2021
DOI: 10.11591/ijai.v10.i3.pp623-635
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Bayesian network to improve service delivery and performance dependability on a campus network

Abstract: An effective systemic approach to task will lead to efficient communication and resource sharing within a network. This has become imperative as it aids alternative delivery. With communication properly etched into the fabrics of today’s society via effective integration of informatics and communication technology, the constant upgrades to existing network infrastructure are only a start to meeting with the ever-increasing challenges. There are various criteria responsible for network performance, scalability,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
30
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(31 citation statements)
references
References 34 publications
(32 reference statements)
1
30
0
Order By: Relevance
“…It has been suggested that young female adults are constantly engaged to boycott social seclusion which leads to addiction whereas, excessive online presence and dependence on social media content used are often relevant lures and cues for potential victimization by phishers [31], [38] and lead to the exposure of associates. Ojugo and Eboka [37] posit that age is linked to risky behavior, which increases the chances of these young (female) adults being phished as they have less education and caution for financial risk [1], [39]. Goel et al [3] postulated that women are easier to entice to open phishing emails, but are equally as capable and proficient as men in detecting a deceptive message.…”
Section: Materials and Methods 31 Sample Demographicsmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been suggested that young female adults are constantly engaged to boycott social seclusion which leads to addiction whereas, excessive online presence and dependence on social media content used are often relevant lures and cues for potential victimization by phishers [31], [38] and lead to the exposure of associates. Ojugo and Eboka [37] posit that age is linked to risky behavior, which increases the chances of these young (female) adults being phished as they have less education and caution for financial risk [1], [39]. Goel et al [3] postulated that women are easier to entice to open phishing emails, but are equally as capable and proficient as men in detecting a deceptive message.…”
Section: Materials and Methods 31 Sample Demographicsmentioning
confidence: 99%
“…The daily rise in the adoption of information and communication technology (ICT) devices vis-à-vis their usage over the Internet due to its ease of use, speed, accuracy, and portability among other features have also, in turn, birthed and continued to advance socially-engineered attacks, designed to evade detection, and poised to help attackers have access to user data. Thus, user trust-level over the adoption and adaptation of ICT devices in today's digital transformation era, has become a global issue [1]. Digital transformation seeks to integrate technology into various facets of life-endeavors and to fundamentally change how we operate/deliver value-chain to clients.…”
Section: Introductionmentioning
confidence: 99%
“…A typical food supply value chain can consist of farmers or growers, processors, wholesales or distributors, retailers, importers, and exporters-with processes that include handling, packaging, transportation, storage, and trading of these products cum goods for contract services and monies and or financial portfolios. These processes and the much-needed stakeholders involved therein constitute a complex, chaotic and dynamic structure of processes whose behavior impacts the performance therein of the entire system [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…The asset market has since become the focal epicenter for diversification of financial portfolios and 3-crucial factors that impact human existence include food, clothing, and shelter-mostly with food being a basic need of man-with agriculture playing a dominant role in the front seat of the asset market [3]. With agricultural products traded as assets as well as the inherent challenges therein, optimizing the food valuechain structure becomes imperative and thus, has also become an extensively studies phenomenon.…”
Section: Introductionmentioning
confidence: 99%
“…As more individuals become connected to the Internet via enabling devices/supports-it consequently, also opens up many of such persons on a larger scale, to avenues of exploitation that can be harnessed by adversaries via threats and cyber-attacks [1], [2]. The attacks reveal how vulnerable a device connected over the network is, with such attacks continually advanced via socially engineered.…”
Section: Introductionmentioning
confidence: 99%