashid+2 more
semanticscholar +1 more source
An Overview on Data Security in Cloud Computing
arXiv.org, 2018Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and ...
Lynda Kacha, Abdelhafid Zitouni
semanticscholar +1 more source
Best Available Technologies (BATs) for Computer Security
, 1981: Over more than a decade, government, industry, and academic centers have invested substantial resources in techniques for developing secure computer systems.
C. Landwehr
semanticscholar +1 more source
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023
Merin Thomas+5 more
semanticscholar +1 more source
Merin Thomas+5 more
semanticscholar +1 more source
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
International Symposium on Human Aspects of Information Security and Assurance, 2022Najla Aldaraani+2 more
semanticscholar +1 more source
Advances and Open Problems in Federated Learning
Foundations and Trends in Machine Learning, 2021Han Yu, Ana Cecilia Boetto
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly