Owners of vehicles can avoid unforeseen car problems by maintaining their vehicles regularly. Early detection of vehicle concerns is crucial to preventing them from developing into serious difficulties. Owners of vehicles frequently inquire about service at auto shops.
Vehicle technicians examine crucial parts of the vehicle and fix problems to m...
|
Suitable technological module for testing and monitoring of quality of medicines and consumables being received in hospitals would be required so that the system ensures necessary compilance and rejection of low quality supplies without manual intervention
...
|
Background: During CSSR (Collapsed Structure Search and Rescue) operations, NDRF teams encounter challenges in identifying buried deceased bodies amidst rubble and debris. Traditional search methods are often time-consuming and labor-intensive, hampering the timely recovery of victims and increasing the risk of further casualties. Description: THe ...
|
With the aim to provide "Right Quantity of "Right Product" on "Right Place" on "Right Time" in "Right Condition" at "Right Cost" for "Right People" and also to streamline the distribution of drugs to institutions and ensure availability of drugs at all times, a new, innovative system named Drug Inventory and supply chain Tracking system is required...
|
since 2000, various authorities like parliaments and government offices have introduced electronic petitions systems (e-petitions).
Compared to most other means of petitions made available by public institutions, e-petitions have moved past the test organization and are portrayed by a significant level of institutionalization and procedural devel...
|
Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
|
Background: Many organization are using Cloud for hosting their web applications. The attackers can try to attack these webservers for achieving Denial of Service attack. Specifically, Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by ...
|
The recent technological advancement in digital computers has provided a more robust computer based operations in modern industrial society, including manufacturing, transport and distribution, government, the military, health services, education and research.
This impact of modern digital computers as an irreplaceable tool for technological grow...
|
Now a day’s a mobile phone has become a necessary part of one’s life. There is a continuous rise in the number of mobile computing applications, centeredaroundpeoples daily life. In such applications, location dependent systems have been identified as an important application.
Such application which presents the architecture and implementation of...
|
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting.
It is interesting because current VPN solutions are well established and have existed ...
|
A software web application based on facial recognition is used to create a gate pass system. During college hours, it coordinates the student's gate pass request and leave. This system is ready for use and is simple to operate and manage.
A gate pass security system is what this system is called. Its main goal is to keep the campus safe from ou...
|
Managing the result sheets using traditional approach is a cumbersome process. The person must maintain the result records in registers and files using pen and paper.
The problem with this approach is, it requires lot of paperwork which is the part of our non-renewable natural resources. We are in the age, where we must think about sustain...
|
The purpose of this thesis was to show how to use Zend Framework to connect PHP applications to the cloud.To find out how easy it is for developers with basic knowledge of the Zend Framework, to incorporate cloud computing in their applications. In order to do this, a blog application was developed using the Zend Framework and the upload files func...
|
The communication-based train control (CBTC) system is a typical cyber physical system in urban rail transit.The train-ground communication system is a very important subsystem of the CBTC system and uses the wireless communication protocols to transmit control commands.However, it faces some potential information security risks.To ensure informati...
|
Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the origina...
|
Powered by virtualization, the cloud computing has brought good merits of cost effective and on-demand resource sharing among many users. On the other hand, cloud users face security risks from co-residence attacks when using this virtualized platform. Particularly, a malicious attacker may create side channels to steal data from a target user’s vi...
|