The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduced a remote monitor system of information appliance, it bases on the microprocessor of S3C2410 as the main controller and Linux as the embedded operate system. It represents the main function and composition of this system, through mounting the Web Server Boa and setting up the embedded remote visit and monitoring platform. Adopting HTML to design friendly man-machine interface...
In recent years, Internet is widely used in a variety of areas in the society. Web Applications that are base on B/S mode are much more convenient than Applications based on C/S mode, because they don't need any clients. But, compared to B/S mode, C/S mode still has a great advantage in pushing instant messages to client from server. Consequently, How to implement pushing instant messages to web browser...
Web Access Pattern Mining (WAPM) technology can automatically discover such knowledge as users' access preferences, interests and trends etc from log files of web server or browser. It has gradually been one of hot topics in the web mining. Firstly, this paper presents a full general architecture model of WAPM system and introduces the work principles of main parts in this system. On the basis, many...
Protocol architecture for a web-sensor gateway interconnecting internet and wireless sensor network is investigated. The web-sensor gateway is to deliver data between TCP/IP and Zigbee/IEEE802.15.4 protocols, transparently. Since the gateway provides a means to remotely control and aggregate sensor data over the internet, it needs to be designed in the view point of users and in their convenience...
Matlab has big and powerful functions to scientific calculation. The Matlab applications that use the capabilities of the World Wide Web to send data to Matlab for computation and to display the results in a Web browser were studied by using Matlab Web server. A real physical experiment data treatment system adopted browser/server networking technique based on Matlab Web server has been developed...
The Web is a primary means of information sharing for most organizations and people. Currently, a recipient of Web content knows nothing about the environment in which that information was generated other than the specific server from whence it came (and even that information can be unreliable). In this paper, we develop and evaluate the Spork system that uses the trusted platform module (TPM) to...
This paper describes implementation of Web server using Altera Nios II embedded IP core, a configurable general purpose embedded RISC processor with embedded peripheral architecture. A Web server is a computer that delivers Web pages to other computers in the network. Every Web server has a unique IP address and possibly a domain name. Any computer can work as Web server by installing server software...
This paper presents a Web framework as an application of steganography. The framework enables us to stealthily organize a tree of Web objects behind another. The Web objects to be embedded are automatically assigned to cover files appropriately. When embedding is done, we obtain stego-objects those can be uploaded to a Web server as ordinary Web objects. We can retrieve files embedded in stego-objects...
Ajax is one of the core technologies of RIA, which implements the asynchronous interaction between the browser and the Web server. In traditional field geological map system of B/S mode, the disadvantages such as low visiting speed and bad security of such kind of field geological map system have emerged. To solve the problem of low visiting speed caused by the large-volume data of filed geological...
The recent spread of broadband Internet access, speeding up of JavaScript in Web browsers, and development of communications technology such as Ajax has led to the development of a variety of Web applications. The access congestion of Web servers and lower usability in the case of frequent requests are the major problems that affect the use of Web applications. In this study, we investigate the bottlenecks...
Cloud computing is a new cost-efficient computing paradigm in which information and computer power can be accessed from a Web browser by customers. Understanding the characteristics of computer service performance has become critical for service applications in cloud computing. For the commercial success of this new computing paradigm, the ability to deliver Quality of Services (QoS) guaranteed services...
In this paper, we show that Web protocols and technologies are good candidates to design the Internet of things. This approach allows anyone to access embedded devices through a Web application, via a standard Web browser. This Web of things requires to embed Web servers in hardware-constrained devices. We first analyze the traffics embedded Web servers have to handle. Starting from this analysis,...
In this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use a standard Web browser). We detail how this Web of Things can handle typical embedded devices interaction needs. We discuss the technical feasibility of embedded Web servers, and, thanks to an analysis of the Web protocols,...
We describe a platform for performing text and radiology analytics (TARA). We integrate commercially available hardware and middleware components to construct an environment which is well-suited for performing computationally intensive analyses of medical data. The system, termed a "medical analytical platform," adopts a client-server approach for the display and processing of radiology...
The XBRL report is being accepted as the main stream for financial reporting due to its irreplaceable advantages such as promptness, convenience and low cost. However, before the advent of Web2.0, the XBRL network model only allowed users to "read" and consult data with great difficulty in the generation of comprehensive and real-time reporting, i.e. personalized service was not supported...
Target strength (TS) of fish is important in order to convert acoustic integration values obtained by acoustic survey into estimates of fish abundance. A large indoor tank has been used in underwater acoustics experiments such as measurements of the target strength pattern of fish. It was equipped with an electric flatcar for the purpose of loading and positioning an ultrasonic transducer. A TS measurement...
This paper analyzes the problems within current anti-spoofing mechanisms and proposes a new SSL protected trust model. Then, this paper describes the attacks on SSL protected trust model. This paper also proposes the new automatic detecting security indicator (ADSI) scheme to defend against spoofing attacks on SSL protected Web servers. This paper describes the ADSI-based trust model. In a secure...
The cooperative mould work in different places under internet environment is constructed on the basis of Web technology, cooperative work theory, network database, networked CAD/CAM technology; together with the analysis of the actual needs of the mould manufacturing enterprise, the development and design of B/S structural mode can be realized. The article focuses on the major issues to be solved...
Malicious Web pages that launch drive-by-download attacks on Web browsers have increasingly become a problem in recent years. High-interaction client honeypots are security devices that can detect these malicious Web pages on a network. However, high-interaction client honeypots are both resource-intensive and unable to handle the increasing array of vulnerable clients. This paper presents a novel...
PKI (public key infrastructure) provides security functions on network, such as encryption of data, assurance that data are complete and user authentication, by public key encryption and so on. PKI begins to be built as an authentication base on a network by governments and universities. In Japan, UPKI (University Public Key Infrastructure) national academic authentication and authorization infrastructure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.