Tìm kiếm tài liệu miễn phí

Hệ điều hành (13.574)

Review of e-mail system, security protocols and email forensics

This paper review working and architecture of current email system and the security protocols followed generally to secure our email communications and the limitations they contained, further email forensics which is a process to analyze email contents, header information, transit path for email, sender or receiver information and other details to collect evidence against culprit or to make our system more secure is discussed. It also discusses common email forensic investigation technique and tools used in email forensic process.


A survey on “security of smart card payment”

To ensure communication between the banking server and the client, they will use security algorithms such as the Brute Force algorithm, the MD5 Hashing algorithm and the Base64 algorithm. There proposed technique will ensure the flow of payment of the card.


Reviewing the significance of software metrics for ensuring design reusability in software engineering

This paper therefore discusses about the essentials of design reusability and its significant charecteristics, which has potential features for cutting the cost of development. The paper also discusses about the most frequently used software metrics till date as well as less -used software metrics. Finally, the paper discusses about the open issues from the studies.


Deployment of openstack using devops

The software platform consists of interrelated components that control hardware pools of processing, storage, and networking resources throughout a data center. Users either manage it through a web-based dashboard. But the implementation of openstack is very complex. So, we can use configuration management tools that is also known as DevOps.


Software testiang techniques for faults/ errors detection

Software testing is one of the important phases in Software Development Life Cycle. It provides several means/methods to reduce errors, cut maintenance and overall software costs. It is a process which focuses on evaluating an attribute or capability of a program and ensures that it meets the required result.


Satellite image enhancement and restoration – A review

This review paper presents various techniques applied in satellite image enhancement and restoration. Our review findings shows that there exists lot of scope for performing satellite image enhancement and restoration using amalgamating soft computing techniques and conventional image processing.


Case study on firewall rules analysis for CWN

In this paper authors proposed a software based system which carry out the analysis of rules implemented in the firewall to find hidden anomalies if any as well as any address conflicts for the Campus Wide Network (CWN) of Vishwakarma Institute of Technology, Pune, India. This information can be very useful for the administrator to modify the existing policies as well as to add the new policies with fewer complexities. Institute has the CWN consisting the seven Ethernet Segments for seven major departments in the institute.


Giáo trình Hệ điều hành mạng Windows 2000 Server: Phần 1

Giáo trình Hệ điều hành mạng Windows 2000 Server: Phần 1 trình bày một số nội dung chính sau: Những khái niệm cơ bản của hệ điều hành mạng Windows, thiết lập mạng theo mô hình Workgroup, thiết lập mạng theo mô hình vùng,... Mời các bạn cùng tham khảo.


Giáo trình Hệ điều hành mạng Windows 2000 Server: Phần 2

Giáo trình Hệ điều hành mạng Windows 2000 Server: Phần 2 tiếp tục trình bày các nội dung chính sau: DHCP và WINS trên windows 2000 Server, đảm bảo an toàn hệ thống, bảo mật hệ thống, dịch vụ cấp phát địa chỉ IP động, bổ sung máy chủ WINS, virus máy tính,... Mời các bạn cùng tham khảo.


Distributed backup of user profiles for information retrieval

This paper presents a technic of safeguard and of implicit construction of the user profile that is part of a distributed backup approach and a formal construction method using the user behavior as a source for predicting implicitly its need.


Utilization of ECDLP for constructing a new certificate based digital signature

The proposed scheme’s security is proven under the elliptic curve discrete logarithm assumption in the random oracle model. Results of comparing our scheme with existing pairing-free certificate-based signature schemes, shows that ours has much lower computational cost.


Application of wireless sensor network to make transportation fleet information systems smart

The result is to obtain network more stability and optimal energy consumption. The new protocol was tested on real characteristics of more than 600 traffic signs in the city of Hamedan, run in MTALAB software. The findings are examined here.


