http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network
Md Waliullah,A B M Moniruzzaman,Md. Sadekur Rahman,Member, IEEE 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.1
IEEE802.11 wireless networks have become one of the most widely used networks. Due to open nature of wireless medium, hackers and intruders can make utilization of the loopholes of the wireless communication; as a result, there are many security threats associated with Wireless Local Area Network (WLAN). In this paper, we have worked an experimental analysis to study some of the well known attacks pertaining to IEEE 802.11 WLAN. At first, some of the open issues related to this fragile technology have been discussed. Based on this vulnerabilities and threats categories some of the major attack has been performed in a live environment by using open source software tools i.e Aircrak-nj, kismet. etc. The analysis and finding from this paper’s proved that the complexity of attacks had increased by time and the Wifi technology are becoming more dangerous to the end users and business environment.
A. B. M. Moniruzzaman,Md. Waliullah,Md. Sadekur Rahman 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.1
This paper designs and implements a high availability clusters and incorporated with load balance infrastructure of web servers. The paper described system can provide full facilities to the website hosting provider and large business organizations. This system can provide continuous service though any system components fail uncertainly with the help of Linux Virtual Server (LVS) load-balancing cluster technology and combined with virtualization as well as shared storage technology to achieve the three-tier architecture of Web server clusters. This technology not only improves availability, but also affects the security and performance of the application services being requested. Benefits of the system include node failover overcome; network failover overcome; storage limitation overcome and load distribution.
GAZI, Md. Abu Issa,RAHAMAN, Atikur,WALIULLAH, Shaikh Sabbir Ahmed,ALI, Md. Julfikar,MAMOON, Zahidur Rahman Korea Distribution Science Association 2021 The Journal of Asian Finance, Economics and Busine Vol.8 No.2
The aim of the present study is to analyze the financial performance of converted commercial bank from non-banking financial institution through a case study of Bangladesh Commerce Bank Limited as sample organization. It is observed that the bank is able to achieve a stable growth rate in total deposits, total loans and advances, and net income after tax during the period of 2015-2019. Researchers also calculated some ratio analysis and noticed that the financial position of Bangladesh Commerce Bank Limited was not so strong because bank's ROA, ROE, NIM and other ratios were below standard. Researchers used secondary data that were examined by using descriptive statistical tools and panel data regression model. Result shows that Bangladesh Commerce Bank has satisfactory operating efficiency, assets management efficiency, and gives loans to customers. In addition, the present study has tested some hypotheses regarding net income after tax, ROA and ROE with total assets, total loans, total deposits and interest income. These hypotheses have been accepted, which means there is no significant influence of the independent variable on the dependent variable. The study suggests that Bangladesh Commerce Bank Limited had the opportunities to make their financial position stronger by utilizing their good financial position and management efficiencies.
Analysis of Topology Based Routing Protocols for Vehicular Ad-HocNetwork (VANET)
A B M Moniruzzaman,Md. Waliullah,Md. Sadekur Rahman 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.3
Now-a-days vehicles are one of the most important parts of our life. We need them to cross distances in our everyday life. In this paper we discuss Vehicular Ad-Hoc Network (VANET) technology that can ensure the maintenance of traffic rules and regulation. By applying this technology we can save life, save time, corruption, vehicle security, avoid collision and so on. Vehicular Ad Hoc Network (VANET) is a part of Mobile Ad Hoc Network (MANET). Every node or vehicle can move freely and they will communicate each other by wireless technology in coverage. The main goal of this research is to study the existing routing protocols for ad-hoc network system and compared between AODV (Reactive) and DSDV (Proactive). We have studied different types of routing protocols such as topology based, position based, cluster based, geo-cast based and broadcast based. We have simulated and compared AODV (Reactive) and DSDV (Proactive) to find out their efficiency and detect their flaws.