There are connectivity issues in developing countries and is distributed LMS. However, the resource cost keeps on increasing which requires incremental synchronization.
Keywords: elearningonlinersyncsynchronizationlearning management system
My own summary regarding to the lecture about how computer hardware works and who knows it might give you a description.
Keywords: computer organizationinterconnection networkhardwaremicroprocessorFPGAassignment
First group 4 bits per block, and then obtain the 3 hamming bit codes from the 4 bits for each blocks and add them to make 7 bits per block.
Keywords: mathbinarychaospiecewisehammingassignmentmarkovrandomengineeringsciencetechnology
For error probability below 0.2 the Skew Tent Map has lower undetected error and for above that, it is better to use Piece Wise Linear Map.
Keywords: mathbinarychaospiecewiseparityassignmentrandomengineeringsciencetechnology
Uses piecewise linear chaotic binary sequence which is more complex than skew tent map but allows various map design for chaotic sequences.
Keywords: mathbinarychaospiecewisemarkovassignmentrandomengineeringsciencetechnology
Using the chaotic sequence generated by skew tent map we can generate the random binary sequence with the probability of '0's and '1's.
Keywords: mathbinarychaosmarkovassignmentrandomengineeringsciencetechnology
We can predict the weather for a month. Beyond that, we will likely miss predict. In computer it can be applied for creating random values.
Keywords: mathengineeringchaosrandomassignmentsciencetechnology
This is a thesis submitted to Graduate School of Science and Technology, Computer Science and Electrical Engineering in Kumamoto University, Japan, on September 2017 in partial fulfillment of the requirements for the degree of Master of Engineering.
Keywords: technologye-learningportablesynchronizationdistributed systemportablemastersthesis
The assignments that survived are Control System, Xray, Noise Policy, Pulse Power, Binaural Accoustic, and how to return home without honor.
Keywords: technologyscienceengineeringJapanassignment
The assignments in human perceptions were exciting where we experiment in compressing image, analyzing website, making video presentations.
Keywords: engineeringimagehumanperceptionassignment
This summary contains the origin of biosignals as deep as how cells generate electricity and how living body can be illustrated as circuit.
Keywords: engineeringmedicalelectricitybiosignalassignment
This summary contains materials about wireless communication, Maxwell equation, line of sight and nlos, circular polarization, and antennas.
Keywords: telecommunicationline of sightcircular polarizationantennaassignment
When using a drone we simply have to apply a control system so the drone will capture 2 image separately that fulfills the 3D requirements.
Keywords: technologycomputersdroneperception3Dassignment
With the advance in technology we can use electronic devices to communicate with others in long distances but can it detect emotions?
Keywords: technologycomputersinformationperceptionemotionassignment
The four steps of digital forensic are confiscating and isolating storage drive, cloning data, analyzing data, and writing a detail report.
Keywords: technologycomputersdigitalforensicassignment
My Opinion of XSS/CSS, Digital Forensic, and Digital Crime Investigation when I was a Young Student
Keywords: technologycomputersXSSCSSdigital forensicassignment
There are mainly 3 steps of breaching NSA using kill chain analysis which are researching the target, initial intrusion, and exfiltration.
Keywords: technologycomputersEdward SnowdenNSAbreachassignment
The statically assigned variables or local variables resides in the stack area and dynamically assigned variables resides in the heap area.
Keywords: technologycomputersbuffer overflowheapC Programassignment
Buffer overflow overwrites other part of the memory. The simplest case is variable B if put too much data can flood to the next variable A.
Keywords: technologycomputersbuffer overflowC Programassignment
Reverse engineering was originally applied only to hardware, reverse-engineering is now applied to software, databases and even human DNA.
Keywords: technologycomputersreverse engineeringdecompileassignment
Use email anti virus (AV), outbound port 25 blocking & authentication, sender policy framework, domain key identified mail, identification.
Keywords: technologycomputersmalwareemailspamassignment
In computer and information system the quarantine is used to isolate harmful data that could spread and infect other PC for example malware.
Keywords: technologycomputersmalwarequarantineassignment
Which type of intrusion detection system should be placed? The best security choice is use both HIDS and NIDS but the problem is resource.
Keywords: technologycomputersintrusion detection systemHIDSNIDSassignment
The important specifications are coverage, detection capability, processing power, false negative, and false positive, though there are more
Keywords: technologycomputersintrusion detection systemspecificationassignment
Antivirus handles malware inside devices, firewall filters packet based on identity, and intrusion detection system find malware in packets.
Keywords: technologycomputersantivirusfirewallintrusion detection systemassignmentmalware
The counter measures are quarantining infected devices, plugging to an external malware cleaner, scan for infections, and delete infections.
Keywords: technologycomputersmalwarecounter measureassignment
The lecture explained the policies when facing vulnerabilities in the kernel, server program, and server common gateway interface (CGI).
Keywords: technologyinformationsecuritypolicyassignment
The countermeasures of Malicious Ware are mitigation, evasion, and treatment like any other measures to cope against harmful substances.
Keywords: technologycomputersantivirusmalwareassignment
Network consists of clients and servers, there are many bots, and ddos and web defacements and sql injections are popular hacking methods.
Keywords: technologycomputer networkbotpenetration testingassignmenthacking
Our method involves in providing a portable hotspot device for correspondent to connect and access our local survey questionnaire website.
Keywords: single board computerhand carry serverraspberry piportablesurvey
This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course's backup files based on rsync algorithm.
Keywords: rsyncrdiffmoodlenetworksynchronization
The web application can show the date accessed to a particular section and the duration spent on that section by the user. It can also provide data that shows the reading pattern of a reader which in the future can be used for analysis by other researchers.
Keywords: technologymouse trackingsection based page viewweb analyticmonitoringonline
The data can answer what, when, and where, but cannot answer how a page is viewed. To answer that question it is needed to track as detail as the page section level.
Keywords: technologymouse trackingsection based page viewweb analyticmonitoringonline
Keywords: mastersschooluniversityresearchpublicationjournalconferencetechnicalpaperarticlemanuscriptslide