To see the other types of publications on this topic, follow the link: History server.

Journal articles on the topic 'History server'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'History server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lacity, Mary C., Leslie P. Willcocks, and Ashok Subramanian. "A strategic client/server implementation: new technology, lessons from history." Journal of Strategic Information Systems 6, no. 2 (1997): 95–128. http://dx.doi.org/10.1016/s0963-8687(97)00009-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simanjuntak, Yohanes Albryan, and Alz Danny Wowor. "Optimalisasi Database Mysql Pada Sistem Perancangan Sistem Housekeeping Transaction History Dengan Pentaho Data Integration." Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) 6, no. 1 (2025): 30–37. https://doi.org/10.30645/kesatria.v6i1.542.

Full text
Abstract:
The volume of transaction data in the banking industry is growing with the increase in customers and transaction complexity. Ineffi-cient data management can lead to server overload, affect system performance, and hinder the delivery of fast, accurate services. Housekeeping processes are needed to move inactive data to sepa-rate storage, allowing the main server to function more efficiently. Pentaho Data Integration (PDI) offers an effective solution for man-aging the ETL (Extract, Transform, Load) process, which is crucial for data housekeeping. This research aims to optimize the manage-ment of banking transaction data using PDI to reduce server load and improve operational efficiency. This quantitative study applies an experimental method, with the ETL process managing Bank XYZ’s transaction data older than six months. The study uses trans-action data from Bank XYZ’s MySQL server, which will be trans-ferred to a data warehouse. The analysis applies clustering algo-rithms to filter and separate active from inactive transactions. The implementation of PDI for housekeeping effectively reduces server load and improves data management efficiency, significantly lower-ing processing time. The combined use of clustering algorithms and PDI delivers substantial improvements in managing banking transac-tion data, enhancing operational efficiency while significantly re-ducing the load on the main server
APA, Harvard, Vancouver, ISO, and other styles
3

Johns, Adrian. "Orders of Service: Markus Krajewski, The Server." Technology and Culture 61, no. 2 (2020): 682–85. http://dx.doi.org/10.1353/tech.2020.0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Suliman, Suliman, Andani Achmad, and Adnan Adnan. "IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN." semanTIK 7, no. 1 (2021): 17. http://dx.doi.org/10.55679/semantik.v7i1.17953.

Full text
Abstract:
Sistem keamanan jaringan semakin hari kian makin berkembang, begitu pula serangan pada sistem jaringan yang berbeda-beda metode dan perkembangannya, khususnya pada server yang menjadi pengendali utama dalam sistem jaringan menjadi target utama. Oleh karena itu pentingnya menggunakan sistem keamanan jaringan dalam mendeteksi dan menggagalkan serangan.Metode serangan yang digunakan adalah Distributed Denial of Service (DDoS attack) dengan berbagai jenis serangan seperti DDoS attack request flooding, DDoS attack traffick flooding, DDoS brute force attack dan DDoS attack SQL injection. Sedangkan untuk mendeteksi dan menggagalkan serangan yaitu menggunakan metode honeypot dan port knocking yang akan berkolaborasi dalam mengamankan sistem server jaringan pada sistem operasi Windows. Hasil saat dilakukan 5 kali proses pengujian sebelum serangan rata-rata performance kinerja CPU usage history (5%-18%) dan networking LAC (1%-5%). Setelah serangan CPU usage history (72%-90%) dan networking LAC (22%-32%). Sedangkan pada saat ada serangan namun server jaringan sudah terpasang honeypot dan port knocking performance kinerja CPU usage history menjadi stabil mencapai rata-rata (5%-21%) dan networking LAC (1%-6%).Kata kunci; Server Jaringan, DDoS Attack, Honeypot dan Port Knocking
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Yage, Bei Gong, ZhiJuan Jia, YanYan Yang, Yuchu He, and Xiaofei Zhang. "Efficient and Secure Cross-Domain Sharing of Blockchain Electronic Medical Records Based on Edge Computing." Security and Communication Networks 2021 (November 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/7310771.

Full text
Abstract:
In this article, we analysed the problems of electronic medical records (EMRs) and found that the EMRs generated by different hospitals for the same patient are mutually independent and duplication and data sharing are difficult among hospitals. In order to solve this problem, this paper proposes an efficient and secure cross-domain sharing scheme of EMRs based on edge computing. The program allows the doctor to access the personal history EMRs through the patient’s authorization so that the doctor can understand the patient’s history of illness and, on this basis, generate a new medical record for the patient. Then, the doctor sends the EMRs to the edge server, and the server calculates the ciphertext and adds it to the patient’s personal medical record to complete the case update. Analysis shows that this solution can effectively prevent data tampering and forgery through blockchain and avoid privacy leakage problems in plaintext sharing by using searchable encryption and by relying on edge servers to solve nearby computing tasks and divert the computing capacity of cloud servers to improve efficiency. The security proof shows that the scheme satisfies the complex problem of the BDH assumption. Performance analysis shows that the scheme is feasible and efficient.
APA, Harvard, Vancouver, ISO, and other styles
6

Qasim, T. Zaidi. "The Case of Exchange Logs – A Deep Dive." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 11–17. https://doi.org/10.5281/zenodo.7842176.

Full text
Abstract:
<strong>Abstract:</strong> This article gives you important guidelines for analyzing the logs of Microsoft Exchange Servers. Microsoft Exchange Server is an On-Premises email service which is often deployed by large organizations to have autonomy over business communication. Logs are an important part of any Information Technology&rsquo;s analysis of any tracking, troubleshooting, and incident handling; email server logs analysis is key to getting to the bottom line faster and more efficiently. While not all logs are useful, some can be very handy for any case and email administrator may be working on. This research paper dives into those critical logs of Exchange Server which every administrator must be familiar with. <strong>Keywords:</strong> Exchange Server Logs, Log Analysis, Email Service troubleshooting, Client Connectivity, Exchange Commandlet History, Exchange Admin Center. <strong>Title:</strong> The Case of Exchange Logs &ndash; A Deep Dive <strong>Author:</strong> Qasim T. Zaidi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 2, April 2023 - June 2023</strong> <strong>Page No: 11-17</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 18-April-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7842176</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/the-case-of-exchange-logs--a-deep-dive</strong>
APA, Harvard, Vancouver, ISO, and other styles
7

Suliman, Achmad Andani, and Adnan. "IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN." semanTIK Volume 7 No 1 Jan-Jun 2021 (June 30, 2021): 17–26. https://doi.org/10.5281/zenodo.5034918.

