The development of portable computing devices has raised the demand for Quality of
Service in MANETs recently. The main objective of the routing protocol in these highly on
demand services is to enable successful data ...
WSN consists of nodes that are very difficult to replace by nature due to their physical
placement in remote and inaccessible locations. These nodes are equipped with limited
energy resources. When the nodes perform ...
The study highlighted the persisting global health crisis of HIV/AIDS and the recent disruptions
caused by economic and humanitarian crises along with the COVID-19 pandemic. These factors
have troubled the established ...
Studying and mapping population mobility pattern in the city dynamically plays a vital
role and has practical applications to urban planning and to plan better transport system.
For long times the city authorities used ...
Identity management and integrated technologies are the basic building blocks in the field
of e-Government, as they constitute secure and reliable access to online services. The
implementation of integrated identity ...
The existence of an anaphoric term in a text has an impact on different natural language
processing studies like machine translation, semantics analysis, and sentiment analysis. This
study use deep learning and a machine ...
Vehicle accidents are becoming a global public health concern, especially in
Ethiopia. According to a World Health Organization report in 2015, Ethiopia
is one of the 50 countries with the deadliest roads in the world. ...
Speaker recognition is the process of identifying the speaker based on the acquired voices. There
are different studies conducted on speaker recognition systems for different languages using
different techniques i.e. ...
Infection with the human immunodeficiency virus and acquired immunodeficiency syn drome (HIV/AIDS) continue to pose a threat to Amhara society. The number of people
who are aware of their HIV status has increased thanks ...
One of the most serious cyberattacks where investigators are concerned about a
solution is phishing. Phishing is a technique used by attackers to entice end
users and steal their private data. To obtain personal ...
The development of portable computing devices has raised the demand for Quality of
Service in MANETs recently. The main objective of the routing protocol in these highly on
demand services is to enable successful data ...
WSN consists of nodes that are very difficult to replace by nature due to their physical
placement in remote and inaccessible locations. These nodes are equipped with limited
energy resources. When the nodes perform ...
The study highlighted the persisting global health crisis of HIV/AIDS and the recent disruptions
caused by economic and humanitarian crises along with the COVID-19 pandemic. These factors
have troubled the established ...
Studying and mapping population mobility pattern in the city dynamically plays a vital
role and has practical applications to urban planning and to plan better transport system.
For long times the city authorities used ...
Identity management and integrated technologies are the basic building blocks in the field
of e-Government, as they constitute secure and reliable access to online services. The
implementation of integrated identity ...
The existence of an anaphoric term in a text has an impact on different natural language
processing studies like machine translation, semantics analysis, and sentiment analysis. This
study use deep learning and a machine ...
Vehicle accidents are becoming a global public health concern, especially in
Ethiopia. According to a World Health Organization report in 2015, Ethiopia
is one of the 50 countries with the deadliest roads in the world. ...
Speaker recognition is the process of identifying the speaker based on the acquired voices. There
are different studies conducted on speaker recognition systems for different languages using
different techniques i.e. ...
Infection with the human immunodeficiency virus and acquired immunodeficiency syn drome (HIV/AIDS) continue to pose a threat to Amhara society. The number of people
who are aware of their HIV status has increased thanks ...
One of the most serious cyberattacks where investigators are concerned about a
solution is phishing. Phishing is a technique used by attackers to entice end
users and steal their private data. To obtain personal ...
Rape is serious crimes that have a troubling impact on victims in particular and the society in
general. It is very dynamic and flexible. It is also sensitive for social and political crises.
Therefore, developing ...
Localization is a topic widely discussed in the field of networking. It can be classified
into indoor and outdoor localization, with indoor localization being particularly
significant for the development of smart cities. ...
In Ethiopia, there are several nations and ethnic groups which have their own language, culture,
and custom. They play their traditional music and perform their own dance style, while
traditional music is recorded as ...
Insufficient blood circulation throughout the body is referred to as heart failure. The heart
normally becomes too weak or stiff to function properly when this occurs. Occasionally,
congestive heart failure is used to ...
WCDMA (Wideband Code Division Multiplexing Access is a 3G broadband, packet based transmission of text, voice, video, and multimedia Services. it provides several
bearer services, real-time and non-real-time services, ...
The collection of tax is the mainsource of incomefor the government.
Taxcollecting has been associated with a lot of fraud, which is a challenge to
detect.Fraud involves one or more persons who intentionally act secretly ...
Relation extraction is a very useful task for several natural language processing applications,
such as automatic summarization, knowledge graph development and question answering. An
entity relation defined as a ...
Counterfeit money refers to fake or imitation currency that is produced with the idea to
deceive. The advancement of color printing technology has increased the rate of fake
currency note printing and ...
Hate speech is a critical problem in Ethiopia and around the world and is disseminated
using different social media platforms. In the world, as social media users increase, hate
speech dissemination increases rapidly ...
Modern information and communication technology is revolutionizing how courts
function, reducing backlogs by speeding up case resolutions and improving citizen access
to trial proceedings and disposition. ...