A model for protecting online banking using transaction monitoring

In this paper we will analyze the level of security in different authentication factor and will provide a new model to enhance the financial security based on user transaction monitoring.


Design of a neural controller applied a level system in hart protocol

This paper presents a design of a neural controller for industrial level systems. The level process has an asymmetric dynamic and its control is not a simple process of performing. This work presents an advanced control technique using intelligent control with artificial neural networks. The proposal is to implement a network of multilayer perceptron with a PI controller for controlling a level system based on a SMAR® didactic plant with Hart protocol.


F2OAS: Towards a standard framework to organizing software architectural styles

In this paper, a standard organization (F2OAS) to all software architectural styles has been provided. To obtain this aim, all previous classifications and categories for architectural styles have been collected. Then by analysis of existing approaches, all different aspect of a standard organization has been investigated.


Integrating WebGIS with WFS and GML

The main advantages of this approach are interoperability and feature-level data sharing. Web services technologies with WFS make use of XML database to store geospatial data as GML. In this paper, we analyzed different interfaces provided by WFS like GetCapabilities, DescribeFeatureType and GetFeature and integrate it with Geoserver open source GIS to limit access of data and transactions.


Adaptive e-learning system based on learning interactivity

In this paper we propose an improved E-Learning Social Network Exploiting Approach based on clustering algorithm and graph model, which can automatically group distributed e-learners with similar interests and make proper recommendations, which can finally enhance the collaborative learning among similar elearners. Through similarity discovery, trust weights update and potential friends adjustment, the algorithm implements an automatic adapted trust relationship with gradually enhanced satisfactions.


Implementation of FHMA communication system using labview

This research was conducted FHMA (Frequency Hopping Multiple Access) standard using Labview. FHMA was developed in Israel in the spectral efficiency. The main objective of this research is to emphasize the performance of the communication system of FHMA paper. FHMA have good radio features that provide full radio capacity, covering the trunking and untargeted mobile phone, with a choice of services including packet mode, short message services and voice. FHMA is compatible with a wide range of additional services, and can be used as for government, emergency services, transportation and military applications.


Giáo trình Microsoft windows 2000: Phần 1 - NXB Thống Kê

Giáo trình Microsoft windows 2000 (lý thuyết - bài tập thực hành) đã được biên soạn nhằm đáp ứng nhu cầu học tập, tham khảo của các bạn là học sinh, sinh viên, người đang làm việc hoặc tự học. Sách gồm 12 nội dung, phần 1 sách gồm 6 nội dung đầu tiên: Làm quen, dùng các ứng dụng trong Windows 2000, làm việc với đĩa, thư liệu, và tập tin, in ấn với Windows, cá nhân hóa Windows, xác lập các chương trình.


Giáo trình Microsoft windows 2000: Phần 2 - NXB Thống Kê

Nối tiếp phần 1, phần 2 giáo trình tiếp tục đề cập đến các nội dung như: Dùng các trình phụ kiện windows, bảo trì hệ thống, giao kết với các dịch vụ trực tuyến, gởi và nhận fax, giao kết internet và e mail, dùng internet và e mail. Với hơn 100 bài học các bạn sẽ được hướng dẫn từng bước, dễ hiểu, ngắn gọn thông qua các hình ảnh minh họa cụ thể, nhiều ví dụ thực tiễn sẽ khiến cho việc tự học của bạn trở nên dễ dàng nhanh chóng và hiệu quả hơn, mời các bạn cùng tham khảo.


Giáo trình Nhập môn quản trị hệ thống Linux

(BQ) Cuốn “Nhập môn Quản trị hệ thống Linux” được viết với mục đích làm giáo trình cho một lớp Linux 3 hoặc 6 tín chỉ (45 hoặc 90 giờ) học thực hành trên phần mềm máy ảo VMware Workstation. Nội dung cuốn sách gồm 3 phần: Giới thiệu về luật bản quyền, phần mềm tự do/nguồn mở (FOSS), các hệ điều hành unix; phần 2 và 3: Các câu lệnh quản trị Linux trên máy đơn và trong môi trường mạng.


