Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Client application for Domain Name System.

Zeitschriftenartikel zum Thema „Client application for Domain Name System“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Client application for Domain Name System" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Ma, Liang, and Xiaole Zhao. "Research on the multi-terminal adapting Web system construction." MATEC Web of Conferences 232 (2018): 01028. http://dx.doi.org/10.1051/matecconf/201823201028.

Der volle Inhalt der Quelle
Annotation:
Among the various applying patterns of Internet programs, the Web system based on B/S architecture has the congenital advantage of cross platform. The same application could be accessed via the same domain name with any operating system, as long as the client-side software (browser) is installed. Thus, in the development of Internet application, if the function could meet the requirement, the Web system construction should be given the top priority. With the wide development of information technology, such as intelligent terminal, mobile interconnection and cloud computing, how to construct th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.

Der volle Inhalt der Quelle
Annotation:
Many applications are developed on education domain. Information and data for each application are stored in distributed locations with different data representations on each database. This situation leads to heterogeneity at the level of integration data. Heterogeneity data may cause many problems. One major issue is about the semantic relationships data among applications on education domain, in which the learning data may have the same name but with a different meaning, or learning data that has a different name with same meaning. This paper discusses on semantic data mapping process to han
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Khudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (2019): 442. http://dx.doi.org/10.3390/electronics8040442.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Der volle Inhalt der Quelle
Annotation:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-uni
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Xiao, Yu Zhi. "On the Research of Internet Equipment Naming Methods." Advanced Materials Research 664 (February 2013): 1021–27. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1021.

Der volle Inhalt der Quelle
Annotation:
This paper analyzes the content of Internet naming problems as well as the current exist problems .We discuss the namespace and the major technologies, and then elaborating the important thinking on research of naming problems detailed and propose development direction in the future. In the paper, we propose a new method for devices naming due to the issues that exist in the Internet naming. Using this technical, it can solve the problem of the extremely scarce IPv4 and the IP address changed frequently on Internet devices. Equipment naming scheme has five major components: equipment name regi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ji, Hong. "Research on Design and Security Strategy of DNS." Applied Mechanics and Materials 378 (August 2013): 510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.378.510.

Der volle Inhalt der Quelle
Annotation:
DNS service plays a very important role in the Internet; each host must pass it to query the IP address of the destination host, and can communicate with each other. DNS uses a distributed database structure and server/client mode, which is stored domain name in the server and allowed a client to access the required data. DNS can resolve the host name to the corresponding IP address, while it also can resolve IP address to a host name. With the development of information technology, the network attacks become more and more frequent occurrence in the Internet. So DNS system has suffered a serie
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.

Der volle Inhalt der Quelle
Annotation:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zhang, Chen Guang, Yu Lan Zhao, Feng Xian Jiang, and Chao Ji. "The Research and Application of Short Message Name and Address System." Advanced Materials Research 225-226 (April 2011): 1008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1008.

Der volle Inhalt der Quelle
Annotation:
With the rapid development of mobile communication technology, the short message name and address system [1] has been developed swiftly nowadays. We make the short message to be a kind of carrier, for delivering the requirements which clients required and return the answers which clients seek for. This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Taking advantages of the superiority of this system
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Der volle Inhalt der Quelle
Annotation:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Jia, Bin. "The Research and Application of Short Message Name and Address Technology." Applied Mechanics and Materials 432 (September 2013): 571–74. http://dx.doi.org/10.4028/www.scientific.net/amm.432.571.

Der volle Inhalt der Quelle
Annotation:
This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Take advantages of the superiority of this system and innovates on the technology, we have completed a business software based on J2ME platform [1-.In the research and develop process we designed client-side functions and structural model combined with some functions used on the mobile phones, accordingly, the system technology has been practiced t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Tian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.