Full text
Abstract:
Sistem keamanan jaringan semakin hari kian makin berkembang, begitu pula serangan pada sistem jaringan yang berbeda-beda metode dan perkembangannya, khususnya pada <em>server</em> yang menjadi pengendali utama dalam sistem jaringan menjadi target utama. Oleh karena itu pentingnya menggunakan sistem keamanan jaringan dalam mendeteksi dan menggagalkan serangan. Metode serangan yang digunakan adalah <em>Distributed Denial of Service</em> (<em>DDoS attack</em>) dengan berbagai jenis serangan seperti <em>DDoS attack request flooding</em>, <em>DDoS attack traffick flooding</em>, <em>DDoS brute force attack</em> dan<em> DDoS attack SQL injection. </em>Sedangkan untuk mendeteksi dan menggagalkan serangan yaitu menggunakan metode <em>honeypot</em> dan <em>port knocking</em> yang akan berkolaborasi dalam mengamankan sistem <em>server</em> jaringan pada sistem operasi Windows. Hasil saat dilakukan 5 kali proses pengujian sebelum serangan rata-rata <em>performance</em> kinerja <em>CPU usage history</em> (5%-18%) dan <em>networking LAC</em> (1%-5%). Setelah serangan, <em>CPU usage history</em> (72%-90%) dan <em>networking LAC</em> (22%-32%). Sedangkan pada saat ada serangan namun <em>server</em> jaringan sudah terpasang <em>honeypot</em> dan <em>port knocking performance </em>kinerja <em>CPU usage history</em> menjadi stabil mencapai rata-rata (5%-21%) dan <em>networking LAC</em> (1%-6%)
APA, Harvard, Vancouver, ISO, and other styles
8

Ismail, Leila, and Huned Materwala. "Blockchain Paradigm for Healthcare: Performance Evaluation." Symmetry 12, no. 8 (2020): 1200. http://dx.doi.org/10.3390/sym12081200.

Full text
Abstract:
Electronic health records (EHRs) have become a popular method to store and manage patients’ data in hospitals. Sharing these records makes the current healthcare data management system more accurate and cost-efficient. Currently, EHRs are stored using the client/server architecture by which each hospital retains the stewardship of the patients’ data. The records of a patient are scattered among different hospitals using heterogeneous database servers. These limitations constitute a burden towards a personalized healthcare, when it comes to offering a cohesive view and a shared, secure and private access to patients’ health history for multiple allied professionals and the patients. The data availability, privacy and security characteristics of the blockchain have a propitious future in the healthcare presenting solutions to the complexity, confidentiality, integrity, interoperability and privacy issues of the current client/server architecture-based EHR management system. This paper analyzes and compares the performance of the blockchain and the client/server paradigms. The results reveal that notable performance can be achieved using blockchain in a patient-centric approach. In addition, the immutable and valid patients’ data in the blockchain can aid allied health professionals in better prognosis and diagnosis support through machine learning and artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Rakesh, and Boris Grot. "Shooting Down the Server Front-End Bottleneck." ACM Transactions on Computer Systems 38, no. 3-4 (2020): 1–30. http://dx.doi.org/10.1145/3484492.

Full text
Abstract:
The front-end bottleneck is a well-established problem in server workloads owing to their deep software stacks and large instruction footprints. Despite years of research into effective L1-I and BTB prefetching, state-of-the-art techniques force a trade-off between metadata storage cost and performance. Temporal Stream prefetchers deliver high performance but require a prohibitive amount of metadata to accommodate the temporal history. Meanwhile, BTB-directed prefetchers incur low cost by using the existing in-core branch prediction structures but fall short on performance due to BTB’s inability to capture the massive control flow working set of server applications. This work overcomes the fundamental limitation of BTB-directed prefetchers, which is capturing a large control flow working set within an affordable BTB storage budget. We re-envision the BTB organization to maximize its control flow coverage by observing that an application’s instruction footprint can be mapped as a combination of its unconditional branch working set and, for each unconditional branch, a spatial encoding of the cache blocks around the branch target. Effectively capturing a map of the application’s instruction footprint in the BTB enables highly effective BTB-directed prefetching that outperforms the state-of-the-art prefetchers by up to 10% for equivalent storage budget.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Chenfeng, Christopher Leckie, and Kotagiri Ramamohanarao. "Protecting SIP server from CPU-based DoS attacks using history-based IP filtering." IEEE Communications Letters 13, no. 10 (2009): 800–802. http://dx.doi.org/10.1109/lcomm.2009.090840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Marwan, Marwan, and Jordy Lasmana Putra. "PERANCANGAN NETWORK MONITORING SYSTEM (NMS) DAN SYSLOG SERVER MENGGUNAKAN LIBRENMS PADA PT. MAXINDO MITRA SOLUSI." JOURNAL OF APPLIED MULTIMEDIA AND NETWORKING 7, no. 2 (2023): 55–61. http://dx.doi.org/10.30871/jamn.v7i2.6684.

Full text
Abstract:
Perkembangan internet telah menjadi bagian penting dalam kehidupan modern, dan memiliki peran yang signifikan dalam membentuk dunia digital saat ini. PT Maxindo Mitra Solusi sebagai salah satu perusahaan penyedia jasa layanan internet yang tentunya perlu memiliki intrastruktur yang sangat baik, pemantauan kondisi jaringan memerlukan aplikasi yang disebut dengan istilah Network Monitoring System (NMS) dan Syslog Server diperlukan untuk memantau perangkat jaringan pelanggan seperti router, switch, access point dan juga server. Permasalahan yang dialami pihak administrator jaringan saat ini yaitu kurangnya informasi detail seperti resource CPU Load dan history log pada setiap perangkat target yang dimonitoring. Penelitian ini bertujuan untuk memberikan rancangan sebuah sistem pemantauan jaringan dan Syslog server pada PT Maxindo Mitra Solusi, dan manfaat dari penelitian ini dapat meningkatkan pelayanan terhadap jaringan pelanggan dengan cara memberikan pemantauan secara berkala. LibreNMS sebagai salah satu aplikasi sistem pemantauan jaringan berbasis Simple Network Management Protocol (SNMP), yang cukup banyak menyediakan fitur dukungan untuk monitoring jaringan pelanggan. Salah satu fitur dukungan tersebut ialah Syslog Server, yang dapat memberikan informasi history log pada setiap perangkat target yang dimonitoring. Dari hasil uji coba yang dilakukan terhadap penelitian ini, LibreNMS berpotensi dapat memberikan sistem pemantauan yang baik dan membantu pihak administrator jaringan dalam melakukan perbaikan dini terhadap gangguan yang terjadi pada jaringan pelanggan.
APA, Harvard, Vancouver, ISO, and other styles
12

Adi, Wiranata, Sarkadi, and Ibrahim Nurzengky. "THE INFLUENCE OF INQUIRY LEARNING MODEL AND LEARNING MOTIVATION ON RESULTS LEARNING HISTORY AT STATE 6 HIGH SCHOOL BANDAR LAMPUNG." International Journal of Engineering Technologies and Management Research 6, no. 7 (2019): 74–78. https://doi.org/10.5281/zenodo.3341539.

Full text
Abstract:
To assist a solution to the problem of the test environment spanning multiple platforms, this paper proposes a decision support framework with the blackboard model to integrate all complementary features into a single automated test environment for multi-platform client/server applications. Before testing client/server applications, the input into this framework are testing tools with different approaches and client sites which are going to run the test. The planning agent will make a decision dynamically and produce a testing plan to allocate testing tasks to these testing tools to client sites. Two complementary features for testing client/server applications are illustrated in this paper to demonstrate how the framework works. The concept of mobile agents is applied to launch the test driver to different client sites, execute the tests and bring back the test results from client sites as well as the trace file from the server site for inspecting the interaction behavior among clients. Based on the multicast framework, the same test data can be broadcasted to multiple clients sites to run the tests simultaneously and the test results can be returned from client sites for examining the problem of repeated executions.
APA, Harvard, Vancouver, ISO, and other styles
13

Ismail, Sura F., and Dheyaa Jasim Kadhim. "Adaptive BBU Migration Based on Deep Q-Learning for Cloud Radio Access Network." Applied Sciences 15, no. 7 (2025): 3494. https://doi.org/10.3390/app15073494.

