Essays about: "access card"
Showing result 1 - 5 of 52 essays containing the words access card.
-
1. Credit Card Fraud Detection by Nearest Neighbor Algorithms
University essay from Göteborgs universitet/Institutionen för matematiska vetenskaperAbstract : As the usage of internet banking and online purchases have increased dramatically in today’s world, the risk of fraudulent activities and the number of fraud cases are increasing day by day. The most frequent type of bank fraud in recent years is credit card fraud which leads to huge financial losses on a global level. READ MORE
-
2. High-Performance Network Data Transfers to GPU : A Study of Nvidia GPU Direct RDMA and GPUNetIO
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study investigates high-performance network data transfers, focusing on Nvidia Graphics Processing Unit (GPU) Direct Remote Direct Memory Access (RDMA) and GPUNetIO. These methods have emerged as promising strategies for improving data communication between GPUs and network interfaces, but harnessing their potential requires meticulous configuration and optimization. READ MORE
-
3. Development through Local Integration: The quest for Durable solutions for Refugees in Kenya. A Qualitative Case Study on The Implementation and Impact of The Kenyan Refugee Act 2021
University essay from Lunds universitet/Institutionen för kulturgeografi och ekonomisk geografi; Lunds universitet/LUMID International Master programme in applied International Development and ManagementAbstract : Refugees often spend over 20 years in what are supposed to be temporary camps, leading to increased violence and abuse. The humanitarian and development sector is seeking long-term solutions to protect their human rights and prevent discrimination. READ MORE
-
4. Security and performance impact of client-side token storage methods
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE
-
5. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions
University essay from Uppsala universitet/Juridiska institutionenAbstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE