Статті в журналах з теми "Hypertext Transfer Protocol (HTTP)"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Hypertext Transfer Protocol (HTTP).

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Hypertext Transfer Protocol (HTTP)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Musliyana, Zuhar, Teuku Yuliar Arif, and Rizal Munadi. "Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia." Jurnal Rekayasa Elektrika 12, no. 1 (March 25, 2016): 21. http://dx.doi.org/10.17529/jre.v12i1.2896.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Single Sign On (SSO) merupakan model autentikasi independen yang diimplementasikan Universitas Ubudiyah Indonesia (UUI) menggunakan Message-Digest Algorithm 5 (MD5) dan web service NuSOAP berbasis bahasa pemograman PHP. Sistem ini berjalan pada protokol Hypertext Transfer Protocol (HTTP). Faktanya penggunaan protokol HTTP ini sangat rentan terhadap berbagai jenis serangan karena data dikirim dalam bentuk plaintext tanpa ada proses enkripsi dan penerapan algoritma MD5 pada autentikasi login juga rentan terhadap serangan dictionary attacks dan rainbow tables. Disisi lain, Penggunaan web service NuSOAP juga menciptakan celah keamanan karena pengiriman dan penerimaan payload tidak dienkripsi. Saat ini diketahui sudah ada beberapa metode yang dapat digunakan untuk meningkatkan pengamanan kerentanan tersebut diantaranya yaitu menggunakan Hypertext Transfer Protocol Secure (HTTPS), Secure Hypertext Transfer Protocol (SHTTP) dan Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Namun beberapa hasil penelitian terkait memperlihatkan masih terdapat beberapa kelemahan dari penggunaan HTTPS, SHTTP dan CAPTCHA. Penelitian ini mengusulkan penggunaan algoritma Advanced Encryption Standard (AES) dengan pembangkit kunci dinamis dan metode One-Time Password (OTP) berbasis sinkronisasi waktu dengan kombinasi salt untuk meningkatkan keamanan pada autentikasi SSO UUI. Hasil pengujian menunjukkan penerapan algoritma AES dan OTP dapat mengamankan proses autentikasi SSO dari serangan dictionary attack dan rainbow table.
2

SUSANA, RATNA, ANGGA NUGRAHA, and DECY NATALIANA. "Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP)." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 3, no. 1 (January 1, 2015): 1. http://dx.doi.org/10.26760/elkomika.v3i1.1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRAKHypertext Transfer Protocol (HTTP) merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW). Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website.Kata kunci: basis data, data logger, Hypertext Transfer Protocol (HTTP), website, protokol jaringan.ABSTRACTHypertext Transfer Protocol (HTTP) is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW). This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16. Website could receive and process the data transmitted by the data logger and organize system entities. Changes in analog data and status logic 0 and 1 of digital data could be seen on display at the website.Keywords: database, data logger, Hypertext Transfer Protocol (HTTP), network protocol, website.
3

Dimitrova, Biljana, and Aleksandra Mileva. "Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)." Journal of Computer and Communications 05, no. 05 (2017): 98–111. http://dx.doi.org/10.4236/jcc.2017.55008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Almanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.
5

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attacks. Enc-DNS-HTTP is based on the distribution of a web server public key, which is transferred via a secure communication between client and a Domain Name System (DNS) server. This key is used to encrypt client-server communication. The scheme is implemented in the C programming language and tested on a Linux platform. In comparison with Apache HTTPS, this scheme is shown to have more effective resistance to attacks and improved performance since it does not involve a high number of time-consuming operations.
6

Mattson, Robert L. R., and Somnath Ghosh. "HTTP-MPLEX: An enhanced hypertext transfer protocol and its performance evaluation." Journal of Network and Computer Applications 32, no. 4 (July 2009): 925–39. http://dx.doi.org/10.1016/j.jnca.2008.10.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Riswandi, Kasim, and Muh Fajri Raharjo. "Evaluasi Kinerja Web Server Apache menggunakan Protokol HTTP2." Journal of Engineering, Technology, and Applied Science 2, no. 1 (April 6, 2020): 19–31. http://dx.doi.org/10.36079/lamintang.jetas-0201.92.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Hypertext Transfer Protocol (HTTP) adalah protokol jaringan lapisan aplikasi yang digunakan untuk sistem informasi terdistribusi, kolaboratif, dan menggunakan hipermedia. Penggunaan internet meningkat mencapai dari tahun 2014-2016, akan tetapi peningkatan tersebut tidak didukung dengan peningkatan kinerja protokol. HTTP/2 hadir sebagai protokol generasi terbaru yang merupakan versi terbaru dari protokol HTTP. Protokol ini sudah dilengkapi dengan sistem keamanan, karena berjalan di atas HTTPS yang merupakan mode security dari protokol HTTP. Penelitian ini dilakukan untuk mengukur kinerja dari protokol HTTP/2 dan cara untuk mengaktifkan protokol ini, sehingga protokol ini dapat diimplementasi dan mempercepat kinerja dari berbagai web server. Berdasarkan hasil penelitian ini, ditunjukkan bahwa pengimplementasian protokol ini dapat berjalan pada web server apache versi 2.4.17 karena versi sebelumnya tidak mendukung dan pada web server nginx versi 1.9.5 karena versi yang sebelumnya juga tidak mendukung protokol ini. Pada pengukuran kinerja yang dilakukan bahwa kecepatan response time yang dihasilkan HTTP/2 dalam mentransfer data lebih kecil dari pada HTTP/1 dapat dilihat dari hasil response time HTTP/1 web server apache sebesar 128,6 ms sedangkan pada HTTP/2 86,3 ms, dan pada web server nginx juga menunjukkan response time HTTP/2 lebih kecil dari pada HTTP/1 yang sebesar 184,3 ms dan 141,6 pada HTTP/2. Dari hasil pengujian response time HTTP/2 menunjukkan performa kecepatan yang lebih cepat jika diterapkan dalam web server apache dari pada menggunakan web server nginx.
8

Cheng, An Yu, Xiao Yu Lin, and Wen Long Feng. "Implementation of Multi-Vehicle Terminals' Data Transmission Based on HTTP Communication Protocol." Applied Mechanics and Materials 556-562 (May 2014): 5098–101. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5098.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Vehicle terminal can upload the vehicle status information to the server in time, to provide service for the users with more security. But vehicle terminal in the process of upload information to the server need to solve many issues, such as a large number of terminals connecting to the server, large amount of data, the data of transmission in various forms, the server is not stable enough and many other issues. This design uses the Hypertext Transfer Protocol (HTTP) to achieve reliable data transmission between the WEB server and vehicle terminals, and the load of server is lower, so the server can support more vehicle terminals’ connection.
9

