Rating
E-BUSINESS MODELS
E-Business Models
Abstract
Recognized and adopted by the academic and professional models maturity of e-business can track the progress of systems and information technology in enterprises. The objective of this paper is to present the main models of e-maturity, taking into account organizational developments caused mainly by Internet and electronic ...
Rating
Computer Security
Computer Security
Challenges of Verisign-based solution
Due to the innovative form of Norweigan banking model, the bank could not utilize the solutions that are available to them on readymade basis. Those solutions of internet security would not be helpful in the course of their primary building out. When they will implement ...
Rating
Computer Security Solution for Online Banking
Computer Security Solution for Online Banking
Introduction
One major problem in the Internet banking is the security systems. A systematic increase in the value of transactions on the Internet justifies the need for continuous improvement of safety systems. Transaction security is essential in building trust between the ...
Rating
TECHNOLOGY
Networking
Networking
Q No 1
Using channel 14 for wireless for personal wireless network
It is impossible for the users using wireless networks at their home to use channel 14 in the SSIDer, due to the strict laws of radio spectrum. According to the laws of radio spectrum it is essential ...
Rating
Case Study
It governance structures in Healthcare
Case Study
It governance structures in Healthcare
Introduction
For the execution of healthcare operations the important thing is needed in the routine time what is an irresistible answer would be—one more group conference. The idea of “death by group” initiated in a manner for describing the well established ...
Rating
MULTIMEDIA SOUND PRODUCTION
Multimedia Sound Production
Multimedia Sound Production
Introduction
A development method may be regarded as a path or a procedure by which the developer proceeds from a problem of a certain class to a solution of a certain class. In trivial cases, the method may be fully algorithmic; for example, ...
Rating
Widget Company LAN
Network Design for Widget Company
Description
The network is divided into four major interfaces. The first one is the Extranet or the un-trusted zone. This is where the Internet is found. The second one is the DMZ or the demilitarized zone which is a buffer between the Extranet and Intranet. ...
Rating
MOBILE ROBOT'S ASSIGNMENT
Mobile Robot's Assignment
[Name of the Institute]
Mobile Robot's Assignment
Introduction
When robots share living space with humans, and particularly when they cooperate on certain tasks, they should first identify target humans, approach them in a stable manner, and maintain a safe distance. This study assumes that humans are engaged in ...
Rating
2D MAPPING
2D Mapping of Robot Environment
2D Mapping of Robot Environment
Introduction
Mobile robots are characterized by their ability to move so autonomously in an unknown environment or only partially known. Their applications cover a wide range of fields, which include underground (Mining, tunneling, etc..), Underwater tasks (inspection of pipelines, measurements, search ...
Rating
LOCALISATION
Localisation of the Robots Environment
Localisation of the Robots Environment
Introduction
To control mobile robots in standalone mode, the main task is the task of determining the current position of the robot [1]. The main sensors in the robots are always odometers - sensors of the wheels.
But not enough to localize the ...