Technology

Technology Research Papers/Topics

Social Network Sites: Definition, History, and Scholarship

Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are hundreds of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of preexi...

The Ten Most Critical Web Application Security Risks

Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our software becomes increasingly complex, and connected, the difficulty of achieving application security increases exponentially. The rapid pace of modern software development processes makes the most common risks essential to discover and resolve quickly and accurately. We can no longer afford to tolerate relatively simple security problems like those presented in this OWASP T...

Application Threat Modeling - OWASP

Threat modelling is an approach for anazlying the security of an application. It is a structured approach that enables you to identify, quantify and address the security risk with an application.

CIT 415: Research Tool

We need tools to facilitate research tasks • Some researchers need special tools indigenous to particular discipline • The concern here is with the general tools of research that the majority of researchers, regardless of discipline and situation, typically need to help carrying out research activities which finally derive meaningful and insightful conclusions from the research. • Be careful not to equate tools of research with the research methodology.

Causes of blood culture contamination at Nelson Mandela Academic Hospital

Phlebotomy has been practiced for centuries and is still one of the most common invasive procedures in health care. Each step in the process of phlebotomy affects the quality of the specimen and is thus important for preventing laboratory error, patient injury and even death. For example, the touch of a finger to verify the location of a vein before insertion of the needle increases the chances that a specimen will be contaminated. This causes false blood culture results, prolonged hospitaliz...

CPT 512-ML Algorithms Real-World Applications

Abstract In the current age of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data, business data, social media data, health data, etc. To intelligently analyze these data and develop the corresponding smart and automated applications, the knowledge of artifcial intelligence (AI), particularly, machine learning (ML) is the key. Various types of machine learning algorithms such ...

An Introduction to Deep Learning. During recent years, deep learning has _ by James Liang _ Towards Data Science

An Introduction to Deep Learning Building the Intuition How Do Deep Learning algorithms “learn”? So why is it called “Deep” Learning? Conclusions and Takeaways

RootsMagic Support

RootsMagic is one of the best genealogy software. We are certified technicians in RootsMagic Support and also have 10+ years of experience. We provide technical support for genealogy users through call chat and remote.

Robotic Soil Instrument for Parasitology

Every year, soybean yields are reduced by numerous diseases, especially the soybean cyst nematode (SCN). Identifying the presence of SCN and measuring its population densities in the field is challenging as there are no visible signs of disease. The only sure way to evaluate SCN population levels is to extract the cysts from the soil, extract the eggs from the cysts, and count them. Currently, this extraction process is typically done in commercial soil analysis laboratories and university pl...

Examining Information Security Controls in the Human Resource Department of Kampala International University, Uganda from 2013-2018.

ABSTRACT  The research study was based on examining informatiOn security contrOls in the Human Resource Department of KIU, Uganda. The objectives of the study were; to analyze the information security controls in the Human Resource department of Kampala International University, to explore the extent of compliance to information security objectives at Kampala International University, to investigate the challenges of information security at Kampala International University, and also to ascer...

Community Policing as a Strategy for Upgrading the Level of Security in Puntland

ABSTRACT  The purpose of this study was to investigate community policing as a strategy for upgrading the level of security in Puntland. Hence it’s examined by identifying the level of awareness of the concept of community policing projects in Puntland, investigating the current status of Puntland security and need for community policing projects, and identifying the challenges that may face community policing projects in Puntland. In gathering information the research study employed both ...

A Web-Based Information System for Ugandan Citizenship Registration

ABSTRACT  Citizen Identification has always been an issue of importance in the Ugandan society in order to solve problems that lead to delivery of poor health services, inefficient use of resources and failure to meet the people’s basic needs. Due to the accumulated cases of poor management of Citizen Information, the consequences are still being felt. A modern Web-based management information system for Uganda’s Citizens where Citizen Information will be kept and disseminated to stakeho...

Examining Information Security Controls in the Human Resource Department of Kampala International University, Uganda from 2013-2018

ABSTRACT  The research study was based on examining information security controls in the Human Resource Department of KIU, Uganda. The objectives of the study were; to analyze the information security controls in the Human Resource department of Kampala International University, to explore the extent of compliance to information security objectives at Kampala International University, to investigate the challenges of information security at Kampala International University, and also to ascer...

Measurement of the Main Pulmonary Artery Diameter in Sudanese Patients by using Computed Tomography

ABSTRACT The study was done to measure the main pulmonary artery diameter by Computed Tomography in normal subjects which were not suffer from the cardiac or pulmonary pathology. Fifty patients (20 males and 30 females) were selected with normal pulmonary artery pressure. The study was done in Algazeira Traumatology center during the period from October 2015 to August 2016. The widest diameter perpendicular to the long axis ofthe main pulmonary artery was measure with computer caliper at the ...

Assessment of Curtain Grouting Used in the Foundation Treatment at Dam Complex of Upper Atbara River

ABSTRACT  Curtain Grouting (CG) is a procedure mainly used to control water seepage in dams by sealing off fissures or joints in bedrock, granular soil pockets and minor cavities; hence CG can be considered as foundation improvement method. This process involves grouting a line, or several lines, of holes in sequence along the water cut-off zone and requires specialized instrumentation to monitor grout pressure and flow parameters. Geological and geotechnical properties of the rock and soil ...


151 - 165 Of 1117 Results