A multi-channel system architecture for banking

C Pavlovski - … Journal of Computer Science, Engineering and …, 2013 - papers.ssrn.com
Financial institutions have increased dependence upon the technology solutions that enable
their financial products and services. The proliferation of Internet technologies, mobile …

Android malware detection using Kullback-Leibler divergence

VN Cooper, HM Haddad, H Shahriar - ADCAIJ: Advances in …, 2014 - revistas.usal.es
Many recent reports suggest that mareware applications cause high billing to victims by
sending and receiving hidden SMS messages. Given that, there is a need to develop …

ASSESSING BUSINESS STUDENTS'EXPERIENCES WITH E-LEARNING IN A GHANIAN UNIVERSITY

J Edumadze - 2019 - ir.ucc.edu.gh
Though e-learning has gained root in most universities all over the world that has resulted in
the change of doing the business of teaching and learning, there are others where this is not …

The readiness of mobile operating systems for cloud computing services

C Oriaku, N Alwan, IA Lami - 2012 IV International Congress …, 2012 - ieeexplore.ieee.org
$5.2 billion is forecasted as the market size of cloud computing services (CCS) on mobile
devices such as Smartphones and Tablets. Mobile cloud computing services (MCCS) has …

Koirarotuja tunnistavan mobiilisovelluksen suunnittelu ja kiinnostavuus-tutkimus

S Kärkkäinen - 2016 - jyx.jyu.fi
Tässä pro gradu-tutkielmassa selvitettiin ihmisten kiinnostusta konenäkömenetelmällä
koirarotuja tunnistavaan mobiilisovellukseen sekä millaisia ominaisuuksia ihmiset haluavat …

[PDF][PDF] Design of arabic recognition application using Convolutional neural network

SS Rosyda, B Irawan, AL Prasasti - Journal of Engineering and …, 2019 - researchgate.net
Arabic is one of the languages which attracted, needed and used by a lot of people in the
world. Many countries have used Arabic language in courses which related to the …

Development and Mitigation of Android Malware

VN Cooper, H Shahriar, HM Haddad - Handbook of Research on …, 2015 - igi-global.com
As mobile applications are being developed at a faster pace, the security aspect of user
information is being neglected. A compromised smartphone can inflict severe damage to …

Tapjacking Threats and Mitigation Techniques for Android Applications

V Cooper - 2014 - digitalcommons.kennesaw.edu
With the increased dependency on web applications through mobile devices, malicious
attack techniques have now shifted from traditional web applications running on desktop or …

La historia, lo histórico y la historicidad en Heidegger

JM Chillón - Azafea: revista de filosofía: 18, 2016, 2016 - torrossa.com
Para que la Historie sea posible como Geschichte, esto es, para que los acontecimientos
sean algo más que meras colecciones de vestigios pasados, es preciso que lo histórico …

Desarrollo de una aplicación que permita el escaneo de las vulnerabilidades en los dispositivos móviles Android para mitigar los problemas de seguridad

HM Villa Yánez - 2016 - dspace.espoch.edu.ec
En este presente trabajo de investigación “Desarrollo de una aplicación que permita el
escaneo de las vulnerabilidades en los dispositivos móviles Android para mitigar los …