Sorry! No results found
Please visit us back tomorrow as we add 10, 000 new research topics everyday!
About 10 results ( 0,31 seconds)
The aim of this assignment is to highlight last few years key developments in family’s friendly employment legislation and show how they can be used in practise in working environment and also at Watermark Publishing LTD, the company I am ...
car rental system algorithm for audio. In general, a number of broad claims have been made about the ‘robustness’ of various digital car rental system or fingerprinting methods but very few researchers or companies have published extensive ...
steganalysis. In this paper, we provide an overview of some characteristics in information hiding methods that direct the steganalyst to the existence of a hidden message and identify where to look for hidden Information. Steganography lite...
pirated movies should be very severe as it comes under Copyright infringement. Introduction One of the biggest and crucial problems that film industry is facing is the illegal distribution of pirated movies. That is an unauthorized use or d...
Designers Perspectives Regarding Copy Although notices are not a requirement under the Berne Convention, (which states that copyright is automatic, whether you mark your work or not), it was a requirement of some countries covered under th...
some great advancement. The forensic sciences have provided the law enforcement agencies with an assortment of exciting set of tools. The field of forensic sciences includes certain disciplines such as: toxicology, psychology, forensic DNA...
Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. There are many different carriers for steganography but the most popular is digital images. R...