Building a computer
-
This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks.
123p runthenight07 01-03-2023 5 4 Download
-
Tensegrity is a structural system constructed of tensile cables and compressive bars. This thesis proposes several general methods for creating tensegrity structures. The author has developed new methods for creating specific tensegrity cells and the corresponding computer code. Furthermore, the author has constructed various physical models to validate the methods. A proposal for an observation tower on top of the Eureka building in Melbourne has also been devised by the author.
88p runthenight07 01-03-2023 5 3 Download
-
To demonstrate the practicality of two proposed model, research works are focused on as follows: O-Marketplace Model, after analyzing the limitations of existing cloud service delivery methods, a multi-cloud service delivery method is proposed to overcome these limitations, and a promising multi-cloud marketplace model is built up; Composable Application Model, we first build up its concept and its description method, then the experimentation is conducted by transform into TOSCA specification to evaluate the feasibility of the proposed multi-cloud application model.
130p viabigailjohnson 10-06-2022 14 3 Download
-
Research objectives: Building a method of granulating partitions of domain of interpretation in DLs. This method is base on bisimulation and using suitable selectors as well as information gain measure; proposing bisimulation-based concept learning algorithms for knowledge bases in DLs using Setting.
31p change03 06-05-2016 51 3 Download
-
Our thesis shows the quality of semantic vector representation with random projection and Hyperspace Analogue to Language model under about the researching on Vietnamese. The main goal is how to find semantic similarity or to study synonyms in Vietnamese. We are also interested in the stability of our approach that uses Random Indexing and HAL to represent semantic of words or documents. We build a system to find the synonyms in Vietnamese called Semantic Similarity Finding System. In particular, we also evaluate synonyms resulted from our system.
55p 01202750693 09-06-2015 96 9 Download
-
Purposes of the research Building a new method (method directly applicable limit theorem) evaluate soil stabilization in accordance with the actual working of the soil environment, the study contributes to the development of stable subgrade; applying the above method to build a computer program, set the tables and nomogram helps engineers quickly determine the height and slope of embankment limited.
30p nganhanggddt2014 01-07-2014 94 6 Download
-
Protein molecular modelling and ligand docking were employed for the design of anthraquinone galactosyl-bio-mimetic dye ligands (galactosyl-mimodyes) for the target enzyme galactose dehydrogenase (GaDH). Using appro-priate modelling methodology, a GaDH model was build based on a glucose-fructose oxidoreductase (GFO) protein template.
15p tumor12 22-04-2013 47 2 Download
-
The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems
19p muathu_102 28-01-2013 47 4 Download
-
Upon completing this module, you will be able to: Explain how bridging and switching operates Explain the purpose and operations of the Spanning-Tree Protocol Verify the default configuration of the device, given a functioning access layer switch Build a functional access switch configuration to support the specified network operational parameters, given a network design Execute an add, move, or change on an access layer switch, given a new network requirement
15p trinhvang 25-01-2013 60 5 Download
-
Upon completing this course, you will be able to: Execute an add, move, or change so that the network functions in accordance with the new requirement, given a new network requirement Use available configuration tools to establish connectivity to the appropriate network device to complete the initial device configuration Build a functional configuration to support the specified network operational requirements, given a network design Use the command-line interface to accurately determine network device operational status and network performance...
12p trinhvang 25-01-2013 70 5 Download
-
PHP 5/MySQL Programming- P1:computer programming has often been seen as a difficult and arcane skill. Programming languages are difficult and complicated, out of the typical person’s reach. However, the advent of the World Wide Web has changed that to some extent. It’s reasonably easy to build and post a Web page for the entire world to see. The language of the Web is reasonably simple, and numerous applications are available to assist in the preparation of static pages
5p venus135 05-12-2010 68 5 Download
-
Chapter 10. RDF, RDF Tools, and the Content Model-P1 Chapter 9 introduced the Resource Description Framework (RDF) as the basis for building display data in the interface, where XUL templates take RDF-based data and transform it into regular widgets. But RDF is used in many other more subtle ways in Mozilla. In fact, it is the technology Mozilla uses for much of its own internal data handling and manipulation.
15p kaka 28-07-2010 104 11 Download
-
It is likely that most people can communicate mathematics to a computer more eectively (rapidly and accurately) by speaking than they can by using a stylus on a computer tablet. This may seem surprising, but is our speculation based on trying various alternative input methods. An even better setup may be to speak and simultaneously use pointing or handwriting. Unfortunately, building a properly functioning prototype using this concept is dicult
20p baohan 17-06-2009 113 13 Download