- Filter by:
-
Content Type
-
Topic
- Big Data (2053)
- Security (2025)
- Data Management (1892)
- Hardware (1880)
- Cloud (1825)
- Networking (1623)
- Mobility (1485)
- Software (1345)
- Enterprise Software (1297)
- E-Commerce (380)
- Data Centers (254)
- Developer (254)
- Storage (239)
- Tech & Work (232)
- Virtualization (230)
- Project Management (120)
- Innovation (118)
- Tech Industry (117)
- Digital Transformation (101)
- Collaboration (84)
- CXO (67)
- SMBs (66)
- Social Enterprise (63)
- Microsoft (38)
- Artificial Intelligence (29)
- Consumerization (27)
- Banking (25)
- Internet of Things (24)
- Printers (20)
- Google (16)
- Start-Ups (14)
- Open Source (9)
- GDPR (3)
- After Hours (2)
- Apple (2)
- Asean (2)
- EU (2)
- IT Policies (2)
- Smart Office (2)
- Amazon (1)
- Australia (1)
- CIO50 (1)
- Digital Health and Wellness (1)
- India (1)
- TechRepublic Premium (1)
-
A Classical Approach for Rolled, Plain to Latent Fingerprint Matching
In this paper, the authors present crime scenes, law enforcement and forensics application (rolled, plain and latent fingerprint matching) biometrics latent fingerprint identifying to catching the criminals. Due to Latent fingerprint is poor quality image means blurred, smudgy image cannot easily to extract. The main goal provide latent fingerprint image...
Download Now -
Architecture Design and Cyber Security Evaluation of a Festival Management System Server
In this paper, the authors introduce an architecture design of a festival management system server. The design incorporates the concept of n-tier architecture and that of 'Thin' server. The designed architecture was evaluated in view of cyber security, particularly defense-in-depth concept. The evaluation was performed to check if the features...
Download Now -
Database Security Model in the Academic Information System
Database plays an important role on both web-based and desktop based Academic Information System (AIS) in Indonesian Higher Education Institutions (HEI). Now-a-days, web-based AIS dominates in Indonesian HEI, almost every HEI uses web-based AIS with Relational DataBase Management System (RDBMS) as database software. Relational database systems such as Oracle, MySQL,...
Download Now -
Priority-Based Locking for Concurrency Control in Distributed Databases
Majority of the research in database management system focuses primarily on centralized database systems. However, with the demand for higher performance and higher availability, database systems have moved from centralized to distributed architectures. Concurrency control is an integral part of database systems. In this paper, the authors have proposed a...
Download Now -
High Efficient Li-Fi and Wi-Fi Technologies in Wireless Communication by Using Finch Protocol
Li-Fi or optical Wi-Fi, Li-Fi technology is the milestone in the history of wireless communication. In the past few years Wi-Fi have gained a lot of popularity, this technology comes to be ten times cheaper than the Wi-Fi and also much safer, because regardless of access control systems and passwords....
Download Now -
An Evaluation of MPLS-TE Based PMIPv6 Network
In this paper, the authors gives some results for a simulation of a Proxy Mobile IPv6 (PMIPv6) network based upon Multi-Protocol Label Switching with Traffic Engineering (MPLS-TE) for handling packet forwarding through the network and handling link or node failure. These results are compared with results from a simulation of...
Download Now -
Towards a New Maturity Model for Information Security Management
Maturity Models are significant tools to ensure continuous improvement of systems and activities. They follow self-assessment and provide a means of benchmark of these activities linked to best practices. Many Maturity Models have been developed for management Information system and specifically, information security management. In the recent years, management of...
Download Now -
Enhance Technique in Multimodal Biometrics
Biometrics means \"Life measurement\" but the term is usually associated with the use of unique physiological characteristics to identify an individual. The application to which most people associate with biometrics is security. A number of biometric traits have been developed and are used to authenticate the identity of a person....
Download Now -
Survey on Secure Group Communication and Applications
Multicast communication is an efficient method of disseminating data to a group of beneficiaries over an open access network. Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. An ever-increasing number of Internet applications, such as content and software distribution, distance learning,...
Download Now -
Modified Encryption and Decryption Using Symmetric Keys at Two Stages: Algorithm SKG 1.2
In the paper, the author has introduced a modified symmetric key cryptographic method, called algorithm SKG 1.2, for data encryption and decryption of any file using symmetric key at two stages, by swapping the characters in the string of text and by shifting the characters to left or right. The...
Download Now