-
1
Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training
Published 2025-03-01“…The Diegif framework aims to enhance storage efficiency by decreasing file sizes by 66.32%, thereby improving data transport efficacy and cloud storage affordability while preserving strong encryption for data confidentiality. …”
Get full text
Article -
2
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. …”
Get full text
Article -
3
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
Get full text
Article -
4
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01Get full text
Article -
5
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. …”
Get full text
Article -
6
Management of Records and Clients Satisfaction at Magistrate Court at Kabale.
Published 2023“…This includes keeping files in soft copy devices as well as computers tapes, flash disks and computer disks. …”
Get full text
Thesis -
7
Record Keeping Practices at Kabale University Central Registry.
Published 2024“…The findings revealed that the types of records maintained at the Central Registry included; confidential and open records. they included minutes of meetings, financial statements, employment and open records containing historical records, and incoming and outgoing mail, the findings revealed that several preservation measures such as photocopying, microfilming, lamination, use of acid-free boxes, digitization, and offsite storage were very essential in record keeping in Kabale University Central Registry, the research findings revealed that disposition methods used in the Central Registry included; burning, shredding and archiving and from the research findings, it was revealed that there are several challenges associated to the access of records by clients which include; misplacement of files, loss of sums of money, lack of record keeping awareness, shortage of storage facilities, cost in managing records, the absence of legislation and policies, the lack of adequate training. …”
Get full text
Thesis -
8
Implementation outcomes of HIV self-testing in low- and middle- income countries: A scoping review.
Published 2021-01-01Get full text
Article -
9
Generating Encrypted Document Index Structure Using Tree Browser
Published 2023-06-01“…Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. …”
Get full text
Article -
10
A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government
Published 2019“…Information shared is exposed to threats of confidentiality, integrity and availability needed for decision making in org anizations. …”
Get full text
Article -
11
Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff
Published 2019-01-01“…Software requirement artifacts such as manuals request for proposals, and software requirements specification (SRS) are commonly focused on functional requirements. In most SRS files, nonfunctional requirements do not formally encoded or encoded as a whole, not for an individual design problem. …”
Get full text
Article -
12
Technical, forensic and organisational aspects of work with Monero cryptocurrency
Published 2023-09-01“…The reasons and trends of Monero use by offenders are identified, and the scheme of operation of this payment system, which ensures its increased confidentiality, is shown. Examples of criminal offences in which Monero is used are presented. …”
Get full text
Article -
13
Synesis as a framework to enable safety interventions in complex healthcare environments
Published 2025-01-01“…Measures included process—completion of review, team engagement, proportion of ‘open’ (those without action plan) reports within 1 month of filing; outcome—number of actions launched and completed, dissemination of actions and postintervention survey results; and balancing—resources invested.Results 26 multidisciplinary leaders reviewed 3175 of the 3406 total reported SERs across four clinical units over 18 months. …”
Get full text
Article