system administrator
Recently Published Documents


TOTAL DOCUMENTS

66
(FIVE YEARS 18)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Vol 30 (8-9) ◽  
pp. 34-43
Author(s):  
V. V. Sivakov ◽  
A. A. Solomnikov ◽  
I. Yu. Adamovich ◽  
S. P. Stroev

The article addresses issues related to the implementation of the competence approach in order to make the teaching process of an educational institution more efficient, analyzes the reasons for diminished efficiency of putting into practice the automated systems used for university management. The authors propose the structure of an automated system, which allows the university to create the required package of teaching documents taking into account the three-level system: administrator, supervisor of educational program, and lecturer. Designing object-oriented model in the area of a special subject requires identification of business-requirements to the system. On the basis of the model of subject area and specified business-requirements, the diagram of applying variants and the schemes of functioning is constructed. The suggested system of the automated execution of teaching documents enables to reduce error rate while carrying out and implementing it due to the integrated system of conceptions and feedback between its elements.


Author(s):  
Andrii Pryimak ◽  
Vasyl Karpinets ◽  
Yana Yaremchuk

It is known that with the growing popularity of blockchain and cryptocurrency technology, many people want to make money on it. As a result, hackers who use other people's resources for easy profit are becoming more active. There are many different tools available today to protect user’s personal computers from cryptojacking, but effective protection for server operating systems are still actual.This paper investigates the possibility of searching for unauthorized cryptocurrency mining processes by three parameters: search for suspicious processes by name, by binary signature and by connection to the mining pool.Based on the study, a method of automated search for unauthorized cryptocurrency mining in server OS containers was proposed, which consists of 5 main stages:1. Search for unauthorized cryptocurrency generation processes by process name.2. Search by binary signature.3. Search for a connection to a mining pool4. Detection of the process of unauthorized mining and stopping the container in which the mining process was detected.5. Notification of the system administrator about the detection of unauthorized cryptocurrency generation processes.It is worth noting that, unlike existing tools, the developed method searches for containers from the host virtual machine, so that there is no need to run a search in each of the containers, as it can be a large number of them and as a result reduce the load on the system.The block diagram of the application for the implementation of the proposed method was also described, as well as examples of stopping the container in which an unauthorized mining process was found and the corresponding message to the system administrator.In addition, a study of the speed of the proposed method was conducted. The results of the test showed a time of 2,585 seconds, which reflects the fast operation and the absence of additional overload on the system.


Author(s):  
Rollin Thomas ◽  
Shreyas Cholia

Rich user interfaces like Jupyter have the potential to make interacting with a supercomputer easier and more productive, consequently attracting new kinds of users and helping to expand the application of supercomputing to new science domains. For the scientist-user, the ideal rich user interface delivers a familiar, responsive, introspective, modular, and customizable platform upon which to build, run, capture, document, re-run, and share analysis workflows. From the provider or system administrator perspective, such a platform would also be easy to configure, deploy securely, update, customize, and support. Jupyter checks most if not all of these boxes. But from the perspective of leadership computing organizations that provide supercomputing power to users, such a platform should also make the unique features of a supercomputer center more accessible to users and more composable with high performance computing (HPC) workflows. Project Jupyter’s core design philosophy of extensibility, abstraction, and agnostic deployment, has allowed HPC centers like NERSC to bring in advanced supercomputing capabilities that can extend the interactive notebook environment. This has enabled a rich scientific discovery platform, particularly for experimental facility data analysis and machine learning problems.


2021 ◽  
Vol 13 (1) ◽  
pp. 33-51
Author(s):  
Mohamed Matoui ◽  
Noureddine Moumkine ◽  
Abdellah Adib

IPTV (Internet Protocol Television) includes several video components. The IMS (IP Multimedia Subsystem) cannot differentiate between them what causes their treatment similarly. These sub-components must have different priorities because they have distinct QoS constraints. In this paper, we suggest the implementation of IPTV in a heterogeneous network that improved QoS by providing the capability to prioritize the sub traffic according to the system administrator policy. A new IPv6 flow label field definition was proposed that is ready for standardization. OPNET Modeler software is used to design our approached architecture. The results show that IPTV users receive different amounts of video data based on the stream's priority.


