دانلود پروژه با فرمت پاورپوینت

۲۶ مطلب با کلمه‌ی کلیدی «پاورپوینت انگلیسی الگوریتم و محاسبات» ثبت شده است

پاورپوینت انگلیسی بررسی احراز هویت در ابر

عنوان فارسی مقاله: احراز هویت در ابر


عنوان انگلیسی مقاله:

AUTHENTICATION IN the CLOUD






 

ادامه مطلب...
۳۰ فروردين ۹۶ ، ۱۹:۳۶ ۰ نظر موافقین ۰ مخالفین ۰

پاورپوینت انگلیسی attacking authentication

عنوان فارسی مقاله: حمله احراز هویت


عنوان انگلیسی مقاله:

Attacking Authentication








بخشی از مقاله

Vulnerable Transmission of Credentials

Even on a secure HTTPS connection, unauthorized parties may exist:

Within the user’s browser history, within the web server logs, and within the logs of any reverse proxies employed within the hosting infrastructure. 

When the login request being handled via a redirect to a different URL with the same credentials passed as query string parameters.

When Web applications store user credentials in cookies, usually to implement poorly designed mechanisms for login, password change, “remember me,” and so on.







 

کلمات کلیدی: 

PPT]attacking authentication - cse.sc.edu https://cse.sc.edu/.../Ch%20%206%20-%20ATTACKING%20AUTHENTICATION.pp... ATTACKING AUTHENTICATION. The Web Application Hacker's Handbook, Ch. 6. Presenter: Jie Huang. 10/31/2012. Authentication is Everywhere. Probably the ... [PDF]Ch 6: Attacking Authentication https://samsclass.info/129S/lec/ch6.pdf Two-factor authentication. (or more). • PIN from a token, SMS message, or mobile app. • In addition to a password. • Submitted through an. HTML form ... How to avoid authentication bypass attacks - SearchSoftwareQuality searchsoftwarequality.techtarget.com/tip/How-to-avoid-authentication-bypass-attacks access request and, based on the user ID and access policy, either grants or denies access. An attack known as authentication bypass allows hackers to avoid ... Searches related to Attacking Authentication common attacks against authentication authenticated and unauthenticated attacks unauthenticated attack examples authorization attack bypass http authentication bypass authentication required popup difference between authenticated and unauthenticated scan authentication bypass using sql injection

۳۰ فروردين ۹۶ ، ۱۹:۳۲ ۰ نظر موافقین ۰ مخالفین ۰

پاورپوینت انگلیسی perceptrons

عنوان فارسی مقاله: پرسپترون


عنوان انگلیسی مقاله:

Perceptrons








 

کلمات کلیدی: 

Perceptron - MATLAB perceptron - MathWorkshttps://www.mathworks.com › ... › Define Neural Network ArchitecturesThis MATLAB function takes these arguments, Hard limit transfer function (default = 'hardlim') Perceptron learning rule (default = 'learnp')Perceptron Neural Networks - MATLAB & Simulink - MathWorkshttps://www.mathworks.com › ... › Define Neural Network ArchitecturesLearn the architecture, design, and training of perceptron networks for simple classification problems.Perceptrons for Dummieshttps://www.jilp.org/cbp/Daniel-slides.PDFby DA JiménezSimple model of neural networks in brain cells. ◇ Learn to recognize and classify patterns. ◇ We used fast and accurate perceptrons [Rosenblatt `62, Block `62].[PDF]Machine Learning: Perceptronsml.informatik.uni-freiburg.de/_media/documents/teaching/ss09/ml/perceptrons.pdfLearning corresponds to adaptation of the efficiency of synapse, of the synaptical weight. AXON dendrites. SYNAPSES soma. Machine Learning: Perceptrons ...Searches related to Perceptronsperceptron exampleperceptron tutorialperceptron machine learningperceptron xorperceptron pythonperceptron incperceptron matlabperceptron vs neuron

۳۰ فروردين ۹۶ ، ۱۸:۵۴ ۰ نظر موافقین ۰ مخالفین ۰

پاورپوینت انگلیسی tabu seach

عنوان فارسی مقاله: جستجوی ممنوعه


عنوان انگلیسی مقاله:

TABU SEARCH






 

ادامه مطلب...
۳۰ فروردين ۹۶ ، ۱۸:۲۶ ۰ نظر موافقین ۰ مخالفین ۰

پاورپوینت انگلیسی الگوریتم برای پایگاه sla

عنوان فارسی مقاله: ارزیابی عملکرد برنامه ریزی الگوریتم برای پایگاه خدمات نرم و سخت SLA ها


عنوان انگلیسی مقاله:

Performance Evaluation of Scheduling Algorithms for Database Services with Soft and Hard SLAs






 

ادامه مطلب...
۳۰ فروردين ۹۶ ، ۱۸:۲۲ ۰ نظر موافقین ۰ مخالفین ۰

پاورپوینت انگلیسی الگوریتم زمان بندی tdma

عنوان فارسی مقاله: الگوریتم های زمان بندی TDMA برای WSN


عنوان انگلیسی مقاله:

TDMA scheduling algorithms for WSN






 


بخشی از مقاله

Level-based scheduling algorithm(Cont.)
Scheduling the original network:
If nodes vi, vj in the linear network are assigned the same color, they do not interfere.

By construction of the linear network any two nodes in the original network, one chosen from level i and the other from level j, can transmit at the same time.

After determining the levels corresponding to the current time slot from the linear network coloring, a nonconflicting set of nodes at these levels that have packets to transmit are selected for transmission.

The algorithm is given in Fig. 4.




دانلود رایگان مقاله پاورپوینت انگلیسی TDMA scheduling algorithms for WSN



 

کلمات کلیدی: 

A Deterministic Distributed TDMA Scheduling Algorithm for Wireless ...ieeexplore.ieee.org/document/4340460by Y Wang - ‎2007 - ‎Cited by 44 - ‎Related articlesEfficient scheduling of time slots in a time division multiple access scheme (TDMA) is important for low power wireless sensor networks. Existing algorithm.Efficient TDMA scheduling algorithms for sensor networks containing ...ieeexplore.ieee.org/document/6657495/by A Orosz - ‎2013 - ‎Cited by 1 - ‎Related articlesEfficient TDMA scheduling algorithms for sensor networks containing multiple rings. Abstract: In this paper a special ring topology is investigated for sensor ...[PDF]Distributed Scalable TDMA Scheduling Algorithmwww4.ncsu.edu/~rhee/export/drand_tech.pdfby I Rhee - ‎Cited by 15 - ‎Related articlesthe paper, a new distributed TDMA scheduling algorithm, called DRAND, is employed that gives a channel schedule as efficient as RAND - a commonly used ...TDMA scheduling algorithms for wireless sensor networks (PDF ...https://www.researchgate.net/.../220292569_TDMA_scheduling_algorithms_for_wireles...Mar 7, 2017 - In developing algorithms for scheduling TDMA transmissions in multi-hop networks, the problem is usually to determine the smallest length ...

۳۰ فروردين ۹۶ ، ۱۸:۱۴ ۰ نظر موافقین ۰ مخالفین ۰