A Review of Security Threats by The Unauthorized in The E-Learning
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 11
Abstract
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavoring to enhance its proficiency and guarantee the nature of data asset. Computer networking technologies - intranet, web - have progressed to the point where data can be put away, transmitted, and available to people accessing the resource anytime and from anywhere. These advantages additionally push organizations into executing web based innovation without considering the security dangers that this involves.
Authors and Affiliations
Mohamed Munser Saleh
A Soft- Computing Approach for Multi Criteria Project Selection Problem with Grey Number
Multi-criteria decision support systems are used in various fields of human activities. In every alternative multi-criteria decision making problem can be represented by a set of properties or constraints. The properties...
Segmentation In Medical Resonance images to extract the cancerous nodule for early diagnosis on cancer
Image segmentation plays a vital role in several medical imaging programs by assisting the delineation of physiological structures along with other parts. The objective of this research work is to segmentize human lung M...
MODEL OF PERCEIVED INFLUENCE OF ACADEMIC PERFORMANCE USING SOCIAL NETWORKING
Social networking sites have created a new social dimension where individuals can increase their social awareness by keeping in touch with old friends, making new friends, getting new data or products and gathering infor...
A Review on Load Balancing In Cloud Environment
Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users ne...
EFFICIENT FPGA BASED MATRIX MULTIPLICATION USING MUX AND VEDIC MULTIPLIER
Most of the algorithms which are used in DSP, image and video processing, computer graphics, vision and high performance supercomputing applications require multiplication and matrix operation as the kernel operation.In...