Full text
Abstract:
The efficiency of the current cellular network is limited due to the imbalance between resource availability and traffic demand. To overcome these limitations, baseband units (BBUs) are deployed on virtual machines (VMs) to form a virtual pool of BBUs. This setup enables the pooling of hardware resources, reducing the costs associated with building base stations (BSs) and simplifying both management and control. However, extreme levels of server resource use within the pool can increase physical maintenance costs and impact virtual BBU performance. This study introduces an adaptive, threshold-based dynamic migration strategy for virtual BBUs within the iCanCloud framework by setting upper and lower limits on the servers’ resource usage in the pool. The proposed method determines whether to initiate a migration by evaluating resource usage on each compute node and identifies the target node for migration if required. This aims to balance server load and cut energy consumption, and also to avoid unnecessary migration because of too high or too low server load, and effectively determine the time to trigger migration and not depend only on a certain instantaneous peak of server resource utilization. This paper used a deep Q-network learning method to predict resource utilization and make an accurate migration decision based on a history dataset. Experimental results show that as compared with Kalman filter prediction and other traditional methods, this model can effectively lower the cost of VM migration by decreasing the migration time and occurrence of it to enhance overall performance while reducing energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
14

P, Kishore, and B. M. Mahendra. "Evolution of Client-Side Rendering over Server-Side Rendering." Recent Trends in Information Technology and its Application 3, no. 2 (2020): 1–10. https://doi.org/10.5281/zenodo.3930215.

Full text
Abstract:
<em>Modern day web applications have become vital part of our daily ecosystem with ever demanding client needs. In today&rsquo;s time web applications do a lot more work than just displaying static data. Thus, it becomes important that the web applications are robust, highly available and responsive. Since most legacy applications are based on server-side rendering which causes full page to reload, memory leaks and thus hindering the performance of the application. Thus, with the help of client-side rendering, major shortcomings like responsiveness, memory leaks, slow reloads can be overcome. In this paper, we discuss the history of server-side rendering and usage of server-side rendering in the past decade. The paper features a portion of the key highlights of client-side techniques, programming paradigms and frameworks.&nbsp; It features fully modularized view layer with efficient state management techniques with the help of flux architecture, observer-observable techniques, reactive and functional programming for better flow and code maintainability. It concludes with exercises gained from surveys and a standpoint of work which is going on in recent times.</em>
APA, Harvard, Vancouver, ISO, and other styles
15

Chandran, Deepak R. "Securing User Authentication with Server-Side Voice Verification." Journal of Computer and Communications 11, no. 05 (2023): 137–50. http://dx.doi.org/10.4236/jcc.2023.115010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ardiyanto, Yudhi, and Muhamad Yusvin Mustar. "Color Blindness Testing Using A Client-Server Based on The Ishihara Method." Journal of Electrical Technology UMY 4, no. 2 (2020): 46–52. http://dx.doi.org/10.18196/jet.v4i2.10993.

Full text
Abstract:
The Ishihara method is one way to detect whether or not someone suffers from color blindness. This method possesses several sets of plates or circle patterns containing various combinations of colored dots and sizes, forming numbers visible for people with normal eyes. A collection of several plates with the name Ishihara book is available in the market. However, the book has a weakness for being easily damaged or faded in color. Although there are some shortcomings, several researchers have developed applications to anticipate those weaknesses. Being unable to be used by several people at once and the test history has not been adequately archived, are several examples of shortcomings of existing applications. This study aims to create a client-server-based color blindness testing mobile application. The system can provide real-time test results, and detailed test history is presented. Another feature is the push notification menu that sends messages to all users. This application has been designed and implemented successfully. Thereby, it can be used for a color blindness test before conducting a medical examination.
APA, Harvard, Vancouver, ISO, and other styles
17

Akbar, Lalu A. Syamsul Irfan, Rayasa Puringgar Prasadha Putra, and Suthami Ariessaputra. "WEBSITE INTERFACE MONITORING CLIENT ACTIVITIES USING MIKROTIK ON UBUNTU SERVER 18.04 LTS." DIELEKTRIKA 10, no. 1 (2023): 41–51. http://dx.doi.org/10.29303/dielektrika.v10i1.332.

Full text
Abstract:
Internet network is beneficial to be able to support the needs of the learning process. However, a large number of internet users, for example, who access university data, can cause weaknesses in a system, making it very vulnerable to data theft, damage, and leakage of confidential documents. The obstacle faced is that the internet is getting slower due to many users using the internet network and not knowing the amount of bandwidth usage. A system is needed to determine the bandwidth usage for each client. This system To simplify the process of monitoring the internet network. It can view client browsing history and block website domains so that internet users in the world of education have positive characteristics and the internet is not slow. In this system, the admin will monitor the use of internet clients connected to the campus environment through the user name and password obtained for each student. The results of this research are the creation of an internet monitoring system for a proxy to monitor the maximum amount of bandwidth usage for each client, view the client's browsing history, and block website domains and client IPs. The admin can observe the internet network and monitor client activity that uses the internet network in the campus environment using the monitoring application.
APA, Harvard, Vancouver, ISO, and other styles
18

Xudong, Zhu, Yin Yang, Liu Zhenjun, and Shao Fang. "C-Aware: A Cache Management Algorithm Considering Cache Media Access Characteristic in Cloud Computing." Mathematical Problems in Engineering 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/867167.

Full text
Abstract:
Data congestion and network delay are the important factors that affect performance of cloud computing systems. Using local disk of computing nodes as a cache can sometimes get better performance than accessing data through the network. This paper presents a storage cache placement algorithm—C-Aware, which traces history access information of cache and data source, adaptively decides whether to cache data according to cache media characteristic and current access environment, and achieves good performance under different workload on storage server. We implement this algorithm in both simulated and real environments. Our simulation results using OLTP and WebSearch traces demonstrate that C-Aware achieves better adaptability to the changes of server workload. Our benchmark results in real system show that, in the scenario where the size of local cache is half of data set, C-Aware gets nearly 80% improvement compared with traditional methods when the server is not busy and still presents comparable performance when there is high workload on server side.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Ying Hua. "Design of Supervisory Control System for Welding Robot Product Line." Advanced Materials Research 971-973 (June 2014): 1187–90. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1187.

Full text
Abstract:
To improve the management level of welding robot product line, a supervisory control system based on C/S(Client/Server) and B/S(Browser/Server) hybrid structure is designed to use for INSPEC configuration software. The system connects the isolated welding robot stations through industrial Ethernet and PPI. The system achieves real-time monitoring and alarm management. It also provides production report function and history record function. The system has already gone into service and the result data have shown its high accuracy and strong reliability in experiments.
APA, Harvard, Vancouver, ISO, and other styles
20

Trivedi, Nripesh. "Implementation of Anonymous social network." International Journal of Scientific Research and Management (IJSRM) 12, no. 01 (2024): 1016–17. http://dx.doi.org/10.18535/ijsrm/v12i01.ec03.

Full text
Abstract:
This paper describes a implementation of a server-client model that could be used as anonymous social network. It could be used for n clients. The anonymity of client is ensured on server side. The scheme implemented in this paper was proposed by Dr. Hamza Harkous and Dr. Rameez Rahman. The scheme was proposed for trusted users where users trust each other.
APA, Harvard, Vancouver, ISO, and other styles
21

Akki, Praveena, and V. Vijayarajan. "An efficient mobility prediction model for resource allocation in mobile cloud computing." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 1 (2021): 149–57. http://dx.doi.org/10.3233/kes-210060.

