Search
Now showing items 1-10 of 11
Using wearable sensors for remote healthcare monitoring system
(Scientific Research Publishing, 2011)
Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human ...
A novel document ranking algorithm that supports mobile healthcare information access effectiveness
(Academic Journals Inc., 2011)
This study presented DROPT; an acronym for Document ranking Optmization algorithm approach, a new idea for the effectiveness of meaningful retrieval results from the information source. Proposed method extracted the frequency ...
Context-Aware Stemming algorithm for semantically related root words
(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012)
There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are
flexible and adaptable for users. In this context, however, information retrieval (IR) is ...
A query-based SMS translation in information access system
(Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., 2011)
Mobile technology has contributed to the evolution
of several media of communication such as chats, emails and
short message service (SMS) text. This has significantly
influenced the traditional standard way of expressing ...
UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms
(Academic Journals Inc., 2011)
Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant ...
Peer-to-Peer Computing and Grid Computing: towards a better understanding
(Akamai University, 2011)
Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia ...
A dependable model for attaining maximum authetication security procedure in a grid based environment
(Academic Journals Inc., 2012)
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer ...
Threats to e-government implementation in the civil service: Nigeria as a case study
(Akamai University, 2012)
The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is ...
Evaluating SMS parsing using automated testing software
(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012)
Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication.
Its enormous pervasiveness has created a great advantage for its use as a technological ...
Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment
(South African Institute of Electrical Engineers, 2013)
The application of grid computing has been hampered by three basic challenges:
scalability, interoperability and efficient access control which need to be optimized before a full-scale
adoption of grid computing can take ...