Skip to main content
    • by 
    •   10  
      AccountingFinancial AccountingProductivityManagerial Accounting
    • by 
    •   7  
      ProductivityProfitabilityLeverageLiquidity
With ongoing trend of digital world, the education firm also strives to maintain its pace with the current technology. Quality teaching plays a key role in contributing towards the development of any educational organization. To meet the... more
    • by  and +1
    •   10  
      Instructional DesignEducational TechnologyE-learningDistance Education
With the advent of cloud computing, more and more information data are outsourced to the public cloud for economic savings and ease of access. However, the privacy information has to be encrypted to guarantee the security. To implement... more
    • by 
    •   6  
      EncryptionSemanticAuditCloud
    • by 
    • SECURE
    • by  and +1
    •   2  
      Secure Software EngineeringSECURE
    • by  and +1
    •   2  
      Secure Software EngineeringSECURE
This study explores the implementation of secure software development practices in the hybrid agile software development lifecycle. Hybrid agile is a mixture of plan-driven development approaches with agile methodology. Hybrid Agile is... more
    • by 
    •   5  
      DevelopmentSoftwareHybridAgile
    • by 
    •   2  
      Secure Software EngineeringSECURE
A successful software application is written to achieve its intended function and ensure it offers a friendly user experience in a fully secure environment. Often, writing applications that meet all specified performance requirements is... more
    • by 
    •   4  
      SECUREEnvironmentSME‘sRelationships etc
This study explores the implementation of secure software development practices in the hybrid agile software development lifecycle. Hybrid agile is a mixture of plan-driven development approaches with agile methodology. Hybrid Agile is... more
    • by 
    •   5  
      DevelopmentSoftwareHybridAgile
Minimizing distortion produced by embedding process is very important to improve the security of hidden message and maintain the high visual quality of stego images. To achieve these objectives, an effective strategy is to perform pixel... more
    • by  and +1
    •   6  
      Image ProcessingModelImage SteganographySECURE
Modern society is deeply and irreversibly dependent on software systems of remarkable scope and complexity in areas that are essential for preserving this way of life. The security and correct functioning of these systems are vital.... more
    • by 
    •   2  
      Secure Software EngineeringSECURE
In recent years the number of cyber attacks has greatly increased, as has their complexity and effect. Therefore, new evolving software development models are needed, helping to build safe software by default. To achieve this, examining... more
    • by 
    •   4  
      SECUREEnvironmentRelationships etcSME‟s