Refine
H-BRS Bibliography
- no (687) (remove)
Departments, institutes and facilities
Document Type
- Conference Object (687) (remove)
Year of publication
Keywords
- Entrepreneurship (6)
- Cloud (4)
- DPA (4)
- E-Learning (4)
- Ghana (4)
- Privacy (4)
- Barriers (3)
- Culture (3)
- HTTP (3)
- OER (3)
- Power Analysis (3)
- REST (3)
- Receivers (3)
- Security (3)
- Stochastic Model (3)
- Web (3)
- end user development (3)
- security (3)
- visualization (3)
- web caching (3)
- web services (3)
- Basic Access Control (2)
- Boolean Masking (2)
- Claim personal data (2)
- Cloud Security (2)
- Data takeout (2)
- E-Passport (2)
- EBSD (2)
- Educational Culture (2)
- Equipment and services (2)
- Fourier transforms (2)
- GDPR (2)
- Heterodyning (2)
- Host-Based Code Injection Attacks (2)
- ICT (2)
- Inclusion (2)
- Institutions (2)
- Kenya (2)
- Learning Culture Survey (2)
- MRTD (2)
- Malware analysis (2)
- Memory forensics (2)
- Mobility (2)
- Non-linear systems (2)
- Open Educational Resources (2)
- Optics (2)
- Oscillators (2)
- Performance (2)
- Performance Analysis (2)
- SOA (2)
- Sensors (2)
- Shared autonomous vehicles (2)
- Side Channel Cryptanalysis (2)
- Social Software (2)
- Spectrometers (2)
- Start-ups (2)
- Sustainability (2)
- TEL (2)
- TLS (2)
- Technology Enhanced Learning (2)
- Telescopes (2)
- Template Attack (2)
- Usable Security (2)
- WS-Security (2)
- design case study (2)
- knowledge learning (2)
- network (2)
- neural networks (2)
- reliability (2)
- resources (2)
- virtual reality (2)
- wire bonding (2)
- AES hardware (1)
- API usability (1)
- Actiotope Model (1)
- Active Eco-Tourism in Emerging Tourism (1)
- Adaptive Media Streaming (1)
- Advance Encryption Standard (1)
- Adversarial Model (1)
- Africa (1)
- Agent-oriented software engineering (1)
- Air transport (1)
- Alternde Gesellschaft (1)
- Appropriateness (1)
- Articulation Work (1)
- Astronomy (1)
- Attacks and Attack Implementations (1)
- Authentication (1)
- Autonomous Driving (1)
- Bewegungsmotivation (1)
- Biometrics (1)
- Black Hole (1)
- Boolean and arithmetic operations (1)
- Botnet tracking (1)
- Browser cache (1)
- COPACOBANA (1)
- CRT (1)
- Cache Poisoning (1)
- Change (1)
- Cipher Block Chain (1)
- Clean Energy and Power Systems (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Community (1)
- Computer Security (1)
- Computer Simulation Techniques (1)
- Computer Support (1)
- Computer hardware (1)
- Concurrent Kleene Algebra (1)
- Conformance Testing (1)
- Constructionism (1)
- Conversational Interface (1)
- Cooperative Work (1)
- Cryptography (1)
- Culinary Tourism (1)
- Cultural Distance (1)
- Culture Awareness (1)
- Culture-Related Conflicts in Education (1)
- Culture-Sensible Education (1)
- Curriculum (1)
- DEMA (1)
- DES (1)
- DNSSEC (1)
- DSGVO (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Denial of Service (1)
- Design patterns (1)
- Development (1)
- Difference-coding (1)
- Differential Side Channel Cryptanalysis (1)
- Differential side-channel analysis (1)
- Digitaler Konsum (1)
- Disaster Area (1)
- Distance Bounding (1)
- Distribute Software Development (1)
- E-Learning 2.0 (1)
- E-Learning 3.0 (1)
- EM Algorithm (1)
- Eco-Cycling (1)
- Eco-system (1)
- Ecosystem (1)
- Education (1)
- Educational Standards (1)
- Elderly (1)
- Electromagnetic Analysis (1)
- Electromagnetic wave propagation (1)
- Electronic Immobilizer (1)
- Enterprise Resource Planning (1)
- Evaluation (1)
- Explainability (1)
- Explainable artificial intelligence (1)
- Fake Link (1)
- Fast Moving Consumer Goods Company (1)
- Fault analysis (1)
- File carving (1)
- Food (1)
