24 research outputs found

    AN ANALYSIS OF INFORMATION SEARCH AND RETRIEVAL TECHNIQUES

    Get PDF
    The informational growth dramatically changed the standard form of publication, access, and use of scientific information. Due to Internet, scientific publications migrated from the traditional to a digital configuration. Common users, as well as highly trained professionals from various fields, aim to retrieve information in the shortest possible time, but in the context of an unprecedented growth of data volume, big difficulties occur in finding and accessing the available information, resulting in stress and important delays in decision making. Therefore, training courses in information culture are organized in university libraries, particularly for a superior efficiency of scientific data bases usage. The paper presents an introduction to the architecture of a retrieval information system and a study of the most popular search engines and of the indexing process. Hereinafter, a Page Rank algorithm implementation is performed and a comparative study relative to different search engines is conducted, emphasizing the specific advantages and disadvantages

    SECURING DATA AND APPLICATIONS IN CLOUD. CASE STUDY

    Get PDF
    Security is a principal concern when entrusting an organization’s critical information to geographically dispersed cloud platforms. In addition to the conventional IT system security procedures, designing security into cloud during the software development life cycle can greatly reduce the cloud attack surface. The paper focuses on presenting IBM Cloud security policies and their architecture and conducts a study of the security implementation steps, beginning with user's authentication on the Cloud platform. Hereinafter, the developed experimental application - a monitoring environment system - retrieves temperature, humidity, and pressure values from dedicated sensors, thus using the facilities offered by IBM Cloud platform

    Intelligent Management of the Cryptographic Keys

    Get PDF
    With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage

    STUDY AND DESIGN OF AN AUTOMATED PALLET SYSTEM

    Get PDF
    The need to increase efficiency, reliability and work capacity becomes a priority in small and large companies. High-level automation entails minimizing human labor and the human factor itself, but it still needs monitoring, surveillance, and inspection through human action. An automated system is much more efficient, its degree of repeatability being definitely a much higher one. The palletizing process used before the development of the automated pallet system implied in a 90% percentage the human factor through a human-machine cooperation, and the only automated mechanisms used were the conveyor belts and a mechanism for fixing the lid of the products transported on the belt. Thus, the industrial handling robot used in the automated pallet process becomes an essential resource, much faster
    corecore