نتایج جستجو برای: labview و vpn

تعداد نتایج: 763406  

2010
Nuha A. S. Alwan Zahir M. Hussain

خلا صلا ـ ة : عون نم يفيكتلا ةانقلا ردقم ءادلأ اًضرع ثحبلا اذه مدقي LMS ةيئاضفلا ةرفشملا تاعومجملا مظن يف نييئاوه مدختست يتلا ةينمزلا لإل اسر ل لابقتسلال اًدحاو اًيئاوهو . و ةانق يه ةمدختسملا ةيكلسلالا ةانقلا Rayleigh ءاضوضلا دوجوب ىسواجلا (Gaussian) يمجتلا جارخلاا يف يع . و حضوت ثحبلا جئاتن إ دحاو لماعم يذ ةانق ردقم مادختساب زاحنم ريغ ريدقت ىلع لوصحلا ةيناكم ) يراسم نم لكل لإا ةراش .( و وحن ةيف...

2011

In this work we study the effect of some electrical prosperities on synthetic rubber reinforced with carbon black diluted in heptanes with concentrations from 0.2% gm/mole to 2.0% gm/ mole in temperatures range (100, 150, 200, 250, 300) C associated with amount weight of black carbon 5wt% added to the diluted rubber. The results of electrical properties measurement of Buna rubber reinforced wit...

Journal: :J. Inform. and Commun. Convergence Engineering 2008
Jung-Yong Park Dae-Hyun Ryu

VoIP isn’t secure since it uses the Internet to which many people connect simultaneously. In this paper, we designed and implemented a Wireless VoIP + VPN system with which secure telephone calls are possible using the open project SIP VoIP Gateway, 'Asterisk' and 'OpenVPN'. Key-Words: VoIP, VPN, SIP, Wireless, Security, WiFi

2005
T. Madsen

The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the...

Journal: :Paediatrica Indonesiana 2023

Background High protein intake in very preterm neonates (VPN) is important for growth. However, kidneys have fewer functional nephrons and many of the ones present may be immature. Studies shown that high induces nephron hypertrophy, proteinuria, glomerular sclerosis, which lead to tubular injury. Urinary neutrophil gelatinase-associated lipocalin (uNGAL) a biomarker released during proximal ce...

Journal: : 2021

В статті проаналізовано основні підходи до забезпечення живучості комп’ютерних мереж. Показано, що методологія живучості, яка застосовується систем має часткову відмінність за ту, мереж, пов’язано з активним розвитком технологій віртуалізації. Метою є розробка методу, який дозволяє забезпечити живучість комп’ютерної мережі, інформаційним середовищем для гарантованого надання цифрових послуг, шл...

Journal: :Jurnal nasional komputasi dan teknologi informasi 2023

Abstrak - Teknologi informasi saat ini berkembang sangat cepat, dinamis dan canggih. Seiring dengan perkembangannya, PT. Jaindo Metal Industries membangun jaringan komputer berbasis VPN untuk mempermudah melakukan kegiatan operasional antar kantor cabang pusat, seperti transaksi data atau presentasi melalui jalur publik, salah satunya penggunaan bersama aplikasi bisnis Microsoft Dynamic Axapta ...

2015
Raaed K. Ibrahim Ali SH. Hussain Roula A. Kadhim

This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from ente...

2006
N. A. Muhamad S. A. M. Ali

Condition monitoring of electrical power equipment has attracted considerable attention for many years. The aim of this paper is to use Labview with Fuzzy Logic controller to build a simulation system to diagnose transformer faults and monitor its condition. The front panel of the system was designed using LabVIEW to enable computer to act as customer-designed instrument. The dissolved gas-in-o...

2012
Ankush Sharma Priya Darshni

AbstractSpeech is the natural form of human communication and the speech processing is the one of the most stimulating area of the signal processing. Speech recognition technology has made it possible for computer to follow the human voice command and understand the human languages. The objects (LED, Toggle switch etc.) control through human speech is designed in this paper. By combine the virt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید