Storing information
-
The paper presents the results of an analysis of the decrease in cryptographic strength of the most common symmetric ciphers, taking into account the development of cryptanalytic methods. The vector of the threat to the reduction of information confidentiality stored and processed in information systems in the long term has been determined.
7p viyoko 01-10-2024 4 1 Download
-
The data collected using purposive sampling and Slovin formula. The hypothesis of this research is tested by multiple linier regression. The research results showed that the variable site design, informative, security and communication have a partialy significant effect to the online shopping customer satisfaction, while the convenience of shopping variable is not significant. This understandable because each online store has different system and procedure that incovenience for consumers.
9p longtimenosee10 26-04-2024 6 3 Download
-
The paper presents a brief description of an automated system, designed to control coal quality in accordance with the specified parameters of the waste rock content owing to obtaining, collecting, processing and storing information from primary instruments, using a radioisotope measuring method.
5p lucastanguyen 01-06-2020 26 1 Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p nhanmotchut_3 20-10-2016 64 4 Download
-
In this chapter, students will be able to understand: Routers receive packets and use the most efficient path to forward them to their destinations, complex internetworks can have redundant routers that provide multiple paths to the same destination, routers store information about the network in a routing table,...
4p tangtuy08 21-04-2016 45 2 Download
-
Chapter 3 introduce to Gene function. This chapter outlines the three activities of genes and provides some background information that will be useful in our deeper explorations in subsequent chapters. This chapter presents the following content: Storing information, replication, mutations.
44p tangtuy05 30-03-2016 59 5 Download
-
Support traditional voice service Support supplementary service & network-based service MSC: Mobile Switching Center, Interface with PSTN, PLMN, PSDN & other carrier. VLR: Visitor Location Register, Temporary storage of MS. HLR: Home Location register, Store all kinds of information of subscribers. AuC: Authentication Center, subscriber authentication.
64p mvthtbtn 15-09-2013 68 1 Download
-
First the notion "paraphrase" is defined, and then several different types of paraphrase are analyzed: transformational, attenuated, lexical, derivational, and real-world. Next, several different methods of retrieving information are discussed utilizing the notions of paraphrase defined previously.
11p nghetay_1 06-04-2013 37 1 Download
-
Molecules and assemblies of molecules with well-defined secondary structures have been designed and characterized by controllingnoncovalent interactions. By specifying intermolecular interactions, a class of information-storing molecular duplexes have been successfully developed. These H-bonded molecular duplexes demonstrate programmable, sequence-specificity and predictable, tunable stabilities. Based on these highly specific molecular zippers (or glues), a systematic approach todesigning self-assembled structures is now feasible. ...
10p dell39 03-04-2013 56 6 Download
-
Epigenetic mechanisms control eukaryotic development beyond DNA-stored information. There are several pathways, including histone tail mod-ifications, histone variant incorporation, nucleosome remodelling, DNA methylation and noncoding RNAs that together all contribute to the dynamic ‘make-up’ of chromatin under distinct developmental options.
15p inspiron33 25-03-2013 39 4 Download
-
The RNA world hypothesis assumes that life arose from ancestral RNA molecules, which stored genetic information and catalyzed chemical reac-tions. Although RNA catalysis was believed to be restricted to phosphate chemistry, it is now established that the RNA has much wider catalytic capacities.
15p viettel02 22-02-2013 40 3 Download
-
Overview The recovery catalog is a schema that is created in a separate database. It contains the RMAN metadata obtained from the target database control file. RMAN propagates information about the database structure, archived redo logs, backup sets, and datafile copies into the recovery catalog from the control file of the target database. You should use a catalog when you have multiple target databases to manage. RMAN stores, uses, and maintains the information in the recovery catalog. The recovery catalog is maintained by RMAN when you do the following: 1.
28p trinh02 28-01-2013 39 5 Download
-
Naming Methods: Overview Oracle Net provides five naming methods: Host naming: Enables users in a TCP/IP environment to resolve names through their existing name resolution service Local naming: Locates network addresses by using information configured and stored on each individual client's tnsnames.
24p trinh02 28-01-2013 73 5 Download
-
Store Procedure (SP) : “A precompiled collection of Transact-SQL statements stored under a name and processed as a unit. SQL Server supplies stored procedures for managing SQL Server and displaying information about databases and users”. Lý do sử dụng : Khi duyệt hay xử lý Dữ Liệu trong Cơ Sở Dữ Liệu SQL Server, ngôn ngữ SQL (Structured Query Language) là ngôn ngữ thực thi hiệu quả nhất. Do đó, khi tính toán với lượng lớn Dữ Liệu trong SQL Server, ta nên sử dụng đối tượng SP để xây dựng đoạn Chương trình và giải quyết vấn đề nếu cần...
40p trinh02 23-01-2013 216 37 Download
-
Epigenetic mechanisms, such as histone modifications, control eukaryotic development beyond DNA-stored information. Intrigu-ingly, there is an under-representation of repressive marks in quies-cent (resting) cells, stem cells and regenerating cells, but a selective accumulation of aberrant histone lysine methylation profiles in aging, ‘‘stressed’’ and tumor cells, particularly for the H3K9, H3K27 and H4K20 methyl marks.
65p cosis54 05-01-2013 51 4 Download
-
This paper investigates an aspect of using iris recognition to authenticate a biometric passport. For this kind of authentication, two citizen’s iris will be captured and stored on a RFID (Radio Frequency Identification) chip within two other biometrics: face and fingerprint. This chip is integrated into the cover of a passport, called a biometric passport. By using the iris recognition, a process of biometric passport authentication was presented in this paper by using the extended acces control, and allows integrate the verification result of the iris, face and fingerprint recognition.
7p tuanlocmuido 13-12-2012 61 3 Download
-
A Microsoft Access query is a question about the information stored in Access tables. Your query can be a simple question about data in a single table, or it can be a more complex question about information stored in several tables. After run query, Microsoft Access returns only the information you requested.
42p huynhbahoc 19-11-2012 43 1 Download
-
Soft error is a great concern for microelectronics circuits today. With the advanced development i n CMOS technologies, VLSI circuits are becoming more sensitive to external noise sources, especially radiation particle strikes, which are the cause of soft error. Soft errors are random and do not cause the permanent failure. However, it causes the corruption of stored information, which could turn to the failure in functionality of the circuits.
89p conchokon 24-09-2012 93 11 Download
-
Concept of User Interface The user interface is the part of the system that you see, hear and feel (look and feel) Other parts of the system are hidden to you, for instance the database where information is stored. Although users don’t see the hidden parts, they imagine to some extent what is going on ’behind the screen’. Examples When you use a computer, you give it orders, usually by means of the mouse and the keyboard. The computer replies, usually by showing something on the screen or making sounds.
65p thanh_k8cntt 13-09-2012 65 7 Download
-
Quản Trị Mạng - Dường như có khá nhiều nhầm lẫn xung quanh khả năng sao lưu Exchange 2010 bằng cách sử dụng tính năng Windows Backup. Exchange 2010 bao gồm một plug-in dành cho Windows Server Backup cho phép bạn thực hiện một bản sao lưu dữ liệu Exchange bằng cách sử dụng Volume Shadow Copy Service. Chuẩn bị Với Windows 2008 R2 và Windows 2008, tính năng Windows Backup theo mặc định sẽ không được kích hoạt. Vậy nên, việc trước tiên cần phải làm là thêm tính năng này. Chạy Server Manager, dưới mục Features chọn...
5p abcdef_46 05-11-2011 73 9 Download