Hae
Aineistot 11-20 / 29
On the State of Information Security in Public Sector Organizations in Ethiopia
(2020-06-05)
Information and communication technology (ICT) has become a vital part of the developing countries economy. As the use of ICT is increasing in day to day work of the organizations, there is a need to implement measures for ...
Analysis of differential alternative splicing at the gene isoform and genomic levels using Cufflinks, Miso, and rMats – an example of ANO7 in prostate cancer
(2020-06-05)
The diagnosis and treatment of prostate cancer (PCa) are the most extensively researched fields in Urology. Studying gene expression profiling in PCa as well as in other types of cancer necessitates the investigation of ...
Achieving ISO 27001 Certification by implementing an Information Security Management System
(2018-12-04)
Information security is intended to protect the confidentiality, integrity and availability of information assets within an organisation. In recent times, there has been a significant trend in increasing cyber-attacks, ...
The properties of the last universal common ancestor
(2019-04-11)
The last universal common ancestor is believed to be an organism from which all modern organisms on earth today are thought to be descended from. LUCA is thought to be the recent most ancestor to all present-day organisms ...
Comparison of de novo metagenomic assembly tools
(2019-05-24)
The field of metagenomics involves studying the composition and function of microbial communities via isolated DNA from a variety of environments like soil, water and the human gut. Since the current generation sequencing ...
Assessing Data Quality in Disease-Specific Patient Information Systems
(2020-05-19)
BCB Medical provides disease-specific patient information systems for collection of patient data, and information services for clinical research as well as for public and private hospitals. There are over 100 disease-specific ...
2.4GHz RF Front-end Module Based on 0.18μm CMOS Process
(2020-05-06)
With the increasing number of wireless communication applications, the demand for low-power and low-cost radio frequency (RF) wireless transceiver chips is increasing. Therefore, the idea of using complementary metal oxide ...
Sovellusprotokollat ja kommunikointiparadigmat web-integroidussa IoT-toteutuksessa
(2018-06-05)
Internet of Things tuo miljardit laitteet Internetiin. Käytössä on kuitenkin valtava määrä protokollia, jotka eivät ole toistensa kanssa yhteensopivia. Keskenään hyvin erilaisten laitteiden ja lukuisten protokollien vuoksi ...
Deceiving Attackers using Record and Play based Honeypots
(2018-05-22)
Firewalls, intrusion detection systems and other security measures are used to control unwanted access to various IT systems. Usually these technologies are used to block, redirect or detect intruders. Honeypots on the ...
Antecedents of Continued Use Intention in the Era of Data Breaches: An Empirical Study of Pakistani Online Banking Users
(2020-04-14)
Data breaches are a rising threat to the banking sector in which the customer’s information is accessed by unauthorized persons leading to reduced trust and reputation. The reduction in trust and satisfaction may result ...