Der volle Inhalt der Quelle
Annotation:
IPv4 and IPv6 will coexist for a long time, due to ISPes’ inertia in the transition from IPv4 to IPv6. Domain Name System (DNS) is a very important functional unit in the Internet. This paper describres the hierarchy and operating process of IPv6 DNS, IPv6 DNS resolver, and presents the DNS transition from IPv4 to IPv6 in particular. We suggest two methods to implement DNS service during the transition period: DNS-Application Level Gateway (DNS-ALG) with Network Address Translation-Protocol Translation (NAT-PT), and dual stacks. And we also propose their respective operational principles. This
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Auer, Michael, and Alexander Zipf. "3D WebGIS: From Visualization to Analysis. An Efficient Browser-Based 3D Line-of-Sight Analysis." ISPRS International Journal of Geo-Information 7, no. 7 (2018): 279. http://dx.doi.org/10.3390/ijgi7070279.

Der volle Inhalt der Quelle
Annotation:
3D WebGIS systems have been mentioned in the literature almost since the beginning of the graphical web era in the late 1990s. The potential use of 3D WebGIS is linked to a wide range of scientific and application domains, such as planning, controlling, tracking or simulation in crisis management, military mission planning, urban information systems, energy facilities or cultural heritage management, just to name a few. Nevertheless, many applications or research prototypes entitled as 3D WebGIS or similar are mainly about 3D visualization of GIS data or the visualization of analysis results,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Schmitt, Paul, Anne Edmundson, Allison Mankin, and Nick Feamster. "Oblivious DNS: Practical Privacy for DNS Queries." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (2019): 228–44. http://dx.doi.org/10.2478/popets-2019-0028.

Der volle Inhalt der Quelle
Annotation:
Abstract Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers—the machines that receive a client’s query for a domain name and resolve it to a corresponding IP address—can learn significant information about client activity. Past work, for example, indicates that DNS queries reveal information ranging from web browsing activity to the types of devices that a user has in their home. Recognizing the privacy vulnerabilities associated with DNS queries,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Zhang, Zhi Chun, Song Yan Lu, Kun Xu, Zhuang Xiong, and Yun He. "A Transparent Communication System in Distributed Systems." Advanced Materials Research 909 (March 2014): 311–16. http://dx.doi.org/10.4028/www.scientific.net/amr.909.311.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a communication system in order to facilitate the development of communication for distributed systems based on TCP/IP network. The system provides real-time communication service based on UDP, subnetting network, broadcast and multi-NIC(Network Interface Card) configuration in the same host. It also provides reliable communication service based on TCP. These services are some application programming interfaces (APIs) that can be called in client applications with IHBs (Information Harbors) to identify the communication end-points. An IHB is a name defined in a network conf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Jeong, Taikyeong Ted. "Highly scalable intelligent sensory application and time domain matrix for safety-critical system design." International Journal of Distributed Sensor Networks 14, no. 4 (2018): 155014771774110. http://dx.doi.org/10.1177/1550147717741102.

Der volle Inhalt der Quelle
Annotation:
The designs of highly scalable intelligent sensory application—Ethernet-based communication architectures—are moving toward the integration of a fault recovery and fault-detection algorithm on the automotive industry. In particular, each port on the same network interface card design is required to provide highly scalable and low-latency communication. In this article, we present a study of intelligent sensory application for the Ethernet-based communication architecture and performance of multi-port configuration which is mainly used in safety-enhanced application such as automotive, military
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Singanamalla, Sudheesh, Suphanat Chunhapanya, Jonathan Hoyland, et al. "Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 575–92. http://dx.doi.org/10.2478/popets-2021-0085.

Der volle Inhalt der Quelle
Annotation:
Abstract The Internet’s Domain Name System (DNS) responds to client hostname queries with corresponding IP addresses and records. Traditional DNS is unencrypted and leaks user information to on-lookers. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting DNS messages from third parties. However, the small number of available public large-scale DoT and DoH resolvers has reinforced DNS privacy concerns, specifically that DNS operators could use query contents and client IP addresses to link activities with identities. O
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.

Der volle Inhalt der Quelle
Annotation:
Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attack
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Setiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jteei.v01i01p02.

