One of the initial signs of degradation of a concrete surface is cracks. Cracks may develop in the walls of the building due to many reasons such as seasonal changes and poor quality of materials. In this research both image processing techniques as well as...
Introduction Without security measures and protocols that have been set in place, certain data can be exposed to attack. Certain attacks are “passive”, which translates to the data being observed; other attacks can be active, implying that the data is changed with the intention of...
Priya Ranjan Muduli et al. (2013) have identified a crack detection method in which they have combined two of the methods and the methods were Hyperbolic Tangent filtering and Canny edge detection algorithm. They have also used Haar Discrete Wavelet Transform Algorithm (HDWT) in which...
The Golden Age of Piracy and Its Lessons for Cybersecurity In the old days, pirates were groups of people who performed a series of criminal activities on boats or ships over the sea. For instance, let’s look at history: how we can learn about cybersecurity...
The median-filter algorithms also have some limitations. Hwang and Haddad et al. (1995) indicated that the median filter performs quite well, but it falters when the probability of impulse noise occurrence becomes high. In their study, the median-filter algorithm was used in the second selection...
A switch is an intermediary device which is used to connect multiple end devices within a local area network to share information and also to connect them to network routers to forward information to another network. There are different types of switches’ form factors available...
Introduction With the development of technology, network system plays more and more important role in society. People need social media to keep contract with friends or colleagues, organizations need network to share meeting history. and Company need network to cooperate with third-party. However, each emerging...
Introduction to Network Devices A network is a collection of computers, servers, mainframes, network devices, and peripherals connected to one another to facilitate the sharing of data. Below are some of the commonly used network devices, which play a crucial role in establishing and maintaining...
Abstract Social Engineering, is the process of gaining access into the system or network by making someone believe into something which is actually not true. It is one of the methods that hackers following in this technology developed era. As Radha Gulati stated in one...
With the growing deployment of WLANs, e.g. in a business environment, the risk of unethical data interceptions increases significantly.Setting up a rogue access pointA rogue access point (AP) is a unknown wireless AP that has been installed on a secured network without any authorization from...
For decades, humans have employed the use of password-based schemes as the main modes of authentication into websites and other electronic platforms. The password authentication system primarily prevents unauthorized access. However, the many number cases of thefts and hacks exposed the various security weaknesses in...
When using a dial-up remote access server on a private network the user is easily able to connect directly to the network. By using a VPN, the connection is internet based, and the user connects to an Internet Service Provider from a modem to a...
Are you ready to embark on a journey through the intricacies of bus topology in networking systems? Imagine a network where devices are connected in a linear fashion, much like passengers boarding a bus at various stops along a route. This assignment will delve into...
Unit 8 in the NT1330 course holds significant importance in understanding the concepts and principles of networking technologies. This unit focuses on advanced topics such as network security, virtualization, and cloud computing, which are crucial in today’s digital age. In this essay, we will explore...
Introduction In the digital age, network security has emerged as a critical concern for organizations of all sizes. The proliferation of cyber threats, ranging from data breaches to sophisticated ransomware attacks, underscores the need for robust security measures to protect sensitive information. The Nt1330 Unit...