Denial of Service (DoS) attacks
Denial of Service (DoS) attacks may become a major threat to current computer networks. Even a teenager can lunch the DoS attack by using readymade DoS tools. DoS attack is…
Read more >Design A 1 Bit Serial Adder Computer Science Essay
The main aim of this project is to design a 1-bit serial adder, simulate its functionality and obtain a layout on silicon, using the 0.35µ process from AMS. The circuit…
Read more >Design And Develop Supermarket Sales System Services Computer Science Essay
It contains details for the customers, suppliers and products. This system contains two types of users, administrator and the end user. The administrator has the authorization to create new users,…
Read more >Design And Implementation Of Multi Tier Firewalls
The Concept of my IS is to protect and secure our private Servers from the public Network and also from the other internal private network. Proposing virtual interfaces on the…
Read more >Design of an Autonomous Car
PREFACE "The beginning of knowledge is the discovery of something we do not understand." Frank Herbert (1920-1986) Autonomous systems play a significant role in developing and deploying modern technology [1].…
Read more >Designing A New Rubber Tapping Knife Computer Science Essay
Rubber tree is a tree that is used by the world community to collect the product. The product from rubber trees not only wood but also sap. However, the main…
Read more >Comparison Of Land Line And Mobile Phones
No one can ever forget Alexander Graham Bell, who is credited as the inventor of "Telephone". With innovation and advancement in technology, the simple two way communicating device has taken…
Read more >Comparison of the OSI and TCP
Introduction There is a significant number of computers that is used by many global organizations and institutions in order to support their activities. For example, a corporation with many branches…
Read more >Comparison Of Persistence Framework Computer Science Essay
Compare and contrast the following persistence frameworks: Java Persistence API (JPA), Hibernate and Java Database Connectivity. What improvements were made in EJB3.1 and JPA2? Include topics of scalability, security, connection…
Read more >Comparison Of RC5 And RC6 Block
Due to rapid growth in Internet and networks applications so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. So it…
Read more >