492 research outputs found

    Reference Based study on Digital Transformation of Education for Quality Sustainability

    Get PDF
    Digital transformation entails considering how products, processes and organizations can be changed through the use of new, digital technologies. A review proposes a definition of digital transformation as "a process that aims to improve an entity by triggering significant changes to its properties through combinations of information, computing, communication, and connectivity technologies.

    E-Commerce Technology and Some Applications

    Get PDF
    Latest and dependable way to deliver electronic transactions by computer to computer communication combined with (JIT) ; Just in time manufacturing methods; EDI and email used for many years. e-commerce is a transaction of buying or selling online. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems

    A Review Study On Some Cyber Security Related Topics

    Get PDF
    It is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privacyIt is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privac

    Literature Study on Data Protection for Cloud Storage

    Get PDF
    Many data security and privacy incidents are observed in today Cloud services. On the one hand, Cloud service providers deal with    a large number of external attacks. In 2018, a total of 1.5 million Sing Health patients’ non-medical personal data were stolen from the health system in Singapore. On the other hand, Cloud service providers cannot be entirely trusted either. Personal data may be exploited in a malicious way such as in the Face book and Cambridge Analytical data scandal which affected 87 million users in 2018. Thus, it becomes increasingly important for end users to efficiently protect their data (texts, images, or videos) independently from Cloud service providers. In this paper, we aim at presenting a novel data protection scheme by combining fragmentation, encryption, and dispersion with high performance and enhanced level of protection as Literature study

    A Survey on MRPrePost

    Get PDF
    Due to the vast amount of processed and unprocessed data that is present in the world and also due to unimaginable amount of data being added continuously there is a need for processing these vast amounts of data. Also the processing capability of any algorithm or tool has to be efficient and fast so as to process this vast data in faster speed consuming less time as possible. MRPrePost is the algorithm that is presented in this survey paper as one of the efficient methods when compared to Apriori with respect to performance and time. DOI: 10.17762/ijritcc2321-8169.15032

    Multiple sclerosis in pregnancy- a case report

    Get PDF
    Multiple sclerosis is primarily a disease of women in their reproductive years. Relapse rate decreases during pregnancy and rises after delivery. Pregnancy and puerperium have opposite effects on the course of the disease. The case presented is that of a second gravida who was a known case of multiple sclerosis. She was managed conservatively during pregnancy and puerperium

    An Anomalous Reentrant 5/2 Quantum Hall Phase at Moderate Landau-Level-Mixing Strength

    Full text link
    A successful probing of neutral Majorana mode in recent thermal Hall conductivity measurements opines in favor of the particle-hole symmetric Pfaffian (PH-Pf) topological order, contrasting the theoretical predictions of Pfaffian or anti-Pfaffian phases. Here we report a reentrant anomalous quantized phase which is found to be gapped in the thermodynamic limit, distinct from the conventional Pfaffian, anti-Pfaffian, or PH-Pf phases, at an intermediate strength of Landau level mixing. Our proposed wave function consistent with the PH-Pf shift in spherical geometry rightly captures the topological order of this phase, as its overlap with the exact ground state is very high and it reproduces low-lying entanglement spectra. A unique topological order, irrespective of the flux shifts, found for this phase possibly corroborates the experimentally found topological order.Comment: 12 pages, 10 figures. The title and abstract have minor modifications. The manuscript and supplementary are mostly rewritte
    • …
    corecore