Bring Your Own Device (BYOD) security is the way to protect organization's network against Variety of threats which come through mobile devices and access channels. This research paper explains the implementation ...
详细信息
Bring Your Own Device (BYOD) security is the way to protect organization's network against Variety of threats which come through mobile devices and access channels. This research paper explains the implementation of BYOD security solution in higher education institution in Oman. This security solution will help to protect the network data from unauthorized access, as well as, controlling unmanaged devices which are smartphones and mobile devices. This research will follow these steps starting with literature review, data collection, analysis, design the network structure with suggested solution and implementation for BYOD security solutions. As well as, monitoring the network performance with the implanted solutions to keep track if traffic flow with high availability and security. This research paper will help to facilitate the work to the network users through allowing BYOD as well as increase the network availability, ability and security through 802.1x, CA and RADius.
The proceedings contain 459 papers. The special focus in this conference is on Mechatronics and controlengineering. The topics include: Vibration sensitivity analysis of the secondary isolation support;dynamic states...
ISBN:
(纸本)9783037855959
The proceedings contain 459 papers. The special focus in this conference is on Mechatronics and controlengineering. The topics include: Vibration sensitivity analysis of the secondary isolation support;dynamic states specific analysis for belt conveyor based on FDM;power tracking of the hybrid vehicle based on hidden markov model;research on dynamic response time of magnetorheological fluid dampers;based on the homotopy analysis method to solve the klein - gordon equation;research and application of vibration control for coupled structures system;a study on the force distribution for artificial antagonistic muscles;design and performance evaluation of tactile device using MR fluid;feasibility analysis on high voltage ride-through of wind turbines;study of a bidirectional proportional electromagnet;the impact of using mathematics principles on the performance of chillers;a tool for modeling and analysis of BTF toolholder-spindle system;analysis and optimization of high-speed gasoline engine cam profile;the analysis and computing of heat storage in drum boiler;hydraulic model and simulation analysis for monorail brake system;operating modal analysis of mobile wastewater treatment plant;fixture clamping force analysis during milling process;investigation of burr in high speed microdrilling;applied expert system design for energy-efficient distillation;an ER haptic master-slave robot system for the minimally invasive surgery;development of controlsystem for colonoscopic robot;wireless local area network based fire monitoring robot design;a simple monitoring network system of wireless sensor network;analog circuits test by using principal component analysis;study on a new elastic element of fiber bragg grating accelerometer;design and realization of universal radar signal processing software;the study of PLC controlsystem for coal quantitative packaging;a reliability enhance method towards hadoop architecture;determined key distribution protocol using orthogonal produ
In this paper, component importance and sensitivity analysis in Bayesian networks are reviewed and a strategy for the case of non-deterministic structures is proposed. A complex system example is analyzed by the metho...
详细信息
ISBN:
(纸本)9781479910144
In this paper, component importance and sensitivity analysis in Bayesian networks are reviewed and a strategy for the case of non-deterministic structures is proposed. A complex system example is analyzed by the methods of Birnbaum's derivative, variance-based sensitivity analysis in deterministic structures and non-deterministic structures respectively. The results are compared and demonstrate the feasibility of the proposed strategy for non-deterministic structures in Bayesian networks.
We have designed and fabricated electrodes microfluidics system for microbio object analysis. Two parallel plate electrodes were fabricated using soft lithography technique integrated with PDMS microfluidics channel. ...
详细信息
We have designed and fabricated electrodes microfluidics system for microbio object analysis. Two parallel plate electrodes were fabricated using soft lithography technique integrated with PDMS microfluidics channel. Gold (Au) material was decomposed to fabricate the electrodes. Voltage response through charging and discharging of the electrodes were observed using oscilloscope. For a constant dc voltage of 5 V we have obtained the time constant of the electrodes as 3.6 ms. On the other hand, it requires 850 ms to discharge completely without an external load. We have measured the capacitance of the electrodes as 0.37 pF in air (room environment) medium, on the other hand in distilled water medium electrodes capacitance is 0.77 pF. This is because of the high dielectric constant of distilled water (80.1). We have also measured electrodes capacitance by changing the medium to microbio objects such as; yeast cells (5 pF) and live bacteria cells (30 pF). Results showed that, bacteria have a higher electrical capacitance rather than yeast.
