Wirelss Security on Security Standard Policy: A Case Studty
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical factors and must ank what their risks are and then design a security policy that is cost effective and manageable. This paper shows variety of systems security on different network systems and then and rovide a solution to adjust security systems of wireless etwork on ecurity standard and also analyze case studies of how to eployed security systems.
Authors and Affiliations
Reza Amirpoor , Ajay Kumar , Satish R. Deavne
Algorithm for Efficient Multilevel Association Rule Mining
over the years, a variety of algorithms for finding frequent item sets in very large transaction databases have been developed. The problems of finding frequent item sets are basic in multi level association rule mining,...
A Face Recognition System Through Somatology
Normally facial recognition algorithms identify faces by extracting landmarks or features from an image of the subject’s face and then algorithm may analyze the relative size, shape of the eyes, nose, cheekbones, and jaw...
Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM
A mixer of printed and handwritten numerals may appear in a single document such as application forms, postal mail, and official documents. The process of identifying of such mixed numerals and sending it to respective O...
A study on the effectiveness of virtual lab in Elearning
The research aims to identify the effectiveness of virtual lab in E-learning suite. The study aims to analyze the increase in learning skills and the understanding level of concepts by implementing virtual lab among scho...
Fuzzy Metagraph and Hierarchical Modeling
In this paper , we show the transformation of a fuzzy metagraph from one form to another based on the projection operator that identifies only the necessary sets of elements for computing. This paper also show some impor...