Yi, Shi, Quan Liu, and Jing Song Li. "Design and Realization of Large File Asynchronous Upload and Broken-Point Continuingly-Transferring Based on ASP.NET MVC." Applied Mechanics and Materials 543-547 (March 2014): 3165–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3165.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, discusses the design and realization of large file asynchronous upload and Broken-point continuingly-transferring based on ASP.NET MVC. At the first, brief review the traditional upload method based on HTTP(Hypertext transfer protocol) protocol and ASP.NET(C#), point out the existed malpractices, while introduce the basic principles of asynchronous upload and broken-point continuingly-transferring, and in-depth analysis of the design and realization of the function of asynchronous upload and broken-point continuingly-transferring in ASP.NET MVC.
10

Yi, Shi, Quan Liu, and Jing Song Li. "Design and Realization of Large File Asynchronous Upload and Broken-Point Continuingly-Transferring Based on ASP.NET MVC." Applied Mechanics and Materials 556-562 (May 2014): 5636–39. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5636.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, discusses the design and realization of large file asynchronous upload and Broken-point continuingly-transferring based on ASP.NET MVC. At the first, brief review the traditional upload method based on HTTP(Hypertext transfer protocol) protocol and ASP.NET(C#), point out the existed malpractices, while introduce the basic principles of asynchronous upload and broken-point continuingly-transferring, and in-depth analysis of the design and realization of the function of asynchronous upload and broken-point continuingly-transferring in ASP.NET MVC.
11

Dempsey, B. J., and J. Herrin. "WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 39, no. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract:An increasing number of clinical databases are being adapted to allow access through Internet protocols, particularly Hypertext Transfer Protocol (HTTP). The World Wide Web (WWW) provides a user-friendly, standardized, broadly distributed database interface; at the same time, it may also present a threat to the security and confidentiality of patient data. However, there is little empirical evidence concerning such threats. Using publicly available records we estimate the additional risk of security violations due to web-enabling a database. The evidence, though limited, suggests that the additional risk may be small relative to more traditional security threats.
12

Peacock, Sylvia E. "Politics, Public Goods, and Corporate Nudging in the HTTP/2 Standardization Process." SAGE Open 10, no. 4 (October 2020): 215824402097161. http://dx.doi.org/10.1177/2158244020971611.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The goal is to map out some policy problems attached to using a club good approach instead of a public good approach to manage our internet protocols, specifically the HTTP (Hypertext Transfer Protocol). Behavioral and information economics theory are used to evaluate the standardization process of our current generation HTTP/2 (2.0). The HTTP update under scrutiny is a recently released HTTP/2 version based on Google’s SPDY, which introduces several company-specific and best practice applications, side by side. A content analysis of email discussions extracted from a publicly accessible IETF (Internet Engineering Task Force) email server shows how the club good approach of the working group leads to an underperformance in the outcomes of the standardization process. An important conclusion is that in some areas of the IETF, standardization activities may need to include public consultations, crowdsourced volunteers, or an official call for public participation to increase public oversight and more democratically manage our intangible public goods.
13

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
14

Ady Kusuma, I. Gusti Ngurah. "PERANCANGAN SIMPLE STATELESS AUTENTIKASI DAN OTORISASI LAYANAN REST-API BERBASIS PROTOKOL HTTP." Jurnal Manajemen Informatika dan Sistem Informasi 4, no. 1 (January 22, 2021): 78. http://dx.doi.org/10.36595/misi.v4i1.325.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Arsitektur Microservice merupakan arsitektur pembangunan sistem yang sering digunakan saat ini. Konsepnya adalah memisahkan komponen program / fungsionalitas ke dalam aplikasi yang berbeda. Antar komponen menggunakan protokol Hypertext Transfer Protocol (HTTP) untuk berkomunikasi karena HTTP mendukung multiplatform layaknya sebuah website ditambah lagi munculnya skema REST API. REST API memungkinkan pengguna dan layanan untuk bertukar data antar platform. Permasalahan yang muncul berasal dari semua komunikasi pada protokol HTTP bersifat stateless, yang dimana setiap permintaan yang diterima akan dijalankan secara independen. Termasuk apakah klien sebelumnya sudah diautentikasi atau belum. Hal ini akan rentan terhadap penyusup yang belum terotentikasi sehingga tidak dapat dipastikan otoritasnya dalam mengakses suatu fungsi. Berdasarkan permasalahan tersebut, diperlukan skema otentikasi dan otorisasi yang dapat mengakomodasi skema layanan mikro. Metode yang dapat digunakan adalah dengan pemanfaatan kode otorisasi yang bersifat unik yang ditempelkan pada setiap permintaan layanan yang divalidasi oleh sebuah server independent. Alur dari skemanya digambarkan menggunakan sequence diagram dan didukung dengan konseptual database. Penelitian ini menghasilkan sebuah rancangan metode autentikasi dan otorisasi sederhana yang dapat digunakan sebagai alternatif kemanan pada arsitektur microservice
15

Akanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (June 11, 2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets. However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS. Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability. This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.89%, 99.89%, 99.95%, 0.18%, and 0.05% respectively. Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented. This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.
16

Vitria, Rikki, Ratna Dewi, and Ariq Naufal. "ANALYSIS OF DATA COMMUNICATION BETWEEN ANDROID APPLICATIONS AND WEB SERVER." JURNAL INTEGRASI 11, no. 2 (October 17, 2019): 91–96. http://dx.doi.org/10.30871/ji.v11i2.1654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Aplikasi android sudah banyak diterapkan dalam berbagai bidang, seperti dalam bidang pendidikan, kesehatan, perbankan, transportasi dan yang lainnya. Aplikasi ini banyak digunakan untuk kemudahan untuk mendapatkan informasi. Pada penelitian ini Aplikasi Android digunakan untuk informasi keberadaan dosen. Aplikasi digunakan untuk memudahkan sesorang untuk mengetahui keberadaan dari dosen yang ingin mereka cari. Tujuan dari penelitian ini adalah untuk menganalisa komunikasi data antara aplikasi android dan web server. Analisa komunikasi data ini menggunakan aplikasi wireshark. Hasil penelitian ini menunjukkan informasi pada masing-masing lapisan Open System Interconnection (OSI) ketika terjadi komunikasi antara aplikasi android dengan web server. Perbandingan komunikasi data menggunakan Hypertext Transfer Protocol (HTTP) dan HTTPS juga dilakukan. Hasil studi ini menunjukkan data-data yang dikirimkan baik dari aplikasi android maupun webserver dapat terbaca dengan mudah ketika yang digunakan HTTP, akan tetapi ketika menggunakan HTTPS data tersebut tidak bisa terbaca lagi karena data-data tersebut sudah di enkripsi.
17

Jaafar, Ghafar A., Shahidan M. Abdullah, and Saifuladli Ismail. "Review of Recent Detection Methods for HTTP DDoS Attack." Journal of Computer Networks and Communications 2019 (January 10, 2019): 1–10. http://dx.doi.org/10.1155/2019/1283472.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack.
18

