To see the other types of publications on this topic, follow the link: Remote Login.

Journal articles on the topic 'Remote Login'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Remote Login.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hwang, M. S. "Cryptanalysis of a remote login authentication scheme." Computer Communications 22, no. 8 (1999): 742–44. http://dx.doi.org/10.1016/s0140-3664(99)00036-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bindu C, Shoba, Chandra Sekhar Reddy P, and Satya Narayana B. "A Novel Remote Login Authentication with Smart Card." i-manager's Journal on Software Engineering 2, no. 2 (2007): 22–27. http://dx.doi.org/10.26634/jse.2.2.545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maynard, Jeff. "Signature and gesture – dynamic biometrics for remote login." Biometric Technology Today 2010, no. 10 (2010): 9–11. http://dx.doi.org/10.1016/s0969-4765(10)70208-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "Impersonation attack on Tan-Zhu's remote login scheme." Electronics Letters 36, no. 14 (2000): 1202. http://dx.doi.org/10.1049/el:20000851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Tzong-Chen. "Remote login authentication scheme based on a geometric approach." Computer Communications 18, no. 12 (1995): 959–63. http://dx.doi.org/10.1016/0140-3664(96)81595-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Das, Ashok Kumar, Vanga Odelu, and Adrijit Goswami. "A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/719470.

Full text
Abstract:
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication
APA, Harvard, Vancouver, ISO, and other styles
7

Yan, Hong Wei, Zi Ming Kou, and Bo Gao. "Research on Robot Arm Remote Control Experiment Based on Web." Advanced Materials Research 159 (December 2010): 51–55. http://dx.doi.org/10.4028/www.scientific.net/amr.159.51.

Full text
Abstract:
The networked and modularization has become the development orientation of experiment system. Aiming at the need for constructing remote laboratory, the paper focused on robot arm remote control experiment system. Based on the introduced of remote control technologies based on Web and Internet, the paper designed robot arm remote control experiment system structure based on Web. The detail working flow of client and server of the experiment system were also provided, which lies good foundation for the implementation of robot arm remote control experiment system. The constructed robot arm remot
APA, Harvard, Vancouver, ISO, and other styles
8

Ardianto, Feby, and Trianto Trianto. "JARINGAN HOTSPOT RADIUS (REMOTE ACCES DIAL-IN USER SERVICE) SERVER MIKROTIK." Jurnal Digital Teknologi Informasi 2, no. 1 (2019): 38. http://dx.doi.org/10.32502/digital.v2i1.2503.

Full text
Abstract:
Peningkatan pengguna ini juga dibarengi dengan peningkatan jumlah Hotspot di tempat-tempat umum, seperti kafe, mal, bandara, di perkantoran bahkan juga di kampus dan di sekolah-sekolah tetapi penyebarannya tidak merata ke daerah-daerah pinggiran kota. Tujuan penelitian rancang bangun sistem keamanan jaringan hotspot menggunakan radius server untuk mengontrol dan membatasi setiap user jaringan. Metode yang digunakan dalam penelitian ini menggunakan 4 tahpan, yaitu: 1). Indentifikasi, 2). Pengadaan perangkat hardware dan software, 3). Desain radius server berbasis mikrotik, 4). Pengujian radius
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Shipra, and Hari Om. "Remote login password authentication scheme using tangent theorem on circle." International Journal of Convergence Computing 2, no. 1 (2016): 93. http://dx.doi.org/10.1504/ijconvc.2016.080403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "A modified remote login authentication scheme based on geometric approach." Journal of Systems and Software 55, no. 3 (2001): 287–90. http://dx.doi.org/10.1016/s0164-1212(00)00077-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cheng, Ting-Fang, Jung-San Lee, and Chin-Chen Chang. "Security enhancement of an IC-card-based remote login mechanism." Computer Networks 51, no. 9 (2007): 2280–87. http://dx.doi.org/10.1016/j.comnet.2007.01.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Dang, Guo Qing, and Xiao Yan Cheng. "The Research of Embedded Remote Monitoring System Based on B/S Framework." Applied Mechanics and Materials 713-715 (January 2015): 508–11. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.508.

