Rating
Robin-Karp algorithm & Boyer-Moore Algorithm
Robin-Karp algorithm & Boyer-Moore Algorithm
Rabin-Karp algorithm
The core aim of the algorithm of Rabin-Karp was to determine a pattern which involves a substring within a text with the usage of hashing. It has been observed that this algorithm is of considerable theoretical importance and is also considered ...
Rating
Dynamics around the Coal Power Plant
Introductory Overview2
Coal Power Plant3
Efficiency5
Changing the thermo physical properties of the working medium5
Introduction of composite working medium6
Fluidized bed combustion6
Integrated gasification combined cycle7
Working Principle: Rankine Cycle9
Types of Pulverizers10
Boiler11
Types of Boilers13
Economizer15
Air preheater16
Electrostatic precipitator16
Smoke stack17
Generator17
Transformers18
Boiler Principles18
Thermodynamics18
Saturated Steam to Superheated Steam20
Heat Transfer22
Thermal Modes22
Energy Balance23
Vapor Power Systems of A Thermodynamic ...
Rating
Biometrics
Biometrics
Introduction
The term biometrics is derived from two Greek words bio and metrics, which mean life and to measure respectively. This depicts that biometrics is used to measure or quantify the traits or characteristics of a living being. The term is now used mostly, to refer to the science and technology ...
Rating
Coal Thermal Power Plant
Introduction
Steam Power Plant
A thermal power station is a facility that produces electricity from burning coal, fuel oil or gas in a boiler designed for this purpose. The operation of all power plants or power plants is similar. Fuel is stored in parks or adjacent tanks, from where ...
Rating
International Conference Paper: Information Security Policy Development
KEYWORDS - Information Security, UAE e-government, Controls, Risks
ABSTRACT
The information security policy would describe security in several terms, but is not simply guidelines, procedures or standards. It is a statement of goals to be achieved by procedures applied to different departments. Policy would guide employees ...
Rating
Can good Hacker stop fight against
The following paper discusses about the Cyber Crime can good hacker help in fighting against the cyber crime. The following paper has three parts; the first part gives an overview, which will be discussing the overview of the paper. The second part is a ...
Rating
Video games
Video games
Introduction
Children of all ages need some fun activity to keep them going. One of the most popular ways of entertainment for children is the video games. They are known as an excellent source of entertainment for all age groups of kids and even adults. Some people consider it ...
Rating
Implications of Encryption
[Name of the institute] Implications of Encryption
Introduction
The world has evolved dynamically and so are its approaches and perceptions. Privacy and secrecy have to be maintained and guarded against the illegal intrusion. Even in olden days people have appeared to be concerned about the secrecy of their messages and ...
Rating
Wireless Local Area Network: Security Issues and Countermeasures
[Name of the Institute]
Introduction1
Security Issues1
Active Attacks1
Types of Active Attacks1
Denial-of-Service (DoS)2
Message Modification2
Replay2
Masquerading2
Passive Attacks2
Traffic Analysis3
Eavesdropping3
Other Types of Attacks3
Availability Attacks3
Authentication Attacks3
Confidentiality Attacks3
Integrity Attacks3
Access Control Attacks4
Countermeasures4
Technical Countermeasures4
Turning on Encryption4
Activation of Firewall4
Changing default SSID4
Prevention of Auto Connection to Open WiFi5
Disabling adapter of WiFi5
Operational Countermeasures5
Management Countermeasures5
Summary6
References8
Wireless Local Area Network: ...
Rating
Managing Human Factors in Aircraft Maintenance
Abstract
It is evident through the US statistics that almost eighty percent of the accidents and malfunctions in aviation and aircrafts industry are because of human factors with fifty percent because of managing human factor issues. Since over ten years, the term P.E.A.R has been employed ...