Der volle Inhalt der Quelle
Annotation:
This paper presents a system to display traffic density in real time based on speed of vehicles on the main roads in the city of Denpasar. With this application, users who are in a vehicle can get the density of roads information. The software will run on the Android platform created with the help of Google maps with visualization density of roads are being reviewed. Measurement of vehicle speed using the frame difference method, so the computational process can be run quickly and in real time. The trial results of this paper, user (vehicle speed measurement) produces the same data as the data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Setiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jeei.2017.v01.i01.p02.

Der volle Inhalt der Quelle
Annotation:
This paper presents a system to display traffic density in real time based on speed of vehicles on the main roads in the city of Denpasar. With this application, users who are in a vehicle can get the density of roads information. The software will run on the Android platform created with the help of Google maps with visualization density of roads are being reviewed. Measurement of vehicle speed using the frame difference method, so the computational process can be run quickly and in real time. The trial results of this paper, user (vehicle speed measurement) produces the same data as the data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Setiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jeei.v01i01p02.

Der volle Inhalt der Quelle
Annotation:
This paper presents a system to display traffic density in real time based on speed of vehicles on the main roads in the city of Denpasar. With this application, users who are in a vehicle can get the density of roads information. The software will run on the Android platform created with the help of Google maps with visualization density of roads are being reviewed. Measurement of vehicle speed using the frame difference method, so the computational process can be run quickly and in real time. The trial results of this paper, user (vehicle speed measurement) produces the same data as the data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Goularas, Dionysis, Khalifa Djemal, and Yannis Mannoussakis. "3D Image Modelling and Specific Treatments in Orthodontics Domain." Applied Bionics and Biomechanics 4, no. 3 (2007): 111–24. http://dx.doi.org/10.1155/2007/248715.

Der volle Inhalt der Quelle
Annotation:
In this article, we present a 3D specific dental plaster treatment system for orthodontics. From computer tomography scanner images, we propose first a 3D image modelling and reconstruction method of the Mandible and Maxillary based on an adaptive triangulation allowing management of contours meant for the complex topologies. Secondly, we present two specific treatment methods directly achieved on obtained 3D model allowing the automatic correction for the setting in occlusion of the Mandible and the Maxillary, and the teeth segmentation allowing more specific dental examinations. Finally, the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Ardiyanto, Yudhi, and Muhamad Yusvin Mustar. "Color Blindness Testing Using A Client-Server Based on The Ishihara Method." Journal of Electrical Technology UMY 4, no. 2 (2020): 46–52. http://dx.doi.org/10.18196/jet.v4i2.10993.

Der volle Inhalt der Quelle
Annotation:
The Ishihara method is one way to detect whether or not someone suffers from color blindness. This method possesses several sets of plates or circle patterns containing various combinations of colored dots and sizes, forming numbers visible for people with normal eyes. A collection of several plates with the name Ishihara book is available in the market. However, the book has a weakness for being easily damaged or faded in color. Although there are some shortcomings, several researchers have developed applications to anticipate those weaknesses. Being unable to be used by several people at onc
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

J, Ravikumar, and Ramakanth Kumar P. "A framework for named entity recognition of clinical data." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 946. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp946-952.

Der volle Inhalt der Quelle
Annotation:
With emergence of technologies like big data, the healthcare services are also being explored to apply this technology and reap benefits. Big Data analytics can be implemented as a part of e-health which involves the extrapolation of actionable insights from sources like health knowledge base and health information systems. Present day medical data creates a lot of information consistently. At present, Hospital Information System is a quickly developing innovation. This data is a major asset for getting data from gathering of gigantic measures of surgical information by forcing a few questions
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Pallavi, P., and Shaik Salam. "Online Command Area Water Resource Management System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 70–74. http://dx.doi.org/10.34306/csit.v5i2.141.