Ahmadzai, Abdul Shabir, Qurban Yazdani, and Adamu Abubakar. "Analysis of Business Intelligence Systems Transmission Session." Journal of Science and Technology 27, no. 1 (December 6, 2022): 16–28. http://dx.doi.org/10.20428/jst.v27i1.1984.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Information and Communication Technology (ICT) is the central part of Intelligent systems. Business Intelligence (BI) utilizes ICT resources and capabilities to enhance decision-making from the available information. One of the core components of ICT resources is the network. Hypertext Transfer Protocol (HTTP) is an application layer protocol in a network model responsible for handling "requests" in a transmission session. Transmission Control Protocol (TCP) establishes connections session and keeps track of the state of the communication session. Unfortunately, a request from a critical online transaction over TCP in a BI environment is bound to face some uncertainty. There is a lack of studies on the impact of communication over transmission sessions on BI operations. This paper presented an experimental evaluation of the BI transaction transmission session. Various transactions were performed to monitor and analyze the request made with HTTP over a TCP transmission session. Both the HTTP and TCP features for all transactions were captured. The finding indicates that time is highly associated with less traffic congestion and transaction overhead.
19

Willoughby, Alexander A., Ayodele O. Soge, Muiz A. Adeleke, and Oluwaseyi A. Ilori. "An IoT-Based Home Automation and Weather Monitoring System." International Journal of Research and Innovation in Applied Science 07, no. 03 (2022): 26–29. http://dx.doi.org/10.51584/ijrias.2022.7302.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper reports an IoT-based home automation and weather monitoring system developed for remote control of household appliances and weather monitoring. The proposed system comprises a Wi-Fi enabled ESP32 microcontroller as the network gateway, a relay module, and a DHT11 sensor for monitoring temperature and humidity. The status of the household devices and the weather data are continuously collected and stored in a MySQL database, which is set up on the IoT platform. A user interface was created using two different protocols – HyperText Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT). The IoT-based home automation and weather monitoring system is designed to be low cost, user-friendly and can remotely control home appliances and monitor weather data over the internet.
20

Maulana, M. Rizqi. "Detection of Attacks on Apache2 Web Server Using Genetic Algorithm Based On Jaro Winkler Algorithm." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 4, no. 1 (July 20, 2020): 185–92. http://dx.doi.org/10.31289/jite.v4i1.3873.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Web server is software that provides data services in the form of HTTP (Hypertext Transfer Protocol) requests and responses in the form of HTML documents (Hypertext Markup Language) with the aim of managing data in the form of text files, images, videos and files. But in managing large amounts of data, good security monitoring is needed so that the data stored on the web server is not easily hacked. To protect the web server from hackers need an application to detect activities that are considered suspicious or possible hacking activities. By utilizing logs from a web server that is processed using the Jaro Winkler algorithm to see hacking attempts that produce a matrix and hacking activity reports to the admin. Thus the web server admin can see suspicious activity on the web server directly.Keywords: Web Server, Jaro Winkler Algorithm.
21

ANSARI, SALIM G., PAOLO GIOMMI, and ALBERTO MICOL. "ESIS ON THE WORLD WIDE WEB." International Journal of Modern Physics C 05, no. 05 (October 1994): 805–9. http://dx.doi.org/10.1142/s0129183194000921.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
On 3rd November, 1993, ESIS announced its Homepage on the World Wide Web (WWW) to the user community. Ever since then, ESIS has steadily increased its Web support to the astronomical community to include a bibliographic service, the ESIS catalogue documentation and the ESIS Data Browser. More functionality will be added in the near future. All these services share a common ESIS structure that is used by other ESIS user paradigms such as the ESIS Graphical User Interface (Giommi and Ansari, 1993), and the ESIS Command Line Interface. A forms-based paradigm, each ESIS-Web application interfaces to the hypertext transfer protocol (http) translating queries from/to the hypertext markup language (html) format understood by the NCSA Mosaic interface. In this paper, we discuss the ESIS system and show how each ESIS service works on the World Wide Web client.
22

Jia, Xi, and Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer." Security and Communication Networks 2022 (August 24, 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Deep packet inspection (DPI) is widely used in detecting abnormal traffic and suspicious activities in networks. With the growing popularity of secure hypertext transfer protocol (HyperText Transfer Protocol over Secure Socket Layer, HTTPS), inspecting the encrypted traffic is necessary. The traditional decryption-and-then-encryption method has the drawback of privacy leaking. Decrypting encrypted packets for inspection violates the confidentiality goal of HTTPS. Now, people are faced with a dilemma: choosing between the middlebox’s ability to perform detection functions and protecting the privacy of their communications. We propose OTEPI, a system that simultaneously provides both of those properties. The approach of OTEPI is to perform the deep packet inspection directly on the encrypted traffic. Unlike machine and deep learning methods that can only classify traffic, OTEPI is able to accurately identify which detection rule was matched by the encrypted packet. It can facilitate network managers to manage their networks at a finer granularity. OTEPI achieves the function through a new protocol and new encryption schemes. Compared with previous works, our approach achieves rule encryption with oblivious transfer (OT), which allows our work to achieve a better balance between communication traffic consumption and computational resource consumption. And our design of Oblivious Transfer and the use of Natural Language Processing tools make OTEPI outstanding in terms of computational consumption.
23

Park, Jiwoo, Minsu Kim, and Kwangsue Chung. "Buffer-based rate adaptation scheme for HTTP video streaming with consistent quality." Computer Science and Information Systems, no. 00 (2021): 21. http://dx.doi.org/10.2298/csis200820021p.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recently, HyperText Transfer Protocol (HTTP) based adaptive streaming (HAS) has been proposed as a solution for efficient use of network resources. HAS performs rate adaptation that adjusts the video quality according to the network conditions. The conventional approaches for rate adaptation involve accurately estimating the available bandwidth or exploiting the playback buffer in HAS clients rather than estimating the network bandwidth. In this paper, we present a playback buffer model for rate adaptation and propose a new buffer-based rate adaptation scheme. First, we model the playback buffer as a queueing system that stores video segments. The proposed scheme selects the next video bitrate that minimizes the difference between the current buffer occupancy and the expected value from the playback buffer model. The evaluation results indicated that the proposed scheme achieves higher video quality than conventional algorithms and can cope with various environments without the tuning of the configuration parameters.
24

Akasiadis, Charilaos, Vassilis Pitsilis, and Constantine D. Spyropoulos. "A Multi-Protocol IoT Platform Based on Open-Source Frameworks." Sensors 19, no. 19 (September 28, 2019): 4217. http://dx.doi.org/10.3390/s19194217.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
25

