Showing 1 - 13 results of 13 for search 'Confidential File', query time: 0.05s Refine Results
  1. 1

    Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training by Abdullah Al Siam, Md Maruf Hassan, Md Atikur Rahaman, Masuk Abdullah

    Published 2025-03-01
    “…The Diegif framework aims to enhance storage efficiency by decreasing file sizes by 66.32%, thereby improving data transport efficacy and cloud storage affordability while preserving strong encryption for data confidentiality. …”
    Get full text
    Article
  2. 2

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “… Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. …”
    Get full text
    Article
  3. 3

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
    Get full text
    Article
  4. 4
  5. 5

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. …”
    Get full text
    Article
  6. 6

    Management of Records and Clients Satisfaction at Magistrate Court at Kabale. by Atukwase, Sarah Loynet

    Published 2023
    “…This includes keeping files in soft copy devices as well as computers tapes, flash disks and computer disks. …”
    Get full text
    Thesis
  7. 7

    Record Keeping Practices at Kabale University Central Registry. by Asiimwe, Peter

    Published 2024
    “…The findings revealed that the types of records maintained at the Central Registry included; confidential and open records. they included minutes of meetings, financial statements, employment and open records containing historical records, and incoming and outgoing mail, the findings revealed that several preservation measures such as photocopying, microfilming, lamination, use of acid-free boxes, digitization, and offsite storage were very essential in record keeping in Kabale University Central Registry, the research findings revealed that disposition methods used in the Central Registry included; burning, shredding and archiving and from the research findings, it was revealed that there are several challenges associated to the access of records by clients which include; misplacement of files, loss of sums of money, lack of record keeping awareness, shortage of storage facilities, cost in managing records, the absence of legislation and policies, the lack of adequate training. …”
    Get full text
    Thesis
  8. 8
  9. 9

    Generating Encrypted Document Index Structure Using Tree Browser by Doaa N. Mhawi, Haider W. Oleiwi, Heba L. Al-Taie

    Published 2023-06-01
    “…Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. …”
    Get full text
    Article
  10. 10

    A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government by Ivan, Niyonzima, Godfrey, Omoda Onyait

    Published 2019
    “…Information shared is exposed to threats of confidentiality, integrity and availability needed for decision making in org anizations. …”
    Get full text
    Article
  11. 11

    Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff by Muhammad Asif, Ishfaq Ali, Muhamad Sheraz Arshed Malik, Muhammad Hasanain Chaudary, Shahzadi Tayyaba, Muhammad Tariq Mahmood

    Published 2019-01-01
    “…Software requirement artifacts such as manuals request for proposals, and software requirements specification (SRS) are commonly focused on functional requirements. In most SRS files, nonfunctional requirements do not formally encoded or encoded as a whole, not for an individual design problem. …”
    Get full text
    Article
  12. 12

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…The reasons and trends of Monero use by offenders are identified, and the scheme of operation of this payment system, which ensures its increased confidentiality, is shown. Examples of criminal offences in which Monero is used are presented. …”
    Get full text
    Article
  13. 13

    Synesis as a framework to enable safety interventions in complex healthcare environments by Jamie Cargill, Aarti Bavare, Tiffany Wrenn, Anne Lam, Lauren Salinas, Itode Idowu, Asma Razavi, Venessa Lynn Pinto, Eric Williams

    Published 2025-01-01
    “…Measures included process—completion of review, team engagement, proportion of ‘open’ (those without action plan) reports within 1 month of filing; outcome—number of actions launched and completed, dissemination of actions and postintervention survey results; and balancing—resources invested.Results 26 multidisciplinary leaders reviewed 3175 of the 3406 total reported SERs across four clinical units over 18 months. …”
    Get full text
    Article