One in 100 Americans are sociopathic. How do you spot the psychopath among your work colleagues? Professor Robert Hare, of the University of British Columbia, is a world expert on the "snakes in suits" who scale corporate ladders with consummate ease. He
One in 100 Americans are sociopathic. How do you spot the psychopath among your work colleagues? Professor Robert Hare, of the University of British Columbia, is a world expert on the "snakes in suits" who scale corporate ladders with consummate ease. He
One of the characteristic manifestations of prolonged stress is decreased performance in tasks that require attention, including the ability to shift focus as well as to learn and unlearn information. Anxiety and depression can make a person feel as if he
One of the characteristic manifestations of prolonged stress is decreased performance in tasks that require attention, including the ability to shift focus as well as to learn and unlearn information. Anxiety and depression can make a person feel as if he
The conventional concept of tumor-host interactions is rooted in the realm of parasitology. A tumor invades an unsuspecting host, and in response to this assault, the host attempts to resist the advances of the tumor by calling on the armamentarium of the
The conventional concept of tumor-host interactions is rooted in the realm of parasitology. A tumor invades an unsuspecting host, and in response to this assault, the host attempts to resist the advances of the tumor by calling on the armamentarium of the
From Brian Benzinger comes a comprehensive list of 50 websites that will help you write, take notes, and organize your life. Some real gems here, check them out. I used a couple of these plus a timeline tool to create an easy-to-update task-reporting tool
Check out the beginning of this interesting series of blog posts about the Will of God: "Many believe this refers to a specific plan God has for our lives that we must discover and follow. I’ll call this concept the Personal Will of God. Does God’s Wo
Welcome to the Scripture Menu. Whether you begin with a brief Bible study as an appetizer or go straight to one of our all-Scripture entrées, we hope you have a satisfying meal of the Word of God.
Welcome to Bible Research! This site is for Bible students who are looking for detailed information on the history of the canon, texts, and versions of Scripture. Choose a link from the menu at left, or explore with the site map.
StudyLight.org is a Christ-centered, Bible-based Internet ministry which is not apart of any one church group or denomination. The following is statement of faith to which we subscribe: 1. We believe in the Bible to be the inspired, the only infalli
Welcome to codex@biblical-studies.ca. This site contains various resources for Biblical Studies, Old Testament Hebrew, religion & popular culture, theology, film, and more. It is maintained by Tyler F. Williams, Chair of the Religion & Theology Department
This site contains scholarship, blasphemy, heresy, freethought, rationalism, atheism, history, psychology, sociology, theology, anthropology, etc. Years of research are summarized, via abstracts from scholars.
A. Aličić. 100 godina muzeja na Humcu: (1884-1984) : zbornik radova, page 187--201. Ljubuški, Samoupravna interesna zajednica kulture Općine Ljubuški, (1985)
S. Mlakar, and M. Haller. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, page 1--10. New York, NY, USA, Association for Computing Machinery, (2020)event-place: Honolulu, HI, USA.
D. Iyobor, B. Ola, and E. Sarkodie. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII):
69-75(August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
Jees, Jincy, and Anakha. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VI):
53-57(June 2020)1. M. A. Rafique, W. Pedrycz, and M. Jeon, “Vehicle license plate detection using region-based convolutional neural networks,” Soft Computing,2018, Vol. 22, No. 19, pp. 6429-6440. 2. Y. N. Chen, C. C. Han, G. F. Ho, and K. C. Fan, “Facial/License Plate Detection Using a Two-level Cascade Classifier and a Single Convolutional Feature Map,” International Journal of Advanced Robotic Systems, 2015, Vol. 12, No. 12, pp. 183-198. 3. C. Gerber, and M. Chung, “Number Plate Detection with a Multi- Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices,” Journal of Information Processing Systems, 2016, Vol. 12, No. 1, pp. 100-108. 4. Y. Yuan, W. Zou, Y. Zhao, X. Wang, X. Hu, and N. Komodakis, “A Robust and Efficient Approach to License Plate Detection,” IEEE Transactions on Image Processing, 2017, Vol. 26, No. 3, pp. 1102-1114. 5. W. Zhou, H. Li, Y. Lu, and Q. Tian, “Principal Visual Word Discovery for Automatic License Plate Detection,” IEEE Transactions on Image Processing, 2012, Vol. 21, No. 9, pp. 4269-4279. 6. B. Li, B. Tian, Y. Li, and D. Wen, “Component-Based License Plate Detection Using Conditional Random Field Model,” IEEE Transactions on Intelligent Transportation Systems, 2013, vol. 14, no. 4, pp. 1690-1699. 7. R. F. Prates, G. C. Chavez, W. R. Schwartz, and D. Menotti, “Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows,” International Journal of Computer Science & Information Technology, 2013, Vol 5, No 6, pp. 39-52. 8. R. Wang, N. Sang, R. Huang, and Y. Wang, "License plate detection using gradient information and cascade detectors,” Optik, 2014, Vol. 125, No. 1, pp. 186-190. 9. A. M. Ghaili, S. Mashohor, A. R. Ramli, and A. Ismail, “Vertical-Edge-Based Car-License-Plate Detection Method,” IEEE Transactions on Vehicular Technology, 2013, vol. 62, no. 1, pp. 26-38. 10. J. Tian, G. Wang, J. Liu, and Y. Xia, “License plate detection in an open environment by density-based boundary clustering,” Journal of Electronic Imaging, 2017, Vol. 26. No. 3, PP. 330171-3301711. 11. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: License plate-recognition from still images and video sequences: A survey. IEEE Trans. Intell. Transp. Syst. 9(3), 377–391 (2008) 12. Jia, W., Zhang, H., He, X.: Region-based License Plate Detection. J. Network and comput. Applications 30(4), 1324–1333 (2007) 13. Wang, S., Lee, H.-J.: A cascade framework for a real-time statistical plate recognition system. IEEE Trans. Inf. Forensics Security 2(2), 267–282 (2007) 14. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: A License Plate-Recognition Algorithm for Intelligent Transportation System Applications. IEEE Trans. Intell. Transp. Syst. 7(3), 377–392 (2006) 15. Zheng, D., Zhao, Y., Wang, J.: An Efficient Method of License Plate Location. Pattern Recognit. Lett. 26(15), 2431–2438 (2005) 16. Chang, S., Chen, L.-S., Chung, Y.-C., Chen, S.-W.: Automatic License Plate Recognition. IEEE Trans. Intell. Transp. Syst. 5(1), 42–53 (2004) 17. Deb, K., Chae, H.-U., Jo, K.-H.: Parallelogram and Histogram based Vehicle License Plate Detection. In: IEEE ICSMA, pp. 349–353. IEEE Press, New York (2008).