Digital art

Sort By:
Page 47 of 50 - About 500 essays
  • Best Essays

    model based on digital watermarking and steganography. Another factor was taken in consideration; the amount of data used and its influence on the voice quality of service. the model is implemented using C# code for both embedding and extracting the watermarking spite of the intended cheating mechanisms that might complicate the send/receive conditions. In addition, the model performance has confirmed its robustness and quality of service. Keywords IP Telephony / VoIP security, Digital watermarking

    • 3629 Words
    • 15 Pages
    Best Essays
  • Good Essays

    On November 10, 2016, a new report was released to the public about a special type of microchip that can test the amount of viral load of HIV in less than 30 minutes. This test can be completely self administered. The user can check the viral load amount in the bloodstream by placing a drop of their blood on the microchip, which looks similar to that of a USB drive. This microchip is then inserted into a computer, tablet, or other handheld device. The results can be achieved in less than 30 minutes

    • 1610 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Crisis Analysis of Kodak

    • 1047 Words
    • 5 Pages

    Film, Photofinishing, Entertainment Group (FPEG) and the Consumer Digital Imaging Group (CGD). ) This report relays to Kodak’s managers the importance of one’s company strength and weakness as well as advices on how to manage their crisis in the most effective manner. Feedbacks and recommendations were also included. Kodak has faced various crises in the past years, where lack of key decision

    • 1047 Words
    • 5 Pages
    Better Essays
  • Best Essays

    INTRODUCTION Owing to the developed technology and cheap prices, wireless networks have increased more preferences over wired networks in the previous few decades.Mobile Ad hoc Network (MANET) is agroup of mobile nodes armed with both a wirelesstransmitter and a receiver that connect with each othervia bidirectional wireless links either directly or indirectly.One of themajor benefits of wireless networks is it allows data to be communicated between different parties and still maintaintheir movement

    • 1971 Words
    • 8 Pages
    • 9 Works Cited
    Best Essays
  • Decent Essays

    of term ‘digital divide’ and factors influencing digital divide drawing on data of various continents including Australia and Europe. Secondly, the positive and negative developments to the society that may develop from linking the gap. Finally, advantages and disadvantages to the people that aids in growing their lives at personal, business, employment and global level to profit countries. The term digital divide refers to the gap between individuals with economical access to digital and information

    • 1086 Words
    • 4 Pages
    Decent Essays
  • Good Essays

    signer or entity has signed the signature with zero knowledge interactive proof. In this signature scheme, any signer cannot shift blame to other entities. Denial ring authentication is a combination of ring signatures and deniable authentication. Digital signatures provides authentication of messages thus providing non-repudiation of messages. In most of the applications, non-repudiation is one of the desirable properties, but in some applications it may not be. Inspired by such requirements Naor

    • 925 Words
    • 4 Pages
    Good Essays
  • Good Essays

    innovating modern day households. The possibilities of 3D printing are extremely captivating, making this one of the most exciting innovations in recent times. 3D printing, also known as additive manufacturing, makes three-dimensional solid objects from a digital model or command. To picture how this process works, 3D printers use an additive process, where adding layers of a successive material creates an object. Traditional machines, however, uses a subtractive process by

    • 1086 Words
    • 5 Pages
    Good Essays
  • Decent Essays

    Digital Television Conversion If you are not connected to cable TV or have a non-digital television, be prepared to either throw it out or convert it into a fish tank. With the increase in technology, the television medium is becoming a more advanced system and is incorporating new standards for their networks and customers. Digital cable is more popular than ever and is being used to launch new capabilities in a couple of years. On February 17th, 2009 all over-the-air television stations are

    • 612 Words
    • 3 Pages
    • 2 Works Cited
    Decent Essays
  • Decent Essays

    An attack is any malicious or accidental disruption in the confidentially, integrity, or availability of information and network resources. Attacks can come from many places, electronic, physical, or human. Electronics attacks may come from the external network (Internet) or the internal network (Intranet); physical attacks can come in the form of hardware and equipment sabotage or theft, and human attacks most often come in the form of social engineering. Some of the attacks identify and evaluate

    • 1414 Words
    • 6 Pages
    Decent Essays
  • Better Essays

    several advantages in mobile cloud ecosystem, there are some issues and challenges in mobile cloud computing. Some of the major issues in security are A. Data Ownership Cloud computing provides the facility to store the personal data and purchased digital media such as e-books, video and audio files remotely. For a user, there is a chance of risk to lose the access to the purchased media data. To avoid these types of risks, the user should be aware of the different rights regarding the purchased media

    • 2328 Words
    • 10 Pages
    Better Essays