Indrajaya, Muh Aristo, Rizana Fauzi, Hajra Rasmita Ngemba, and Syaiful Hendra. "Penerapan dan Analisis Perbandingan Metode Antrian Jaringan (Network Queuing) Pada Jaringan Local Area Network Fakultas Teknik Universitas Tadulako." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 9, no. 1 (April 11, 2022): 79–86. http://dx.doi.org/10.33019/jurnalecotipe.v9i1.2921.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Membanjirnya konten yang diakses oleh civitas akademika di lingkungan kampus menuntut kinerja jaringan yang handal, terutama dalam menangani beban trafik data yang tinggi. Seringkali yang terjadi adalah ketika beban trafik data meningkat, kualitas layanan data yang dapat diberikan akan menurun. Hal ini tentu saja berdampak buruk, terutama layanan komunikasi yang membutuhkan kehandalan tinggi seperti layanan VoIP atau video conference. Untuk mengatasi hal tersebut maka perlu diterapkan suatu metode antrian data yang mampu mengatur distribusi beban lalu lintas data secara efektif dan mampu bekerja dengan baik di segala kondisi beban lalu lintas. Penelitian ini akan mensimulasikan jaringan komputer lokal yang berada di Fakultas Teknik Universitas Tadulako menggunakan tiga jenis metode antrian trafik data yaitu First In First Out (FIFO), Priorityt Queuing (PQ), dan Weighted Fair Queuing (WFQ) dimana tiga protokol akan diuji untuk mengelola tiga jenis layanan yang sering digunakan, antara lain layanan konferensi video, Voice Over Internet Protocol (VoIP), dan Hypertext Transfer Protocol (HTTP) dalam kondisi beban trafik tinggi. Hasil penelitian ini menunjukkan bahwa metode PQ memiliki keunggulan dalam menangani beban trafik data yang tinggi.
26

Indrajaya, Muh Aristo, Rizana Fauzi, Hajra Rasmita Ngemba, and Syaiful Hendra. "Penerapan dan Analisis Perbandingan Metode Antrian Jaringan (Network Queuing) Pada Jaringan Local Area Network Fakultas Teknik Universitas Tadulako." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 9, no. 1 (April 11, 2022): 79–86. http://dx.doi.org/10.33019/jurnalecotipe.v9i1.2921.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Membanjirnya konten yang diakses oleh civitas akademika di lingkungan kampus menuntut kinerja jaringan yang handal, terutama dalam menangani beban trafik data yang tinggi. Seringkali yang terjadi adalah ketika beban trafik data meningkat, kualitas layanan data yang dapat diberikan akan menurun. Hal ini tentu saja berdampak buruk, terutama layanan komunikasi yang membutuhkan kehandalan tinggi seperti layanan VoIP atau video conference. Untuk mengatasi hal tersebut maka perlu diterapkan suatu metode antrian data yang mampu mengatur distribusi beban lalu lintas data secara efektif dan mampu bekerja dengan baik di segala kondisi beban lalu lintas. Penelitian ini akan mensimulasikan jaringan komputer lokal yang berada di Fakultas Teknik Universitas Tadulako menggunakan tiga jenis metode antrian trafik data yaitu First In First Out (FIFO), Priorityt Queuing (PQ), dan Weighted Fair Queuing (WFQ) dimana tiga protokol akan diuji untuk mengelola tiga jenis layanan yang sering digunakan, antara lain layanan konferensi video, Voice Over Internet Protocol (VoIP), dan Hypertext Transfer Protocol (HTTP) dalam kondisi beban trafik tinggi. Hasil penelitian ini menunjukkan bahwa metode PQ memiliki keunggulan dalam menangani beban trafik data yang tinggi.
27

Et al., Abed. "Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms." Baghdad Science Journal 16, no. 1 (March 11, 2019): 0130. http://dx.doi.org/10.21123/bsj.2019.16.1.0130.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual resource, by combining two types of algorithms: dynamic algorithm (adaptive firefly) and static algorithm (weighted round robin). The results show improvement in resource utilization, increased productivity, and reduced response time.
28

Chaubet, Allan, George Henrique de Oliveira, Gustavo Valeira, and Cristiano Akamine. "Practical tests with MMT and ROUTE/DASH on the transport layer of ATSC 3.0." SET INTERNATIONAL JOURNAL OF BROADCAST ENGINEERING 2020, no. 6 (August 1, 2020): 56–65. http://dx.doi.org/10.18580/setijbe.2020.5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The development of new technologies allowed television systems to evolve over time. For the transport layer, the Movie Pictures Expert Group (MPEG) developed several standards to deliver multimedia content, including the MPEG-2 Transport Stream (TS), which has been widely explored for years. However, it was developed before the spread of the internet, which led to the interest in a new standard that could fulfill the needs from a connected world. One of these standards is the MPEG Multimedia Transport (MMT), which has inherited some features from the MPEG-2 TS, adapting them to be compatible with the Internet Protocol (IP). The broadband systems also needed a new standard compatible with Hypertext Transfer Protocol (HTTP), resulting in the development of the MPEG-Dynamic Adaptive Streaming over HTTP (DASH). To deliver DASH on broadcast channels, it was combined with the Real-time Object delivery over Unidirectional Transport (ROUTE) protocol. The Advanced Television Systems Committee 3.0 (ATSC 3.0) adopted many technologies to attend the requirements for the next generation of television systems, including both MMT and ROUTE/DASH. This paper presents a historic background of these delivery methods, as well as a brief technical review, focusing on a practical setup to test the methods mentioned, analyzing the differences and similarities of their properties.
29

Madani, Krisna, Rahmi Hidayati, and Uray Ristian. "Sistem Update Firmware Perangkat IoT Menggunakan Teknik OTA Berbasis HTTP." JURIKOM (Jurnal Riset Komputer) 9, no. 4 (August 30, 2022): 1160. http://dx.doi.org/10.30865/jurikom.v9i4.4685.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Firmware is software that resembles an operating system and embedded in the hardware. On Internet of Things (IoT) devices, the already installed firmware will not be updated for the specified time or will not even be updated at all. This is because the firmware is considered a system whose needs and functions do not need to be changed. However, in reality the firmware that is already installed and is being run definitely needs a change. The update process generally also uses conventional methods, namely by connecting devices on a computer using a cable. This method is of course not effective and efficient to do, especially if you have many devices installed and running. Therefore, in this study, an update system was created to update devices using the internet network. The update system built on this study using Over The Air (OTA) techniques and Hypertext Transfer Protocol (HTTP). In testing the update process with 3 IoT devices simultaneously, the average time needed by device 1, device 2 and device 3 is 43 seconds, 44 seconds and 45 seconds. In the QoS analysis carried out, the results obtained throughput of 100% (very good), packet loss of 0% (very good), average delay of 93,931ms (very good) and jitter of 98,948ms (medium) on the network used for updating
30