Full text
Abstract:
The embedded remote monitoring system is based on embedded technology, video coding technology and network transmission technology as the core of the new video surveillance system, it in real-time monitoring system, network, miniaturization, etc than traditional remote monitoring system has outstanding advantages. The embedded server is responsible for the data from field devices and video images, and real-time and reliable transmission to the remote client browser. User through a PC browser login system, can get equipment real-time data and video image, also can control the equipment, so as t
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Chun-Ta, Cheng-Chi Lee, and Chi-Yao Weng. "A dynamic identity-based user authentication scheme for remote login systems." Security and Communication Networks 8, no. 18 (2015): 3372–82. http://dx.doi.org/10.1002/sec.1264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH." Jurnal Teknologi Informasi 4, no. 1 (2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.

Full text
Abstract:
Abstract - System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure shell (SSH) to enter the system with a secure channel. By default, SSH is not secure because there is a great chance that the account will be taken over by brute force techniques. The application of asymmetric cryptography on SSH accounts is considered safe than SSH remote login by default. However, this is still not enough because hackers could control
APA, Harvard, Vancouver, ISO, and other styles
15

Hawedi, Hadya S., Omran Ali Bentaher, and Kaled E. I. Abodhir. "REMOTE ACCESS TO A ROUTER SECURELY USING SSH." Journal of the Academic Forum 5, no. 1 (2021): 174–89. https://doi.org/10.59743/jaf.v5i1.177.

Full text
Abstract:
Routers in a computer network are responsible for managing much of the data flow. Therefore, it is important to properly configure routers, as this will help to resist attacks and maintain the security and confidentiality of network traffic. Using Telnet for accessing a router remotely is not secure enough. The aim of this paper is to demonstrate that using Secure Socket Shell protocol (SSH) to remote login a router is more secure. Cisco packet tracer simulation has been used for configure the router. The simulation showed that The SSH is provides a strong authentication and encryption, preser
APA, Harvard, Vancouver, ISO, and other styles
16

Qu, Juan, and Li-min Zou. "An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme." Journal of Electrical and Computer Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/786587.

Full text
Abstract:
In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resist impersonation attack and insider attack and provide anonymity for the users. However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Kai. "Research of Remote Access System to the Digital Resources Based on Cloud Computing." Applied Mechanics and Materials 543-547 (March 2014): 3606–9. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3606.

Full text
Abstract:
This paper introduces the working principle of remote access system based on SSL VPN in cloud computing. Meanwhile, it focuses on the operation principle of the SSL protocol and resource management. In addition, it analyses system characteristics such as https login, hardware signature certification and so on. At last, it puts forward some problems and solutions in actual use.
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Jun, Wen Long Li, Ruo Xin Zhu, and Guang Hui Cai. "Design and Implementation of Remote Intelligent Control System Based on Cortex-M3." Applied Mechanics and Materials 513-517 (February 2014): 3336–39. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.3336.

Full text
Abstract:
With the rapid development of the Internet, the remote control technology was demanded more. In this paper, we designed a simple and practical remote intelligent control system, using CGI technology to complete the construction of Web servers and embedding uCOSII as the real-time operating system in Cortex-M3 core processor. By porting TCP/IP protocol stack, users could login in the server to access and control the system via the Internet. Using NRF2401 wireless technology to build a terminal network, the terminal carried out intelligent control with field data collected by sensors. Meanwhile,
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Wei Chen. "A New Remote User Authentication Scheme on Three Dimensions." Advanced Materials Research 846-847 (November 2013): 1707–10. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1707.

Full text
Abstract:
The authors present a new remote user authentication scheme on three dimensions for multi-server environments. The merits include: the scheme can be used in multi-server environments; the system does not need to maintain any verification table; the users who have registered with various servers do not need to remember different login passwords for each; the ability to choose passwords freely and change them offline; mutual authentication is provided between the user and the remote system; a session key agreed by the user and the remote system is generated in every session. Furthermore, we prop
APA, Harvard, Vancouver, ISO, and other styles
20

Alamsyah, Zaenal, Gina Purnama Insany, and Friendly Jihad Taqwana. "PERANCANGAN DAN IMPLEMENTASI APLIKASI KEAMANAN UJIAN ONLINE MENGGUNAKAN ALGORITMA RIJNDAEL DAN REMOTE DESKTOP PROTOCOL." SKANIKA: Sistem Komputer dan Teknik Informatika 7, no. 2 (2024): 119–32. http://dx.doi.org/10.36080/skanika.v7i2.3185.

