Quantum resistivity of cryptography

This paper investigates the Quantum resistivity of cryptography and provides an understanding towards building a cryptosystem that can survive cryptanalytic attacks carried out using quantum computers; such attacks are called quantum attacks. Quantum resistivity of cryptography refers to the ability of cryptosystems on which cryptanalytic attacks using a quantum computer cannot be performed. Both symmetric … Read more

Social Media in Crisis: A Literature review

Recent technological advancements has made technology (devices, internet and information) available to a large population across the globe. In this literature review, we will investigate the relevance of social media during crisis. In particular, we will look at how existing technologies are being exploited by various stakeholders (victims, NGOs, government etc.) to navigate, gather information, … Read more

Principles of Java programming

Originally known as oak, Java is a programming language developed by James Gosling and others at Sun Microsystems. It was first introduced to the public in 1995 and is widely used to create Internet applications and other software programs. Today, Java is maintained and owned by Oracle. When used on the Internet, Java allows applets … Read more

Internet memes

Paste your essay in here…The coming of web-based social networking has brought internet memes, an extraordinary social sensation, to the front phase of the Web. Memes can broadly be considered social or cultural ideas or symbols that are virally transmitted via the Internet. Memes are normally jokes, urban legends, viral recordings, funny pictures or infectious … Read more

Mobile Ad Hoc Network (MANET)

Abstract: Mobile Ad Hoc Network (MANET) is a dynamic, infrastructureless, Self Configuring network. Due to its natural characteristics, a MANET is vulnerable to many security threats. Blackhole attack is one of such attacks, that attempts to degrade the performance and reliability of the network. Since nodes are allowed to move freely within the network, it … Read more

New methods of 3D seismic attenuation tomography

The goal of this review article is to outline the state of art in the new methods of the three-dimensional (3-D) seismic attenuation tomography. The last decade have shown significant advances in the theory and the applications of seismic tomography leading to robust advances in the model parametrization, 3-D ray tracing, inversion algorithm, combined use … Read more

Social networks analysis

In recent years, there has been growing interest in social networks analysis. Methods and technical tools have significantly developed and became more available to users (borgatti et al, 2009 ), which allow researchers to analyze relations between persons, groups and organizations (Carrington and al, 2005 ). There has also been increasing interest in people’s mobility … Read more

ELECTRONIC PAYMENT SYSTEMS

INTRODUCTION 1. ABOUT ELECTRONIC PAYMENT SYSTEM Ecommerce payment system provides electronic payment system for all online transactions. The use of electronic payment has been increased especially for online based shopping and banking transactions. Credit card have become more common form of payments for e commerce transaction from few years. In developed countries 90% of transactions … Read more

SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS

A SURVEY ABSTRACT Vehicular Ad Hoc Network (VANET) is a sub class of mobile ad hoc networks. VANET provides wireless communication among vehicles and vehicle to road side equipment’s. The communication between vehicles is used for safety, proficiency and other added services. However, VANETs are themselves defenseless against attacks that can directly lead to the … Read more

Character recognition

INTRODUCTION 1.1 Background to the Study A character is the basic building block of any language that is used to build different structure of the language (Iorundu and Esiefarinrhe, 2015). Characters are the alphabets and the structures are the words, strings and sentences (Lecun et al., 1990), (Kader & Deb, 2012). Recognizing characters with diacritical … Read more

iOS devices in healthcare

Apple devices have seen an increased presence in the workplace. Industries such as construction, retail, finance, education, and others have brought iOS to the workplace. Apple’s operating software is being implemented for a variety of reasons, including (but not limited to) security and durability, and the overall user-friendly software. Like many industries, healthcare has introduced … Read more

Big data

Tim McGuire, an Ivey Business Journal reporter in his work “Why Big Data is the new competitive advantage”, defines the use of big data as “large pools of data that can be brought together and analyzed to discern patterns and make better decisions (par. 1). He argues that adoption of data collection techniques will become … Read more