Hae
Aineistot 1-10 / 15
Design and implementation of UHF RFID smart readers
(2019-12-17)
The traditional process of integrating RFID technology into business processes can be very costly and tedious. The readers were only capable of doing a single task which is listen for requests from a client application, ...
Ensuring the integrity of nodes under the context of container live migration in a secure network
(2019-12-17)
The amount of data generated in our hyper-connected networks is rising exponentially. More and more consumer electronic devices rely on the internet to provide users with seamless access to services. Cloud computing has ...
FACTORS AFFECTING PHISHING SUSCEPTIBILITY OF THE STUDENTS
(2018-11-20)
The purpose of this study is to identify and examine the factors that may affect phishing susceptibility of the students. Using a role-play task in an online survey, data were collected from students of the University of ...
Real time Learning State Evaluation System for Elearning
(2019-10-30)
In the information age, the popularity of the Internet is profoundly changing the way people live. In this context, the online classrooms, which are spawned as a supplement to traditional classroom teaching, ...
On the State of Information Security in Public Sector Organizations in Ethiopia
(2020-06-05)
Information and communication technology (ICT) has become a vital part of the developing countries economy. As the use of ICT is increasing in day to day work of the organizations, there is a need to implement measures for ...
Achieving ISO 27001 Certification by implementing an Information Security Management System
(2018-12-04)
Information security is intended to protect the confidentiality, integrity and availability of information assets within an organisation. In recent times, there has been a significant trend in increasing cyber-attacks, ...
2.4GHz RF Front-end Module Based on 0.18μm CMOS Process
(2020-05-06)
With the increasing number of wireless communication applications, the demand for low-power and low-cost radio frequency (RF) wireless transceiver chips is increasing. Therefore, the idea of using complementary metal oxide ...
Antecedents of Continued Use Intention in the Era of Data Breaches: An Empirical Study of Pakistani Online Banking Users
(2020-04-14)
Data breaches are a rising threat to the banking sector in which the customer’s information is accessed by unauthorized persons leading to reduced trust and reputation. The reduction in trust and satisfaction may result ...
Path Planning of Autonomous Agricultural Vehicles
(2020-04-28)
Autonomy in the automotive industry is not a new concept. Advanced changes in technology have made it possible. With this trend, bringing autonomy to industrial agricultural fields in this era is also possible. With the ...
Scalable Tree Structure Blockchain System and Consensus for Consortium Chain
(2021-10-01)
The blockchain technology has gradually attracted the attention of researchers and various industries and has been used to build a network for trust due to its data traceability and difficult to tamper with since the birth ...