Full text
Abstract:
Mobile cloud computing (MCC) is a technology which provides cloud server resources to mobile users with optimized latency. MCC allows mobile device to access cloud resources and to offload tasks to cloud let servers at any time and from anywhere. The cloud let servers are attached to wireless Access points. But mobility plays an important role which leads to the loss of connectivity of mobile devices because of varying signal strengths. On the other hand, optimal code execution is a challenge. In this paper, a connectivity base mobility prediction method is proposed to assign the cloud resources to the user without loss in the connection. The past accessing history of the users and path loss factors are taken into consideration to predict proper access point. From the performance evaluation the performance of the proposed method is increased by 15.23% when compared to other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
22

Wulandari, Heni, Suherman Suherman, and Razali Razali. "PELATIHAN ADMINISTRASI SISTEM JARINGAN BERBASIS WINDOWS PADA GURU DAN SISWA (STUDI KASUS: SEKOLAH SMK MADANI MARENDAL I)." RESWARA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (2022): 185–90. http://dx.doi.org/10.46576/rjpkm.v3i1.1637.

Full text
Abstract:
Administarsi Sistem Jaringan merupakan salah satu mata pelajaran wajib pada paket keahlian TKJ. Pada pembelajaran tersebut mempelajari hal teknik tentang bagaimana cara administrasi server dalam sebuah jaringan. Sekolah SMK Madani Marendal I salah satu SMK di Marendal yang memiliki program keahlian Teknik Komputer dan Jaringan (TKJ) yang berfokus pada bidang Teknologi Informasi dan Komunikasi. SMK Madani Marendal I belum menerapkan administrasi sistem jaringan pada sekolah tersebut, khususnya pada lab komputer. Pelatihan administrasi sistem jaringan pada guru dan peserta didik diharapkan dapat memberikan pemahaman teori dan praktik tentang konsep serta implementasi dalam membangun server dengan sistem operasi berbasis windows. Pelatihan dilaksanakan selama satu hari dengan 3 sesi yaitu setiap sesi dilaksanakan selama 2 jam. Penyusunan pelatihan administrasi sistem jaringan berbasis windows di sekolah SMK Madani Marendal I berjalan dengan baik dan mudah. Hal ini dapat dilihat dari dari evaluasi angket yang dilakukan yaitu 90% menyatakan SS (sangat setuju) serta dapat dilihat dari berhasilnya guru dan peserta didik dalam melakukan konfigurasi DHCP Server, FTP Server dan Remote Server di lab komputer di sekolah SMK Madani Marendal I
APA, Harvard, Vancouver, ISO, and other styles
23

Mardiani, Eri, Dedeh Supriyanti, Sharmila Septya, and Alan Purnata. "Smart Door Lock Dengan Face Recognition Untuk Keamanan Akses Ruang Server." Journal Cerita 10, no. 1 (2024): 14–23. http://dx.doi.org/10.33050/cerita.v10i1.3081.

Full text
Abstract:
PT. Fiber Networks Indonesia is an Internet Service Provider (ISP) that has installed a Base Transceiver Station (BTS) in the Jabodetabek area. Access to the BTS server room is currently via manual access using a regular key. All ISPs want to immediately resolve existing problems so that their customers remain connected and stable. Access to the server room door is still compromised from a security perspective and can still be accessed easily by irresponsible individuals. The aim of this research is to develop a Smart Door Lock prototype with Face Recognition for security access to the server room. This prototype tool uses Raspberry Pi-based facial recognition for entry access and a camera for facial detection and recognition. Flask framework web-based application that simplifies the Internet as a medium for communication, access and data storage. As well as using a Solenoid Door Lock as an actuator. The test results show that it is able to recognize registered faces and open the door. If there is an unfamiliar face, the solednoid will remain locked and the door will not open. Infiltration user data and infiltration attempts (intruders) are stored as logs or history in the SQLite 3 database and Raspberry Pi internal storage, making it easy to review the data if needed at a later date.
APA, Harvard, Vancouver, ISO, and other styles
24

Vikasari, Cahya, Purwiyanto Purwiyanto, and Galih Mustiko Aji. "Teknologi Aplikasi Nurse Call berbasis Client Server Pada Rumah Sakit." JOURNAL OF APPLIED INFORMATICS AND COMPUTING 2, no. 2 (2018): 01–08. http://dx.doi.org/10.30871/jaic.v2i2.1035.

Full text
Abstract:
The credibility of a hospital has the effect of the services provided by the hospital. One of the services in the hospital is inpatient services and the role of nurses who have an important role in serving patients. Some problems in hospitalization services that occur such as manual nurse calls are done by visiting the treatment room and proposing the desired service. This method is less effective because it will require a long process in service. The application of nurse calls is done to improve services so that nurses can provide the best service and patient health can be monitored properly. The calling system for nurses is based on client-server and additional features such as heart detection, temperature detection, and emergency buttons that have the role to call nurses. The advantage of the nurse call application is that it can monitor patient health from several detection devices that will automatically call through the application. In addition to handling patients will be monitored by the hospital, the nurse's performance will also be detected. The results of this study are that the nurse call process will be automatically carried out by a detection device so that the nurse will detect the patient's condition quickly, the patient handling data will be stored on the server, therefore the history of heart rate and temperature records is more complete and can be used for doctors to handle patients.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhou, Jian-Zhong (Joe). "The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers." Information Technology and Libraries 19, no. 1 (2017): 50–52. http://dx.doi.org/10.6017/ital.v19i1.10075.

Full text
Abstract:
This article first examines the difference between two very familiar and sometimes synonymous terms, the Internet and the Web. The article then explains the relationship between the Web's protocol HTTP and other high-level Internet protocols, such as Telnet and FTP, as well as provides a brief history of Web development. Next, the article analyzes the mechanism in which a Web browser (client) "talks" to a Web server on the Internet. Finally, the article studies the market growth for Web browsers and Web servers between 1993 and 1999. Two statistical sources were used in the Web market analysis: a survey conducted by the University of Delaware Libraries for the 122 members of the Association of Research Libraries, and the data for the entire Web industry from different Web survey agencies.
APA, Harvard, Vancouver, ISO, and other styles
26

Tajne, Ketan, Abhijeet Takale, Mangesh Tale, et al. "Comprehensive Towing Services Online." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 368–72. http://dx.doi.org/10.22214/ijraset.2024.64944.

Full text
Abstract:
Abstract: This project aims to streamline and enhance the towing service experience through the development of a comprehensive web-based platform. Utilizing JavaScript, HTML, CSS, XAMPP, phpMyAdmin, and SQL, the platform offers a user-friendly interface that facilitates efficient towing services. JavaScript ensures dynamic client-side interactions, while HTML and CSS provide a clean and intuitive layout. XAMPP serves as the local server environment, and phpMyAdmin manages SQL database interactions. The backend, powered by SQL, securely handles user data, service requests, and provider details. Users can easily request towing services, track their status, and access service history, while providers can manage their fleet and respond to requests efficiently. This project represents a significant advancement in the towing service industry, offering a seamless solution that benefits both users and service providers through its robust technological foundation.
APA, Harvard, Vancouver, ISO, and other styles
27

Ibrahim, Rouba, and Ward Whitt. "Real-Time Delay Estimation Based on Delay History in Many-Server Service Systems with Time-Varying Arrivals." Production and Operations Management 20, no. 5 (2010): 654–67. http://dx.doi.org/10.1111/j.1937-5956.2010.01196.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Swe, Swe Aung and Thinn Thu Naing. "MINING DATA FOR TRAFFIC DETECTION SYSTEM USING GPS_ENABLE MOBILE PHONE IN MOBILE CLOUD INFRASTRUCTURE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 4, June (2018): 01–12. https://doi.org/10.5281/zenodo.1413901.

