Research Paper Managing Web Application Security Risks Computer Science
Changes in business environments and the advances in web technologies have made the services of corporate, public and private firms to be more widespread over the web by making use of web applications. Although web services can provide greater convenience, flexibility and efficiency, they also possess great number of threats which could be a significant risk for the organization if not properly dealt with. This paper discusses the various vulnerabilities that web applications present and the...
Read full essay14 Reads
Texture Features From Infrared Thermogram Computer Science
Breast cancer has always been a threat to many women and has become the most common disease in many developed countries and it is on the rise in developing countries. The limitations of mammography as a screening and diagnostic modality, especially in young women with dense breasts, necessitated the development of novel and more effective modalities with better sensitivity and specificity. Currently, there are several non-invasive techniques to detect breast cancer. These techniques are based...
Read full essay11 Reads
A Study On Broadcasting Wireless Transmissions Computer Science
Introduction: In wireless transmission the signal quality suffers occasional, severe degradations due to effects like fading caused by multipath propagation. To reduce such effects, diversity, as proposed by [1], can be used to transfer the different samples of the same signal over essentially independent channels. There are several approaches to implement diversity in a wireless transmission. The most common on is using the 'multiple antennas' which is used to achieve space diversity. But...
Read full essay11 Reads
Analyzing Current Systems Of Twf Property Group Computer Science
TWF Property Group who is our client is a leading property rental management company which provides property rental service across Singapore. The current TWF Property Group had a headquarters located in the central city and several branches across the city. Each branch not only uses spreadsheet with alphabet label tab to record their clients and renters information, they also file a hard-copy into a filing cabinet in alphabet order for reference. The staffs' information is stored in a...
Read full essay11 Reads
Study About Intelligent Agents Versus Malicious Agents Computer Science
Intelligent agents are today accepted as powerful tools in a distributed environment because they are not cumbersome for the network traffic; they overcome network latency, operate in heterogeneous environment and possess fault-tolerant behavior. The concept of mobile agent is over a decade old, the technology proves not to be perfect yet, due to a misconception of an intelligent agent as a malicious agent that can be a computer virus. This paper presents a study of intelligent agent and...
Read full essay14 Reads
Quality Of Service QOS Motivation Computer Science
This research aims at improving the performance of resource reservation protocol in mobile networks. Today, more and more portable devices such as mobile phones and laptops can easily access the wireless network. Hence, more and more people choose the wireless devices due to the convenience they provide. When a large number of these devices are accessing the mobile networks, it could lead to service disruptions, packets loss, and accumulative delay. Therefore, the question of how to provide a...
Read full essay12 Reads
Overview On Methods Of Searching The Web Computer Science
Introduction World Wide Web (WWW) is the ultimate source of information. It has taken over the books, newspaper, and any other paper based material. It has become the first preference for many people for finding their required information. Curiosity is built into human nature. People always want to explore and find new information about different things. A person goes through the process of learning since his birth to his death. All the progress man has made so far is the result of learning and...
Read full essay10 Reads
A Detailed Review On Sql Injection Computer Science
Abstract- SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.SQL injection is a trick to SQL query or command as an input possibly via the web pages. They occur when data provided by user is not properly validates and is...
Read full essay12 Reads
Imaginary and complex numbers
When Are We Ever Going to Use This? – Imaginary and Complex Numbers The number √-9 may seem impossible, and it is when talking about real numbers. The reason is that when a number is squared, the product is never negative. However, in mathematics, and in daily life for that matter, numbers like these are used in abundance. Mathematicians need a way to incorporate numbers like √-9 into equations, so that these equations can be solvable. At first the going was tough, but...
Read full essay18 Reads
Understanding Of The Developer Role Computer Science
Designers' role is to develop an interaction concept for the "BookManager" application system that meets users' requirements. Designers need to know many different things about users, technologies and interactions between them in order to create effective user experiences. Designer should develop a paper prototype of the application to use as though it is the actual software. Similarly, as users see and experience design idea, can able to give better feedback that enables the...
Read full essay11 Reads