Wharf Traders is moving to new location and hence below mentioned is the proposed manual for their new office location. As a consultant, to Wharf Traders I have suggested detailed specifications that are required in order to create and achieve security and protection of the data, which is sensitive in nature. I have proposed 3 Windows server 2008 and 4 Linux servers including Ubuntu and Centos as backend server to the network. Also, I have acknowledged that users will have client machines as ...
Abstract - A secure network partially depends on user authentication and unfortunately authentication schemes used at present are not utterly secure. Some passwords are not computationally dominant, where brute force attacks on this unprecedented scale became potential. Here we have designed a combined schema of One Time Password (OTP) algorithm concatenated with PassText which makes uncomplicated to commit to memory and is computationally powerful. It can be fairly and rapidly provided to th...
Abstract. In this paper, a novel strategy for eliminating redundancy in the data dissemination process is proposed. A cluster based infrastructure is considered where the entire geographical area of interest is divided into grid based clusters having a representative member in each of the cluster. The output from the sensors is made to pass through a context aware system to ensure the validity of the sensor data. Redundancy in the above valid data can be of two types - Intra cluster and Inter...
The 21st century is the century of the computers. People from all walks of lives need to learn how to use computers as most of the things around us required at least some basic knowledge of the computer. Somehow, for perfectly normal people like us, it is a piece of cake to adapt to the evolving technology. As we look around the street, have we ever thought of those unfortunate people with disabilities? What about their difficulties in utilizing the computer? Of course, we might say that the ...
Mobile IP is most effective in the current environment where mobility is popular and the existing models cannot give the competent solution for the requirements of the users. "It is an open standard of the Internet Engineering Task Force (IETF) that allows users to hold the same IP address without terminate the session and maintain current applications while moving different networks". But later on it was found that Mobile IP cannot work efficiently. So, to adjust this problem Mobile IP enhan...
Want to call and chat with your friends for free, right from the comfort of your house at your own convenience? Then download Google Talk now. Google Talk or GTalk as it is more popularly known as is a free, online Windows software application, specially designed for VoIP and instant messaging. This web-based chat application developed by Google Inc. not only enables you to text chat but also voice chat with family and friends from across the world. Check out what all you can do with GTalk: T...
I. INTRODUCTION MANY countermeasures are needed to protect data. Cryptography is one of the most important techniques used to protect data while the data is being transmitted or even stored in storage devices. Cryptography is the science of creating encryption and decryption algorithms, while Cryptanalysis is the art of attacking the encryption system. The aim of such attack is to recover the secret key using two methods: brute-force attack and cryptanalytic attack. Nowadays both methods are ...
INTRODUCTION Three developing stages of the interlocking and control system at railway stations are went through, which are mechanical-interlocking control system, electronic-centralized interlocking control system and computer interlocking control system . The computer interlocking control system, which is used presently, is a system whose operation realizes by computer and execution outcome is taking out by safety relays[1]. Although different typed computer interlocking system reserves dif...
By traditional airline reservation system, the customer needs to go through airline agency and get the air flight ticket after three days of booking. If go through airline e-ticketing system, the customer can directly get the air flight ticket. By through airline e-ticketing system, the customer only need a several steps to making reservation and does not need help of customer service. Reduce effort and frustration for customer in scheduling trip. By through airline e-ticketing system, custom...
You would have seen many sites while surfing on the internet showing very nice animated characters, graphics and pictures. Web Animation is a very powerful and flexible medium to convey text or moving picture messages and create long-lasting impact on the mind of viewers. Whereas a static website despite delivering unique and meaningful content may not be able create impression on the mind of visitors. Web Animation in simple words is animation on the World Wide Web (www). Flash has changed t...