Full text
Abstract:
The increasing need for traffic detection system has become a vital area in both developing and developed countries. However, it is more important to get the accurate and valuable data to give the better result about traffic condition. For this reason, this paper proposes an approach of tracking traffic data as cheap as possible in terms of communication, computation and energy efficient ways by using mobile phone network. This system gives the information of which vehicles are running on which location and how much speed for the Traffic Detection System. The GPS sensor of mobile device will be mainly utilized to guess a user&rsquo;s transportation mode, then it integrates cloud environment to enhance the limitation of mobile device, such as storage, energy and computing power. This system includes three main components: Client Interface, Server process and Cloud Storage. Some tasks are carried out on the Client. Therefore, it greatly reduces the bottleneck situation on Server side in efficient way. Most of tasks are executed on the Server and history data are stored on the Cloud Storage. Moreover, the paper mainly uses the distance based clustering algorithm in grouping mobile devices on the same bus to get the accurate data.
APA, Harvard, Vancouver, ISO, and other styles
29

Nurr Sadikan, Siti Fairuz, Azizul Azhar Ramli, Mohd Farhan Md. Fudzee, et al. "User behaviour pattern for online learning system: UiTM iLearn portal case." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 1 (2019): 382. http://dx.doi.org/10.11591/ijeecs.v15.i1.pp382-390.

Full text
Abstract:
&lt;span&gt;A Web server log files contain an entire record of the user’s browsing history such as referrer, date and time access, path, operating system (OS), browser and IP address. User navigation pattern discovery involves learning of user’s browsing behaviour to gain the pattern from web server log file. This paper emphasizes on identifying user navigation pattern from web server log file data of iLearn portal. The study implements the framework for user navigation including phases of acquisition of weblog, log query parser, preprocessor, navigational pattern modelling, clustering, and classification. This study is conducted in the context of the actual data logs of the iLearn portal of Universiti Teknologi MARA (UiTM). This study revealed the navigational patterns of online learners which relatively related to their intake or group along the semester of 14 weeks. Besides, access patterns for students along the semester are different and can be classified into three (3) quarter, namely Q1, Q2 and Q3 based on the total of week per semester. Future work will focus on the development of prototype to improve the security of online learning especially during the assessment progress such as online quiz, test and examination.&lt;/span&gt;
APA, Harvard, Vancouver, ISO, and other styles
30

Chung, Myoungbeom. "User Visit Certification and Visit Trace System Using Inaudible Frequency." Signals 6, no. 2 (2025): 24. https://doi.org/10.3390/signals6020024.

Full text
Abstract:
This study proposes a user visit certification and visit trace system using inaudible frequencies in the range of audible frequencies but not those audible to people. The signal frequency consists of inaudible frequencies in the range of 18 kHz to 20 kHz, which can be generated by normal speakers. This system recognizes the signal frequency and sends signal values, users’ IDs, and location information to a server to certify the current user’s location. The server categorizes and stores the user’s visit history by individual, and the user can check their personal visit trace information in the application. To verify the utility of the proposed system, we developed an application for user certification and tracing based on a smart device and a built server system. We conducted user certification and trace experiments using the proposed system, resulting in 99.6% accuracy. As a comparative experiment, we conducted a visit certification experiment using a QR code and the proposed system and found that the proposed system performed better. Thus, the proposed system will be a useful technology for epidemiological surveys for individual users and electronic entry lists to restaurants and facilities in the age of COVID-19.
APA, Harvard, Vancouver, ISO, and other styles
31

Sun, Xue Yang, Yu Zhang, and Cheng Lin Xiao. "Application of Kingview and SQL Server Database on the Full Automatic Coating Production Lines of Solar Collector Tubes." Applied Mechanics and Materials 182-183 (June 2012): 1101–4. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1101.

Full text
Abstract:
Kingview software combined with the SQL Server database are applied in the data storage of monitoring system of the automatic coating production lines of solar collector tubes. The system can acquisition parameter the critical process parameters on-site in real time, the data after the necessary processing are stored in the database, as well as operations such as tracking of the history of process parameters, alarm queries, generating reports etc. can be realized in the corresponding pages that use the SQL functions contained in the Kingview.
APA, Harvard, Vancouver, ISO, and other styles
32

Kambhampati, Rambabu, Sravan K.Vittapu, Ravichand Sankuru, Chennadi Thirumala, Gali Hemakanth, and Ganagam Umeshchandra. "Arduino-Based Home Automation System Using ESP8266 Wi-Fi Module." Journal of Embedded Systems and Processing 8, no. 3 (2023): 14–18. http://dx.doi.org/10.46610/joesp.2023.v08i03.003.

Full text
Abstract:
This paper presents the design and prototype execution of a new home automation system that connects its components using Wireless-Fidelity (Wi-Fi) technology. The system under consideration comprises two primary parts. The first element is the web server, which serves as the system core and is responsible for managing, controlling, and keeping an eye on users' homes. Remotely using the internet and locally using a Local Area Network (LAN) the user and system administrator can manage and control the system code. The hardware interface part is the second element which acts as an interface between sensors and actuators. The proposed system is more scalable since it can manage many hardware modules available in Wi-Fi coverage using a single server. The system which is proposed in this paper outperforms the recently proposed home automation systems in terms of scalability and flexibility.
APA, Harvard, Vancouver, ISO, and other styles
33

Best, Jason. "DemoCamp: BRIT Digitization Appliance." Biodiversity Information Science and Standards 2 (April 24, 2018): e26122. http://dx.doi.org/10.3897/biss.2.26122.

Full text
Abstract:
In recent years, the natural history collections community has made great progress in accelerating the pace of collection digitization and global data-sharing. However, a common workflow bottleneck often occurs in that period immediately following image capture but preceding image submission to portals, a critical phase involving quality control, file management, image processing, metadata capture, data backup, and monitoring performance and progress. While larger institutions have likely developed reliable, automated workflows over time, small and medium institutions may not have the expertise or resources to design and implement workflows that take full advantage of automation opportunities. Without automation, these institutions must invest many hours of manual effort to meet quality and performance goals. To address its own needs, BRIT developed a number of workflow automation components, which coalesced over time into a suite of tools that operate on both an image capture station as a client application and on a server that provides file storage and image processing features. Together, these tools were created to meet the following goals: Simplify file management and data preservation through automation Quickly identify quality issues Quickly capture skeletal metadata to facilitate later databasing Significantly reduce time between image capture and online availability Provide performance and quality monitoring and reporting Easy configuration and maintenance of client and server The client and server components together can be considered a “digitization appliance”: software integrated with the specific goal of providing a comprehensive suite of digitization tools that can be quickly and easily deployed on simple consumer hardware. We have made this software available to the natural history collections community under an open-source license at https://github.com/BRITorg/digitization_appliance.
APA, Harvard, Vancouver, ISO, and other styles
34

Best, Jason. "DemoCamp: BRIT Digitization Appliance." Biodiversity Information Science and Standards 2 (April 24, 2018): e26122. https://doi.org/10.3897/biss.2.26122.