Full text
Abstract:
Hanna Hersop Course and Training Institute (LKP) is a non-formal educational institution that offers learning materials both offline and online. The obstacles faced by the institution during the implementation of the exam are still not optimal because they are still carried out using conventional methods, such as the use of paper and pencils, which causes the risk of cheating and security during the exam. So this study aims to implement an exam system on a virtual machine with an integrated security application using the Remote Desktop Protocol (RDP) with the Windows Server 2019 operating syst
APA, Harvard, Vancouver, ISO, and other styles
21

Chang, Chin-Chen, and Iuon-Chang Lin. "Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach." Informatica 16, no. 1 (2005): 37–44. http://dx.doi.org/10.15388/informatica.2005.082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zhong, Xiaoyan. "Application of Multi-lens Video Editing Technology in Multi-media Interactive Teaching of "Aerobics"." International Journal of Emerging Technologies in Learning (iJET) 12, no. 02 (2017): 27. http://dx.doi.org/10.3991/ijet.v12i02.6484.

Full text
Abstract:
This study designed an interactive multi-media remote courseware teaching system based on the network application technology Flex and the multi-media server technology FMS. It can quickly extract and concatenate scattered images and videos in teaching courseware, and then generate complete and clear materials of teaching courseware. Meanwhile, by using the network server constructed on FMS, the system can realize remote interactive design and teaching application online. Noticeably, the system is featured by its diversified functions such as remote login, live teaching of courseware and intera
APA, Harvard, Vancouver, ISO, and other styles
23

Buhari, Bello A., Afolayan A. Obiniyi, Sahalu B. Junaidu, and Armand F. Donfack Kana. "Comparative analysis of remote user authentication schemes based on external memory." Dutse Journal of Pure and Applied Sciences 10, no. 3c (2024): 313–22. http://dx.doi.org/10.4314/dujopas.v10i3c.30.

Full text
Abstract:
Because of recent availability of remote services and resources, remote user authentication becomes an essential component of all digital environment. Remote user login authentication is the process of validating the identity of a user. Users present their credentials, such as username and password, as evidence of their identity. The most practical and effectively implemented remote user authentication scheme is the smart card-based one, however, because it is expensive to acquire and operate smart card facilities, users may find it challenging to employ smart card authentication schemes in re
APA, Harvard, Vancouver, ISO, and other styles
24

Hasan, Mokhtar Mohammed, and Noor Adnan Ibraheem. "APPLYING ADAPTIVE FUZZY NEURAL ALGORITHM FOR INTRUSION DETECTION." Journal of Engineering 16, no. 01 (2010): 4488–509. http://dx.doi.org/10.31026/j.eng.2010.01.08.

Full text
Abstract:
Many Network applications used as remote login have some ways for detecting the intruders which are classical ways applied by comparison of operations between login user interface and system stored information. The proposed system tried to detect the intrusions happened by the network intruders using new technique called Adaptive Fuzzy Neural Network which have the ability to detect the intrusions at the same time even if the number of users is large. The proposed system consists of two stages, the first stage is for monitoring all events that happen and analyzing them, and the second stage is
APA, Harvard, Vancouver, ISO, and other styles
25

Lee, Yung Cheng, and Pei Ju Lee. "Cryptanalysis of Ahirwal-Sonwanshi ID-Based Remote User Authentication Scheme." Applied Mechanics and Materials 764-765 (May 2015): 858–62. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.858.

Full text
Abstract:
Due to the rapid growth of computer and communication technologies, people obtain variety of online services quickly. However, all networks are vulnerable to lots of security threats and attacks. The remote authentication scheme provides an efficient method to validate the remote users and servers. Ahirwal and Sonwanshi proposed a remote user authentication scheme with smart card in 2012. They indicated that Song’s smart card based password authentication protocol cannot resist the offline password guessing attack, insider attack, forward secrecy and denial of service attack. They proposed an
APA, Harvard, Vancouver, ISO, and other styles
26

Shin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 13. http://dx.doi.org/10.5772/50912.

Full text
Abstract:
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The
APA, Harvard, Vancouver, ISO, and other styles
27

Subangi, Dr M. C., Dr M. Kumaran, and Mr M. Mohan. "A Web Based Remote Access in Tamil Nadu Agricultural University E-Library on Overview." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39684.