Der volle Inhalt der Quelle
Annotation:
Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the activity of planning, developing, distributing and managing the optimum use of water resources. Successful management of water resources requires accurate knowledge of their resource distribution to meet up the competing demands and mechanisms to make good decisions using advanced recent technologies.Towards evolving comprehensive management plan in suitable conservation and utilization of water resource
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Adler, Jeffrey L., and Eknauth Persaud. "Knowledge Acquisition for Large-Scale Expert Systems in Transportation." Transportation Research Record: Journal of the Transportation Research Board 1651, no. 1 (1998): 59–65. http://dx.doi.org/10.3141/1651-09.

Der volle Inhalt der Quelle
Annotation:
One of the greatest challenges in building an expert system is obtaining, representing, and programming the knowledge base. As the size and scope of the problem domain increases, knowledge acquisition and knowledge engineering become more challenging. Methods for knowledge acquisition and engineering for large-scale projects are investigated in this paper. The objective is to provide new insights as to how knowledge engineers play a role in defining the scope and purpose of expert systems and how traditional knowledge acquisition and engineering methods might be recast in cases where the exper
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Kart, Özge, Alp Kut, and Vladimir Radevski. "Decision Support System For A Customer Relationship Management Case Study." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 2 (2014): 88. http://dx.doi.org/10.11591/ijict.v3i2.pp88-96.

Der volle Inhalt der Quelle
Annotation:
<span lang="EN-US">Data mining is a computational approach aiming to discover hidden and valuable information in large datasets. It has gained importance recently in the wide area of computational among which many in the domain of Business Informatics. This paper focuses on applications of data mining in Customer Relationship Management (CRM). The core of our application is a classifier based on the naive Bayesian classification. The accuracy rate of the model is determined by doing cross validation. The results demonstrated the applicability and effectiveness of the proposed model. Naiv
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Rhodus*, Tim, and Bud Witney. "Developing New Approaches and Tools for Improved Management and Delivery of Online Digital Photos." HortScience 39, no. 4 (2004): 875C—875. http://dx.doi.org/10.21273/hortsci.39.4.875c.

Der volle Inhalt der Quelle
Annotation:
More and more of the Department's academic and outreach communications on the Internet involve the use of digital photos. While enhancing visual appeal and conveying information that cannot be communicated via text is an obvious benefit, it is critical that digital collections be efficiently and effectively managed at the client level (personal workstation) and also the server level. To assist faculty and staff who routinely publish on the web and those who contribute to the Ohio State Univ.'s WebGarden online image database, a new client application was developed to assist in viewing and orga
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Cresswell, Stephen N., Thomas L. McCluskey, and Margaret M. West. "Acquiring planning domain models using LOCM." Knowledge Engineering Review 28, no. 2 (2013): 195–213. http://dx.doi.org/10.1017/s0269888912000422.

Der volle Inhalt der Quelle
Annotation:
AbstractThe problem of formulating knowledge bases containing action schema is a central concern in knowledge engineering for artificial intelligence (AI) planning. This paper describes Learning Object-Centred Models (LOCM), a system that carries out the automated generation of a planning domain model from example training plans. The novelty of LOCM is that it can induce action schema without being provided with any information about predicates or initial, goal or intermediate state descriptions for the example action sequences. Each plan is assumed to be a sound sequence of actions; each acti
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Santhanavanich, T., P. Wuerstle, J. Silberer, V. Loidl, P. Rodrigues, and V. Coors. "3D SAFE ROUTING NAVIGATION APPLICATION FOR PEDESTRIANS AND CYCLISTS BASED ON OPEN SOURCE TOOLS." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences VI-4/W2-2020 (September 15, 2020): 143–47. http://dx.doi.org/10.5194/isprs-annals-vi-4-w2-2020-143-2020.

