Design Of Two Stage High Gain Opamp
A High Swing Ultra-Low-Power Two Stage CMOS OP-AMP in 0.18 um Technology with 1.2v supply, is presented. Cascode technique has been used to increase the dc gain. The unity-gain bandwidth…
Read more >Detecting of Ransomware using Software Defined Networking
Abstract- Ransomware is a major weapon for cyber-extortion. The traditional signature-based detection no longer holds good against modern, sophisticated malware that employs encryption techniques and social engineering. This paper investigates…
Read more >Detection and Mitigation of DDOS Attack
A Survey on Detection and Mitigation of Distributed Denial of Service attack in Named Data Networking Sandesh Rai1*, Dr. Kalpana Sharma 2, and Dependra Dhakal 3 1Sikkim Manipal Institute of Technology,…
Read more >Developing A Mobile Application For Kingston Library Computer Science Essay
As part of my course, I will be developing a mobile application for Kingston University Library for my dissertation. The application will be designed for Android devices. I chose Android…
Read more >A Remote Desktop Application For Android
The aim of this project is to develop a simple-to-use remote desktop application which enables users to remote view contents of their desktop and view, create, edit and delete files…
Read more >Developing a Database Management System Presentation
I am Estelle Lemmer and would like to provide you with a business presentation outlining the process Klingon Systems has followed in developing a Database Management System for The Borg…
Read more >Developing high quality multimedia products
Introduction: The increasing development of computer science including the web design in parallel to the huge revelation of media has resulted to an increase in multimedia content at the final…
Read more >Developing an Online Banking Application
This report details the importance of securely developing a software and the best practices to implement throughout the development lifecycle. Using the Microsoft Secure Development Lifecycle Model, a software…
Read more >Cyber Attacks in Indonesia: Types, Targets, and Preventions
According to Indonesia Security Incident Response Team on Internet and Infrastructure/Coordination Center (Id-SIRTII/CC), there are about 89 million attacks that occurred during the first half of 2014 with the domination…
Read more >Cyber Security Case Study: Pure Land Wastewater Treatment
Introduction Every organization should use the industrial control system to ensure the success of their departments and ensure the ultimate success of critical operations within the premise. Since such organizations…
Read more >