Full text
Abstract:
The introduction of web-based remote access to the Tamil Nadu Agricultural University (TNAU) e-library marks a significant advancement in providing enhanced access to academic and research resources. This system allows students, faculty, and researchers to access a vast range of agricultural literature, journals, e-books, and databases from anywhere, at any time, via the internet. The web-based interface eliminates the need for physical presence at the library, ensuring convenience and flexibility for users, especially those in remote or rural locations. It also supports TNAU's mission to fost
APA, Harvard, Vancouver, ISO, and other styles
28

Om, Hari, Vishavdeep Goyal, and Kunal Gupta. "A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card." International Journal of Computer Network and Information Security 7, no. 8 (2015): 72–79. http://dx.doi.org/10.5815/ijcnis.2015.08.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kerta, Johan Muliadi, Panji Adiprabowo, Eva Kusmiyati, and Sylvia Astri Wulandari Rahardjo. "Penggunaan Single Sign On (SSO) pada Jaringan Internet Badan Pengkajian dan Penerapan Teknologi (BPPT)." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (2011): 880. http://dx.doi.org/10.21512/comtech.v2i2.2838.

Full text
Abstract:
Using various applications needs more than one authentication or user and password to login. Users in BPPT found this problem on their network application. Implementation of Single Sign On can help users to use only one authentication for many applications. Therefore a research is conducted to design and implement Single Sign On system that simplify and facilitate the user's email account to access application. Data are collected from literature study, system observation, and interviews while the design uses Network Development Life Cycle (NDLC) method. The research results in a Single Sign On
APA, Harvard, Vancouver, ISO, and other styles
30

OMOLOLA AKINOLA. "Robust authentication mechanisms integrating biometrics and AI for securing remote access to cloud-based healthcare services." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 034–44. http://dx.doi.org/10.30574/wjarr.2024.23.3.2642.

Full text
Abstract:
Strong authentication is needed to protect remote patient health data in cloud-based healthcare services. Traditional verification techniques like passwords or tokens are hard to remember, share, or steal. This project aims to secure online cloud healthcare platform access using biometrics and AI. Biometrics is the finest cloud healthcare user authentication option, while others have issues with utility, accuracy, and fraud. Research reveals that biometric approaches may authenticate persons well, but cloud storage can compromise privacy. Machine learning aids biometric recognition, but curren
APA, Harvard, Vancouver, ISO, and other styles
31

OMOLOLA, AKINOLA. "Robust authentication mechanisms integrating biometrics and AI for securing remote access to cloud-based healthcare services." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 034–44. https://doi.org/10.5281/zenodo.14908946.

Full text
Abstract:
Strong authentication is needed to protect remote patient health data in cloud-based healthcare services. Traditional verification techniques like passwords or tokens are hard to remember, share, or steal. This project aims to secure online cloud healthcare platform access using biometrics and AI. Biometrics is the finest cloud healthcare user authentication option, while others have issues with utility, accuracy, and fraud. Research reveals that biometric approaches may authenticate persons well, but cloud storage can compromise privacy. Machine learning aids biometric recognition, but curren
APA, Harvard, Vancouver, ISO, and other styles
32

Manikam, Karthikeyan Manikam. "Optimizing Remote Workforce Productivity: A Non-Invasive Monitoring Framework." International Journal of Computing and Engineering 6, no. 7 (2024): 40–51. https://doi.org/10.47941/ijce.2432.

Full text
Abstract:
The transition to remote work has created a critical need for monitoring solutions that optimize productivity without infringing on employee privacy. This paper introduces a comprehensive framework of non-invasive monitoring techniques tailored for remote workforce management. We explore advanced attendance and activity tracking systems that utilize subtle indicators like mouse movements and keyboard inputs to assess engagement levels. Robust login/logout monitoring frameworks are discussed, providing detailed insights into active work hours while preserving autonomy. The implementation of cus
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Da Wei, and Xiao Jian Xie. "Research on Network Virtual Instrument." Applied Mechanics and Materials 432 (September 2013): 603–8. http://dx.doi.org/10.4028/www.scientific.net/amm.432.603.

