Specifying systems
-
The paper presents the results of an analysis of the decrease in cryptographic strength of the most common symmetric ciphers, taking into account the development of cryptanalytic methods. The vector of the threat to the reduction of information confidentiality stored and processed in information systems in the long term has been determined.
7p viyoko 01-10-2024 4 1 Download
-
Objectives: The main objective of this thesis is to study the problem of stability analysis and applications in control of discrete-time 2-D systems described by Roesser model with certain types of stochastic parameters. The research includes the methodology development and establishment of analysis and synthesis conditions of the following specified models.
120p thebadguys 08-06-2021 22 4 Download
-
Objectives: The main objectives of this thesis is to study the problem of stability analysis and applications in control of discrete-time 2-D systems described by Roesser model with certain types of stochastic parameters. The research includes the methodology development and establishment of analysis and synthesis conditions of the following specified models.
27p thebadguys 08-06-2021 28 4 Download
-
The article will focus on highlights and features in the political system of consolidating and establishing the maritime sovereignty of the Tay Son dynasty and specify its impact on the Nation’s protection of sacred maritime sovereignty.
12p koxih_kothogmih5 04-09-2020 15 1 Download
-
The paper presents a brief description of an automated system, designed to control coal quality in accordance with the specified parameters of the waste rock content owing to obtaining, collecting, processing and storing information from primary instruments, using a radioisotope measuring method.
5p lucastanguyen 01-06-2020 26 1 Download
-
Lecture "Software engineering - Lecture 10: Specifying systems" has contents: Use of UML for ODP system specifications, use of UML for ODP system specifications, UML object constraint language.
42p bautroibinhyen13 10-01-2017 70 3 Download
-
Bài giảng chương 13 đề cập đến vấn đề bảo mật trong cơ sở dữ liệu. Chương này trình bày những nội dung chinh như: Introduction to database security, access control, discretionary access control, specifying privileges using views, revoking privileges, propagation of privileges using the grant option,... Mời các bạn cùng tham khảo.
72p kiepnaybinhyen_02 25-12-2015 61 4 Download
-
Identify the product whose software requirements are specified in this document, including the revision or release number. Describe the scope of the product that is covered by this SRS, particularly if this SRS describes only part of the system or a single subsystem.
8p gaudinh2015 27-11-2015 79 5 Download
-
Formal specification of agent behaviour through environment scenarios introduces a formal notation for the specification of scenario s in agent based systems. The autonomous and collaborative behavior of an agent can be formally specified by a set of rules describing its activity in various scenarios. The power of the approach is illustrated by the formal specification of maes.
15p namdmcist 24-05-2015 40 4 Download
-
Formal methods mathematical languages, techniques and tools, used to specify and verify systems, goal is help engineers construct more reliable systems. Introduction to Formal Methodspresents about introduction; formal specification; formalformal verificationverification; model checking; theorem proving.
29p ngkhacvu 22-05-2015 71 6 Download
-
Lots of users and privileges scattered over many platforms and applications. Who are the valid users? What are they entitled to access?How do you keep access rights up-to-date? How do you specify and enforce policy?
29p muathu_102 28-01-2013 48 3 Download
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p trinh02 28-01-2013 81 3 Download
-
cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...
19p muathu_102 28-01-2013 28 2 Download
-
Used to communicate IP status and error messages between hosts and routers Uses IP to route its messages between hosts Must be implemented with IP remember, IP is just a packet delivery system transmits and routes datagrams from sources to destinations through a series of interconnected networks it has a checksum in the IP header to detect lost bits no error detection on the datagram payload though but has no native mechanism for source host notification This is where ICMP comes in its used to report IP errors to the source host ICMP data is carried as the payload of an IP datagram specifie...
19p muathu_102 28-01-2013 51 3 Download
-
Upon completing this lesson, you will be able to: Describe the features and operation of static routing Describe the features and operation of dynamic routing protocols, including RIP, IGRP, EIGRP, and OSPF Build a functional router configuration to support the specified network operational requirements, given a network design Use show commands to identify anomalies in routing operation, given an operational router Use debug commands to identify events and anomalies in routing operation, given an operational router...
28p trinhvang 25-01-2013 58 5 Download
-
Upon completing this module, you will be able to: Explain how bridging and switching operates Explain the purpose and operations of the Spanning-Tree Protocol Verify the default configuration of the device, given a functioning access layer switch Build a functional access switch configuration to support the specified network operational parameters, given a network design Execute an add, move, or change on an access layer switch, given a new network requirement
15p trinhvang 25-01-2013 60 5 Download
-
Upon completing this course, you will be able to: Execute an add, move, or change so that the network functions in accordance with the new requirement, given a new network requirement Use available configuration tools to establish connectivity to the appropriate network device to complete the initial device configuration Build a functional configuration to support the specified network operational requirements, given a network design Use the command-line interface to accurately determine network device operational status and network performance...
12p trinhvang 25-01-2013 70 5 Download
-
SPIN là một công cụ để xác minh tính chính xác của của một mô hình phần mềm một cách nghiêm ngặt và tự động. Ngôn ngữ đầu vào của SPIN có tên là PROMELA. PROMELA có thể dùng để quy định hệ thống đồng thời bằng cách tự động thay đổi số lượng các quá trình tương tác, nơi mà các quá trình tương tác có thể được đồng bộ hóa hoặc không đồng bộ hóa.
18p tinhbanpt 14-01-2013 93 21 Download
-
The for loop is a MATLAB construct that allows a sequence of MATLAB statements to be executed more than once. The for loop repeats a block of commands for a specified number of times; the specified number is established before the loop is executed.
19p feteler 27-11-2012 44 2 Download
-
Data Model: A set of concepts to describe the structure of a database, and certain constraints that the database should obey. Data Model Operations: Operations for specifying database retrievals and updates by referring to the concepts of the data model. Operations on the data model may include basic operations and user-defined operations.
34p thienthanoze 12-11-2012 102 10 Download