Der volle Inhalt der Quelle
Annotation:
Abstract. The recent advancement in Information & Communication Technology (ICT) is seen as a critical enabler to design intelligent smart cities targeting different domains. One such domain is modes of transport in a city. Currently, various cities around the world are envisioning innovative ways to reduce emissions in the cities by increasing physically active mobility. However, there is still limited information about the safety of cyclists and pedestrians within city limits. To address this, we develop a 3D web-based safe routing tool called Vision Zero. Our concept prototype used
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

S, Priyadharshini, and Catherine Joy. R. "Design and Implementation of an Automated Hotel Management System." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 37–42. http://dx.doi.org/10.35940/ijeat.e2569.0610521.

Der volle Inhalt der Quelle
Annotation:
The aim of an automated hotel management system is to handle all aspects of the hotel's information and booking system. This application attempted to cover all operations that occur in residential hotels. It is all identified, from employee management to booking, floors, offices, and room type management, among other things. We sought to demonstrate how data/information is processed in hotels in our project, automated Hotel Management System. The hotel management overview was achieved by splitting the project into different modules. Customers are offered various facilities such as check-in, ch
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Pandey, Divyanshu, Adithya Venugopal, and Harry Leib. "Multi-Domain Communication Systems and Networks: A Tensor-Based Approach." Network 1, no. 2 (2021): 50–74. http://dx.doi.org/10.3390/network1020005.

Der volle Inhalt der Quelle
Annotation:
Most modern communication systems, such as those intended for deployment in IoT applications or 5G and beyond networks, utilize multiple domains for transmission and reception at the physical layer. Depending on the application, these domains can include space, time, frequency, users, code sequences, and transmission media, to name a few. As such, the design criteria of future communication systems must be cognizant of the opportunities and the challenges that exist in exploiting the multi-domain nature of the signals and systems involved for information transmission. Focussing on the Physical
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Munkhdalai, Lkhagvadorj, Tsendsuren Munkhdalai, Oyun-Erdene Namsrai, Jong Lee, and Keun Ryu. "An Empirical Comparison of Machine-Learning Methods on Bank Client Credit Assessments." Sustainability 11, no. 3 (2019): 699. http://dx.doi.org/10.3390/su11030699.

Der volle Inhalt der Quelle
Annotation:
Machine learning and artificial intelligence have achieved a human-level performance in many application domains, including image classification, speech recognition and machine translation. However, in the financial domain expert-based credit risk models have still been dominating. Establishing meaningful benchmark and comparisons on machine-learning approaches and human expert-based models is a prerequisite in further introducing novel methods. Therefore, our main goal in this study is to establish a new benchmark using real consumer data and to provide machine-learning approaches that can se
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Alshaer, Abdulaziz, David O’Hare, Philippe Archambault, Mark Shirley, and Holger Regenbrecht. "How to Observe Users’ Movements in Virtual Environments: Viewpoint Control in a Power Wheelchair Simulator." Human Factors: The Journal of the Human Factors and Ergonomics Society 62, no. 4 (2019): 656–70. http://dx.doi.org/10.1177/0018720819853682.

Der volle Inhalt der Quelle
Annotation:
Objective We describe a networked, two-user virtual reality (VR) power wheelchair (PWC) simulator system in which an actor (client) and an observer (clinician) meet. We then present a study with 15 observers (expert clinicians) evaluating the effect of three principal forms of viewpoint control (egocentric-egomotion, egocentric-tethered, and client-centric) on the observer’s assessment of driving tasks in a virtual environment (VE). Background VR allows for the simulation and assessment of real-world tasks in a controlled, safe, and repeatable environment. Observing users’ movement behavior in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Telagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan, and Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server." International Journal of Online Engineering (iJOE) 13, no. 11 (2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.

Der volle Inhalt der Quelle
Annotation:
A remote monitoring and control are one of the most important criteria for maximizing the production in any industry. With the development of modern industry the requirement for industrial monitoring system is getting higher. This project explains the real time scenario of monitoring temperature and humidity in industries. National Instruments my RIO is used and results are observed on Lab VIEW and VI Server. The server VI program and client VI program is developed in block diagram for the two sensor data. This proposed system develops a sensor interface device essential for sensor data acquis
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Manvi, Sunilkumar S. "Resource Monitoring for Wireless Sensor Networks using ANFIS." Journal of Applied Computer Science Methods 8, no. 1 (2016): 41–67. http://dx.doi.org/10.1515/jacsm-2016-0004.

