Biblio
In this research a secured framework is developed to support effective digital service delivery for government to stakeholders. It is developed to provide secured network to the remote area of Bangladesh. The proposed framework has been tested through the rough simulation of the network infrastructure. Each and every part of the digital service network has been analyzed in the basis of security purpose. Through the simulation the security issues are identified and proposed a security policy framework for effective service. Basing on the findings the issues are included and the framework has designed as the solution of security issues. A complete security policy framework has prepared on the basis of the network topology. As the output the stakeholders will get a better and effective data service. This model is better than the other expected network infrastructure. Till now in Bangladesh none of the network infrastructure are security policy based. This is needed to provide the secured network to remote area from government.
Measuring software complexity is key in managing the software lifecycle and in controlling its maintenance. While there are well-established and comprehensive metrics to measure the complexity of the software code, assessment of the complexity of software designs remains elusive. Moreover, there are no clear guidelines to help software designers chose alternatives that reduce design complexity, improve design comprehensibility, and improve the maintainability of the software. This paper outlines a language independent approach to measuring software design complexity using objective and deterministic metrics. The paper outlines the metrics for two major software design notations; UML Class Diagrams and UML State Machines. The approach is based on the analysis of the design elements and their mutual interactions. The approach can be extended to cover other UML design notations.
Earth provides natural resources, such as fossil fuels and minerals, that are vital for Europe's economy. As the global demand grows, especially for strategic metals, commodity prices rapidly rise and there is an identifiable risk of an increasing supply shortage of some metals, including those identified as critical to Europe's high technology sector. Hence a major element in any economy's long-term strategy must be to respond to the increasing pressure on natural resources to ensure security of supply for these strategic metals. In today's rapidly changing global economic landscape, mining in the deep sea, specifically at extinct hydrothermal vents and the vast areas covered by polymetallic nodules, has gone from a distant possibility to a likely reality within just a decade. The extremely hostile conditions found on the deep-ocean floor pose specific challenges, both technically and environmentally, which are demanding and entirely different from land-based mining. At present, European offshore industries and marine research institutions have significant experience and technology and are well positioned to develop engineering and knowledge-based solutions to resource exploitation in these challenging and sensitive environments. However, to keep this position there is a need to initiate pilot studies to develop breakthrough methodologies for the exploration, assessment and extraction of deep-sea minerals, as well as investigate the implications for economic and environmental sustainability. The Blue Mining project will address all aspects of the entire value chain in this field, from resource discovery to resource assessment, from exploitation technologies to the legal and regulatory framework.
The convergence of the Internet and mobile computing enables personalised access to online services anywhere and anytime. This potent access capability creates opportunities for new business models which stimulates vigorous investment and rapid innovation. Unfortunately, this innovation also produces new vulnerabilities and threats, and the new business models also create incentives for attacks, because criminals will always follow the money. Unless the new threats are balanced with appropriate countermeasures, growth in the Internet and mobile services will encounter painful setbacks. Security and trust are two fundamental factors for sustainable development of identity management in online markets and communities. The aim of this study is to present an overview of the central aspects of identity management in the Internet and mobile computing with respect to security and trust.