Secure communications
-
This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.
11p viengfa 28-10-2024 3 1 Download
-
In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.
10p viling 11-10-2024 1 1 Download
-
An embedded device is becoming popular in daily life thanks to their low power consumption and multiprocessing capability. In particular, the security of embedded devices has been a big issue of concern to academic and industrial communities. This study aims at the Grain 128- AEAD authenticated encryption with associated data algorithm embedded on low-power and resourceconstrained devices.
12p vibecca 01-10-2024 4 1 Download
-
In this paper, we conduct a survey on optimization-based approaches to dynamic CGKM, which can be divided into two categories based on logical/heuristic arguments and a rigorous mathematical optimization model.
9p viyoko 01-10-2024 3 1 Download
-
In this paper, we introduce a novel model, improved from CViT, designed to optimize the process of deepfake detection, named DSViT (Deepfake Detection with SC-based Convolutional Vision Transformer).
12p viyoko 01-10-2024 3 1 Download
-
The data collected using purposive sampling and Slovin formula. The hypothesis of this research is tested by multiple linier regression. The research results showed that the variable site design, informative, security and communication have a partialy significant effect to the online shopping customer satisfaction, while the convenience of shopping variable is not significant. This understandable because each online store has different system and procedure that incovenience for consumers.
9p longtimenosee10 26-04-2024 6 3 Download
-
Purposes: Reproducing systematically, comprehensively and objectively the process of implementing social security policies from 2001 to 2015 in Hai Phong City, indicating achievements and limitations in the implementation process. From there, the author draws on the characteristics, impact assessment and issues raised.
27p thebadguys 08-06-2021 18 4 Download
-
In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream.
8p tamynhan6 14-09-2020 34 3 Download
-
Bài giảng "Mật mã học: Tổng quan về mật mã học" cung cấp cho người học các kiến thức: Introduction, information security and cryptography, cryptographic goals, one-way functions, basic terminology and concepts,... Mời các bạn cùng tham khảo.
41p abcxyz123_10 07-06-2020 26 4 Download
-
Summary of the Doctor thesis of Sociology: Role of grassroots socio political organizations in ensuring social security for rural residents: Case study in 2 communes with content to understand the role of grassroots socio-political organizations in ensuring social security for rural residents through the implementation of this organization, supporting labor market policies and social assistance in rural communities. On that basis, a number of recommendations are proposed to improve the performance of socio-political organizations in the context of current social change. Invite you to refer.
18p lanxichen 05-05-2020 40 4 Download
-
In this paper, a novel method is presented to detect spam content on the web. It is based on classification and employs an idea from biology, namely, danger theory, to guide the use of different classifiers. The evaluation of content features of WEBSPAM-UK2007 data set using 10-fold cross-validation demonstrates that this method provides high evaluation criteria in detecting web spam.
13p byphasse043256 23-03-2019 27 1 Download
-
In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilitie.
7p byphasse043256 23-03-2019 31 1 Download
-
Cộng đồng Chính trị - An ninh ASEAN (APSC) là một trong ba nhân tố cấu thành nên Cộng đồng ASEAN và là nhân tố có vai trò quan trọng, đặc biệt trong bối cảnh tình hình an ninh chính trị khu vực diễn biến phức tạp. ASEAN đang củng cố sự đoàn kết nâng cao vai trò trung tâm cũng như vị thế của ASEAN trong giải quyết các vấn đề an ninh khu vực và quốc tế.
9p sieunhansoibac3 12-04-2018 144 10 Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p nhanmotchut_3 20-10-2016 55 4 Download
-
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45p nhanmotchut_3 20-10-2016 41 6 Download
-
Research clarify fundamental issues of theory and practice, on that basis, to propose measures to enhance fostering the working capacity of national defense - security at communes, wards and towns in the Military.
29p change05 08-06-2016 40 3 Download
-
In this chapter, you will learn to: Explain how ACLs are used to secure a medium-size enterprise branch office network, including the concept of packet filtering, the purpose of ACLs, how ACLs are used to control access, and the types of Cisco ACLs. Configure standard ACLs in a medium-size enterprise branch office network, including defining filtering criteria, configuring standard ACLs to filter traffic, and applying standard ACLs to router interfaces,...
86p youcanletgo_01 04-01-2016 61 5 Download
-
After completing this chapter, students will be able to: Describe how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication; describe the mechanisms to ensure data integrity and authentication; describe the mechanisms used to ensure data confidentiality.
104p youcanletgo_01 04-01-2016 36 4 Download
-
Establishing a network performance baseline requires collecting key performance data from the ports and devices that are essential to network operation.1 Gather symptoms - Troubleshooting begins with the process of gathering and documenting symptoms from the network, end systems, and users. Stage 2 Isolate the problem - The problem is not truly isolated until a single problem, or a set of related problems, is identified.
66p mrdvad11 12-03-2013 169 55 Download
-
Static NAT – Mapping an unregistered IP address to a registered IP address on a one-to-one basis. Particularly useful when a device needs to be accessible from outside the network.Dynamic NAT – Maps an unregistered IP address to a registered IP address from a group of registered IP addresses. Dynamic NAT also establishes a one-to-one mapping between unregistered and registered IP address, but the mapping could vary depending on the registered address available in the pool, at the time of communication....
81p mrdvad11 12-03-2013 147 52 Download