oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 12 )

2018 ( 6 )

2017 ( 8 )

2016 ( 23 )

Custom range...

Search Results: 1 - 10 of 1801 matches for " Samir Lemes "
All listed articles are free for downloading (OA Articles)
Page 1 /1801
Display every page Item
Information Security Management of Web Portals Based on Joomla CMS
Samir Lemes
Computer Science , 2014,
Abstract: Information is the key asset of all organizations and can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation. In today's competitive business environment, such information is constantly under threat from many sources, which can be internal, external, accidental, or malicious. Joomla is a very popular Content Management System (CMS) used for web page maintenance. This highly versatile software has found itself in both large corporate web portals, and simple web pages such as blogs. Such popularity increases its vulnerability to potential attacks and therefore needs an appropriate security management. ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) created the series of standards aimed at providing a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an Information Security Management System (ISMS). This paper shows how principles set in ISO/IEC 27000 series of standards can be used to improve security of Joomla based web portals.
Using industrial robot to manipulate the measured object in CMM
Samir Lemes,Damir Strbac,Malik Cabaravdic
Computer Science , 2014, DOI: 10.5772/56585
Abstract: Coordinate measuring machines (CMMs) are widely used to check dimensions of manufactured parts, especially in automotive industry. The major obstacles in automation of these measurements are fixturing and clamping assemblies, which are required in order to position the measured object within the CMM. This paper describes how an industrial robot can be used to manipulate the measured object within the CMM work space, in order to enable automation of complex geometry measurement.
Upgrade of A Robot Workstation for Positioning of Measuring Objects on CMM
Deni Sabic,Damir Strbac,Samir Lemes,Malik Cabaravdic
Computer Science , 2014,
Abstract: In order to decrease the measuring cycle time on the coordinate measuring machine (CMM) a robot workstation for the positioning of measuring objects was created. The application of a simple 5-axis industrial robot enables the positioning of the objects within the working space of CMM and measuring of different surfaces on the same object without human intervention. In this article an upgrade of an existing robot workstation through different design measures is shown. The main goal of this upgrade is to improve the measuring accuracy of the complex robot-CMM system.
Rapid prototyping for sling design optimization
Nermina Zaimovic-Uzunovic,Samir Lemes,Damir Curic,Alan Topcic
Computer Science , 2014,
Abstract: This paper deals with combination of two modern engineering methods in order to optimise the shape of a representative casting product. The product being analysed is a sling, which is used to attach pulling rope in timber transportation. The first step was 3D modelling and static stress/strain analysis using CAD/CAE software NX4. The slinger shape optimization was performed using Traction method, by means of software Optishape-TS. To define constraints for shape optimization, FEA software FEMAP was used. The mould pattern with optimized 3D shape was then prepared using Fused Deposition Modelling (FDM) Rapid prototyping method. The sling mass decreased by 20%, while signifficantly better stress distribution was achieved, with maximum stress 3.5 times less than initial value. The future researches should use 3D scanning technology in order to provide more accurate 3D model of initial part. Results of this research can be used by toolmakers in order to engage FEA/RP technology to design and manufacture lighter products with acceptable stress distribution.
A New Full-NT-Step Infeasible Interior-Point Algorithm for SDP Based on a Specific Kernel Function  [PDF]
Samir Bouali, Samir Kabbaj
Applied Mathematics (AM) , 2012, DOI: 10.4236/am.2012.39150
Abstract: In this paper, we propose a new infeasible interior-point algorithm with full NesterovTodd (NT) steps for semidefinite programming (SDP). The main iteration consists of a feasibility step and several centrality steps. We used a specific kernel function to induce the feasibility step. The analysis is more simplified. The iteration bound coincides with the currently best known bound for infeasible interior-point methods.
Avalia??o de desempenho para gest?o econ?mica de empresas pecuárias
Lemes, Sirlei;
Caderno de Estudos , 1997, DOI: 10.1590/S1413-92511997000300003
Abstract: este artigo representou uma contribui??o ao desenvolvimento de um modelo de avalia??o de resultados e de desempenho para gest?o econ?mica da empresa pecuária. a base conceitual adotada sustenta-se no sistema de informa??o para gest?o econ?mica(gecon), principalmente na premissa de que o resultado econ?mico é o melhor indicador da eficácia empresarial. o desenvolvimento do artigo iniciou-se com a caracteriza??o da produ??o pecuária, contextualizando sua importancia econ?mica nacional e internacional. num segundo momento, pela vis?o sistêmica da empresa pecuária, identificou-se seus elementos, enfatizando principalmente o aspecto da gest?o do sistema pecuário. a seguir, delineou-se o modelo de informa??o para avalia??o de resultados e de desempenho da empresa pecuária. finalizou-se o estudo, com a identifica??o dos principais eventos de uma área de produ??o animal, caracterizando-se as estruturas de tais eventos, partindo-se da suposi??o de que o processo de avalia??o de desempenho fundamenta-se na representa??o, em termos econ?mico-financeiros, do que ocorre em termos operacionais.
