Computer System technology
-
Intrusion Detection (ID) is one of the active branches in network security research field. Many technologies, such as neural networks, fuzzy logic and genetic algorithms have been applied in intrusion detection and the results are varied. In this thesis, an Artificial Immune System (AIS) based intrusion detection is explored. AIS is a bio-inspired computing paradigm that has been applied in many different areas including intrusion detection.
74p runthenight07 01-03-2023 8 2 Download
-
What are the key aspects to achieving acceptable usability outcomes for information systems being developed? The changing technologies and increased usage across the general population, the impacts of this in our everyday lives, at work and at leisure are exponentially increasing. The interfaces and interaction styles presented as part of these technologies have been challenged to be more intuitive, contextually sensitive, location aware, human centred and aimed at a larger community of stakeholders.
376p runthenight04 02-02-2023 6 2 Download
-
In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.
185p runthenight04 02-02-2023 7 2 Download
-
This research investigates the interactive effects of usability, the designer perspective and user expectations on the user experience (UX) of e-commerce websites. It incorporates the theoretical underpinnings of Norman’s (1988) seminal research specifically, Mental Models and Nielsen’s User Categories (1993) to explore the different mental models, domain and technology expertise of two distinct groups – users and designers – in the interaction with a selected system image, that of the e-commerce website.
293p runthenight04 02-02-2023 8 2 Download
-
In recent years, optical orthogonal frequency division multiplexing (OOFDM) has emerged as a dominant research and development area in the field of high-speed optical communications. OFDM is a potential candidate as the most promising next-generation optical networks such as passive optical networks and optical transport networks, due to their simple configuration based on low cost, high speed data rates, high spectral efficiency, high quality of service and robustness against narrow band interference, frequency selective fading, and chromatic dispersion.
99p nguathienthan12 18-05-2021 21 7 Download
-
The first is the hybrid filterwrapper algorithm proposal for finding the reduction set of the decision table using advanced fuzzy distance measurements and other measurements basing on fuzzy rough set to minimize2 the number of attributes of reduction set. Reduce and improve the accuracy of the classification model.
26p capheviahe27 23-02-2021 31 4 Download
-
This paper conducted an analysis about the best tools and technology that can be adopt as social knowledge management system for lecturer in doing collaboration among units and other lecturers.
12p lucastanguyen 01-06-2020 13 2 Download
-
Research object are the organization and state management activities on ITI in Vietnam. The scope limited in the contents of state management on ITI systems, focusing on policies, strategies, planning, plans and programs; legal documents; inspection and examination to eliminate violations; organizing the state management apparatus on ITI in the field of manufacturing computer hardware and computer software.
30p dungmaithuy 18-09-2019 46 4 Download
-
Liquid alloy systems have a high degree of thermal conductivity, far superior to ordinary nonmetallic liquids and inherent high densities and electrical conductivities. This results in the use of these materials for specific heat conducting and dissipation applications for the nuclear and space sectors. Uniquely, they can be used to conduct heat and electricity between nonmetallic and metallic surfaces.
10p minhxaminhyeu4 26-06-2019 34 1 Download
-
In this study, we compared a PCD and conventional scintillation detector with respect to the energy windows (5%, 10%, 15%, and 20%) using a 99mTc gamma source with a Geant4 Application for Tomography Emission simulation tool. The gamma camera systems used in this work are a CZT PCD and NaI(Tl) conventional scintillation detector with a 1-mm thickness. According to the results, although the IU and DU results were improved with the energy window, the SF and CNR results deteriorated with the energy window.
5p minhxaminhyeu4 26-06-2019 27 0 Download
-
Creative teaching in the age of rapidly developing information technology is a major problem of concern. The problem is how to develop the capacity and creative thinking for students while a wide range of knowledge is increasing rapidly and the classroom learning time is decreasing. This article provides a model of creative teaching through using an effective online learning system for the computer architecture module.
7p vinhbinhnguyen 14-06-2017 51 2 Download
-
When computer virus wide spreads in the world nowadays, anti-virus needs to improve their identifying methods to enhance the performance. In this paper, we introduce a new method to diagnose computer virus. First, we analyse the characteristics of viral data type to define virus classes through object-oriented methods. Second, we study the machine learnning mechanism for each virus class. Finally, we apply these learning forms to a data processing stage of a machine learning anti-virus expert system.
10p binhminhmuatrenngondoithonggio 09-06-2017 67 5 Download
-
In this paper, a domain specific ontology called Information Technology Ontology (ITO) is proposed. This ontology is built basing on three distinct sources of Wikipedia, WordNet and ACM Digital Library. An information extraction system focusing on computing domain based on this ontology in the future will be built.
10p dieutringuyen 07-06-2017 22 3 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 35 3 Download
-
Chapter summary: Bridges selectively relay packets between network segments, depending on their data-link layer destination addresses; bridges maintain a single broadcast domain and create separate collision domains; switches improve on the function of bridges by forwarding packets only to their destination systems;...and other contents.
16p tangtuy08 21-04-2016 40 2 Download
-
This chapter includes contents: Types of remote network connections, public switched telephone network (PSTN), modems, modem communications, configuring a modem, Virtual Private Network (VPN) communications,...
13p tangtuy08 21-04-2016 39 2 Download
-
In this chapter, students will be able to understand: Routers receive packets and use the most efficient path to forward them to their destinations, complex internetworks can have redundant routers that provide multiple paths to the same destination, routers store information about the network in a routing table,...
4p tangtuy08 21-04-2016 44 1 Download
-
Chapter summary: Computers have a variety of ports, some of which are implemented by the motherboard and others by expansion cards; computers use many different types of connectors fortheir various interfaces, and in some cases the same connector type can provide different functions; SCSI host adapters can use any one of several types of connectors, which are not interchangeable;...
16p tangtuy08 21-04-2016 35 3 Download
-
This chapter includes contents: Documentation and resources, logs and indicators, network testing and monitoring tools, product documentation, CD-ROM documentation formats,...
26p tangtuy08 21-04-2016 41 3 Download
-
Chapter overview: Introduction to network troubleshooting, incident administration, gathering information, possible causes: Internet router problem, internet communication problem, domain Name System (DNS) failure, local area network (LAN) communication problem, computer configuration problem, user error.
20p tangtuy08 21-04-2016 50 3 Download