scholarly journals Giddy Ion Reloaded: Desktop Manager, Optimizer with Multi Utility Tool

Author(s):  
Jaymar C ◽  
Marifel Grace Capili-Kummer

The performance of our computer is vital in fulfilling the task of the user. The paper presents a solution for maintaining the performance of the computer specifically computers with Windows operating systems. In this article, the fundamental difference and problem of the Windows operating system are defined which roots in the architectural design of using single configuration storage. The security hole of windows authentication, the exploitation of Microsoft EFS, and the acquisition of password hashes from Microsoft SAM are also discussed. Various existing utility software is evaluated to investigate if they meet the user define criteria. This paper also proposes a user-level implementation of the AES 256 encryption algorithm for securing user files and a Network Blocking algorithm based on ARP Spoofing techniques that provide a user-level network monitoring capability. The proposed application is called “Giddy-ION Reloaded” which consists of four main modules; machine information acquisition and monitoring, machine optimization, machine cleaning, and tools module that is divided into submodule; encryption and decryption, network monitoring, desktop management, network optimization/ control, and task automation. The testing was conducted with the participants coming from a computer college, continuing education trainer/faculty, and various IT experts. The response from these groups was statistically treated and analyzed, where the Giddy ION rank top and shows promising results. The study is limited to windows machines with 64-bit support architecture. The developed application is ready for implementation and deployment as evidenced by its high overall performance rating as evaluated by the participants against the ISO 25010 standards.

Author(s):  
Yi Shan Lim ◽  
Sudeesh Kala ◽  
Mark Chatten

<p>This paper identifies the architectural design challenges associated with wind-driven rain in tropical cities like Kuala Lumpur and Singapore. It explains state-of-the-science analysis tools and techniques that can be employed to understand how windy, rainy weather interacts with buildings and how to improve the overall performance and occupant comfort.</p>


Author(s):  
Ashraf A. Ali ◽  
Khalid Al-Begain

In this chapter, the most important protocols that controls the operation of the end-to-end system and has implications on the overall performance aspects will be presented. Then, performance issues will be demonstrated. the performance issues and the challenge of enhancing SIP services performance will be highlighted and briefly discussed. The protocol related performance metrics will be identified to determine the way SIP is utilizing the system resources and how to maximize it. Moreover, the architectural design challenges will be targeted to enhance the SIP performance.


2020 ◽  
Vol 39 (6) ◽  
pp. 8813-8821
Author(s):  
Chen Guo

In rural construction, affected by covid-19, it leads to the collection and demand survey of basic information data of relevant interest groups. The specific situation of the transformation of ancient villages is also gradually increasing. However, due to the complexity of rural space, the dispersion of settlement space and the diversity of information demand of rural planning work, the data coverage is large, information acquisition is difficult, the use effect of data collection is not ideal, and there is no planning feedback mechanism. However, during the epidemic period, the staff could not carry out a series of reconstruction of ancient villages. At present, the data of village planning and construction and architectural design are complex, the needs of relevant interest groups are diversified, and regional planning is difficult. In this paper, the big data function is applied to the reconstruction of ancient villages in the epidemic period of covid-19.


Data transmission with protection is main concept which is getting demand now a days for which number of encryption of data techniques are developed and now in this paper Advanced Encryption Standard (AES) Algorithm is used and is implemented on FPGA kit using vertex-3 family. We use 128 bits consists of input, key data, output data for this design. It is called an iterative looping with replacement box, key, loop in this design for both encryption and decryption of data. We use Xilinx software platform for simulation of our design that is AES by which area utilization and throughput is increased for achieving low power consumption, high data security, reduced latency and easy architectural design. This data operation is applicable in many areas.


2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Mingming Huang ◽  
Quanzhen Huang ◽  
Yang Zhang ◽  
Xinjun Guo

Hybrid excitation synchronous motor (HESM) offers the advantages of a convenient flux regulation and a wide range of available speeds. As such, it may be conveniently employed in the fields of electric vehicle and aerospace. In this paper, based on a suitable control strategy for vector and speed partition, we put forward a speed control method for HESM which shows optimal efficiency. On the one hand, our method aims at minimizing the copper loss by an optimal configuration of the q-axis current, the d-axis current, and the excitation current under the constraint voltage at the armature end. On the other hand, we conduct a comprehensive analysis of the effects of the flux-weakening speed coefficient on the operating performance of the motors and suggest a self-adaptive control method to regulate that coefficient and further improve the overall performance of the motors, including their speed-range regulation, their efficiency, and their dynamical properties. The proposed flux-weakening control method has been assessed by simulations and HESM-driven experiments. Results have confirmed the feasibility and optimality of our method.


2012 ◽  
Vol 3 (2) ◽  
pp. 242-248
Author(s):  
Hareesh K ◽  
Manjaiah D. H

In the Internet, video streaming requires greater amount of network bandwidth and other resources as the number of user requests increases. In case of traditional centralized directory server approach all the users requests are directly handled by the centralized server and each user request will send dedicated stream by the server, which requires higher end server, server cost will become more and greater amount of network bandwidth utilized by this server. To solve these problems peer to peer technology as emerged for the distribution of video streams to the larger requests over the network. In P2P VoD architecture adopted both the peer to peer and proxy based architectural design of a VOD system for larger community of users over the network. Hence our proposed Peer to Peer Video on Demand Architecture using V-Chaining improves the overall performance of the system by efficient utilization of uplink bandwidth and smaller amount of buffer space among the peers. In this paper we have introduce architecture for handle the large number of user requests over the communication network and ease of implementation.


Author(s):  
David C Joy

The electron source is the most important component of the Scanning electron microscope (SEM) since it is this which will determine the overall performance of the machine. The gun performance can be described in terms of quantities such as its brightness, its source size, its energy spread, and its stability and, depending on the chosen application, any of these factors may be the most significant one. The task of the electron gun in an SEM is, in fact, particularly difficult because of the very wide range of operational parameters that may be required e.g a variation in probe size of from a few angstroms to a few microns, and a probe current which may go from less than a pico-amp to more than a microamp. This wide range of operating parameters makes the choice of the optimum source for scanning microscopy a difficult decision.Historically, the first step up from the sealed glass tube ‘cathode ray generator’ was the simple, diode, tungsten thermionic emitter.


1987 ◽  
Vol 18 (3) ◽  
pp. 250-266 ◽  
Author(s):  
R. Jane Lieberman ◽  
Ann Marie C. Heffron ◽  
Stephanie J. West ◽  
Edward C. Hutchinson ◽  
Thomas W. Swem

Four recently developed adolescent language tests, the Fullerton Test for Adolescents (FLTA), the Test of Adolescent Language (TOAL), the Clinical Evaluation of Language Functions (CELF), and the Screening Test of Adolescent Language (STAL), were compared to determine: (a) whether they measured the same language skills (content) in the same way (procedures); and (b) whether students performed similarly on each of the tests. First, respective manuals were reviewed to compare selection of subtest content areas and subtest procedures. Then, each of the tests was administered according to standardized procedures to 30 unselected sixth-grade students. Despite apparent differences in test content and procedures, there was no significant difference in students' performance on three of the four tests, and correlations among test performance were moderate to high. A comparison of the pass/fail rates for overall performance on the tests, however, revealed a significant discrepancy between the proportions of students identified in need of further evaluation on the STAL (20%) and the proportion diagnosed as language impaired on the three diagnostic tests (60-73%). Clinical implications are discussed.


Sign in / Sign up

Export Citation Format

Share Document