Full text
Abstract:
According to research on the technologies of virtual instrument and network, a netwok virtual instrument test structure based on mixed C/S/B mode is presented in this paper. In order to solve the problem of real-time of network test, ActiveX client control and instrument testing application server is developed based on ActiveX plug-in technology. Users can login the virtual instrument test platform through the browser, submit request commands and test parameters to the Web server, control the remote equipments, and observe the real-time test data and analysis results.
APA, Harvard, Vancouver, ISO, and other styles
34

Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Full text
Abstract:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distr
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "A Robust and Efficient Password Authentication Scheme Using Smart Cards." Applied Mechanics and Materials 571-572 (June 2014): 1172–75. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.1172.

Full text
Abstract:
Password authentication scheme using smart cards is an important part of securely accessing the server program. In 2012, Chen et al. proposed a robust smart-card-based remote user password authentication scheme. Recently, Li et al. discovered the scheme of Chen et al. cannot really ensure forward secrecy, and it cannot achieve the goal of efficiency for wrong password login. Then, they proposed an enhanced remote user password authentication scheme based on smart cards. In this paper, we propose a novel authentication scheme by using elliptic curve cryptography. The new scheme can achieve both
APA, Harvard, Vancouver, ISO, and other styles
36

Dr.M Ananthalakshmi, C Banumathy, T Harish, and S Kaviya. "Efficient and Secure Authentication Scheme for IoMT – Based Healthcare." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 05 (2025): 1577–79. https://doi.org/10.47392/irjaem.2025.0255.

Full text
Abstract:
The Internet of Medical Things (IoMT) has gained substantial traction in modern healthcare by enabling real-time monitoring and remote access to patient health data. This paper proposes an efficient and secure authentication-based healthcare monitoring system using cost-effective IoMT components. The system integrates biomedical sensors (LM35, MAX30102, ECG) with Arduino Nano and transmits health parameters via the ESP8266 Wi-Fi module to a Firebase cloud database. A lightweight authentication scheme using Firebase’s email-password login ensures controlled access to patient data. The system is
APA, Harvard, Vancouver, ISO, and other styles
37

Narkhede, Puja. "College Automation System Using IOT." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 654–58. http://dx.doi.org/10.22214/ijraset.2022.45361.

Full text
Abstract:
Abstract: College Automation System Using IOT Project will work on College Electrical Appliances Remote control and Improved Attendance System. It will include Automation of all the Electrical gadgets in the college. It will have Facial Recognition verified RFID Attendance system along with Appliances Remote Control System for every class so that admin can see all Incoming and Outgoing Students Record on the Web User Interface and can also control the Gadget switches through a click on their phone. Let us see how this College Automation System Project will work. College Automation System Proje
APA, Harvard, Vancouver, ISO, and other styles
38

M, Mohan Tej, Mahabaleshwara Rao, and Shivananda Bhat K. "Enabling OpenAthens Single Sign On (SSO) Remote Access Authentication to eResources." DESIDOC Journal of Library & Information Technology 43, no. 05 (2023): 347–53. http://dx.doi.org/10.14429/djlit.43.05.18872.

Full text
Abstract:
Accessing the library’s subscribed electronic resources remotely by users has always been a challenge for the library. KMC Health Sciences Library, Manipal relied on proxy-based authentication to remotely cater its e-resources to library users. To enhance the secure usage of electronic resources and to provide user-friendly authentication, the library has considered a Single Sign-On (SSO) remote access through OpenAthens. The article demonstrates the setup process of OpenAthens and the various steps involved in the transformation of the library from proxy-based authentication. The single sign-
APA, Harvard, Vancouver, ISO, and other styles
39

Marcel, Marcel, and Garpepi Hanief Aotearoa. "Enhancing IT Service Desk for Hybrid Work: Insight from a TOE and TTF Case Study." Journal of Information Systems and Informatics 7, no. 1 (2025): 848–69. https://doi.org/10.51519/journalisi.v7i1.971.

