標題: Titlebook: e-Infrastructure and e-Services for Developing Countries; 13th EAI Internation Yahya H. Sheikh,Idris A. Rai,Abubakar D. Bakar Conference pr [打印本頁] 作者: 回憶錄 時間: 2025-3-21 18:38
書目名稱e-Infrastructure and e-Services for Developing Countries影響因子(影響力)
書目名稱e-Infrastructure and e-Services for Developing Countries影響因子(影響力)學科排名
書目名稱e-Infrastructure and e-Services for Developing Countries網(wǎng)絡公開度
書目名稱e-Infrastructure and e-Services for Developing Countries網(wǎng)絡公開度學科排名
書目名稱e-Infrastructure and e-Services for Developing Countries被引頻次
書目名稱e-Infrastructure and e-Services for Developing Countries被引頻次學科排名
書目名稱e-Infrastructure and e-Services for Developing Countries年度引用
書目名稱e-Infrastructure and e-Services for Developing Countries年度引用學科排名
書目名稱e-Infrastructure and e-Services for Developing Countries讀者反饋
書目名稱e-Infrastructure and e-Services for Developing Countries讀者反饋學科排名
作者: 詼諧 時間: 2025-3-21 23:41
Britta Rehder,Thomas Winter,Ulrich Willemsice. Until recently, mobile banking was most often done via SMS or the mobile web. In west African countries, these applications are preferred before all others of the same kind due to their proximity and ease of use. However, in recent years, several end-users have fallen victim of attacks aiming a作者: 不規(guī)則 時間: 2025-3-22 01:01
Gerhard Himmelmann,Walter Gagelommunication systems letters in the alphabet are represented with standard ASCII-8 code, which uses 8 bits/letter, or UTF-8 fixed length encoding, which uses 16 bits/letter. Moreover, the language uses gemination (i.e., doubling of a consonant) and long vowels are represented by double letters, e.g.作者: 一小塊 時間: 2025-3-22 08:19 作者: Carcinogenesis 時間: 2025-3-22 12:13
https://doi.org/10.1007/978-3-322-93542-7ngo Province, Zimbabwe. The portfolio resulted from of a concerted effort of stake- and relationholders in Masvingo Province, under the guidance of the Ministry of Health and Child Care. It contains digital health platforms sustaining digital health services to cater for digital health interventions作者: 鈍劍 時間: 2025-3-22 13:56 作者: 鈍劍 時間: 2025-3-22 17:07 作者: carotid-bruit 時間: 2025-3-22 23:17
https://doi.org/10.1007/978-3-030-64602-8e proven to be effective for classification tasks, even when the traffic is encrypted. The pursuit for higher accuracy has incentivized implementations of deep learning models that are larger and slower, and require higher computational resources. This poses a problem for real-time online classifica作者: 宮殿般 時間: 2025-3-23 03:01
Jo?o Loureiro,Jo?o Gaio e Silvaechniques are effective for this classification task, especially since classical approaches struggle to deal with encrypted traffic. However, deep learning models often tend to be computationally expensive, which weakens their suitability in low-resource community networks. This paper explores the c作者: GENRE 時間: 2025-3-23 05:51
Interest Groups in U.S. Local Politicss mostly via an online web-based platform. Transactions are often done without the direct arbitration of financial institutions, such as banks or other financial agencies. In 2005 the first money lending platform called Zopa was created in the United Kingdom, and several other have since followed. T作者: exclusice 時間: 2025-3-23 13:06
https://doi.org/10.1007/978-3-319-21130-5or continuous autonomous suggestion of actions. On side of Maintenance activities priority for complex equipment, maintainers are manually deciding on crucial action to be performed prior to others. We claim that the integration of knowledge based expert system might support an effective predictive 作者: rectocele 時間: 2025-3-23 15:34 作者: Allergic 時間: 2025-3-23 21:57 作者: Control-Group 時間: 2025-3-24 01:21
More Exotic Features and Basis Risk Hedging this technology, farmers and ranchers are more confident in running their farms, which are now smart farms. By using New Information and Communication Technologies as a catalyst and essential facilitator for the development of this new style of agriculture. Several devices and mechanisms are used i作者: 粗糙濫制 時間: 2025-3-24 05:58 作者: grenade 時間: 2025-3-24 09:34 作者: Estrogen 時間: 2025-3-24 14:43 作者: 辭職 時間: 2025-3-24 15:23 作者: lattice 時間: 2025-3-24 19:40 作者: Lime石灰 時間: 2025-3-24 23:39
978-3-031-06373-2ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2022作者: OVER 時間: 2025-3-25 03:34
