Background to the Study
With the shrinking of the world into a global village through the increasing sophistication of communication technologies, the local media in a nation is brought under fierce competition for local audience by the global media. What broadcasting d...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the study
Over the past decade, there has been a spectacular increase in the usage of the Internet, and more specifically the World Wide Web. This rise has had an influence on virtually every aspect of daily life in industrialized c...
Background of the study
Over the past ten years, there has been a spectacular increase in the usage of the Internet, and more specifically the World Wide Web. This rise has had an influence on practically every aspect of daily life in industrialised cul...
ABSTRACT
Today, the advancement of mobile technologies has provided an opportunity for financial service providers in introducing new financial innovations. One of the emerging financial innovations introduced by financial providers is mobile banking or m-banking. This...
INTRODUCTION
Modern financial accounting is based on a double entry system. Described simply, double entry bookkeeping allows firms to maintain records that reflect what the firm owns and owes and also what the firm has earned and spent over any given p...
BACKGROUND OF THE STUDY
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or e...
Excerpt from the Study
This study focused on the development of novel digital image watermarking technique in DOST domain in conjunction with DWT and SVD based on the principle of photon polarization using optimal scaling factor. The developed algorithm is applied on co...
Abstract
Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...