5 research outputs found

    Micro-Electromechanical Systems In The Ecology

    Get PDF
    In the present paper a definition, a model for building of MEMS (micro-electromechanical systems), types, their advantages and disadvantages have been given. The elements and the components, from which they are built, the development and the prediction of market about them have been considered as well more important firms, that manufacture them. A classification of MEMS is made on the basis of their designation and the region, where they operate. A special place is separated on the application of MEMS in the ecology as well as concrete examples are indicated – developments of firms and own ones

    Software Provisioning of the Protech Integrated Engineering Automation System

    Get PDF
    This is a presentation of the basic principle, operational functions and modules of the software for planning, programming and control of the serial production in the engineering automation system environment. We specified the software provisioning of the particular application and the benefits from its use in the manufacture process. There is a description of the available data bases for the input of the basic technological information about the work-pieces and details and for setting-up of the metal-processing tools. This product traces the technological sequence and the specifics of the production process of machines with computer and numerical control (CNC), the direct connection and dependency of the individual modules within the processing and exchange of the running current information

    Protection of user credentials in web application

    Get PDF
    Protecting user data in web applications is a challenge that developers face. Enabling secure user login and overcoming vulnerabilities without exposing sensitive data to attackers, is based on the application of modern methods and techniques for protection. This paper first reviews the current situation in this area with an emphasis on important security features. Then, the available systems are evaluated and the obtained results are quantified, from where their advantages and disadvantages can be seen. Another goal of the paper is a deeper insight into the field of user data security. Special attention is given to the importance of password protection for access in web applications
    corecore