Protection And Security Of An Operating System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
In this research paper first of all we gave a brief introduction of the operating system, furthers its types is also explained with an example and its component also. In this paper we show that what kind of problem arise, when we protect our operating system, how we can overcome from these problem. In this paper, we show what new requirements arise when introducing security and protection to the operating system into the area of real time operating system as well as distributed and many more operating system.
Authors and Affiliations
Jyoti Yadav, Kriti Bhatia, Kriti Kaushik
Biological Study and Fish Culture of Marpha Pond District Anuppur, Madhya Pradesh
The present paper deals with the seasonal variations in some important Physico-chemical parameters and Biological analysis of the fish Pond of Anuppur District of Madhya Pradesh using selected standard classical methods...
Survey on Education Institutional Solution
Implementation of Student Performance Analysis and Institute Solution using RDBMS is the web application on which the teacher are allow to insert the marks of the students obtain in the college exams (Test, Sessional, e...
A Review –Tour Routing Problem
The objective of the study is Traveling salesman problem (TSP) is a typical combinatorial optimization problem and a NP problem in operations research. Ant colony algorithm (ACO) is a kind of probability technology used...
Combined Beamforming with Space Time Frequency Coding for Mimo-OFDM Systems
Multiple antennas can be used in wireless systems to attain good quality of service and high data rate communication. Recently, efficient space-time-frequency (STF) codes have been developed to improve the diversity gai...
slugStudy of Security in Wireless Sensor Networks
Wireless Sensor Networks (WSN) is an incipient technology that shows great potential for various futuristic application both for military and mass public. Security plays a vital role in a WSN. The intent of this paper i...