Author(s):  
Zlatko Lazarević

In the health sector, one of the biggest questions of modern time is the way of cutting cost while maintaining the same quality of service. Abroad, the use of pipe mail for the purpose of solving internal logistics and with that providing quality and adequacy of products and direct cut of costs related with the work force, is already widely present in hospitals. Transport with the use of pipe mail enables fast, safe and foremost economic content transfer. Hospitals abroad use the pipe mail mostly for: - transport of samples (swabs, blood, tissues) to laboratories, - transport of blood for the surgeries in operation rooms from the central blood bank, - transport of medicine from central pharmacy for surgeries in operation rooms or the need of different departments, - transport of documentation between departments and laboratories, - transport of lab test results to the department that ordered for that test. Pipe mail enables centralization – existence of one central laboratory, who takes care of all the necessary analysis, which directly means: - savings in space, - direct saving in the cost of pay due to the lowering number of employees or their redeployment, - higher efficiency (individual documentation processing, which directly means higher productivity based on the reduction of wasted time and waiting for documentation), - information renewal of processes, - reliability, timeliness and order, most importantly from the point of view of the patient, who will save unnecessary waiting time, from which most psychologically related issues arise, - the system is computer controlled and statistics are available to the system administrator at any time, - - Pipeline airmail has a significant impact on the safety of both employees and patients during an epidemic.


2020 ◽  
Vol 22 (6) ◽  
pp. 395-403
Author(s):  
Charlie Urame ◽  
Paul Ratnamahilan Hoole

Hydro-Electricity and Solar Power are environmentally friendly renewable sources of energy that utilize the potential energy from dammed water and the sun respectively to generate electricity. In this paper is reported a new design and implementation of combining solar and hydro-electric power. The turbine and gearbox system used in this design is fabricated from scarp parts of used appliances. The hydro head of the Pico-Hydro plant commissioned was 5m which accumulated a hydraulic potency of the stream of about 5.886kW. The prime mover of the generator consisted of a modified crossflow turbine that is coupled with a gearbox to amplify the rpm of the system. A 500W synchronous generator was driven by the prime mover to generate raw phase shifted AC power. This raw power was rectified with a 25 A full wave rectifier and used in conjunction with 12 V 400 AH deep cycle battery bank system to supply power to a newly furnished double storey house. The generator output through the full wave rectifier is connected to a load controller for optimal charge efficiency. The load controller is connected to the battery bank through a Programmable Logic Controller (PLC). The PLC activates a dummy resistive hot water element when the battery bank is fully charged. The Arduino GSM module monitors the entire process and automatically sends notification via a SIM interface to the system administrator notifying the system administrator of the on/off state of the heating element.


2020 ◽  
Vol 2 (1) ◽  
pp. 27-30
Author(s):  
Saharuddin Saharuddin

Article 26 paragraph (3) of Law number 19 the Year 2016 concerning Electronic Information and Transactions (The ITE Law) in Indonesian concerning the right to be forgotten. The contents of this article allow a person based on a court order to ask the electronic system administrator to delete irrelevant electronic information that is under their control. This provision conflicts with several other rights, which are also regulated in several laws. Like the location of the intersection right to be forgotten with the protection of personal data and public access to information.


Credit card frauds has been a threat that has evolved as a major source of loss for the financial sectors. It has been seen in the different parts of world causing loss of billions of dollars. It is also a area which needs attention from the researchers as the task of fraud detection can be automated using the different machine learning classifiers and data science. If the frauds model encounter the fraudulent transactions it will raise an alarm to the system administrator. The paper proposes a model which uses the machine learning classifiers to detect the fraudulent transactions. The classifiers used in the paper are SVM (Support Vectore Machine ), Isolation Forest and Local Outlier. The focus of the research is to detect the fraudulent transactions to 100% and also we emphasise on the fact that no normal transaction should be detected as fraud wrongly. The process starts with preprocessing the data and then the classifers are applied. The results from each classifers is evaluated to check the one with the better performance. The performance can be increased with use of deep learning algorithms but with the rise in expennses.


METIK JURNAL ◽  
2020 ◽  
Vol 4 (1) ◽  
pp. 22-32
Author(s):  
Arnada Cinta Belena ◽  
Tina Tri Wulansari ◽  
Riyayatsyah

Computer technology is needed everywhere including inventory activities. The existence of inventory activities can minimize defects or obscurity of each device starting from the data collection of the device entering and exiting device, data collection of consumable and non-consumable device, data collection of damaged device or items that must be destroyed. But so far the inventory activities at the SMK Negeri 5 Laboratory have not been going well and the reporting process is very ineffective. Assist in research made by the Inventory Information System of Device that will assist administrative staff, laboratory personnel and principals in inventory activities. This system was designed using the prototyping system development method. Whereas the programming language used is Visual Basic and SQL Server 2008 databases. Principals, laboratories responsible, and administrative staff have their user access according to their respective user access rights according to the access rights specified by the system administrator. These data can produce reports on receipt, utilization, transfer, and maintenance of a device. Help reduce delays in reporting by organizing data collection and making inventory reports.


Sign in / Sign up

Export Citation Format

Share Document