Full text
Abstract:
In recent years, the natural history collections community has made great progress in accelerating the pace of collection digitization and global data-sharing. However, a common workflow bottleneck often occurs in that period immediately following image capture but preceding image submission to portals, a critical phase involving quality control, file management, image processing, metadata capture, data backup, and monitoring performance and progress. While larger institutions have likely developed reliable, automated workflows over time, small and medium institutions may not have the expertise or resources to design and implement workflows that take full advantage of automation opportunities. Without automation, these institutions must invest many hours of manual effort to meet quality and performance goals. To address its own needs, BRIT developed a number of workflow automation components, which coalesced over time into a suite of tools that operate on both an image capture station as a client application and on a server that provides file storage and image processing features. Together, these tools were created to meet the following goals: Simplify file management and data preservation through automation Quickly identify quality issues Quickly capture skeletal metadata to facilitate later databasing Significantly reduce time between image capture and online availability Provide performance and quality monitoring and reporting Easy configuration and maintenance of client and server The client and server components together can be considered a "digitization appliance": software integrated with the specific goal of providing a comprehensive suite of digitization tools that can be quickly and easily deployed on simple consumer hardware. We have made this software available to the natural history collections community under an open-source license at https://github.com/BRITorg/digitization_appliance.
APA, Harvard, Vancouver, ISO, and other styles
35

Aditya, Moch Vicky, Aries Boedi Setiawan, and Abdur Rabi. "Implementation of The Speech Recognition System Using a real time web Server Based." Internet of Things and Artificial Intelligence Journal 1, no. 1 (2021): 26–37. http://dx.doi.org/10.31763/iota.v1i1.355.

Full text
Abstract:
a Speech Recognition is a system used to recognize word commands from human voices and then translated them into data that can be understood by a computer. The advantages of Speech Recognition include speed and ease of use. Merdeka Malang is a private university founded on January 29, 1964. The University of Merdeka Malang still doesn’t have a strategy in recommending new students based on historical data calculations in choosing faculties. and majors. In calculating the history, if you use a manual system, they will be constrained by the time and accuracy of the data, causing the data to be less valid.Therefore, there is a need for a system that can exchange data in real-time so that the data displayed is always up to date without manual data updating. This process is useful for monitoring and accelerating the process of calculating student interest data, which can later be recommended to future new students. Moreover, The speech technique used is using speech recognition which is used for processing speech data on smartphones while sending data using the XAMPP web server which is used to exchange data from smartphones to servers.&#x0D;
APA, Harvard, Vancouver, ISO, and other styles
36

Laila, Ida, A. Arifin, and Bidayatul Armynah. "INTERNET OF MEDICAL THINGS (IoMT)-BASED HEART RATE AND BODY TEMPERATURE MONITORING SYSTEM." Indonesian Physical Review 5, no. 1 (2022): 1–14. http://dx.doi.org/10.29303/ipr.v5i1.134.

Full text
Abstract:
Research has been carried out on a heart rate and body temperature monitoring system based on the Internet of Medical Things (IoMT). This study aims to create a system for monitoring heart rate and body temperature remotely in real-time with measurement results displayed on a web server. This research includes several methods such as developing research concepts based on literature studies, system design consisting of hardware and software design, sensor calibration, web server creation, system testing, and direct data retrieval. The hardware manufacturing stage uses several components such as a pulse heart sensor to detect heart rate, DS18B20 sensor to detect body temperature, Arduino Uno microcontroller, Xbee end device, Xbee coordinator, and raspberry pi as a server computer. Then for the use of software on this system, it consists of Arduino Integrated Development Environment (IDE) to run Arduino Uno hardware, XCTU to provide configuration on Xbee, Python to run Raspberry Pi and Django as a framework for building web servers and MySQL as data storage center measurement results. Heart rate monitoring is done by placing a sensor on one of the fingers, and body temperature is done by placing the sensor in the axilla. The output from the sensor in the form of analog data is converted by the Arduino Uno microcontroller into digital data and then sent to the Raspberry Pi module via Xbee. The raspberry pi has processed data is then stored in the database and then displayed on the webserver. The sensor calibration results show that the pulse heart sensor's error rate is 0.41%, and the DS18B20 temperature sensor is 1.09%. After calibration of the sensor, data was collected on the three respondents' heart rate and body temperature. The measurement results show that the system can store each respondent's heart rate and body temperature data in the database and display the measurement results on the webserver in real-time. Based on these results indicate that the system that has been made can work well.
APA, Harvard, Vancouver, ISO, and other styles
37

Kuchumov, Sergey. "Unified system of library services in St. Petersburg and irbis-turbo." Infolib 26, no. 2 (2021): 10–15. http://dx.doi.org/10.47267/2181-8207/2021/2-052.

Full text
Abstract:
The article describes the Unified System of Library Services in St. Petersburg, which is the first corporate system of library services in the Russian Federation. The article describes the history of the system, the capabilities, principles and solutions used in its creation. The article also addresses the issue of transferring the system to a new Irbis-Turbo server to solve problems that arose during operation.
APA, Harvard, Vancouver, ISO, and other styles
38

Sri Nagesh, O., Tapas Kumar, and Venkateswara Rao Vedula. "A Survey on Security Aspects of Server Virtualization in Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (2017): 1326. http://dx.doi.org/10.11591/ijece.v7i3.pp1326-1336.

Full text
Abstract:
Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.
APA, Harvard, Vancouver, ISO, and other styles
39

DAMANIK, HILLMAN AKHYAR, and MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, no. 1 (2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.

Full text
Abstract:
ABSTRAKMakalah ini mengimplementasikan sistem log honeypot untuk menganalisis eksploitasi dari global internet berupa kategori serangan Statistical Traffic Analysis, Top Targeted Attack Sources and Destination, Penetration Analysis dan Infection Pattern Analysis serta Intrusion Detection System (IDS). Pengelompokan level kategori serangan adalah low, medium, dan high, dengan Teknik K-Means dan menerapkan rule filtering IPTables Automation yang digunakan untuk teknik mitigasi pada perangkat farm server dan virtual router public. Hasil attribute yang di cluster mendapatkan jumlah kuadrat jarak cluster ke pusat cluster terdekat, ditimbang dengan bobot nilai μi dan persentase jumlah serangan sebesar 64% untuk kategori High, 36% medium dan Low dengan jumlah tahapan clustering sebanyak 3 tahapan iterasi untuk mendapatkan cluster yang sesuai. Iterasi hasil Rule Firewall IPTables, untuk perangkat vRouter menghasilkan history beban kerja CPU berkurang menjadi 28%, dan memory 39%. vFarm Server menunjukkan beban kerja CPU pada masing-masing vServer berkurang menjadi 43% dan Memory (RAM) menjadi menjadi 21%.Kata kunci: Machine Learning, Cyber Security, Honeypot, K-Means, Firewall IPTables ABSTRACTThis paper implements a honeypot log system to analyze exploitation of the global internet in the form of Statistical Traffic Analysis attack categories, Top Targeted Attack Sources and Destinations, Penetration Analysis and Infection Pattern Analysis and Intrusion Detection System (IDS). The grouping of attack category levels is low, medium, and high, using the K-Means technique and applying the IPTables Automation filtering rule used for mitigation techniques on server farm devices and public virtual router. The results of the clustering attribute get the mean of the squares of the cluster distance to the nearest cluster center, weighted by the weight of the μi value and the percentage of the number of attacks is 64% for the High, 36% medium and Low with a number of clustering stages of 3 iteration stages to get the appropriate cluster. Iteration of the results of the IPTables Firewall Rule, for vRouter devices, results in a history of CPU workload being reduced to 28%, and memory to 39%. vFarm Server shows the CPU workload on each vServer is reduced to 43% and RAM to 21%.Keywords: Machine Learning, Cyber Security, Honeypot, K-Means, Firewall IPTables
APA, Harvard, Vancouver, ISO, and other styles
40

