Results 101 to 110 of about 145,910 (140)
Some of the next articles are maybe not open access.

Soil Contamination in Fadama Area in Zaria, Nigeria, Using X-ray Fluorescence Technique

Journal of the Nigerian Association of Mathematical Physics, 2011
In this paper, the contamination level of thirteen elements (Si, Ca, K, V, Ti, Fe, Co. Zn, Rb, Sr, Y, Zr and Nb) from soil samples of the Fadama areas in Zaria, Nigeria were investigated with Energy Dispersive X-ray Fluorescence Technique (EDXRF) method.
R Bello   +3 more
openaire   +53 more sources

Robust hybrid watermarking for security of medical images in computer-aided diagnosis based telemedicine applications

IEEE International Symposium on Signal Processing and Information Technology, 2018
Telemedicine has gained much popularity in recent times. It refers to the use of state of the art telecommunication and information technologies to provide medical and health care services to distant locations.
Ramsha Ahmed, Bilal Hassan, Bo Li
semanticscholar   +1 more source

An empirical model in intrusion detection systems using principal component analysis and deep learning models

International Conference on Climate Informatics, 2020
Data are a main resource of a computer system, which can be transmitted over network from source to destination. While transmitting, it faces lot of security issues such as virus, malware, infection, error, and data loss.
Hariharan Rajadurai, U. Gandhi
semanticscholar   +1 more source

Face Recognition System Based on Gabor Wavelets Transform, Principal Component Analysis and Support Vector Machine

International Journal on Advanced Science, Engineering and Information Technology, 2020
Face Recognition is a well-known image analysis application in the branches of pattern recognition and computer vision. It utilizes the uniqueness of human facial characteristics for personnel identification and verification.
Salar Jamal Rashid   +2 more
semanticscholar   +1 more source

An Overview on Data Security in Cloud Computing

arXiv.org, 2018
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and ...
Lynda Kacha, Abdelhafid Zitouni
semanticscholar   +1 more source

Best Available Technologies (BATs) for Computer Security

, 1981
: Over more than a decade, government, industry, and academic centers have invested substantial resources in techniques for developing secure computer systems.
C. Landwehr
semanticscholar   +1 more source

Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment

Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023
Merin Thomas   +5 more
semanticscholar   +1 more source

Online Security Attack Experience and Worries of Young Adults in the United Kingdom

International Symposium on Human Aspects of Information Security and Assurance, 2022
Najla Aldaraani   +2 more
semanticscholar   +1 more source

Advances and Open Problems in Federated Learning

Foundations and Trends in Machine Learning, 2021
Han Yu, Ana Cecilia Boetto
exaly  

A Survey on Metaverse: Fundamentals, Security, and Privacy

IEEE Communications Surveys and Tutorials, 2023
Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly  

Home - About - Disclaimer - Privacy