Results 71 to 80 of about 4,234 (179)

Teleoperation of passivity-based model reference robust control over the internet [PDF]

open access: yes, 2011
This dissertation offers a survey of a known theoretical approach and novel experimental results in establishing a live communication medium through the internet to host a virtual communication environment for use in Passivity-Based Model Reference ...
Naghshineh, Sam
core  

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

Phytophthora megakarya and Phytophthora palmivora, closely related causal agents of cacao black pod rot, underwent increases in genome sizes and gene numbers by different mechanisms [PDF]

open access: yes, 2017
Phytophthora megakarya (Pmeg) and Phytophthora palmivora (Ppal) are closely related species causing cacao black pod rot. Although Ppal is a cosmopolitan pathogen, cacao is the only known host of economic importance for Pmeg.
Ali, Shahin   +16 more
core   +1 more source

Virtual Privet Networks using Cisco Routers

open access: yesJournal of Engineering and Sustainable Development, 2009
Virtual private Network (VPN), is a technology that provides a secure communications mechanism for data and control information transmitted between networks. It can be used over existing network such as data across public network.
Haider Tarish Haider   +1 more
doaj  

Media Informasi Berbasis Video UPT PPTP Pada Dinas Perhubungan Kota Tangerang

open access: yesMAVIB Journal
Kemajuan media dan teknologi informasi dapat dirasakan semua masyarakat, seperti Unit Pelaksana Teknis Pelayanan Teknis Pelayanan Lalu Lintas Kota Tangerang (UPT PPTP) B. Tangerang yang beralamat di Daan Mogot Kota Tangerang, menyediakan kendaraan bermotor seperti kendaraan umum dan kendaraan angkutan kargo, pelayanan pemeriksaan teknis dan sertifikat.
Syahrul Maulana Ashari   +2 more
openaire   +1 more source

Genomic Profiling of Childhood Tumor Patient-Derived Xenograft Models to Enable Rational Clinical Trial Design. [PDF]

open access: yes, 2019
Accelerating cures for children with cancer remains an immediate challenge as a result of extensive oncogenic heterogeneity between and within histologies, distinct molecular mechanisms evolving between diagnosis and relapsed disease, and limited ...
Baxter, Patricia   +68 more
core  

Analisis dan Perancangan Virtual Private Network (Studi Kasus : PT Surya Donasin ) [PDF]

open access: yes, 2016
PT.Surya Donasin adalah perusahaan yang bergerak dibidang distribusi fast moving consumer dan non consumer good yang yang memiliki sekitar 33 cabang tersebar di area jawa barat, jawa timur, dan jawa tengah.
EGGY RENDY PERMADY, 123040290   +2 more
core  

Implementasi Virtual Private Network (VPN) Menggunakan Protokol PPTP Mikrotikrouter pada Yayasan Muhamadiyah Parung

open access: yesJurnal Teknik Informatika STMIK Antar Bangsa, 2018
Abstract—In the modern era, many companies and institutions who have made computerized at every routine of office, issues that often occur on a computer network that is sufficiently broad in scope or have a branch to be very disturbing for office, for this in Muhamadiyah Parung Foundation mengrim Indonesia to process files for internal office use ...
Wati Erawati, Sujiliani Heristian
openaire   +1 more source

Redes, comunicações e segurança informática [PDF]

open access: yes, 2013
Este trabalho começa por apresentar uma instalação de rede informática local efetuada sob supervisão do candidato e parcialmente por ele, descrevendo de seguida algumas considerações que na altura se lhe levantaram. Sendo ligada à saúde, para além das
Leite, Jorge Pinto
core  

Система оценивания эффективности применения криптографической защиты трафика NGN [PDF]

open access: yes, 2011
В статье анализируются недостатки современных систем криптографической защиты трафика. Рассматриваются вопросы разработки системы оценивания эффективности внедрения новых алгоритмов и модификации сетевых протоколов с учетом параметров, задаваемых в ...
Еременко, А. С.   +1 more
core  

Home - About - Disclaimer - Privacy