The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The PhD degree is a requirement for promotion in academia. The brain drain experienced by Sudan and other neighbouring countries has led to a scarcity of PhD supervisors. Thus, many young Sudanese college lecturers holding Master degrees find it difficult to do their PhD locally in Sudan. Furthermore, they cannot seek education abroad due to economic, social and family commitments. This paper describes...
Conducting on-line learning requires the availability of a number of aspects. These aspects include students' readiness, curricula suitability, technical infrastructure, technical support, financial readiness and teachers' training. In view of these aspects, this study was undertaken to provide a framework for investigating the extent to which universities are ready to conduct on-line learning with...
As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuse- and anomaly-based. A collaborative, intelligent intrusion detection system (CIIDS) is proposed to include both methods, since it is concluded from recent research...
As complete prevention of computer attacks is not possible, intrusion detection systems (IDS) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuse- and anomaly-based. A collaborative intelligent intrusion detection system (CIIDS) is proposed to include both methods, since it is concluded from recent research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.