-
281
Assessment of Records Management Practices at Uganda College of Commerce Kabale.
Published 2024“…Proposed solutions included ensuring retention and durability, providing secure storage, offering continuous training programs, acknowledging the diversity of paper and electronic records, maintaining authenticity, proper disposal, and utilizing computer-based management practices. …”
Get full text
Thesis -
282
Cross-Chain Identity Authentication Method Based on Relay Chain
Published 2025-01-01“…More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. …”
Get full text
Article -
283
-
284
A novel aggregated coefficient ranking based feature selection strategy for enhancing the diagnosis of breast cancer classification using machine learning
Published 2025-02-01“…The work implemented the introduced methodology using Wisconsin-based breast cancer data and applied the Synthetic Minority Oversampling Technique (SMOTE) to the obtained data subset. …”
Get full text
Article -
285
Geographical Peer Matching for P2P Energy Sharing
Published 2025-01-01“…Furthermore, we propose and study analytically and empirically a spectrum of approaches to address it and perform a cost-efficient matching of peers in a computationally efficient fashion. Our experimental study, based on real-world energy data, demonstrates that our proposed solutions are efficient both in terms of cost savings achieved by the peers and in terms of communication and computing requirements. …”
Get full text
Article -
286
Modern Geodata Management: Application of Interdisciplinary Interpretation and Visualization in Central America
Published 2009-01-01“…In the last years new methods of data acquisition and processing in geosciences, inspired by growing computer performance, have led to an increased amount of data, and this development will proceed surely. …”
Get full text
Article -
287
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…Cloud computing provides network based access to computing and data storage services on a pay per usage model. …”
Get full text
Article -
288
-
289
Design and Realization of the Intelligent Design System for Tunnel Blasting in Mine Based on Database
Published 2020-01-01“…The implementation of the new system addresses the needs of blasting data information storage and search and lays a foundation for the informatization and standardization of tunnel excavation blasting.…”
Get full text
Article -
290
The Application of ICT in Reference Service at Kabale University Library.
Published 2023“…Both questionnaires and interview guides were used to collect data. The study findings indicated that information sharing, communication purposes, cataloguing and classification of library materials, issuing in and out of library materials (circulation), storage, retrieval and dissemination of information and e-resources trainings were applications of ICT use for rendering reference services at Kabale University Library. …”
Get full text
Thesis -
291
-
292
Role of Subsurface Geo-Energy Pilot and Demonstration Sites in Delivering Net Zero
Published 2022-12-01“…Part of the solution for net zero will be geo-energy technologies in the subsurface, these include: mine water geothermal, aquifer thermal energy storage (ATES), enhanced geothermal systems and other thermal storage options, compressed air energy storage (CAES), and carbon dioxide capture and storage (CCS) including bioenergy CCS (BECCS). …”
Get full text
Article -
293
Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System
Published 2015-01-01Get full text
Article -
294
-
295
A local algorithm to approximate the global clustering of streams generated in ubiquitous sensor networks
Published 2018-10-01“…However, centralized algorithms force communication and storage requirements to grow unbounded. This article presents L2GClust, an algorithm to compute local clusterings at each node as an approximation of the global clustering. …”
Get full text
Article -
296
Design of Meteorological Element Detection Platform for Atmospheric Boundary Layer Based on UAV
Published 2017-01-01“…Thirdly, data management of the collected data was conducted, including local storage and real-time display on ground host computer. …”
Get full text
Article -
297
Framework for a Cloud-Based Multimedia Surveillance System
Published 2014-05-01“…Cloud computing can provide a powerful and scalable infrastructure for large-scale storage, processing, and dissemination of sensor data. …”
Get full text
Article -
298
Improvement of Image Compression by Changing the Mathematical Equation Style in Communication Systems
Published 2022-01-01Get full text
Article -
299
Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital
Published 2021“…When asked what they feel about what should be done to stop information disclosure to untrusted parties , 20% of the Interviewees expressed concern for keeping their information in closed rooms, 60% of the Interviewees expressed concern for information storage in the computer with passwords and 20% of the respondents expressed concern for hiring external authorities to store their information. …”
Get full text
Article -
300
Mapping Iterative Medical Imaging Algorithm on Cell Accelerator
Published 2011-01-01“…However, the prohibitively long processing time of these techniques prevents their adoption in commercial CT machines. Parallel computing is one solution to this problem. With the advent of heterogeneous multicore architectures that exploit data parallel applications, medical imaging algorithms such as OS-SART can be studied to produce increased performance. …”
Get full text
Article