Welcome![Sign In][Sign Up]
Location:
Search - security system

Search list

[Software Engineeringwangshangxixiguanli

Description: 近年来,随着计算机技术的发展和互联网时代的到来,我们已经进入了信息时代,也有人称为数字化时代,在这数字化的时代里,学校的教学管理都受到了极大的挑战。Internet技术持续迅猛的发展,也给传统的办学提出了新的模式。通过设计和建设网络拓扑架构、网络安全系统、数据库基础结构、信息共享与管理、信息的发布与管理,从而方便管理者、老师和学生间信息发布、信息交流和信息共享。以现代计算技术、网络技术为基础的数字化教学主要是朝着信息化、网络化、现代化的目标迈进。作为新型的办学模式,它们具有对于教育、教学过程来说极为宝贵的特性,可以为新型办学模式的建构提供理想的环境。在此开发的大学信息学院管理信息系统,旨在探索一种以互联网为基础的办学模式。通过这种新的模式,为信息学院营造一种新的办学环境,使管理突破时空限制,扩大教学规模,提高工作效率和办学水平,使学校管理者、教师和学生可以在任何时候、任何地点通过网络进行学习与交流。-In recent years, with development of computer technology and the advent of the Internet era, We have entered the information age, it was also known as the digital era, and in this digital era, schools have been teaching management a great challenge. Internet technologies continue rapid development, but also to the traditional school of new models. Through the design and construction of network topology architecture, network security system, database infrastructure, information sharing and management, information publishing and management, thus facilitating administrators, teachers and students between the release of information, exchange of information and sharing of information. With modern technology, network technology based on the Digital Teaching is mainly towards information technolo
Platform: | Size: 754688 | Author: jiafeimao | Hits:

[Otherrsa

Description: 网络安全体制中的RSA算法的一些相关文章-Network security system of the RSA algorithm in a number of related articles
Platform: | Size: 4818944 | Author: | Hits:

[SCMCSA_car_security_system_sch

Description: car security system is more important for us
Platform: | Size: 28672 | Author: csallon | Hits:

[WEB CodeRFID-Security

Description: Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing-The automated identification of objects with electromagnetic fields is the major purpose of the RFID [Radio Frequency Identification] technology. An RFID system basically consists of transponders [tags], readers [scanners] and application systems for further processing of the acquired data. There is a large variety of different RFID systems: they may use low, high or ultra high frequencies, the transponder may emit only a fixed identifier or possess significant memory and processing capabilities. Transponders may incorporate no security features at all or realise effective security protocols similar to smartcards. Most transponders are passively powered by the radio field emitted by the reader but there are also active tags with a separate power supply. The transponder design is also little uniform: there are e.g. tiny tags with a size of several millimetres, very thin “smart labels” or standard ID-1 cards
Platform: | Size: 357376 | Author: 胡利建 | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Delphi VCLTMS.Security.System.v2.4.Full.Source.Delphi

Description: delphi组件,用于与操作系统安全有关的操作,控件中对底层的API函数,作了大量封装。哈哈,用起来就一个字“爽”-delphi components, with the operating system for security-related operations, controls on the bottom of the API function, made a large number of packages. Haha, to use one word on the " Smooth"
Platform: | Size: 1342464 | Author: LWM | Hits:

[Windows Developavr

Description: Hello guys, I ve built this GSM security system as my semester project using T290i mobile and controlled my car using it. Please leave your comments about it. If any one needs help in implementing such a system, I can help. Some of the functions it can perform are: * start and stop the engine (without using the key) * stop the engine if somebody starts it with a key ( by cutting off ignition) * lock and unlock the doors * send a text message to the owner if an intruder is detected (by monitoring the doors) * switch the heater/air conditioner on and off
Platform: | Size: 1984512 | Author: Asif | Hits:

[Other Embeded programRFID-security-system

Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Platform: | Size: 111616 | Author: Binu | Hits:

