Showing 1 - 10 of 611
Many people are afraid of falling prey to crime. The present report investigates the extent to which this fear is in line with the actual regional crime rates. This analysis is based on data from a comprehensive database on the fear of crime, combined with police crime statistics (specifically,...
Persistent link: https://www.econbiz.de/10011207405
The use of electronic spreadsheets as the primary software tool for teaching management science modeling techniques and quantitative methods in economics and finance undoubtedly played a key role in the increasing impact of quantitative lectures given in graduate programs. Researchers suggest...
Persistent link: https://www.econbiz.de/10010296462
An enormous growth in internet usage has resulted into great amounts of digital data to handle. Data sharing has become significant and unavoidable. Data owners want the data to be secured and perennially available. Data protection and any violations thereby become crucial. This work proposes a...
Persistent link: https://www.econbiz.de/10012042644
privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved …
Persistent link: https://www.econbiz.de/10012042666
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
aspects. Non-availability of a standard functional SDI model based on SOA, Lack of technical interoperability and security … models, which links the metadata server to database server, 3-tier interoperability and security framework with the help of …
Persistent link: https://www.econbiz.de/10012042844
end-to-end data, voice and video. Data transmission through WMN has the security and reliability, same as the conventional …
Persistent link: https://www.econbiz.de/10012043257
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card …
Persistent link: https://www.econbiz.de/10012043265
, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session … registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and …
Persistent link: https://www.econbiz.de/10012043352
One of the most technological trends that enables on demand sharing of resources through Internet is Cloud Computing. It is a collection of hardware, software, storage, and services which are efficiently utilized to enhance business agility through reducing communication and computing costs....
Persistent link: https://www.econbiz.de/10012043354