Warsito, Ary Budi, Ajeng Ananda, and Dian Triyanjaya. "Penerapan Data JSON Untuk Mendukung Pengembangan Aplikasi Pada Perguruan Tinggi Dengan Teknik Restfull Dan Web Service." Technomedia Journal 2, no. 1 (August 27, 2017): 26–36. http://dx.doi.org/10.33050/tmj.v2i1.313.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Data adalah salah satu komponen penting dalam sebuah aplikasi. Di perlukan sebuah database untuk menyimpan data dalam jumlah besar sebagai media pendistribusian data dari server ke client. Banyak nya aplikasi pada sebuah perguruan tinggi membutuhkan bandwidth yang besar untuk keperluan pengambilan data untuk di sajikan sebagai sistem informasi yang sangat berguna untuk berbagai kepentingan. Web Service sangat berperan penting pada kasus ini dimana, client yang seharusnya mengakses melalui jalur yang berbeda ke database akan di alihkan ke dalam web service dalam proses pengambilan data untuk meringankan kerja database yang harus berulang ulang melayani permintaan dari client. Arsitektur REST, yang pada dasarnya di oprasikan melalui HTTP (Hypertext Transfer Protocol), yang mengacu pada proses pembacaan halaman web tertentu yang berisi sebuah file JSON. File inilah yang menguraikan dan memuat konten yang hendak disajikan kepada konsumen. Setelah melalui sebuah proses definisi tertentu, konsumen akan bisa mengakses antarmuka aplikasi yang tersedia. Kata Kunci : Database, Web Service, permintaan Data is one of the important components in an application. In need of a database to store large amounts of data as a medium for the distribution of data from the server to the client. Many of its application on a college requires a large bandwidth for data retrieval purposes toserved as an information system that is very useful for various purposes. Web Service is very important in this case where, clients should access through different pathways to the database will switch to the web service in the data collection process to alleviate the database that should be repeated requests from the client. REST architecture, which is basically in oprasik an via HTTP (Hypertext Transfer Protocol), which refers to the process of reading a specific web page that contains a JSON file. It is this file that describes and includes the content to be presented to consumers. After going through a process of certain definitions, consumers will be able to access the application interface is available. Keywords: Database, Web Service, request
31

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as the attack parameter. Recently, a new type of XML-based Denial-of-Service (XDoS) attacks has surfaced, which targets the web services. The purpose of these attacks is to consume the system resources by sending SOAP requests that contain malicious XML content. Unfortunately, these malicious requests go undetected underneath the network or transportation layers of the Transfer Control Protocol/Internet Protocol (TCP/IP), as they appear to be legitimate packets.In this paper, a middleware tool is proposed to provide real time detection and prevention of XDoS and HTTP flooding attacks in web service. This tool focuses on the attacks on the two layers of the Open System Interconnection (OSI) model, which are to detect and prevent XDoS attacks on the application layer and prevent flooding attacks at the Network layer.The rule-based approach is used to classify requests either as normal or malicious,in order to detect the XDoS attacks. The experimental results from the middleware tool have demonstrated that the rule-based technique has efficiently detected and prevented theattacks of XDoS and HTTP flooding attacks such as the oversized payload, coercive parsing and XML external entities close to real-time such as 0.006s over the web services. The middleware tool provides close to 100% service availability to normal request, hence protecting the web service against the attacks of XDoS and distributed XDoS (DXDoS).\
32

Pozo, Alejandro, Álvaro Alonso, and Joaquín Salvachúa. "Evaluation of an IoT Application-Scoped Access Control Model over a Publish/Subscribe Architecture Based on FIWARE." Sensors 20, no. 15 (August 4, 2020): 4341. http://dx.doi.org/10.3390/s20154341.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) brings plenty of opportunities to enhance society’s activities, from improving a factory’s production chain to facilitating people’s household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices’ resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system’s performance.
33

Khudhur, Dhuha Dheyaa, and Muayad Sadik Croock. "Developed security and privacy algorithms for cyber physical system." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5379. http://dx.doi.org/10.11591/ijece.v11i6.pp5379-5389.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
34

Daud, Guiamarudin S., and Mohaymin A. Maguid. "Secured Cotabato City State Polytechnic College Web-Based Student Clearance System." Randwick International of Social Science Journal 3, no. 1 (January 16, 2022): 61–66. http://dx.doi.org/10.47175/rissj.v3i1.372.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The study describes the Secured CCSPC Web-Based Student Clearance System's use and predicted effects. Hypertext Transfer Protocol (HTTP), Hypertext Preprocessor (PHP), Sublime editor, Bootstrap, and MySQL as the database tool were used to create the clearance system. This system includes two-factor authentication for students and designated offices. In the clearance system, a Secure Socket Layer (SSL) for data transit, as well as a software firewall and anti-SQL Injection attack, were offered and implemented. The CCSPC Portal was linked to the web-based student clearance system and Web API, with Web API acting as a bridge between SIMone and the clearance system. SIMone's role is to offer just a limited amount of information on the web-based clearing, such as designated office operations, account status from the Cashier, and student profiles from the Registrar. Students and the approved offices in charge of signing the student clearance include the Graduating Class Association (GCA) Treasurer, Laboratory Custodian, Cashier, Librarian, Academic Related Services (ARS), SPEED Director, Department Chairperson, College Dean, and the Registrar. The ISO 9126-1 International Standard Tool for Software Evaluation, on the other hand, was utilized in the CCSPC beneficiaries' surveys to test the system's effectiveness and reliability.
35

Deroussi, Anass, Abdessalam Ait Madi, Imam Alihamidi, Lalla Amina Charaf, Mohammed Saber, Anass Erraoui, and Adnane Addaim. "A novel autonomous remote system applied in agriculture using transmission control protocol." International Journal of Reconfigurable and Embedded Systems (IJRES) 11, no. 1 (March 1, 2022): 1. http://dx.doi.org/10.11591/ijres.v11.i1.pp1-12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<span lang="EN-US">An internet of things (IoT) irrigation system is challenged by several issues, such as cost, energy consumption, and data storage. This paper proposes a novel energy-efficient, cost-effective IoT system called "NewAgriCom" to monitor agricultural field water flow. NewAgriCom works with an embedded energy harvesting system, is an autonomous remote supervisory control and data acquisition (SCADA) based on a general packet radio service (GPRS) cellular network that effectively communicates irrigation field data to the Node.js server using SIM808 EVBV3.2 modem. In javascript object notation (JSON) format, data is transmitted over the hypertext transfer protocol (HTTP) protocol to the MySQL database. Then data are transferred to the proposed IoT platform, which gives us a hand to control actuators, visualise, store and download the data. NewAgriCom can significantly reduce water consumption. It can set a schedule to control water automatically at specific times in various modes, including normal, light, and deep sleep modes. It regularly provides the location, time, signal strength, and the state of actuators with the identifier of every device remotely on the IoT Platform.</span><p> </p>
36