- Forschungsprojekt (1)
- Fourier optics (1)
- Fourier transform spectra (1)
- Fragmented files (1)
- Frequency conversion (1)
- Frontend architecture (1)
- Full-text Search (1)
- Fuzzy Logic (1)
- Gaussian Mixture Models (1)
- Gender (1)
- Gesundheit (1)
- Ghanaian entrepreneurs (1)
- Global Software Development (1)
- Globally convergent methods (1)
- Government (1)
- Grassroots (1)
- HCI (1)
- HFI (1)
- HMAC-construction (1)
- Haco Tiger Brands (1)
- Hall-Petch relation (1)
- Hardware Testbed (1)
- Hauswirtschaft (1)
- High-Order Attacks (1)
- Higher-Order Analysis (1)
- Higher-Order Side Channel Analysis (1)
- Holographic interferometry (1)
- Holography (1)
- Hospitality entrepreneurial skills (1)
- Human computer interaction (1)
- Human factors (1)
- Human-agent interaction (1)
- IDEA (1)
- IEEE 802.11 (1)
- IEEE 802.11n (1)
- Impaired (1)
- Implementation Attack (1)
- Index (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Innovation (1)
- Instructor Support (1)
- Instrumented indentation experiments (1)
- Integrierungsmethodik (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Internationalization (1)
- Internet (1)
- Internet Technology (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- Jobs (1)
- Kalman filter (1)
- Kenya Vision 2030 (1)
- Key Search Machine (1)
- Knowledge sharing (1)
- Kommunikationsvernetzung (1)
- Laws of programming (1)
- Leapfrogging (1)
- Learner’s Preferences (1)
- Learning (1)
- Learning 2.0 (1)
- Learning 3.0 (1)
- Learning Context (1)
- Learning Environments (1)
- Learning Management Systems (1)
- Legal Design (1)
- Liberalization (1)
- Living Labs (1)
- Long-distance (1)
- MASLOC (1)
- MEMS glass frit (1)
- MIMO (1)
- MPLS (1)
- MR-WMN (1)
- MRTD Cracker (1)
- Machine Learning (1)
- Mafia Attack (1)
- Malware (1)
- Malware Detection (1)
- Marketing practices (1)
- Maximum Likelihood Principle (1)
- Mental Models (1)
- Message Authentication (1)
- Metrics (1)
- Microservices (1)
- Minimum Principle (1)
- Mobile technologies (1)
- Mobility Model (1)
- Mobility modeling (1)
- Modal Shift (1)
- Model-based engineering approaches to AI safety (1)
- Motion Generator (1)
- Motivators (1)
- Motor Control Unit (1)
- Mountain Biking (1)
- Mully Model of Applied Entrepreneurship Teaching (1)
- Multi-hop Net-works (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multivariate Side Channel Analysis (1)
- NBSSI (1)
- Nachhaltigkeit (1)
- Norm (1)
- Onion Model of Culture (1)
- Open Educational Practices (1)
- Paketvermittlung (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Performance Evaluation (1)
- Persuasive Systeme (1)
- Phishing (1)
- Physical Security (1)
- Platform economy (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Private sector development (1)
- Privatsphäre (1)
- Product Innovation (1)
- Pulsars (1)
- Push-based Streaming (1)
- QoS (1)
- Qualitative research (1)
- Qualitäts-Service (1)
- RC6 (1)
- REST security (1)
- RF Eavesdropper (1)
- RFID (1)
- RSA (1)
- Radio astronomy (1)
- Rank correlation (1)
- Refinement (1)
- Reflectors (1)
- Renewable Energy (1)
- Research Trajectories (1)
- Restful Web Services (1)
- Revised Onion Model of Culture (1)
- Router (Rechnernetz) (1)
- Runtime AI safety monitoring (1)
- Rural communities (1)
- SCP (1)
- SHA-1 (1)
- SOAP (1)
- SaaS (1)
- Scanning (1)
- Second-Order DPA (1)
- Secure Cloud Storage (1)
- Security APIs (1)
- Security Approaches (1)
- Security Protocol (1)
- Semantic models (1)
- Semi-Virtual Testbed (1)
- Semiconductor lasers (1)
- Sensorbasierte Systeme (1)
- Service-Oriented Architecture (1)
- Side Channel Analysis (1)