In recent years, much attention has been focused on the research of multi-agent system (MAS), since it is widely applicable in many areas. Model building and simulation of MAS is very important for the research of MAS...
详细信息
Excessive traffic noise is a major environmental complaint in residential areas. This paper investigates an SOA based loosely-coupled platform for urban traffic strategic noise mapping. Service-Oriented computing Envi...
详细信息
The ieee 802.16 mesh network, which is self-organized and self-configured with multi-hop, is deployed to providing an effective solution for broadband wireless access system. The standard defines the basic scheduling ...
详细信息
ISBN:
(纸本)9783037855652
The ieee 802.16 mesh network, which is self-organized and self-configured with multi-hop, is deployed to providing an effective solution for broadband wireless access system. The standard defines the basic scheduling scheme, but doesn't specify the resource allocation and routing scheme in the protocol. Therefore, designing a reasonable scheduling and routing algorithm to enhance the capability is very important for the system. In this paper, we propose an efficient and practical routing algorithm which takes the channel condition and modulation mode into consideration in an ieee 802.16 mesh network. Furthermore, our algorithm enables direct communications between subscriber stations without referring to the base station. Simulation results show that our algorithm effectively improved the scheduling length, delay and system throughput.
This paper shows the development of the dynamic binaural beat encoding using JAVA program. Binaural beat is an auditory phenomenon that has been used worldwide to alter our brain state, to get to the desired state, e....
详细信息
This paper shows the development of the dynamic binaural beat encoding using JAVA program. Binaural beat is an auditory phenomenon that has been used worldwide to alter our brain state, to get to the desired state, e.g. Relax. However, most of the Binaural Beat system designed is a static binaural beat on which the user is not able to alter the frequency of the audio. The binaural beat frequency listened by the user might not be suitable to the user's current brain state. Such incompatibility may cause the user to feel uncomfortable and may also cause dizziness while listening to the audio being played. Hence, dynamic encoding of binaural beats is designed and implemented to replace the existing static encoding of binaural beats. The GUI of the system has two options, Manual Configuration and Automatic Configuration on which the user able to choose the base frequency and the offset frequency as desired. The developed system has been tested and validated in the lab to show its ability to generate the binaural beat frequency.
The proceedings contain 105 papers. The topics discussed include: discovering core architecture classes to assist initial program comprehension;frequency estimation on power system using recursive-least-squares approa...
ISBN:
(纸本)9783642345210
The proceedings contain 105 papers. The topics discussed include: discovering core architecture classes to assist initial program comprehension;frequency estimation on power system using recursive-least-squares approach;carrier-aided smoothing for real-time beidou positioning;life feature extraction based on I-filbert marginal spectrum entropy for ADT vibration;the study of emergency response dynamic geographical process simulation based on the multi-agent;what on earth drive the propagation of tweets on Chinese microblog network;multiple pitch estimation based on modified harmonic product spectrum;the demand forecasting method for repairable spare parts based on availability;service efficiency evaluation of distribution facilities in comprehensive passenger transport hub;analysis and modeling of the distribution control strategy of comprehensive passenger transportation hub;and comparison research of reconstruction algorithms about airborne electromagnetic response data.
Interpretation of Ground Penetrating Radar (GPR) dataset towards detecting underground utility is a challenging task. The underground utility information such as location, depth and type serves as a reference prior to...
详细信息
Interpretation of Ground Penetrating Radar (GPR) dataset towards detecting underground utility is a challenging task. The underground utility information such as location, depth and type serves as a reference prior to any construction project in order to avoid damage to the utility during excavation. However, the interpretation of GPR images is a tedious and timely process which requires human intervention. This study proposed a new hyperbola fitting technique to estimate the radius of buried utility (pipes and cables). The method was applied to nine (9) different sizes of buried pipes for radius estimation purposes. The result indicates that the technique is capable of estimating the radius of buried pipes with acceptable result; approximately 97.7% to 99.2% for cable/pipe type with a radius between 45mm to 150mm are detected accurately.
暂无评论