e-Infrastructure and e-Services for Developing Countries978-3-031-06374-9Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 極微小 時間: 2025-3-25 11:24 作者: Intrepid 時間: 2025-3-25 15:36
Utilization of Information and Communication Technology in Addressing Property Tax Collection Challetion to address some of the identified challenges. By addressing the identified challenges, this research will enable the government to collect more revenues from property taxes to be used to undertake development projects. A case study approach was used to gather information from two regions, Dodom作者: 抱狗不敢前 時間: 2025-3-25 18:52
Preliminary Investigation of?Mobile Banking Attacks in?West Africa: Feedback from?Orange Money Custoice. Until recently, mobile banking was most often done via SMS or the mobile web. In west African countries, these applications are preferred before all others of the same kind due to their proximity and ease of use. However, in recent years, several end-users have fallen victim of attacks aiming a作者: 考古學 時間: 2025-3-25 20:58
On the Entropy of Written Afan Oromoommunication systems letters in the alphabet are represented with standard ASCII-8 code, which uses 8 bits/letter, or UTF-8 fixed length encoding, which uses 16 bits/letter. Moreover, the language uses gemination (i.e., doubling of a consonant) and long vowels are represented by double letters, e.g.作者: ANTH 時間: 2025-3-26 00:26 作者: 高原 時間: 2025-3-26 06:01
A Portfolio of Digital Platforms and Services for Digital Health Interventions, A Case in Masvingo Pngo Province, Zimbabwe. The portfolio resulted from of a concerted effort of stake- and relationholders in Masvingo Province, under the guidance of the Ministry of Health and Child Care. It contains digital health platforms sustaining digital health services to cater for digital health interventions作者: arousal 時間: 2025-3-26 11:44
Developing a Digital Information and Consultation Platform in Zimbabwen response to a WHO prediction and call to prepare for the worst, a team of medical and computer experts worked on a sovereign digital platform facilitating COVID-19 triaging over the phone. Ethnographic assessments revealed that platform developments benefitted from national dialogue, engaged commu作者: insert 時間: 2025-3-26 15:44 作者: Encoding 時間: 2025-3-26 19:12 作者: 希望 時間: 2025-3-27 00:58
Community Network Traffic Classification Using Two-Dimensional Convolutional Neural Networksechniques are effective for this classification task, especially since classical approaches struggle to deal with encrypted traffic. However, deep learning models often tend to be computationally expensive, which weakens their suitability in low-resource community networks. This paper explores the c作者: Preamble 時間: 2025-3-27 03:13 作者: handle 時間: 2025-3-27 07:36
Enhancing the?Priority for?the?Maintenance Activities of?the?Hospitals’ Mechanical Equipment Using tor continuous autonomous suggestion of actions. On side of Maintenance activities priority for complex equipment, maintainers are manually deciding on crucial action to be performed prior to others. We claim that the integration of knowledge based expert system might support an effective predictive 作者: audiologist 時間: 2025-3-27 11:52 作者: fabricate 時間: 2025-3-27 16:04 作者: 確認 時間: 2025-3-27 18:36
Effective Contribution of Internet of Things (IoT) in Smart Agriculture: State of Art this technology, farmers and ranchers are more confident in running their farms, which are now smart farms. By using New Information and Communication Technologies as a catalyst and essential facilitator for the development of this new style of agriculture. Several devices and mechanisms are used i作者: 享樂主義者 時間: 2025-3-28 00:53 作者: RODE 時間: 2025-3-28 04:18 作者: LINES 時間: 2025-3-28 08:49
Extension of the Hybrid Method for Efficient Imputation of Records with Several Missing Attributes results of data mining algorithms, thus invalidating the results. In this paper, we present an extension of the Hybrid Method for Efficient Imputation of Discrete Missing Attributes (HMID) to effectively handle these records. The method consists of partitioning the database into two subsets, one co作者: Atheroma 時間: 2025-3-28 11:00 作者: 天氣 時間: 2025-3-28 18:14 作者: 幻影 時間: 2025-3-28 19:00
On the Entropy of Written Afan Oromoalso called .-gram model, to compute the entropy of a sample text corpora (or written source) by capturing the dependencies among sequence of letters generated from the corpora. Entropy measures average information in bits per letter or block of letters, depending on the .-gram considered. Entropy a作者: considerable 時間: 2025-3-29 02:48
