Water Quality Issues Related to Special Industrial Zones Along Hlaing River
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 6
Abstract
During the past decade e banking has emerged with enormous speed. The use of e banking and the application of e banking is now enormous these days. But the modern banking completely relies on internet and computer technology, the threats and the chances of breaching the security has also increased. We are totally dependent on the internet to carry out the transactions and the daily routines in the banks. Thus there is the immense need of increasing the security in the banking field. We have developed the system in which we have developed a secure banking system. We are using Finger print authentication device and the GSM module to carry out the functionalities of the system. Bilal Hussain Ch | Subayyal "Secure E-Banking Using Bioinformatics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18455.pdf
Migration of Students A Comparative Study among Different Countries of the World
Going abroad has now become trend for the youngsters mainly in India. Students go abroad for their higher education and majority of them stays there and don't come back. The reason for not coming back can be influenced b...
Traffic Engineering in Software Defined Networking SDN
The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long lived large flows. Moreover, it can lead to low network throughput and high network latenc...
Data Storing in Multitenant Clouds using Split and Merge Method
Resource Accounting of Shared IT Resources is a technique that distributes the excess dynamic local workload evenly across all the nodes. It is used for achieving a better service provisioning and resource utilization ra...
SQL Injection Attack Detection and Prevention Techniques to Secure Web-Site
Structured Query Language (SQL) Injection is a code injection technique that exploits security vulnerability occurring in database layer of web applications [8]. According to Open Web Application Security Projects (OWASP...
Effective Data Erasure and Anti Forensics Techniques
Deleting sensitive data after usage is just as important as storing of data in a safe location. In the verge of cyber attacks such as data theft happening, it is best to delete or purge or destroy unwanted sensitive data...