The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The SFSVC (Super Fast Support Vector Classifier) architecture is implemented to a computational mobile platform and its performances are evaluated against its implementation on a classic machine (personal computer). The aim of this article is to prove that the SFSVC architecture can have good performances on an environment with very limited resources by taking advantages of its compact structure and...
In this paper, a hybrid broadcast broadband TV (HbbTV) test system with the automatic testing subsystem is proposed. The proposed system is based on Node.js framework with SQLite database on the backend side and Polymer framework on the front-end side. The paper covers basic testing metodology and design process with the emphasis on the implementation and testing.
.NET platform is increasingly being used in software development industry. Many data access technologies have been developed on this platform, thus choosing a suitable technology has become a difficult task. In this paper, an empirical study on fetch performance comparison by conducting experiments on common test data set of selected data access libraries; ADO.NET, Dapper and Entity Framework Core...
This paper describes an innovative approach to standards education in an undergraduate mechanical engineering technology design course. The work is focused on making standards appeal to students by using “everyday objects” (e.g. toaster, ladder, grill, etc.) as catalysts to introduce the topic of standards in a way that connects to students' daily lives. The project involves instructor-librarian collaboration...
Library Automation and Digital Archive (Lontar) is a liblary information system developed by Universitas Indonesia and used by its main library. Rapid increase of library collections will soon make query performance of current SQL DBMS, which is MySQL, not fast enough to satisfy users and need to be complemented by NoSQL database, an emerging technology that specially developed for managing big data...
In this paper, we study an automatic testing system for public cloud on data security risks. To this end, we first establish a framework based on SOA (Service Oriented Architecture), which provides a capability to proceed data security tests on cloud automatically. Second, based on the framework we implement a cloud security testing system, which includes data confidentiality test and data deletion...
Gathering and analyzing statistic information is essential for every college or university, which cares about their students. This paper aims at giving theoretical overview of modern web page development and statistics gathering methods, analyzing present state of TUKE and designs a new statistics system, where emphasis is placed primarily on comfortable work of students with the system.
The boundary devices, such as routers, firewalls, proxies, and domain controllers, etc., are continuously generating logs showing the behaviors of the internal and external users, the working state of the network as well as the devices themselves. To rapidly and efficiently analyze these logs makes great sense in terms of security and reliability. However, it is a challenging task due to the fact...
This document represents a client server based application designed for the purpose of artefact recognition in a museum, based on photos made with the help of a mobile phone. Image recognition was conducted with the help of SURF (Speeded Up Robust Features) algorithm. Server was implemented with the usage of Netty library. Because of the parallel approach used both in the classification part and during...
To improve the shortage of the existing online examination system, a common online curriculum examination system is designed and realized. Mainly from the system function design, database design and security mechanisms design, the paper elaborates the implementation of the system. Many courses and a variety of questions can be taken into account by the system, and also flexible and comprehensive exam...
Research Center for Biology LIPI as research institutions have made use of ICT in improving the function of libraries with digital library system named BIOLIB. But because it was his application biolib many features that are not working properly. Therefore, Research Center for Biology require a new digital library system that can search a collection, booking reference, report the results of a reservation,...
The advantages of web applications have already got attention in major physical research facilities like Canadian Light Source (CLS). It is the accessability of web applications that makes them preferred to native desktop application in some experimental control scenarios. This short paper presents two web applications that were mainly developed at CLS — Science Studio for remote access and collaboration...
Open Source Software (OSS) represents an extremely valuable resource that is reused systematically almost in every software project. The reuse of OSS components however is restricted to ready-made components and developers who want to reuse code that exists in OSS projects but is not offered as a black-box component often resort to copying existing code and adapting it in their projects. OPEN-SME...
Today is the world of information era, where information is available on just our single click. Web applications are playing a magnificent role in this, every organizations are mapping their business from a room to the world with the help of these Web Apps. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable assets in any...
SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations...
Prompt updating against the latest security threats is important, and conveniently achieved by using patches (i.e., software updates) on both servers and PCs in a timely manner. To apply patches safely, however, their impact should be examined in advance. Administrators need to pinpoint all the software programs that are potentially influenced by a patch. Our patch impact analyzer monitors the program's...
According to the low efficiency of system testing, the longer test cycle, the single form of the test results, no standardized documents of tested results and other drawbacks of the traditional penetration testing system, this paper design and implement of an XML-based penetration testing system. The system uses SNMP, PING, Telnet and other ways to explore resource, is based on OVAL, CVE to assess...
There is a vital need to electronically preserve our cultural heritage as well as the digital outcomes of today's research, arts and humanities. Due to the rapid pace of changes in information technologies, digital data, documents and records are likely to become uninterpretable bit-streams within short periods of time. Digital Preservation deals with the long-term storage, access and maintenance...
Databases have become an integral part of the web applications in the current world. Database based applications have brought a revolution in the domain of information technology. These applications interact with the databases using Structured Query Language (SQL) queries embedded in the code. There are automated ways to test the applications written in imperative and structured languages. However,...
Grey diagnosis method is introduced in this paper. Grey relation analysis is applied in model identification of the fault diagnosis. Take example for the fault diagnosis for shipboard chemical defense equipment. The grey diagnosis methods for shipboard chemical defense equipment are studied by applying grey system theory and database. The theory of fault diagnosis by grey relation degree is put forward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.