Security Mental Models and?Personal Security Practices of?Internet Users in?Africaot only result from users’ negligence, but also from lack of sufficient Internet security knowledge. Our findings motivate for reinforcing users’ Internet security mental models through personalised security configuration frameworks to allow users, especially those with limited technical skills, to 作者: Kidney-Failure 時間: 2025-3-29 06:30 作者: 小故事 時間: 2025-3-29 08:22
Community Network Traffic Classification Using Two-Dimensional Convolutional Neural Networkse 2D-CNNs has a tradeoff of slower prediction speed, which weakens their relative suitability for use in real-time applications. However, we observe that by reducing the size of the input supplied to the 2D-CNNs, we can improve their prediction speed whilst maintaining higher accuracy than other sim作者: 留戀 時間: 2025-3-29 14:05
Trading 4.0: An Online Peer-to-Peer Money Lending Platformions between lenders and borrowers. The developed prototype uses knapsack and perfect sum algorithms in both direct and reverse auctioning mode, to determine the least compromising match between loan requests and offers. After rigorous testing, obtained results showed that indeed the system can meet作者: Harness 時間: 2025-3-29 19:25 作者: 折磨 時間: 2025-3-29 20:40 作者: Decibel 時間: 2025-3-30 01:41 作者: Morbid 時間: 2025-3-30 05:54 作者: essential-fats 時間: 2025-3-30 08:56
Barriers and Facilitators of eHealth Adoption Among Healthcare Providers in Uganda – A Quantitative l that eHealth adoption and education level (χ2 = 40.72, ρ?0.05), age (χ2 = 13.08, ρ?0.05), location (χ2 = 20.96, ρ?0.05), gender (χ2 = 4.40, ρ?0.05) and institutional place of work (χ2 = 49.67, ρ?0.05) are statistically significant. Furthermore, training users, ease of use, usefulness of 作者: 兩種語言 時間: 2025-3-30 14:50
Tools for?Analytics and?Cognition for?Crowd Journalism Applicationantitative metrics for a sharing economy and estimate stakeholders’ channel monetization as a new innovative quantified value by engaging users with trusted content. TAC uses this principle of engagement rate measurements and provides visualization insights for stakeholders to choose the right track作者: FILLY 時間: 2025-3-30 20:27
Extension of the Hybrid Method for Efficient Imputation of Records with Several Missing Attributese records are estimated. We evaluate our algorithm using two databases. The Adult dataset extracted from the UCI Machine Learning database and SH_CDI_Single extracted from the World Bank database. Finally, we compare our algorithm with four imputation methods using the accuracy of missing value esti作者: Entrancing 時間: 2025-3-31 00:25 作者: Gratulate 時間: 2025-3-31 04:53 作者: 依法逮捕 時間: 2025-3-31 06:40 作者: FOIL 時間: 2025-3-31 09:43
https://doi.org/10.1007/978-3-322-96029-0ot only result from users’ negligence, but also from lack of sufficient Internet security knowledge. Our findings motivate for reinforcing users’ Internet security mental models through personalised security configuration frameworks to allow users, especially those with limited technical skills, to 作者: acheon 時間: 2025-3-31 15:41 作者: 分解 時間: 2025-3-31 17:30 作者: GROVE 時間: 2025-3-31 21:59 作者: 真繁榮 時間: 2025-4-1 05:46 作者: 惰性氣體 時間: 2025-4-1 08:04
Characteristic Function Method,k analyses the channel uncertainty in the simulation of native DVB-T2 and enhanced FBMC based DVB-T2 systems transmission performance using a channel PDP from field measurement in Belgium. This paper shows that uncertainties values tolerable for a good signal quality, using the quasi error-free (QEF作者: QUAIL 時間: 2025-4-1 14:05
https://doi.org/10.1057/9781137360076hesive pressure; influences organisations not to seek information security legitimacy This then influences how threat agents respond to ISP compliance. The implications of these findings for practice and policy are highlighted.作者: Hippocampus 時間: 2025-4-1 15:50
More Exotic Features and Basis Risk Hedgingns out that smart agriculture is really at the heart of researchers, farmers, producers, and even states. The results of this state of the art show us that various devices and technologies are deployed in smart farms to ensure better performance. Depending on requirements and realities, each intelli作者: Feckless 時間: 2025-4-1 21:38