Der volle Inhalt der Quelle
Annotation:
Abstract Wireless sensor networks (WSNs) are usually a resource constrained networks which have limited energy, bandwidth, processing power, memory etc. These networks are now part of Internet by the name Internet of Things (IoT). To get many services from WSNs, we may need to run many applications in the sensor nodes which consumes resources. Ideally, the resources availability of all sensor nodes should be known to the sink before it requests for any further service(s) from the sensor node(s). Hence, continuous monitoring of the resources of the sensor nodes by the sink is essential. The pro
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Hong, Yang, David Gochis, Jiang-tao Cheng, Kuo-lin Hsu, and Soroosh Sorooshian. "Evaluation of PERSIANN-CCS Rainfall Measurement Using the NAME Event Rain Gauge Network." Journal of Hydrometeorology 8, no. 3 (2007): 469–82. http://dx.doi.org/10.1175/jhm574.1.

Der volle Inhalt der Quelle
Annotation:
Abstract Robust validation of the space–time structure of remotely sensed precipitation estimates is critical to improving their quality and confident application in water cycle–related research. In this work, the performance of the Precipitation Estimation from Remotely Sensed Information using Artificial Neural Networks-Cloud Classification System (PERSIANN-CCS) precipitation product is evaluated against warm season precipitation observations from the North American Monsoon Experiment (NAME) Event Rain Gauge Network (NERN) in the complex terrain region of northwestern Mexico. Analyses of hou
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Ouedraogo, Moussa, Haralambos Mouratidis, Eric Dubois, and Djamel Khadraoui. "Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality." International Journal of Handheld Computing Research 2, no. 4 (2011): 59–81. http://dx.doi.org/10.4018/jhcr.2011100104.

Der volle Inhalt der Quelle
Annotation:
Today’s IT systems are ubiquitous and take the form of small portable devices, to the convenience of the users. However, the reliance on this technology is increasing faster than the ability to deal with the simultaneously increasing threats to information security. This paper proposes metrics and a methodology for the evaluation of operational systems security assurance that take into account the measurement of security correctness of a safeguarding measure and the analysis of the security criticality of the context in which the system is operating (i.e., where is the system used and/or what
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Der volle Inhalt der Quelle
Annotation:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection sy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Fierro Abella, Jorge Alberto. "Nombre de dominios y otros signos distintivos. Aproximación teórica y análisis practico." Revista Jurídica Piélagus 6 (December 3, 2007): 39–63. http://dx.doi.org/10.25054/16576799.579.

Der volle Inhalt der Quelle
Annotation:
El desarrollo de la llamada red de redes o internet ha supuesto un cambio sustancial en la forma de entender las relaciones comerciales. La extensión del acceso a aquella a un número cada vez mayor de agentes económicos, unido a un crecimiento continuo de los contenidos de toda índole disponibles en la red, implica que la facilidad con que se acceda a la información de una determinada compañía tenga un elevado valor. El objetivo de este documento de reflexión es ofrecer en primer lugar, un panorama general del marco teórico en el que se desarrolla la actividad de registro de nombres de dominio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Khan, Basit, Sabine Banzhaf, Edward C. Chan, et al. "Development of an atmospheric chemistry model coupled to the PALM model system 6.0: implementation and first applications." Geoscientific Model Development 14, no. 2 (2021): 1171–93. http://dx.doi.org/10.5194/gmd-14-1171-2021.

