Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
Pattern Matching with variable length gaps: A Practitioner's Approach which compares the theoretical and practical performance between two most recent pattern matching algorithms with variable length gaps as pattern matching problem is a basic primitive in computational biology applications.It is a fundamental computer science problem and is a basic need of many sophisticated forms of searching applications, such as text retrieval, music retrieval, data mining and network security.
Widespread global acceptance of electronic governance designates that E-governance has revolutionized the governing systems in the world to a degree. Many developing countries around the world has initiated and implemented several ICT projects in different ministries to build basic infrastructure, to impart IT literacy to the employees and to make some of the government services IT enabled. E-governance promises transparency, shortened service delivery time, mitigation of poverty, corruption, and strengthening of democratic practices through people's participation, and support for good governance. Though the governments of the developing countries are concerned about the issue 'E-governance', in many developing countries E-governance is not in the best practice level thus the advantages of electronic governance are not delivered in full fledge. This paper aims to investigate the maturity level and practices of E-governance currently being followed by the selected developing countries. The authors followed qualititative research approach to investigate the maturity level and current practices of the selected countries' E-governance.
Timely action and prompt response are the crying need for emergency services like health care in a hospital. Unavailability of it may result to a massive disaster. For example, in a hospital, doctors and nurses must respond promptly to take necessary action for a critical patient to save his life. Prompt response and timely act may save thousands of lives.But prompt response does not mean that it can compromise with the security issues. In critical scenarios massive flow of highly secure information is expected. Different levels of employees are allowed to have different level of privileges to the system for securing access and a smooth run of the system. To provide the exact level of service according to one's privileges to the system is only possible by a proper authentication process.Repetitive authentication processes wastes valuable time on a critical moment along with distracting people from their main course of action. The system loses its invisibility and efficiency. Here comes the need for having a fully automated solution for this access control systems.Here we have presented an efficient way of automated access control mechanism using Proximity Based Access Control(PBAC
Today's globalized world is more liable on high-tech novelty as well as business. Yet, setting up of business value with technology is the biggest challenge for mid-sized organization. For the time being, a new sector so-called "information technology (Networks, desktop applications, data center, different service support such as call centers etc.)" expanded intensely due to hasty speed of technological revolution. Conversely, difficulties in resource specification & rareness, political unrest, technological ambiguity and economic instability etc. have made the business environment more intricate and competitive. Considering those barriers and supplement issues, IT outsourcing is now a common practice in most organization. Again, IT outsourcing often goes wrong due to lack of analysis about possible appropriateness of few economic theories into IT outsourcing decision process. This paper work strongly focuses on the key reasons behind IT outsourcing, common goals and objectives as well.This also explores diverse issues that trigger outsourcing decisions and critical success factors of selecting vendors. As a whole, it may be an effective handout for novice managers of SMEs.
|
You may like...
Snyman's Criminal Law
Kallie Snyman, Shannon Vaughn Hoctor
Paperback
|