Essays about: "related literature for library system"

Found 5 essays containing the words related literature for library system.

  1. 1. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE

  2. 2. Vehicle dynamic simulation and powertrain simulation of a heavy hybrid vehicle with interconnected suspensions

    University essay from KTH/Fordonsdynamik

    Author : Florian Cellière; [2014]
    Keywords : hybrid vehicle; off-highway; low pressure tires; obstacle crossing;

    Abstract : This thesis presents two simulations of a heavy hybrid vehicle, the first part of the thesis is focused on the specifications of the vehicle designed in accordance with the requirements based on the literature study of the soils where the vehicle will travel. The second part presents the study of the vehicle through two simulations. READ MORE

  3. 3. A Comparative Study of Component Based Regression Testing Approaches without Source Code

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Nabin Raj Dulal; Sabindra Maharjan; [2011]
    Keywords : Component Based System; Regression Testing; Change Identification; COTS Component; Systematic Literature Review;

    Abstract : Context: Today, most of the software products are built with COTS components. When a new version of these components is available, it is difficult to perform testing as the vendors of the component do not usually provide source code. READ MORE

  4. 4. Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Matthias Aifuobhokhan Okonoboh; Sudhakar Tekkali; [2011]
    Keywords : Cloud Computing; Software Vulnerability; System Integrity; Distributed Systems;

    Abstract : Context: Cloud computing is rapidly emerging in the area of distributed computing. In the meantime, many organizations also attributed the technology to be associated with several business risks which are yet to be resolved. READ MORE

  5. 5. Encryption in Delocalized Access Systems

    University essay from Institutionen för teknik och naturvetenskap

    Author : Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Keywords : Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Abstract : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. READ MORE