Giáo trình Sử dụng hệ điều hành và quản lý máy tính: Phần 1

Giáo trình gồm 7 học phần, mỗi học phần cung cấp cho học viên một nội dung kiến thức cụ thể, độc lập. Ở phần 1 sách gồm các nội dung sau: Các khái niệm cơ bản về CNTT; sử dụng hệ điều hành và quản lý máy tính; soạn thảo văn bản (MS Word); bảng tính điện tử (MS Excel).


Giáo trình Sử dụng hệ điều hành và quản lý máy tính: Phần 2

Nối tiếp phần 1, phần 2 sách trình bày: Kỹ năng trình diễn (MS PowerPoint), cơ sở dữ liệu (MS Access), ứng dụng của mạng LAN và mạng Internet trong công việc. Để nắm rõ nội dung chi tiết từng phần của Giáo trình Sử dụng hệ điều hành và quản lý máy tính mời các bạn cùng tham khảo.


A new technique for adapting sip protocol to Ad hoc networks: VNSIP ((Virtual Network for SIP) illustration and evaluation of performance

In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. In this paper, we present and evaluate a new technique, which we have called Virtual Network for SIP (VNSIP) to fix the problem related to the constraints of SIP deployment in Ad Hoc network.


Hybrid multi biometric person authentication system

In this paper, the authors present a hybrid multibiometric authentication person system that integrates both multi modal and multi algorithmic. Multi-modal, the system using face and fingerprint features, has long been considered common in personal authentication. Multi-algorithm is the system which uses Circularly Orthogonal Moments, such as Zernike Moment (ZM), Pseudo Zernike Moment (PZM), Polar Cosine Transform (PCT) and Radial Basis Function (RBF) Neural Networks. These moments are widely used because their magnitudes are invariant to image rotation, scaling and noise.


Service oriented architecture essentiality as a best-practice for the development of large software projects

In this paper we will examine the benefits which lead us to utilize service oriented architecture in large application development.


One way direction communication synchronization for widemac protocol in IR-UWB based WSN

WideMac was presented as a novel MAC protocol designed for wireless sensor networks using impulse radio ultra wide band transceivers due to its low power consumption. Because of the luck of synchronization in this protocol, this paper will present a solution for the synchronization problem when there is only one way direction communication.


Modeling and simulation of PV array and its performance enhancement using MPPT (P&O) technique

The proposed Perturb and Observe control algorithm is a software programme with a self-tuning function which adjusts the array reference voltage and step size of the voltage to achieve maximum power point. The validity of the photo voltaic module with P & O method allows better performance of MPPT due to variation of both power and voltage. This work is proposed to be carried out in MATLAB/SIMULINK environment.


Robust watershed segmentation of noisy image using wavelet

In this paper, we tried to address a very effective technique called Wavelet thresholding for denoising, as it can arrest the energy of a signal in few energy transform values, followed by Marker controlled Watershed Segmentation.


Scenario based study of on demand reactive routing protocol for ieee 802.11 and 802.15.4 standards

The main method for evaluating the performance of MANETs is simulation. In this paper performance of Ad-hoc On-demand Distance Vector (AODV) reactive routing protocol is studied by considering IEEE 802.11 and IEEE 802.15.4 standards. Metrics like average end-to-end delay, packet delivery ratio, total bytes received and throughput are considered for investigating simulation scenario by varying network size with 10 mps node mobility.


Tài liệu mới download

Từ khóa được quan tâm

CTV FACE

Có thể bạn quan tâm

MCSE Windows server 2003- P16
  • 15/08/2010
  • 14.724
  • 859
19.4. Stationery Rich text
  • 28/07/2010
  • 55.028
  • 856

Bộ sưu tập

Danh mục tài liệu