|
Showing 1 - 3 of
3 matches in All Departments
Pattern Matching with variable length gaps: A Practitioner's
Approach which compares the theoretical and practical performance
between two most recent pattern matching algorithms with variable
length gaps as pattern matching problem is a basic primitive in
computational biology applications.It is a fundamental computer
science problem and is a basic need of many sophisticated forms of
searching applications, such as text retrieval, music retrieval,
data mining and network security.
Widespread global acceptance of electronic governance designates
that E-governance has revolutionized the governing systems in the
world to a degree. Many developing countries around the world has
initiated and implemented several ICT projects in different
ministries to build basic infrastructure, to impart IT literacy to
the employees and to make some of the government services IT
enabled. E-governance promises transparency, shortened service
delivery time, mitigation of poverty, corruption, and strengthening
of democratic practices through people's participation, and support
for good governance. Though the governments of the developing
countries are concerned about the issue 'E-governance', in many
developing countries E-governance is not in the best practice level
thus the advantages of electronic governance are not delivered in
full fledge. This paper aims to investigate the maturity level and
practices of E-governance currently being followed by the selected
developing countries. The authors followed qualititative research
approach to investigate the maturity level and current practices of
the selected countries' E-governance.
Timely action and prompt response are the crying need for emergency
services like health care in a hospital. Unavailability of it may
result to a massive disaster. For example, in a hospital, doctors
and nurses must respond promptly to take necessary action for a
critical patient to save his life. Prompt response and timely act
may save thousands of lives.But prompt response does not mean that
it can compromise with the security issues. In critical scenarios
massive flow of highly secure information is expected. Different
levels of employees are allowed to have different level of
privileges to the system for securing access and a smooth run of
the system. To provide the exact level of service according to
one's privileges to the system is only possible by a proper
authentication process.Repetitive authentication processes wastes
valuable time on a critical moment along with distracting people
from their main course of action. The system loses its invisibility
and efficiency. Here comes the need for having a fully automated
solution for this access control systems.Here we have presented an
efficient way of automated access control mechanism using Proximity
Based Access Control(PBAC
|
You may like...
Hampstead
Diane Keaton, Brendan Gleeson, …
DVD
R66
Discovery Miles 660
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.