Der volle Inhalt der Quelle
Annotation:
Abstract. In this article we describe the implementation of an online-coupled gas-phase chemistry model in the turbulence-resolving PALM model system 6.0 (formerly an abbreviation for Parallelized Large-eddy Simulation Model and now an independent name). The new chemistry model is implemented in the PALM model as part of the PALM-4U (PALM for urban applications) components, which are designed for application of the PALM model in the urban environment (Maronga et al., 2020). The latest version of the Kinetic PreProcessor (KPP, 2.2.3) has been utilized for the numerical integration of gas-phase
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Pustišek, Matevž, Dejan Dolenc, and Andrej Kos. "LDAF: Low-Bandwidth Distributed Applications Framework in a Use Case of Blockchain-Enabled IoT Devices." Sensors 19, no. 10 (2019): 2337. http://dx.doi.org/10.3390/s19102337.

Der volle Inhalt der Quelle
Annotation:
In this paper, we present Low-Bandwidth Distributed Applications Framework (LDAF)—an application-aware gateway for communication-constrained Internet of things (IoT) devices. A modular approach facilitates connecting to existing cloud backend servers and managing message formats and APIs’ native application logic to meet the communication constraints of resource-limited end devices. We investigated options for positioning the LDAF server in fog computing architectures. We demonstrated the approach in three use cases: (i) a simple domain name system (DNS) query from the device to a DNS server,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Vats, Satvik, and B. B. Sagar. "An independent time optimized hybrid infrastructure for big data analytics." Modern Physics Letters B 34, no. 28 (2020): 2050311. http://dx.doi.org/10.1142/s021798492050311x.

Der volle Inhalt der Quelle
Annotation:
In Big data domain, platform dependency can alter the behavior of the business. It is because of the different kinds (Structured, Semi-structured and Unstructured) and characteristics of the data. By the traditional infrastructure, different kinds of data cannot be processed simultaneously due to their platform dependency for a particular task. Therefore, the responsibility of selecting suitable tools lies with the user. The variety of data generated by different sources requires the selection of suitable tools without human intervention. Further, these tools also face the limitation of recour
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Konan, Martin, and Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN." Sensors 19, no. 7 (2019): 1608. http://dx.doi.org/10.3390/s19071608.

Der volle Inhalt der Quelle
Annotation:
The current advances in cloud-based services have significantly enhanced individual satisfaction in numerous modern life areas. Particularly, the recent spectacular innovations in the wireless body area networks (WBAN) domain have made e-Care services rise as a promising application field, which definitely improves the quality of the medical system. However, the forwarded data from the limited connectivity range of WBAN via a smart device (e.g., smartphone) to the application provider (AP) should be secured from an unapproved access and alteration (attacker) that could prompt catastrophic cons
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Facco Rodrigues, Vinicius, Ivam Guilherme Wendt, Rodrigo da Rosa Righi, Cristiano André da Costa, Jorge Luis Victória Barbosa, and Antonio Marcos Alberti. "Brokel: Towards enabling multi-level cloud elasticity on publish/subscribe brokers." International Journal of Distributed Sensor Networks 13, no. 8 (2017): 155014771772886. http://dx.doi.org/10.1177/1550147717728863.

Der volle Inhalt der Quelle
Annotation:
Internet of Things networks together with the data that flow between networked smart devices are growing at unprecedented rates. Often brokers, or intermediaries nodes, combined with the publish/subscribe communication model represent one of the most used strategies to enable Internet of Things applications. At scalability viewpoint, cloud computing and its main feature named resource elasticity appear as an alternative to solve the use of over-provisioned clusters, which normally present a fixed number of resources. However, we perceive that today the elasticity and Pub/Sub duet presents seve
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Mekkanen, Mike, and Kimmo Kauhaniemi. "Wireless Light-Weight IEC 61850 Based Loss of Mains Protection for Smart Grid." Open Engineering 8, no. 1 (2018): 182–92. http://dx.doi.org/10.1515/eng-2018-0022.

