ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Economy
Administration - Business
Electrical and electronic
Computing
Social Sciences
Computing
History
Mechanical Engineering
Infrastructure
Biology
all records (18)

Languages
English

Countries
South Africa
Indonesia
USA
Argentina
Iraq
Pakistan
Canada

Years
2023
2021
2020
2019
2018
2017
2016
2015
2013
2012
all records (11)

Filter  
 
21  Articles
1 of 3 pages  |  10  records  |  more records»
The task of network security is to keep services available at all times by dealing with hacker attacks. One of the mechanisms obtainable is the Intrusion Detection System (IDS) which is used to sense and classify any abnormal actions. Therefore, the IDS s... see more

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusion... see more

Cloud Environment is next generation internet based computing system that supplies customiza-ble services to the end user to work or access to the various cloud applications. In order to provide security and decrease the damage of information system, netw... see more

AbstractThe study of subjective well-being is no longer on the periphery of study in the field of economics. A significant body of literature exists on the determinants of subjective well-being in the developed world. This paper uses the first wave of the... see more

Cloud Environment is next generation internet based computing system that supplies customiza-ble services to the end user to work or access to the various cloud applications. In order to provide security and decrease the damage of information system, netw... see more

Indonesia is one of agrarian countris which has a fertile soil condition, but the agricultural products nowadays are not maximal in certain areas particularly strawberry plantation. Strawberry plant it self needs precise temperature and humidity level to ... see more

The rapid growth of the data-communications network for real-world commercial applications requires security and robustness. Network intrusion is one of the most prominent network attacks. Moreover, the variants of network intrusion have also been extensi... see more

This study explored the relationship between satisfaction with life and internal migration intention in South Africa. Data were from three waves of the National Income Dynamics Surveys (NIDS) conducted in 2008, 2010, and 2012. Analyses of data were by des... see more

Objective: The study aimed to investigate the effect of Ramadan Fasting on Patients with Chronic Diseases and their experience during fasting.Methods: This study was a descriptive research that used a researcher-designed questionnaire in face-to-face inte... see more

1 of 3 pages  |  10  records  |  more records»