Full text
Abstract:
Adopting hybrid work has brought new challenges of IT service desks in small companies with limited resources. This study focuses on a software company in Jakarta with 15 employees, exploring how its size influences the ability to resolve issues, manage tickets, and keep both remote and on-site staff satisfied. Utilizing the Technology-Organization-Environment (TOE) Framework and the Task-Technology Fit (TTF) Model, we investigated ticket records, surveyed 13 employees, and conducted group discussions for deeper analysis. On average, the initial response time was 3.5 hours, but remote staff of
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Shao-Jui, Jing-Ying Huang, Cheng-Ta Huang, and Wei-Jen Wang. "SAMEVED." International Journal of Grid and High Performance Computing 5, no. 2 (2013): 27–42. http://dx.doi.org/10.4018/jghpc.2013040102.

Full text
Abstract:
Cloud computing is an emerging computing paradigm that provides all kinds of services through the Internet. Existing elastic computing approaches are popular in cloud computing. They can fulfill the requirements of some cloud applications, but usually fail to provide an isolated computing environment consisting of connected virtual machines over a user-defined network topology. This paper presents a system architecture, namely SAMEVED, which exposes a cloud service that can allocate and manage a private, virtual elastic datacenter by integrating VPN and virtual routers into existing virtualiza
APA, Harvard, Vancouver, ISO, and other styles
41

Kamiński, Kamil Adam, Andrzej Piotr Dobrowolski, Zbigniew Piotrowski, and Przemysław Ścibiorek. "Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication." Electronics 12, no. 18 (2023): 3791. http://dx.doi.org/10.3390/electronics12183791.

Full text
Abstract:
This paper presents a voice biometrics system implemented in a web application as part of a two-factor authentication (2FA) user login. The web-based application, via a client interface, runs registration, preprocessing, feature extraction and normalization, classification, and speaker verification procedures based on a modified Gaussian mixture model (GMM) algorithm adapted to the application requirements. The article describes in detail the internal modules of this ASR (Automatic Speaker Recognition) system. A comparison of the performance of competing ASR systems using the commercial NIST 2
APA, Harvard, Vancouver, ISO, and other styles
42

Syed, Abbas Ali, Raheela Asif, Saman Hina, and Zainab Fatima. "Cloud Based Remote FPGA Lab Platform: An Application of Internet of Things." October 2018 37, no. 4 (2018): 535–44. http://dx.doi.org/10.22581/muet1982.1804.08.

Full text
Abstract:
IoT (Internet of Things) is the next generation of the Internet. The main goal of IoT is to connect each and every physical object to the Internet Cloud. This concept is introduced by bringing IoT technology to the laboratories, making expensive laboratory equipment available on-cloud for real-time experimentation. In this paper, an on CLP (Cloud Laboratory Platform) is presented by employing the concept of IoT to the academic experimentation environment. The CLP allows a rapid deployment of an online laboratory system enabling students and researchers to perform actual experiments on the on-C
APA, Harvard, Vancouver, ISO, and other styles
43

Giguère, Marlene. "The Internet: A Selective Annotated Bibliography of Print Material." Education Libraries 17, no. 2 (2017): 13. http://dx.doi.org/10.26443/el.v17i2.45.

Full text
Abstract:
Since the Internet is such an ideal medium for electronic publishing, much of the information about it is available in that format. This can be a problem for the Internet beginner who does not have access to the network or who does not know how to retrieve information in an electronic format. The objective of this annotated bibliography, therefore, is to provide a selection of items available in print which the novice may consult before accessing or using the Internet. Material selected is introductory in nature. Topics covered include: guides and directories to resources,general information a
APA, Harvard, Vancouver, ISO, and other styles
44

Mattigiri, Mohan Teja, Mahabaleshwara Rao, and Shivananda Bhat K. "A Comparative Analysis of Single Sign-On and Proxy Solutions for Facilitating Remote Access to Electronic Resources in Academic Libraries." DESIDOC Journal of Library & Information Technology 45, no. 1 (2025): 16–21. https://doi.org/10.14429/djlit.19823.

Full text
Abstract:
In the era of internet-driven information, in libraries, the comparative analysis of Single Sign-On (SSO) and Proxy Technologies plays a vital role in understanding the features and importance of these technologies in providing information to patrons. The study investigated the SSO authentication systems that effectively provide users convenience in managing multiple login credentials and proxy technologies that enable remote access to library materials and extend services beyond physical library premises. Proxy authentication, which is decentralised and based on IP addresses. The study analys
APA, Harvard, Vancouver, ISO, and other styles
45

Srinivasan, R. "Mahindra Powerol: powering entrepreneurial growth within a corporate group." Emerald Emerging Markets Case Studies 5, no. 4 (2015): 1–13. http://dx.doi.org/10.1108/eemcs-09-2014-0235.

