AAP logoAAP logo
Browse

Agri Food Systems

  • symmetric-key encryption
    symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt new messages and send them as if they came from one of the two parties who were originally using the key.
    By: Vijaya Super admin
    Wednesday, May 12, 2021
    +3
    post image
  • symmetric-key encryption
    symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt new messages and send them as if they came from one of the two parties who were originally using the key.
    By: Vijaya Super admin
    Wednesday, May 12, 2021
    +3
    post image
  • Impact of COVID-19 (Coronavirus) on Global economy
    COVID-19 is not only a global pandemic and public health crisis; it has also severely affected the global economy and financial markets. Significant reductions in income, a rise in unemployment, and disruptions in the transportation, service, and manufacturing industries are among the consequences of the disease mitigation measures that have been implemented in many countries. It has become clear that most governments in the world underestimated the risks of rapid COVID-19 spread and were mostly reactive in their crisis response. As disease outbreaks are not likely to disappear in the near future, proactive international actions are required to not only save lives but also protect economic prosperity.
    By: Vijaya Super admin
    Wednesday, May 12, 2021

    post image
  • Risk
    Everyone feels a certain way about risk. Some are risk-oriented, others are risk-averse. Talking about risks seems to generate some good conversation. You could ask questions like: What is your definition of risk? Are you a risk taker? Why/why not? What are the advantages/disadvantages of taking risks? What risks do you come across in your work/life? What risks have you taken in your life?
    By: Vijaya Super admin
    Wednesday, May 12, 2021
    +2
    post image
  • Smart health prediction system
    By: Vijaya Super admin
    Thursday, May 13, 2021
    +2
    post image
  • Software piracy protection system
    The goal of developing this project is to prevent software piracy and improve protection and security measures for software. Piracy is one of the biggest threats in the industry. Hackers use malware and malicious code to gain access to software products/systems, thus, putting at stake the entire security infrastructure of a company. As a result, it is pivotal to incorporate the necessary measures and protection systems to uphold the integrity of data as well as the copyright rights of software products. 
    By: Vijaya Super admin
    Wednesday, May 12, 2021
    +3
    post image
  • Data leakage detection system
    The primary task of data leakage detection systems is to detect data leakage and discover the sources for the same. If ever an organization’s sensitive data gets leaked, it may then finds its way to unauthorized devices. This is why it is crucial to trace the source of data leakage so that you can nip the problem in the bud.
    By: Vijaya Super admin
    Wednesday, May 12, 2021
    +1
    poster image
  • Android Patient Tracker
    This project involves the development of an Android application for viewing and managing patient data. The app is designed to help doctors to see the medical history of their patients. Doctors can also continually upgrade the system by entering the latest medical data of their patients. 
    By: Vijaya Super admin
    Wednesday, May 12, 2021
    +2
    post image
  • loading category
    loading