- Side Channel Cryptanalysis, Stochastic Methods (1)
- Single sideband modulation (1)
- Smart Home (1)
- SmartMANET Jamming (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Social sustainability (1)
- Soft skill (1)
- Software Security (1)
- Softwareanpassung (1)
- Softwaresystem (1)
- Spectroscopy (1)
- Standardization (1)
- Stationary network problems (1)
- Strategy (1)
- Structural sensitivity (1)
- Sub-Saharan Africa (1)
- Submillimeter telescopes (1)
- Sustainable Agriculture (1)
- Sustainable Business Model Canvas (1)
- Sustainable Development Goals 2030 (1)
- Sustainable HCI (1)
- Tactical Wireless Multi-hop Networks (1)
- Tamper-Proof Hardware (1)
- Tampering (1)
- Taxi (1)
- Template attacks (1)
- Templates (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Tourism Destination Development (1)
- Tourism Destination Management (1)
- Tourism education (1)
- Trace algebra (1)
- Training Approaches (1)
- Transponder (1)
- Transportation (1)
- Trusted Computing (1)
- UI-Dressing (1)
- URI (1)
- Unifying theories (1)
- University IT Teaching (1)
- University–industry linkage (1)
- Usable Privacy (1)
- Verbraucherforschung (1)
- Verbraucherinformatik (1)
- Warnings (1)
- Web 2.0 (1)
- Web 3.0 (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- Weitverkehrsnetz (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Wireless back-haul (1)
- Wizard of Oz (1)
- Workflow (1)
- Worm Hole (1)
- XAI (1)
- XML (1)
- XML Security (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XSpRES (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- action unit recognition (1)
- adoption (1)
- aluminum (1)
- appropriation (1)
- attacks (1)
- breakdowns (1)
- business management principles (1)
- caching (1)
- capillary compression test (1)
- case study (1)
- cognitive agents (1)
- conceptual framework (1)
- cooperation (1)
- crack growth (1)
- creativity (1)
- cryptographic apis (1)
- culture of participation (1)
- deep learning (1)
- delivery (1)
- design (1)
- design science research (1)
- developed market (1)
- developer console (1)
- development (1)
- digital fabrication (1)
- distributed systems (1)
- doctoral students (1)
- dynamic econometric forecasting models (1)
- ease (1)
- economic culture (1)
- economic sector (1)
- einheitliches Internet-Übertragungsprotokoll (1)
- electromagnetic wave polarisation (1)
- emerging market (1)
- emerging markets (1)
- emotion recognition (1)
- end-to-end security (1)
- energy feedback (1)
- entrepreneurial interest (1)
- entrepreneurship development (1)
- entrepreneurship education (1)
- erp4students (1)
- facial expression analysis (1)
- failure (1)
- field programmable gate arrays (1)
- finite element model (1)
- focus groups (1)
- fracture mechanic (1)
- fracture toughness (1)
- gas lasers (1)
- gold (1)
- hardware engineering (1)
- harmonic generation (1)
- harmonic generation including higher-order harmonic generation (1)
- implementation (1)
- in-campus internships (1)
- indentation (1)
- industry forces (1)
- information sharing (1)
- innovation (1)
- instructional supervisor (1)
- integration governance (1)
- interaction design (1)
- interactive-learning (1)
- intercultural management (1)
- interferometers (1)
- international entrepreneurship (1)
- internships (1)
- inverse parameter identification (1)
- job and wealth creation (1)
- knowledge management (1)
- laser diodes (1)
- leapfrog (1)
- learning experience (1)
- lifetime (1)
- link optimization (1)
- link quality (1)
- linkage strategy (1)
- local material properties (1)
- logistics (1)
- lokales Netz (1)
- maker communities (1)
- metadata (1)