Suthendra, Juan Andrew, and Magdalena Ariance Ineke Pakereng. "Implementation of Microservices Architecture on E-Commerce Web Service." ComTech: Computer, Mathematics and Engineering Applications 11, no. 2 (December 16, 2020): 89–95. http://dx.doi.org/10.21512/comtech.v11i2.6453.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The research aimed to make e-commerce web services using a microservices architecture. Web service was built using Representational State Transfer Protocol (REST) with Hypertext Transfer Protocol (HTTP) method and JavaScript Object Notation (JSON) response format. Meanwhile, the microservices architecture was developed using Domain-driven Design (DDD) approach. The research began by analyzing e-commerce business processes and was modeled using Unified Modeling Language (UML) based on business process analysis. Next, the bounded context was used to make a small responsible service for a function. The Programming language used to make the system was Go programming language with Go-kit tool and apply database-per-service pattern for data management. The system also applied the concept of containerization using Docker as the container platform and using API Gateway to manage each endpoint. Last, the evaluation process was carried out using the Postman application by testing each endpoint based on the white-box testing method. Based on the results of the evaluation process, the e-commerce web service can work as expected. The results also show that the system has a high level of resilience. It means that the system has a low level of dependencies between services and adapts to future changes.
37

Nur, M. Adnan, and Nurilmiyanti Wardhani. "Mobile Application Bimbingan Tugas Akhir Mahasiswa Pada Stmik Handayani Makassar Sebagai Media Pendukung Pembelajaran Daring." Jurnal Fokus Elektroda : Energi Listrik, Telekomunikasi, Komputer, Elektronika dan Kendali) 6, no. 4 (November 30, 2021): 181. http://dx.doi.org/10.33772/jfe.v6i4.20608.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Penelitian ini bertujuan untuk mengembangkan serta menguji akses antara mobile application yang dibangun dengan framework apache cordova dan web server apache melalui hypertext transfer protocol (HTTP) menggunakan Object XHR dari Javascript. Aplikasi yang dibangun menggunakan studi kasus bimbingan tugas akhir pada STMIK Handayani Makassar. Penelitian ini dilaksanakan menggunakan metode research and development (R & D) yang terdiri atas beberapa tahapan yaitu tahap analisis meliputi tinjauan terhadap penggunaan framework apache cordova dan web service, tahap perancangan menggunakan unified modelling language, tahap pembuatan aplikasi dan tahap pengujian menggunakan metode blackbox. Hasil penelitian menunjukkan bahwa seluruh fungsi aplikasi dapat mengakses data dari web service. Terdapat perbedaan waktu request data server ketika aplikasi dijalankan pada emulator (google chrome) dan aplikasi yang diinstalasi langsung pada perangkat android dengan sistem operasi MIUI OS dan ColorOS. Request data server dengan emulator lebih cepat dengan perbedaan waktu yang tidak begitu signifikan yaitu rata-rata selisih waktu hanya 41,76 ms untuk MIUI OS dan 46,52 ms untuk ColorOS.
38

Zhang, Hongxian, Yanli Zeng, Xiaoting Guo, Honghe Chen, Guanlin Liu, and Qingya Wang. "Data Analysis System Based on REST Architecture for In-Pipe Inspection." Journal of Physics: Conference Series 2337, no. 1 (September 1, 2022): 012007. http://dx.doi.org/10.1088/1742-6596/2337/1/012007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract To solve the problems of high maintenance cost, low reusability and poor scalability of in-pipe inspection data analysis system, an in-pipe inspection data analysis system based on REST (Representational State Transfer) architecture is designed and implemented. A multilayer service-oriented architecture based on REST is designed, which decouples the functions of client, middleware, server and data storage to improve the maintainability of the software. REST APIs (Application Program Interfaces) based on HTTP (Hypertext Transfer Protocol) are designed, which encapsulate the core functions such as data analysis, signal processing, automatic identification and quantization into language and platform independent services to meet the needs of multiuser, cross platform and online data analysis. An adaptation method of in-line inspection tool based on metadata is designed, which abstracts the in-line inspection tool into a separate metadata file and decouples it from the client and server programs to improve the scalability of the software. Practice has proved the architecture can improve the maintainability, reusability and scalability of the software, and provide a basis for constructing online in-pipe inspection data analysis service based cloud.
39

Priadi, Doni. "Measurement of Quality of Service (QoS) in File Sharing Applications with the Android-Based Client Server Method." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 6, no. 1 (May 7, 2018): 39–49. http://dx.doi.org/10.33795/jartel.v6i1.144.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this research, an application is made that can make it easier to transfer files or data by utilizing a wifi connection on a network and then transferring files via a web browser using Hypertext Transfer Protocol (HTTP) server technology which will be installed on an Android-based smartphone. After that, it is necessary to measure network performance to determine the quality of the network in accessing the application. The measured performance is Quality of Service (QoS), which is a parameter that shows the quality of data packets on the network. Based on the results of measurements carried out by connecting the server to the AH building network and the client accessing from the AI ??building network at the State Polytechnic of Malang, when compared to the ITU-T standard, the application delay is in the very good category, jitter is in the bad category, the throughput value depends on the size. data sent. For packet loss, it is in the very good category. Meanwhile, based on measurements made using the Apache benchmark software, out of the 1000 requests that were tested, none of them failed or failed.
40

Revay, Lukas, and Ivan Zelinka. "Swarm Inteligence in Virtual Environment." Journal of Advanced Engineering and Computation 3, no. 2 (June 30, 2019): 415. http://dx.doi.org/10.25073/jaec.201932.242.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
To simulate some behavior of swarms, the malware was selected as a carrier of intelligence. This article describes the current solution which is fully virtual. This gives us a possibility to interfere environment and see how the improved malware will react. This common intention provides improvements related to docker images and also architectural that is related to code changes. Communication over network together with cooperation on particle level is a key part of this solution. Malware movements are the same as movements of swarm particles, which fully fit this requirement. Significance is also put on the swarming part, where the decision which swarms algorithm to utilize is crucial. The outcome from this work should be partly practical and theoretical related to environment setup, particles communication, movements and coordination which finally finishes in distributed denial of service (DDoS) coordinated attack via hypertext transfer protocol (HTTP) to some server. After this theoretical work, the practical simulation will be done to see if the swarm attack brings expected results. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.
41

Varthis, Evagelos, Marios Poulos, Ilias Giarenis, and Sozon Papavlasopoulos. "A novel framework for delivering static search capabilities to large textual corpora directly on the Web domain: an implementation for Migne’s Patrologia Graeca." International Journal of Web Information Systems 17, no. 3 (May 19, 2021): 153–86. http://dx.doi.org/10.1108/ijwis-10-2020-0062.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose This study aims to provide a system capable of static searching on a large number of unstructured texts directly on the Web domain while keeping costs to a minimum. The proposed framework is applied to the unstructured texts of Migne’s Patrologia Graeca (PG) collection, setting PG as an implementation example of the method. Design/methodology/approach The unstructured texts of PG have automatically transformed to a read-only not only Structured Query Language (NoSQL) database with a structure identical to that of a representational state transfer access point interface. The transformation makes it possible to execute queries and retrieve ranked results based on a specialized application of the extended Boolean model. Findings Using a specifically built Web-browser-based search tool, the user can quickly locate ranked relevant fragments of texts with the ability to navigate back and forth. The user can search using the initial part of words and by ignoring the diacritics of the Greek language. The performance of the search system is comparatively examined when different versions of hypertext transfer protocol (Http) are used for various network latencies and different modes of network connections. Queries using Http-2 have by far the best performance, compared to any of Http-1.1 modes. Originality/value The system is not limited to the case study of PG and has a generic application in the field of humanities. The expandability of the system in terms of semantic enrichment is feasible by taking into account synonyms and topics if they are available. The system’s main advantage is that it is totally static which implies important features such as simplicity, efficiency, fast response, portability, security and scalability.
42