Full text
Abstract:
Subject area Corporate Strategy, Vertical integration, Diversification. Study level/applicability Graduate. Case overview The case discusses the evolution, decline and turnaround of Mahindra Powerol, a division inside the large Indian business group, Mahindra & Mahindra (M&M). The Powerol division had its genesis from the then Farm Equipment Sector, when they used the surplus capacity in the tractor manufacturing facilities to produce and sell power generators (Gensets). Powerol capitalized on the rapid growth of the Indian telecommunications sector and the need for power backup at rem
APA, Harvard, Vancouver, ISO, and other styles
46

Shen, Dawei, Dongxing Pei, and Tiehua Ma. "Design of MultiChannel Parallel Dynamic Testing Virtual Instrument Based on Dynamic Measurement." Wireless Communications and Mobile Computing 2022 (February 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/9936626.

Full text
Abstract:
With the rapid advancement of virtual instrument technology, converting the data measurement and control platform to a virtual one has become fashionable. This study focuses on dynamic measurement in order to create a multichannel parallel dynamic testing virtual instrument and then test the instrument’s performance. System login, user management, database storage, query and compression, data processing and real-time display, multifunctional analysis, remote access, and report generation modules have all been designed and implemented. A dynamic measurement uncertainty evaluation method based o
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Chang Biao, Kai Yong Jiang, and Xi Peng Xu. "A New Approach to the Communication of the Distributed Collaborative System Based on COM+." Materials Science Forum 532-533 (December 2006): 1148–51. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1148.

Full text
Abstract:
In this paper COM+ based on Microsoft .NET is adopted to realize a Distributed Collaborative System (DCS). This system adopts a complex architecture combined C/S with B/S to reduce the remote communication and improve the performance. By means of IE or other browsers, a client can download client tool, register or login, search or publish information via the collaborative website. After installing the client tool, a client can automatically receive the collaborative requests or invitations from the collaborative server and collaborate with other participators. The system utilizes COM+ services
APA, Harvard, Vancouver, ISO, and other styles
48

Wu, Zhuo Kui, and Tao Zeng. "Design of On-Off Control System for Electric Equipment Based on WiFi." Applied Mechanics and Materials 536-537 (April 2014): 1157–60. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.1157.

Full text
Abstract:
According to the demands of electric equipment monitoring and control, a design of on-off control system for electric equipment based on WiFi is presented. The system introduces WiFi wireless communication technology into the communication network construction, which realizes the rapid wireless data transmission, simplifies the network organizing method and saves the network building cost. The WiFi on-off control device and the host computer program based on C# are designed. The WiFi on-off control device has the functions of on-off control of electric equipment and WiFi communication. The hos
APA, Harvard, Vancouver, ISO, and other styles
49

Kalimuthu, P., and A. Justin Diraviam. "Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 130–34. http://dx.doi.org/10.51983/ajcst-2012.1.1.1691.

Full text
Abstract:
Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing
 While some legal challenges in cyberspace have started to become clearer, the use of cloud computing and hosted applications adds a new dimension of legal risk. Compliance, privacy, and security problems are compounded by the use of remote, distributed services operated by third parties. Businesses employing these new technologies must look a new at their online risk, and learn how to assess and manage it. Authentication is the first line of defense against
APA, Harvard, Vancouver, ISO, and other styles
50

Baig, Mirza Jabbar Aziz, M. Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "A Low-Cost, Open-Source Peer-to-Peer Energy Trading System for a Remote Community Using the Internet-of-Things, Blockchain, and Hypertext Transfer Protocol." Energies 15, no. 13 (2022): 4862. http://dx.doi.org/10.3390/en15134862.

Full text
Abstract:
A low-cost, open-source peer-to-peer (P2P) energy trading system for a remote community is presented in this paper. As a result of its geographic location, this community has never been able to access electricity and other modern amenities. This study aims to design and implement a P2P energy trading system for this remote community that allows residents to take advantage of distributed energy resources. A Raspberry Pi 4 Model B (Pi4B) hosts the main server of the trading system that includes the user interface and a local Ethereum blockchain server. The Ethereum blockchain is used to deploy s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!