- micro chevron (1)
- micro compression test (1)
- microwave propagation (1)
- modular reduction (1)
- neural-networks (1)
- new business start-ups (1)
- other holographic techniques (1)
- pain recognition (1)
- participatory design (1)
- performance and training (1)
- personal orientation (1)
- practical skills (1)
- prospects and challenges (1)
- prosumption (1)
- qualitative research methods (1)
- radiowave propagation (1)
- rate adaptation (1)
- rebound effects (1)
- reproducible node motion (1)
- reverse innovation (1)
- risk taking (1)
- routing metrics (1)
- security warning design (1)
- sensitivity of point forecast (1)
- sharing (1)
- signature (1)
- smartcard (1)
- software development (1)
- software engineering (1)
- state constraints (1)
- stellar radiation (1)
- support agencies (1)
- survival (1)
- sustainability (1)
- technological platform (1)
- technology (1)
- textile and apparel industry (1)
- transaction costs (1)
- university of applied sciences (1)
- university performance (1)
- usability (1)
- usable privacy (1)
- values (1)
- verteiltes System (1)
- virtual-reality (1)
- voice interaction (1)
- wireless back-haul (1)
- Übertragungsqualität (1)
- “Big Four” agenda (1)
There is severe clinical vitamin A deficiency (VAD) prevalence among Ghanaians and many African countries. Foodbased diets has been suggested as a more sustainable approach to solving the VAD situation in Africa. In this study, A participatory action research between orange flesh sweet potato farmers, gari processors within central region and academia was adopted to develop gari containing provitamin A beta-carotene. Gari is a major staple for Ghanaians and people in the West African subregion due to its affordability and swelling capacity. It is mainly eaten raw with water, sugar, groundnut and milk as gari-soakings or with hot water to prepare gelatinized food called gari-kai in Ghana or “eba” among Nigerians. However, gari is limited in provitamin A carotenoids. Orange fleshed sweet potato (OFSP) is known to contain large amount of vitamin A precursor. Therefore, addition of OFSP to gari would have the potential to fight the high prevalence rate of vitamin A deficiency amongst less developed regions of Africa. To develop this, different proportions of orange fleshed sweet potatoes (OFSP) was used to substitute cassava mash and fermented spontaneously to produce composite gari - a gritty-crispy ready-to-eat food product. Both the amount of OFSP and the fermentation duration caused significant increases in the β-carotene content of the composite gari. OFSP addition reduced the luminance while roasting made the composite gari yellower when compared with the cake used. Addition of OFSP negatively affected the swelling capacity of the gari although not significant. The taste, texture, flavour and the overall preferences for the composite gari decreased due to the addition of the OFSP but fermentation duration (FD) improved them. The sample with 10% OFSP and FD of 1.81 days was found to produce the optimal gari. One-portion of the optimal gari would contribute to 34.75, 23.2, 23.2, 27, 17 and 16% of vitamin A requirements amongst children, adolescent, adult males, adult females, pregnant women and lactating mothers respectively. The study demonstrated that partial substitution of cassava with OFSP for gari production would have the potential to fight the high prevalence rate of vitamin A deficiency amongst less developed regions of Africa while involvement of farmers and processors prior to the design of research phase enhanced the adoption of intervention strategies.