A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam  [PDF]
Samir A. Elsagheer Mohamed
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2012, DOI: 10.4236/ijcns.2012.57051
Abstract: Spam or unsolicited emails constitute a major threat to the Internet, the corporations, and the end-users. Statistics show that about 70% - 80% of the emails are spam. There are several techniques that have been implemented to react to the spam on its arrival. These techniques consist in filtering the emails and placing them in the Junk or Spam folders of the users. Regardless of the accuracy of these techniques, they are all passive. In other words, they are like someone is hitting you and you are trying by all the means to protect yourself from these hits without fighting your opponent. As we know the proverbs \"The best defense is a good offense\" or \"Attack is the best form of defense\". Thus, we believe that attacking the spammers is the best way to minimize their impact. Spammers send millions of emails to the users for several reasons and usually they include some links or images that direct the user to some web pages or simply to track the users. The proposed idea of attacking the spammers is by building some software to collect these links from the Spam and Junk folders of the users. Then, the software periodically and actively visit these links and the subsequent redirect links as if a user clicks on these links or as if the user open the email containing the tracking link. If this software is used by millions of users (included in the major email providers), then this will act as a storm of Distributed Denial of Service attack on the spammers servers and there bandwidth will be completely consumed by this act. In this case, no human can visit their sites because they will be unavailable. In this paper, we describe this approach and show its effectiveness. In addition, we present an application we have developed that can be used for this reason.
Development of El-Salam Canal Automation System  [PDF]
Noha Samir Donia
Journal of Water Resource and Protection (JWARP) , 2012, DOI: 10.4236/jwarp.2012.48069
Abstract: In Egypt irrigation water is becoming more scarce with the continuously increasing demand for agriculture, domestic and industrial purposes. To face this increasing irrigation demand, the available water supply in Egypt is supplemented by the reuse of agricultural drainage water as in El-Salam Canal that do not satisfy water quality standards defined for the canal. This paper introduces an automation system for El-Salam Canal to control the flow of the fresh water and drainage water supplied to the canal. This automatic control system (ACS) is able to process data of various flows and water quality data along the canal. This control system is represented by a canal computer model. This system computes the required control actions at the Damietta branch and the feeding drains. It is also able to generate optimum solutions for the canal to satisfy the pre-defined canal conditions and standards.
Stability of Production Planning Problem with Fuzzy Parameters  [PDF]
Samir Abdou Abass
Open Journal of Applied Sciences (OJAppS) , 2012, DOI: 10.4236/ojapps.2012.23028
Abstract: The traditional production planning model based upon the famous linear programming formulation has been well known in the literature. The consideration of uncertainty in manufacturing systems supposes a great advance. Models for production planning which do not recognize the uncertainty can be expected to generate inferior planning decisions as compared to models that explicitly account the uncertainty. This paper deals with production planning problem with fuzzy parameters in both of the objective function and constraints. We have a planning problem to maximize revenues net of the production inventory and lost sales cost. The existing results concerning the qualitative and quantitative analysis of basic notions in parametric production planning problem with fuzzy parameters. These notions are the set of feasible parameters, the solvability set and the stability set of the first kind.
Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods  [PDF]
Samir A. Elsagheer Mohamed
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.62011
Abstract:

Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time consuming and resource demanding. They are inaccurate and require continuous update to cope with newly invented spammer’s tricks. On the other side, the existing subjective proposals have some drawbacks like the attacks from malicious users that make them unreliable and the privacy. In this paper, we propose an efficient spam filtering system that is based on a smart cooperative subjective technique for content filtering in addition to the fastest and the most reliable non-content-based objective methods. The system combines several applications. The first is a web-based system that we have developed based on the proposed technique. A server application having extra features suitable for the enterprises and closed work groups is a second part of the system. Another part is a set of standard web services that allow any existing email server or email client to interact with the system. It allows the email servers to query the system for email filtering. They can also allow the users via the mail user agents to participate in the subjective spam filtering problem.

Page 1 /1801
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.