Barman, Ludovic, Italo Dacosta, Mahdi Zamani, et al. "PriFi: Low-Latency Anonymity for Organizational Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 24–47. http://dx.doi.org/10.2478/popets-2020-0061.

Full text
Abstract:
AbstractOrganizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks.We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance. PriFi builds onDining Cryptographers networks (DC-nets), but reduces the high communication latency of prior designs via a new client/relay/server architecture, in which a client’s packets remain on their usual network path without additional hops, and in which a set of remote servers assist the anonymization process without adding latency. PriFi also solves the challenge of equivocation attacks, which are not addressed by related work, by encrypting traffic based on communication history. Our evaluation shows that PriFi introduces modest latency overhead (≈ 100ms for 100 clients) and is compatible with delay-sensitive applications such as Voice-over-IP.
APA, Harvard, Vancouver, ISO, and other styles
41

Salsabila, Fitra Nuvus, Fahren Bukhari, and Sri Nurdiati. "Mathematical Study for Proving Correctness of the Serial Graph-Validation Queue Scheme." Journal of the Indonesian Mathematical Society 31, no. 2 (2025): 1592. https://doi.org/10.22342/jims.v31i2.1592.

Full text
Abstract:
Numerous studies have been conducted to develop concurency control schemes that can be applied to client-server systems, such as the Validation Queue (VQ) scheme, which uses object caching on the client side. This scheme has been modified into the Serial Graph-Validation Queue (SG-VQ) scheme, which employs validation algorithms based on queues on the client side and graphs on the server side. This study focuses on verifying the correctness of the SG-VQ scheme by using serializability as a mathematical tool. The results of this study demonstrate that the SG-VQ scheme can execute its operations correctly, in accordance with Theorem 4.16, which states that every history (H) of SG-VQ is serializable. Implementing a cycle-free transaction graph is a necessary and sufficient condition to achieve serializability. To prove Theorem 4.16, mathematical statements involving ten definitions, two propositions, and three lemmas have been formulated.
APA, Harvard, Vancouver, ISO, and other styles
42

Viacheslav, Spirintsev, Spirintseva Olga та Mykhaylenko Maria. "Веб-орієнтований застосунок ведення дентальної хроніки для запису і аналізу стану ротової порожнини". System technologies 1, № 150 (2024): 117–26. http://dx.doi.org/10.34185/1562-9945-1-150-2024-11.

Full text
Abstract:
A web-based application for keeping dental records is proposed for effective monitoring of the patient's oral cavity. The application provides the opportunity for the patient to keep his own dental history in order to increase the level of responsibility, interest and awareness of the state of his own health, which can be a good motivation. It also increases the level of diagnosis and further treatment by providing access to the entire clinical history of the patient. The client-server architecture model, MVC design template, JavaScript programming language, HTML, SCSS preprocessor, MERN programming stack, which included such modules as MySQL, Express(.js), Node.js, React, were used to implement the application.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Chang Zheng, Chao Lin, and Yong Lei. "Application of Computer Aided Testing System in Aero Engine Running." Applied Mechanics and Materials 80-81 (July 2011): 1109–12. http://dx.doi.org/10.4028/www.scientific.net/amm.80-81.1109.

Full text
Abstract:
Aero engine running is complex mechanical experiments. In the last two decades, many computer aided testing (CAT) systems were developed and employed in aero engine running. Traditionally, the main role of a CAT system is data acquisition, which developed with the client/server (C/S) architecture. Now, a CAT system plays more and more important roles in information management, such as measurement channels management, experiment design and management, data analysis and report management, and so on. Users may work on local place or on remote. So, it is not only a data acquisition system, but also an information system. In this paper, we introduce hybrid architecture of C/S and browser/server (B/S) to take advantages of both of them. For local users, clients are realized to provide local monitor and operation. For remote users, browsers provide not only real-time measurement data, but also querying and management of the history data. It demonstrates that the CAT system meets the requirement of aero engine running.
APA, Harvard, Vancouver, ISO, and other styles
44

Kunda, Douglas, Mumbi Chishimba, Mwenge Mulenga, and Victoria Chama. "An Analysis of Security and Performance Concerns in Mobile Web Application Development: Challenges and Open Issues." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 5, no. 3 (2017): 26. http://dx.doi.org/10.3991/ijes.v5i3.7330.

Full text
Abstract:
The paper focuses on security and performance concerns in mobile web development. The approach used in the study involved surveying journal publications to identify security and performance concerns. The paper highlights some of the contemporary issues currently being faced by application developers as they create, update and maintain mobile web applications including Cross-Site Scripting, Cookie hijacking/theft, location hijacking, history theft, behaviour analysis, session hijacking, API design, security and the type of web server used considered.
APA, Harvard, Vancouver, ISO, and other styles
45

GUAN, SHENG-UEI, and WEI LIU. "MODELING INTERACTIVE MEMEX-LIKE APPLICATIONS BASED ON SELF-MODIFIABLE PETRI NETS." International Journal of Information Technology & Decision Making 03, no. 03 (2004): 395–417. http://dx.doi.org/10.1142/s0219622004001185.

Full text
Abstract:
This paper introduces an interactive Memex-like application using a self-modifiable Petri Net model — Self-modifiable Color Petri Net (SCPN). The Memex ("memory extender") device proposed by Vannevar Bush in 1945 focused on the problems of "locating relevant information in the published records and recording how that information is intellectually connected". The important features of Memex include associative indexing and retrieval. In this paper, the self-modifiable functions of SCPN are used to achieve trail recording and retrieval. A place in SCPN represents a website and an arc indicates the trail direction. Each time when a new website is visited, a place corresponding to this website will be added. After a trail is built, users can use it to retrieve the websites they have visited. Besides, useful user interactions are supported by SCPN to achieve Memex functions. The types of user interactions include the following — forward, backward, history, search, etc. A simulator has been built to demonstrate that the SCPN model can realize Memex functions. Petri net instances can be designed to model trail record, back, and forward operations using this simulator. Furthermore, a client-server based application system has been built. Using this system, a user can surf online and record his surfing history on the server according to different topics and share them with other users.
APA, Harvard, Vancouver, ISO, and other styles
46

Fereig, Ragab M., and Hanan H. Abdelbaky. "Comparative study on Toxoplasma gondii dense granule protein 7, peroxiredoxin 1 and 3 based on bioinformatic analysis tools." German Journal of Microbiology 2, no. 1 (2022): 30–38. http://dx.doi.org/10.51585/gjm.2022.1.0013.