ICT integration by universities teaching professionals is emerging as a major concern, this study demonstrate the need to address the integration problem by encouraging existing metrics use in indexing ICT integration as an ICT governance strategy. Quality of integration depends on quality indexing which also depend on quality of existing metrics and their use. Considering the role that University Information Technology Teaching Professionals’ (UITTPs) continuous improvement indexing can offer, towards autonomic governance of the continuous emerging ICTs in the university teaching, this study examined extent in use of existing ICT integration metrics to index ICT integration by the UITTPs. Six metrics for ICT integration were investigated; time, workshop course content relevance, technical malfunctions, support conditions, support services, and motivation and commitment to student learning and staff professional development metrics. Descriptive survey design was used in which interviews were conducted to UITTPs in three (3) public and three (3) private purposively selected universities in Kenya. The findings were analyzed descriptively and inferentially using Kendall’s correlation of concordance and tested using Chi-square on the extent of concordance and presented with help of frequency tables, figures and percentages. The findings revealed that all the metrics are rarely used for indexing ICT integration (32.8%), and most UITTPs were in discordance on this level of all the six metrics use except for support condition. This implied that the use of metrics for indexing integration has not been formalized across the Kenyan universities. Universities need to be encouraged to identify suitable metrics, formalize them and improve their frequency in use. Secondly, socio based metrics such as content relevance are used more frequently for indexing integration as compared to Technical metrics, socio-technical metrics balance therefore need to be emphasized by the universities management when determining and using metrics for indexing ICT integration.
Cancer is one of the leading causes of death worldwide [183], with lung tumors being the most frequent cause of cancer deaths in men as well as one of the most common cancers diagnosed in woman [40]. As symptoms often arise in advanced stages, an early diagnosis is especially important to ensure the best and earliest possible treatment. In order to achieve this, Computed Tomography (CT) scans are frequently used for tumor detection and diagnosis. We will present examples of publicly available CT image data of lung cancer patients and discuss possible methods to realize an automatic system for automated cancer diagnosis. We will also look at the recent SPIE-AAPM Lung CT Challenge [10] data set in detail and describe possible methods and challenges for image segmentation and classification based on this data set.
With trainings and research oriented towards sustainable development since 2006 (Water and Sanitation, Infrastructure, Renewable Energies and Energy Processes), Foundation 2iE is positioning itself as a reference institute that trains innovative engineers-entrepreneurs for the needs and challenges of Africa’s development. Center of Excellence of the UEMOA and the World Bank, CSR is at the heart of the Strategy of the institute which aims to be a showcase in this field in Africa.
The role of tourism entrepreneurship in rural development continues to be a subject of interest and debate among academia and practitioners. Theoretically, it is anticipated that tourism entrepreneurship will lead to livelihood diversification, enhancement and ultimately a revitalization of the rural economy. While tourism is posited as an accessible entrepreneurship pathway, there is a dearth of information regarding rural dwellers’ actual experiences with it, especially within the Ghanaian context. Using a case study approach and qualitative data from Wli; a rural tourism destination in Ghana, this paper delves into the opportunities and concerns associated with tourism entrepreneurship in rural areas. Data was obtained between November and December 2016 from 27 persons who were either tourism enterprise owners or employees. Findings from the study showed that entrepreneurial activities centred on the provision of accommodation, food and beverage, souvenir and guiding services. The nature of the activities enabled easy transfer of existing skills and knowledge. Further, entry into tourism entrepreneurship was perceived to be easy by the majority of study participants. These findings confirm the potential for tourism to be employed in boosting entrepreneurial activities in rural areas. Nevertheless, there were concerns regarding access to credit, institutional support, unhealthy competitions, low incomes, unguaranteed pensions, and seasonality and skewness of demand. These concerns threatened the growth and sustainability of tourism entrepreneurship within the community. From a policy perspective, there is a need for institutional recognition and support for tourism entrepreneurial intentions and activities in rural areas. Practice-wise, credit facilities need to be designed specifically for tourism-related rural enterprises. Further, periodic skills and knowledge augmentation programmes must be initiated to help expand the skill sets for the rural entrepreneurs. Finally, there is a need for the formation of traderelated networks to provide a platform for knowledge and experience sharing among the entrepreneurs.