[Software Engineeringfingerprint-and-password-security-system-thesis.z

Description: Nice document on Fingerprint recognition system Very good thesis
Platform: | Size: 1626112 | Author: pannu | Hits:

[Delphi VCLDelphi-VCL-TMSSecuritySystem

Description: TMS Security System 2.4 for Delphi - FullSource
Platform: | Size: 1515520 | Author: ThotAcc | Hits:

[SCMAT89S52-GSM-Final

Description: 基于AT89S52的GSM安防系统 本人最近弄了个基于AT89S52的GSM安防系统,想到当初由一个新手开始做这个的时候在找案例参考基本都看不懂。所以我做好这个项目后,就把它无私贡献给大家。希望对有兴趣的朋友有所帮助。这是一整套的成品,里面有说明文档,99SE的原理图和PCB,还有全套代码。在这里需要说明一点的是,由于本人孤军做此项目,所以很多地方都不是很完善。 该程序已经实现发生警报,然后通过GSM发送短信到目标号码,然后由目标再回发相应的控制短信去控制。 更多请查看附件里面的说明文档-AT89S52 based on the GSM security system I recently broke a AT89S52 of GSM based security systems, originally thought of starting from a novice to do this when looking for the basic reference case are read. So I do this project, put it selflessly to the party. Want to help friends who are interested. This is a set of finished product, which has documentation, 99SE schematic and PCB, have a complete code. Need to point out here is that, because I alone in doing this project, many places are not quite perfect. The program has been achieved alarm occurred, and then send text messages to the destination GSM number, and then issued by the goal of returning to the corresponding control messages to control. Please see attachment for more documentation inside
Platform: | Size: 3756032 | Author: | Hits:

[Software Engineeringsecurity-system-BF533-

Description: 基于ADI的Blackfin533的家庭安全系统设计-Blackfin533 based on ADI' s Home Security System
Platform: | Size: 384000 | Author: recochun | Hits:

[Delphi VCLTMS-Security-System-QS

Description: TMS Security System Quick Start documentation.
Platform: | Size: 130048 | Author: Kebo | Hits:

[Delphi VCLTMS-Security-System-v2.4.3.1(DelphiXE2)

Description: The TMS Security System facilitates the definition of user rights on a menu or form level. In its user management features the TMS Security System relies on user/group profiles stored in a database. The users can be grouped and can inherit rights in this way. Thereby you can integrate a highly sophisticated and close grained user management that closes all potential loopholes via shortcuts with minimal effort. Only if the user has been granted the specific right by the administrator he can see or use the specific function assigned by the administrator. The administrator can configure the rights at run-time thereby preventing a restart of the program when changing assignments. For doing so he can use an easy to handle, intuitive GUI that enables the administrator to create new users or to group or delete them directly from the application.
Platform: | Size: 2834432 | Author: volod3000 | Hits:

[Industry research(CAN)-Application-in-Security-System

Description: Can Application in Security system
Platform: | Size: 893952 | Author: bedreddin | Hits:

[OtherHome-Security-System-12-08-28

Description: 用matlab编写的家庭安全监控系统,运用无线网络摄像头,同软件实时监控家庭实际情况。-Home Security System write by matlab.
Platform: | Size: 403456 | Author: 张三 | Hits:

[VHDL-FPGA-VerilogSecurity-System

Description: The security system implemented monitors the state of eight doors (open or closed) and shows the state in leds when the selector indicate it. Also the number corresponding to the desired door is shown in a 7seg display.
Platform: | Size: 673792 | Author: dokuro | Hits:

[OtherMicroprocessor-based-home-security-system

Description: Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system-Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system
Platform: | Size: 4096 | Author: ag | Hits:

[OtherATM Security System

Description: Atm security system using GSM
Platform: | Size: 9216 | Author: Kishor | Hits:

[Other(App) Delphi Component - Tms Security System

Description: TMS Security system pack delphi 7 source code
Platform: | Size: 490496 | Author: mzille | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net