Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  DOS
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available remote Four Dimensional Security and Vulnerability Matrix for Cloud (4-SVM)
EN
Cloud computing is a catchphrase for today's ICT world. The emerging trend of ``Everything as a service'' has made this rapid growing technology a very admired and highly demanding technology for a must adapted one. With the virtues of 24x7 service availability, multi tenancy, utility, speed, high productivity, agility, scalability of this technology, it has been proved as an emerging trend for the ICT industry as well as the academia. Today the rapid data analytics is changing the way companies try to win, and hence enabling them to generate instantaneous insights for supporting their most important business processes.In present technological era, cloud combining with IOT or Big Data, or highly popular commercial ERP solutions, namely SAP cloud, has touched the height of technological growth but one of the major reasons for the trepidation of its widespread adaptability is the security and authentication breach in cloud technology. Being used in highly commercial solutions, the security issues play a major role.Threat or vulnerability is more important to qualify rather than being quantified only. This paper is a proposal showing a quantifiable approach, focuses on several threats and security breaches and countermeasures their impact concentrating on a cloud based solutions, with the philosophy of the inevitability of testing on cloud security References
EN
In the present work a systematic study was carried out to understand the influence of Sc doping on electronic and optical properties of CdS nanoparticles. The geometry optimization and symmetry computation for CdS and Sc doped CdS nanoparticles using Density Functional Theory (DFT) on B3LYP level with the QZ4P for Cd and DZ2P for sulphur and Sc were performed by Amsterdam Density Functional (ADF). The results show that HOMO-LUMO gap as well as electronic and optical properties of CdS clusters vary with Sc doping. The HOMO-LUMO gap is affected by the dopant and its value decreases to 0.6 eV. Through considering the numerical integration scheme in the ADF package, we investigated different vibrational modes and our calculated Raman and IR spectra are consistent with the reported result. The calculated IR and Raman peaks of CdS and Sc doped CdS clusters were in the range of 100 to 289 cm−1, 60 cm−1 to 350 cm−1 and 99 cm−1 to 282 cm−1, 60 cm−1 to 350 cm−1, respectively, which was also confirmed by experiment as well as a blue shift occurrence. Subsequently, for deeper research of pure and doped CdS clusters, their absorption spectra were calculated using time-dependent DFT method.
3
Content available remote Rozproszony system pomiarowo–kontrolny do nadzoru sieci wodociągowej
PL
Artykuł omawia skonstruowany przez autorów i będący w końcowej fazie wdrażania system pomiarowy–kontrolny służący do monitorowania i sterowania działaniem rozległej sieci wodociągowej. System ten składa się z szeregu autonomicznych sterowników pracujących pod kontrolą systemu DR–DOS, które komunikują się za pomocą modemów GSM z jednostką centralną PC (serwerem bazy danych i konsolą operatorską) pracującym pod kontrolą systemu Linux.
EN
Distributed control–measurement system, developed and implemented by the authors, is discussed in the paper. The system consists of autonomic controllers, working under the control of DR–DOS, which communicate over GSM network with central Linux database server also acting as an operator console.
PL
Przedstawiono typowe zagrożenia na jakie narażeni są użytkownicy pracujący w sieci. Opisano typowe metody ataków. Podane zostały przykłady ataków na systemy komputerowe oraz opisano próby wyłudzenia poufnych informacji od indywidualnych osób. W artykule wskazano na pomysłowość oszustów i próby ominięcia przez nich zabezpieczeń stosowanych w systemach komputerowych. Podsumowanie pracy zawiera wskazówki dotyczące zarówno stosowanych systemów zabezpieczeń jak i polityki bezpieczeństwa.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.