Der volle Inhalt der Quelle
Annotation:
Abstract This paper presents a novel Loss of Mains (LoM) protection method based on IEC 61850 Manufacturing Messages Specification (MMS) protocol over wireless Global System for Mobile Communication (GSM) based access point name (APN) mechanism. LoM or anti islanding protection is a key requirement in modern power distribution grids where there is significant amount of distributed energy resources (DER). The future Smart Grids are based on extensive communication capabilities and thus the communication based LoM approaches will also become dominant. The IEC 61850 standard based systems are gai
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Maxwell, Deborah, Chris Speed, and Larissa Pschetz. "Story Blocks." Convergence: The International Journal of Research into New Media Technologies 23, no. 1 (2017): 79–97. http://dx.doi.org/10.1177/1354856516675263.

Der volle Inhalt der Quelle
Annotation:
Digital technology is changing, and has changed the ways we create and consume narratives, from moving images and immersive storyworlds to digital long-form and multi-branched story experiences. At the same time, blockchain, the technology that underpins cryptocurrencies such as Bitcoin, is revolutionizing the way that transactions and exchanges occur. As a globally stored and collaboratively written list of all transactions that have ever taken place within a given system, the blockchain decentralizes money and offers a platform for its creative use. There are already examples of blockchain t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Kocsis, Imre. "Blokklánc alkalmazási lehetőségek a biztonság területén és bevezetés-tervezésük." Scientia et Securitas 1, no. 1 (2020): 12–20. http://dx.doi.org/10.1556/112.2020.00003.

Der volle Inhalt der Quelle
Annotation:
Összefoglalás. A blokklánc-technológiákat első sikeres alkalmazásuk, a kriptopénzek tették híressé és hírhedté. Valódi jelentőségük azonban az általuk létrehozott új informatikai rendszerkategóriában, az adatbázis jellegű, több résztvevő által közösen hitelesen tartott elosztott főkönyvekben rejlik. A tanulmány ismerteti ezek alapelveit, jellemző üzleti alkalmazási mintáit és a „blokkláncosítást”, mint bevezetési stratégia tervezési elvet. Új eredményként a blokkláncosítás a biztonság területén alkalmazhatóságának megteremtéséhez felállításra kerül egy ismert példákon alapuló érték-modell. Sum
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Klots, Y. P., I. V. Muliar, V. M. Cheshun, and O. V. Burdyug. "USE OF DISTRIBUTED HASH TABLES TO PROVIDE ACCESS TO CLOUD SERVICES." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 85–95. http://dx.doi.org/10.17721/2519-481x/2020/67-09.

Der volle Inhalt der Quelle
Annotation:
In the article the urgency of the problem of granting access to services of distributed cloud system is disclosed, in particular, the peer distributed cloud system is characterized. The process of interaction of the main components is provided to access the domain name web resource. It is researched that the distribution of resources between nodes of a peer distributed cloud system with the subsequent provision of services on request is implemented using the Kademlia protocol on a local network or Internet and contains processes for publishing the resource at the initial stage of its owner, re
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Shen, Hong. "11 YEARS OF BIOSTEREOLOGY IN CHINA." Image Analysis & Stereology 19, no. 3 (2011): 157. http://dx.doi.org/10.5566/ias.v19.p157-161.

Der volle Inhalt der Quelle
Annotation:
Biostereology in China is very active. Here is a brief summary: Organization: The organization of biostereology in China was founded in Nov. 1988. Its name is Chinese Society of Biomedical Stereology (CSBS), and is affiliated to the Chinese Society for Stereology (CSS). The first joint president of CSS/BMC was Prof. Peixuan Tang, the second and now the third, is Prof. Dewen Wang. There are 556 registered members. Academic Congresses: Sessions of the National Biostereological Congress were convened in 1990, 1992, 1996 and 2000. Publications: Four works were written and published in China. One i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Jara, Antonio J., Miguel A. Zamora, and Antonio Skarmeta. "Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things." Mobile Information Systems 8, no. 3 (2012): 177–97. http://dx.doi.org/10.1155/2012/819250.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M) communication mechanism allowing global access to devices, sensors and smart objects. In this respect, the proposed answer to these technological requirements is called Glowbal IP, which is based on a homogeneous access to the devices/sensors offer
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!