Mahzabin, Rahnuma, Fahim Hossain Sifat, Sadia Anjum, Al-Akhir Nayan, and Muhammad Golam Kibria. "Blockchain associated machine learning and IoT based hypoglycemia detection system with auto-injection feature." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (July 1, 2022): 447. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp447-455.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Hypoglycemia is an unpleasant phenomenon caused by low blood glucose. The disease can lead a person to death or a high level of body damage. <br /> To avoid significant damage, patients need sugar. The research aims at implementing an automatic system to detect hypoglycemia and perform automatic sugar injections to save a life. Receiving the benefits of the internet of things (IoT), the sensor’s data was transferred using the hypertext transfer protocol (HTTP) protocol. To ensure the safety of health-related data, blockchain technology was utilized. The glucose sensor and smartwatch data were processed via Fog and sent to the cloud. A Random Forest algorithm was proposed and utilized to decide hypoglycemic events. When the hypoglycemic event was detected, the system sent a notification to the mobile application and auto-injection device to push the condensed sugar into the victim’s body. XGBoost, k-nearest neighbors (KNN), support vector machine (SVM), and decision tree were implemented to compare the proposed model's performance. The random forest performed 0.942 testing accuracy, better than other models in detecting hypoglycemic events. The system’s performance was measured in several conditions, and satisfactory results were achieved. The system can benefit hypoglycemia patients to survive this disease.
43

Ciuffoletti, Augusto. "Design of an Open Remote Electrocardiogram (ECG) Service." Future Internet 11, no. 4 (April 24, 2019): 101. http://dx.doi.org/10.3390/fi11040101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Currently, the deployment of services for real-time delivery of an electrocardiogram to a remote site has a cost that prevents its widespread diffusion, which would contribute to saving lives with prevention, assistance and rescue efficiency. To fill this gap, we introduce the design of a remote electrocardiogram service that privileges open, low-cost options. The architecture is based on the HyperText Transfer Protocol (HTTP) and uses commercial off-the-shelf devices to implement the sensor on the patient’s side. The doctor uses a laptop browser to display the tracing, and a cloud computing instance connects the two using WebSockets. A prototype is built to evaluate overall performance, the power consumption of the patient’s side device, and the quality of rendering on doctor’s browser. The patient’s sensor prototype device is portable, and its power consumption is below 1 Watt, thus allowing a daylong autonomy when operated on batteries. Its cost is below 50$, and the required hardware is commercially available. The whole design is ready for on-field evaluation, and it is available in a public repository.
44

Ala-Laurinaho, Riku, Juuso Autiosalo, and Kari Tammi. "Open Sensor Manager for IIoT." Journal of Sensor and Actuator Networks 9, no. 2 (June 19, 2020): 30. http://dx.doi.org/10.3390/jsan9020030.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Data collection in an industrial environment enables several benefits: processes and machinery can be monitored; the performance can be optimized; and the machinery can be proactively maintained. To collect data from machines or production lines, numerous sensors are required, which necessitates a management system. The management of constrained IoT devices such as sensor nodes is extensively studied. However, the previous studies focused only on the remote software updating or configuration of sensor nodes. This paper presents a holistic Open Sensor Manager (OSEMA), which addresses also generating software for different sensor models based on the configuration. In addition, it offers a user-friendly web interface, as well as a REST API (Representational State Transfer Application Programming Interface) for the management. The manager is built with the Django web framework, and sensor nodes rely on ESP32-based microcontrollers. OSEMA enables secure remote software updates of sensor nodes via encryption and hash-based message authentication code. The collected data can be transmitted using the Hypertext Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT). The use of OSEMA is demonstrated in an industrial domain with applications estimating the usage roughness of an overhead crane and tracking its location. OSEMA enables retrofitting different sensors to existing machinery and processes, allowing additional data collection.
45

Ohe, K., S. Kaihara, and T. Kiuchi. "Using a WWW-based Mail User Agent for Secure Electronic Mail Service for Health Care Users." Methods of Information in Medicine 37, no. 03 (July 1998): 247–53. http://dx.doi.org/10.1055/s-0038-1634539.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.
46

Maya Kadarina, Trie. "Otomatisasi Perekaman Foto Intraoral Gigi untuk Rekam Medis Elektronik Menggunakan Internet of Things." Jurnal Teknologi Elektro 11, no. 1 (February 1, 2020): 56. http://dx.doi.org/10.22441/jte.2020.v11i1.008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Salah satu manfaat dari implementasi Internet of Things (IoT) dalam dunia kesehatan adalah otomatisasi pengumpulan data dari perangkat medis yang bertujuan untuk mengurangi peran manusia sehingga dapat meminimalisir kesalahan input data dan meningkatkan kualitas data yang dihasilkan. Dalam praktik kedokteran gigi, seringkali dibutuhkan penggunaan kamera yang mencakup rongga mulut pasien (intraoral). Akan tetapi, kamera intraoral yang ada saat ini umumnya menggunakan kabel yang dapat dihubungkan ke komputer. Adapula yang menggunakan kartu memori sebagai penyimpan sementara sebelum dipindahkan ke komputer tempat menyimpan rekam medis elektronik (RME). Penggunaan kabel atau kartu memori tersebut memunculkan keterbatasan, seperti permasalahan instalasi atau efisiensi waktu perekaman. Untuk itu dalam penelitian ini sebuah perangkat medis dibuat dengan memanfaatkan Raspberry Pi dan koneksi internet nirkabel sehingga gambar yang direkam melalui kamera intraoral tersebut dapat langsung dikirim ke server penyimpan data medis tanpa harus terhubung secara fisik dan berkas yang tersimpan dapat langsung dikelola oleh aplikasi server. Aplikasi pada Raspberry Pi mengolah citra dan menyeleksi foto intraoral gigi dengan metode histogram correlation untuk dikirim ke server menggunakan Hypertext Transfer Protocol (HTTP). Hasil pengujian sistem menujukkan bahwa sistem telah berhasil mengambil, memilah dan mengirim gambar dari kamera intraoral ke server dengan waktu respon antara 1,5 sampai 1,9 detik.
47

Akinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (July 21, 2022): 2536. http://dx.doi.org/10.3390/math10142536.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
To provide a low-cost methodical way for inference-driven insight into the assessment of SDN operations, a behavioral study of key network parameters that predicate the proper functioning and performance of software-defined networks (SDNs) is presented to characterize their alterations or variations, given various emulated SDN scenarios. It is standard practice to use simulation environments to investigate the performance characteristics of SDNs, quantitatively and qualitatively; hence, the use of emulated scenarios to typify the investigated SDN in this paper. The key parameters studied analytically are the jitter, response time and throughput of the SDN. These network parameters provide the most vital metrics in SDN operations according to literature, and they have been behaviorally studied in the following popular SDN states: normal operating condition without any incidents on the SDN, hypertext transfer protocol (HTTP) flooding, transmission control protocol (TCP) flooding, and user datagram protocol (UDP) flooding, when the SDN is subjected to a distributed denial-of-service (DDoS) attack. The behavioral study is implemented primarily via univariate and multivariate exploratory data analysis (EDA) to characterize and visualize the variations of the SDN parameters for each of the emulated scenarios, and linear regression-based analysis to draw inferences on the sensitivity of the SDN parameters to the emulated scenarios. Experimental results indicate that the SDN performance metrics (i.e., jitter, latency and throughput) vary as the SDN scenario changes given a DDoS attack on the SDN, and they are all sensitive to the respective attack scenarios with some level of interactions between them.
48

Mihalkovich, Aleksejus, Eligijus Sakalauskas, and Kestutis Luksys. "Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem." Symmetry 12, no. 9 (August 20, 2020): 1389. http://dx.doi.org/10.3390/sym12091389.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial complete (NP-Complete) decisional problem. Recently there are no known quantum cryptanalysis algorithms effectively solving NP-Complete problems. So far, KEPs are widely used in secure communication channel creation, e.g., in hypertext transfer protocol secure (https://) and are based on traditional cryptographic primitives representing commutative cryptography. However, the security of these protocols does not rely on NP-Complete problems and hence, according to P. W. Shorr, they are vulnerable to quantum cryptanalysis. We use one of seven non-commuting groups of order 16 which is not isomorphic to any other group to define a platform group for a key exchange protocol based on previously considered matrix power function (MPF). By investigating basic properties on the group M16 and their implementation for our goals we fix the order of actions in MPF from left to right. Furthermore, we define a special form of the base matrix and separate templates for left and right power matrices. Using properties of the specified templates and Schaeffer criteria we prove that the security of the proposed key exchange relies on an NP-Complete decisional problem.
49

Ashok Kumar, Ponnai Manogaran, Lakshmi Narayanan Arun Raj, B. Jyothi, Naglaa F. Soliman, Mohit Bajaj, and Walid El-Shafai. "A Novel Dynamic Bit Rate Analysis Technique for Adaptive Video Streaming over HTTP Support." Sensors 22, no. 23 (November 29, 2022): 9307. http://dx.doi.org/10.3390/s22239307.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recently, there has been an increase in research interest in the seamless streaming of video on top of Hypertext Transfer Protocol (HTTP) in cellular networks (3G/4G). The main challenges involved are the variation in available bit rates on the Internet caused by resource sharing and the dynamic nature of wireless communication channels. State-of-the-art techniques, such as Dynamic Adaptive Streaming over HTTP (DASH), support the streaming of stored video, but they suffer from the challenge of live video content due to fluctuating bit rate in the network. In this work, a novel dynamic bit rate analysis technique is proposed to model client–server architecture using attention-based long short-term memory (A-LSTM) networks for solving the problem of smooth video streaming over HTTP networks. The proposed client system analyzes the bit rate dynamically, and a status report is sent to the server to adjust the ongoing session parameter. The server assesses the dynamics of the bit rate on the fly and calculates the status for each video sequence. The bit rate and buffer length are given as sequential inputs to LSTM to produce feature vectors. These feature vectors are given different weights to produce updated feature vectors. These updated feature vectors are given to multi-layer feed forward neural networks to predict six output class labels (144p, 240p, 360p, 480p, 720p, and 1080p). Finally, the proposed A-LSTM work is evaluated in real-time using a code division multiple access evolution-data optimized network (CDMA20001xEVDO Rev-A) with the help of an Internet dongle. Furthermore, the performance is analyzed with the full reference quality metric of streaming video to validate our proposed work. Experimental results also show an average improvement of 37.53% in peak signal-to-noise ratio (PSNR) and 5.7% in structural similarity (SSIM) index over the commonly used buffer-filling technique during the live streaming of video.
50

Маслов, Н. Д., and Е. В. Попова. "INVESTIGATION OF THE WEB SERVICE ACCESS MODEL ASP.NET USING A PROXY ASSEMBLY ON THE EXAMPLE OF DEVELOPING A VIDEO RENTAL SERVICE." Южно-Сибирский научный вестник, no. 5(39) (October 31, 2021): 23–28. http://dx.doi.org/10.25699/sssb.2021.39.5.023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
В статье рассматривается исследование модели соединения Web-приложения и Web-службы напрямую и через прокси. Рассматривается кроссплатформенная высокопроизводительная среда ASP.NET. При разработке используется паттерн MVC. Формирование запросов реализуется с помощью архитектурного стиля REST и протокола передачи гипертекста HTTP. Строится модель взаимодействия Web-приложения и Web-службы. Целью данной работы является исследование данной модели взаимодействия напрямую и через прокси. Были разработаны Web-приложение, являющееся сервисом по аренде видеофильмов и Web-служба, функциональное назначение которой – работа с базой данных Web-сервера. Для реализации прокси сборки было создан отдельный проект. В настройках проекта были прописаны протокол передачи данных, хост API, порт и роутинги перенаправления запросов. Исследование модели проводилось с помощью программного обеспечения Postman и инструментов браузера. Результаты исследования показывают плюсы и минусы использования прокси при взаимодействии Web-приложения и Web-службы. Данная статья поможет заказчикам, разработчикам Web-приложений выбрать модель соединения Web-приложения и Web-службы, соответствующую решаемым задачам. The article considers the study of the connection model of a Web application and a Web service directly and through a proxy. A cross-platform high-performance environment is considered ASP.Net. The MVC pattern is used during development. Request generation is implemented using the REST architectural style and the HTTP hypertext transfer protocol. A model of interaction between a Web application and a Web service is being built. The purpose of this work is to study this model of interaction directly and through a proxy. A Web application was developed, which is a video rental service and a Web service, the functional purpose of which is to work with a Web server database. A separate project was created to implement the build proxy. In the project settings, the data transfer protocol, API host, port and request forwarding routings were registered. A previously developed service was used as an API. The model was studied using Postman software and browser tools. The results of the study show the pros and cons of using a proxy when interacting with a Web application and a Web service. This article will help customers, developers of Web applications to choose a model for connecting a Web application and a Web service that corresponds to the tasks being solved.

До бібліографії