Full text
Abstract:
Toxoplasmosis remains a devastating protozoan disease induced by Toxoplasma gondii (T. gondii) that induces extreme hazards in both medical and veterinary fields. Our previous studies revealed the high immunogenicity and antigenicity of T. gondii peroxiredoxin (TgPrx) 1, 3, and TgGRA7. Herein, the comparison of TgPrx1, TgPrx3, and TgGRA7 was conducted using bioinformatics analysis tools. In this computational comparison, the physico-chemical, morphometric, immunogenic, and antigenic properties were analyzed. Analyses of complete coding sequences showed the probability of signal peptides and transmembrane domains only in the case of TgGRA7. NetPhos server-based prediction revealed 23, 11, and 39 phosphorylation sites in TgGRA7, TgPrx1, and TgPrx3 proteins, respectively. The secondary structure of TgGRA7, TgPrx1, and TgPrx3 proteins were analyzed by PSIPRED servers. The percentage of the random coil and alpha-helix amino acids was higher in TgGRA7 (99.15%), followed by TgPrx3 (85.87%) and TgPrx1 (77.55%). The antigenic epitopes of the protein were predicted by analyzing the features of the IEDB server. The linear B-cell epitope regions prediction of TgGRA7 showed the maximum estimated length (118 amino acid residues). In addition, antigenicity and hydrophilicity index showed similar tendencies among the three tested proteins, TgGRA7, TgPrx1, and TgPrx3. Thus, the current computational analyses represented TgGRA7, TgPrx1, and TgPrx3 proteins as efficient diagnostic and vaccine candidates suggesting further research and assessments. Additional validation of bioinformatic analysis tools in predicting potent diagnostic and vaccine antigens will greatly contribute to the success of control policies against T. gondii and other infectious agents.
APA, Harvard, Vancouver, ISO, and other styles
47

Yang, Xu, Yuchuan Luo, Shaojing Fu, Ming Xu, and Yingwen Chen. "DPMF: Decentralized Probabilistic Matrix Factorization for Privacy-Preserving Recommendation." Applied Sciences 12, no. 21 (2022): 11118. http://dx.doi.org/10.3390/app122111118.

Full text
Abstract:
Collaborative filtering is a popular approach for building an efficient and scalable recommender system. However, it has not unleashed its full potential due to the following problems. (1) Serious privacy concerns: collaborative filtering relies on aggregated user data to make personalized predictions, which means that the centralized server can access and compromise user privacy. (2) Expensive resources required: conventional collaborative filtering techniques require a server with powerful computing capacity and large storage space, so that the server can train and maintain the model. (3) Considering only one form of user feedback: most existing works aim to model user preferences based on explicit feedback (e.g., ratings) or implicit feedback (e.g., purchase history, viewing history) due to their heterogeneous representation; however, these two forms of feedback are abundant in most collaborative filtering applications, can both affect the model, and very few works studied the simultaneous use thereof. To solve the above problems, in this study we focus on implementing decentralized probabilistic matrix factorization for privacy-preserving recommendations. First, we explore the existing collaborative filtering algorithms and propose a probabilistic matrix co-factorization model. By integrating explicit and implicit feedback into a shared probabilistic model, the model can cope with the heterogeneity between these two forms of feedback. Further, we devise a decentralized learning method that allows users to keep their private data on the end devices. A novel decomposing strategy is proposed for users to exchange only non-private information, in which stochastic gradient descent is used for updating the models. Complexity analysis proves that our method is highly efficient with linear computation and communication complexity. Experiments conducted on two real-world datasets FilmTrust and Epinions show that our model gains a guarantee of convergence as the RMSE decreases quickly within 100 rounds of iterations. Compared with the state-of-the-art models, our model achieves lower model loss in rating prediction task and higher precision in item recommendation task.
APA, Harvard, Vancouver, ISO, and other styles
48

Sathiyamoorthi V., Suresh P., Jayapandian N., Kanmani P., Deva Priya M., and Sengathir Janakiraman. "An Intelligent Web Caching System for Improving the Performance of a Web-Based Information Retrieval System." International Journal on Semantic Web and Information Systems 16, no. 4 (2020): 26–44. http://dx.doi.org/10.4018/ijswis.2020100102.

Full text
Abstract:
With an increasing number of web users, the data traffic generated by these users generates tremendous network traffic which takes a long time to connect with the web server. The main reason is, the distance between the client making requests and the servers responding to those requests. The use of the CDN (content delivery network) is one of the strategies for minimizing latency. But, it incurs additional cost. Alternatively, web caching and preloading are the most viable approaches to this issue. It is therefore decided to introduce a novel web caching strategy called optimized popularity-aware modified least frequently used (PMLFU) policy for information retrieval based on users' past access history and their trends analysis. It helps to enhance the proxy-driven web caching system by analyzing user access requests and caching the most popular web pages driven on their preferences. Experimental results show that the proposed systems can significantly reduce the user delay in accessing the web page. The performance of the proposed system is measured using IRCACHE data sets in real time.
APA, Harvard, Vancouver, ISO, and other styles
49

Lemos, Janaína, Pedro D. Gaspar, and Tânia M. Lima. "Individual Environmental Risk Assessment and Management in Industry 4.0: An IoT-Based Model." Applied System Innovation 5, no. 5 (2022): 88. http://dx.doi.org/10.3390/asi5050088.

Full text
Abstract:
This paper addresses the design of a system to facilitate individual environmental risk assessment and long-term risk management in the Industry 4.0 work context. The solution is based on IoT to provide data related to workers’ exposure to hazardous agents (dust, noise, ultraviolet radiation, poor lighting, and inappropriate temperature and humidity) through a simple interface for employees and employers. The system includes a monitoring device and a server and performs employee registration, receives secure messages from the monitoring devices, shows information about the workers’ exposure, and triggers alarms when the measures reach or exceed the limits established by applicable legislation and/or standards. The system was tested in a controlled environment, and the results are presented in this work. Our solution is still under development, and in future stages, it will include a smartphone app for employees to check their exposures and the use of artificial intelligence on the server, which is expected to enable long-term planning by companies based on the analysis of employees’ health history and their exposures to hazardous agents.
APA, Harvard, Vancouver, ISO, and other styles
50

Ahn, Byeongtae. "A Study for Development of Digital Contents Management Systems Based on Smart Home." Sustainability 14, no. 9 (2022): 5524. http://dx.doi.org/10.3390/su14095524.

Full text
Abstract:
With the development of high-speed wireless LAN, the use of multimedia-type digital contents is increasing significantly even in the smart home environment. Therefore, it is very important to efficiently process and manage the use of digital content in the form of multimedia. In order to effectively process multimedia digital contents in the wireless LAN environment of a smart home, a server higher than the PC level is required. There is also a need for a support system that can exchange multimedia digital contents between clients of home appliances. Therefore, in this paper, we propose a Smart Home Digital Contents Management and Operation System (SDCMOS) that effectively processes and supports multimedia digital contents. This system is designed to effectively process real-time multimedia processing in home service in a wireless LAN environment. In addition, it was made possible to efficiently search multimedia information directly from the home server. SDCMOS is designed to be usable in fields such as biomedical image search, history museums, art exhibition halls, tourism information, geographic information, and e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!