The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At the International Space Station (ISS) Mission Control Center, flight controllers and mission support staff utilize a large number of web-based applications to perform mission operations and crew support tasks. Although access to these applications is through a common web portal, they are separate systems, developed independently and in isolation from one another. To integrate information across...
In the present IT age, we are in need of fully automated industrial system. An embedded web based interface used for an industry application is designed in this paper. Here two parameters are being measured. One is sensed voltage of each line in the form of analog and then converts it into Digital signal and the second one is to amplification for the driven current, which is monitored and controlled...
Recently there has been increasing interest in building networks with Ambient Intelligence (AmI), which incorporates the user-centricity and context awareness. However, both the Internet TCP/IP protocol stack and the seven-layer OSI reference model are not suitable for AmI networks, because they do not specifically take the end-user requirements into consideration in their architecture design. Under...
This paper introduces the relevant contents of the software interface and web page display for LXI instruments. Based on the hardware and software environments, two methods of implementing the software interface for LXI instruments are introduced. The realization of operating panel with W3C for LXI instruments is described in detail. The techniques of implementing real-time interactive operating interface...
This paper describes the background of PDM, analyses the relationship between the Web technology and PDM technology, and puts forward a PDM system frame work based on Web technology, and then depicts the system in detail and introduces the Web environment of the system. Moreover, the advantages and disadvantages of PDM on the basis of Web technology are discussed in detail.
This paper introduced a remote monitor system of information appliance, it bases on the microprocessor of S3C2410 as the main controller and Linux as the embedded operate system. It represents the main function and composition of this system, through mounting the Web Server Boa and setting up the embedded remote visit and monitoring platform. Adopting HTML to design friendly man-machine interface...
Rich Internet Applications (RIAs) are a new generation of Internet applications. These applications solve the current needs of interaction and functionality in user interfaces: multimedia content incorporation, attractive applications and interactive data exploration, besides, RIAs solves different disadvantages of Web 1.0 applications such as processing overload on Web server and continuous updating...
As the popularity of WWW explodes, a massive amount of data is gathered by Web servers in the form of Web access logs which are rich source of information for understanding the Web user's surfing behavior. Web Usage Mining is an application of data mining algorithms to Web access logs to find trends and regularities in Web users' traversal pattern. Web page prediction technique is an important research...
The widespread use of Web applications, in conjunction with large number of vulnerabilities, makes them very attractive targets for malicious attackers. The increasing popularity of Web 2.0 applications, such as blogs, wikis, and social sites, makes Web servers even more attractive targets. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction...
This paper studies an architecture of multi-server Web industrial facility monitoring systems using only commercial-off-the-shelf (COTS) Web browser's existing functionality. First we introduce our original method of background change-of-state (CoS) communication while the user interface is focusing to a currently-connected foreground Web server. The method makes it possible for currently-not-connected...
Measurement-based research benefits greatly from efficient and minimum-effort management of large-scale data and their metadata. Effective data management has become a key in promoting data sharing within our community. During the past decade, a great deal of effort has been devoted to building Internet data archives. Several institutions run repositories where they post metadata of their collections,...
The classic web applications usually need a lot of bandwidth to provide the rich user interfaces. Since Ajax [8] was introduced, it has reduced the web server load and the data transfer to/from users' computers. By using Ajax, only a specific part in the web page can be requested to the web server [6]. However, it still cannot provide the real time data updating. The common approach to provide the...
Following a critical illness, technology-dependent children on chronic ventilator support require specialized care to facilitate recovery and rehabilitation that minimally impedes social and psychological development. Intervention strategies have been confounded by the need for frequent assessment via physical exam in a relatively immobile patient population. The availability of technology that enables...
In this paper, we investigate a real-time estimation system in HLA-based simulation systems. The use case and architecture of the system are analyzed. The main parts of the system, including the evaluation agent, the databases and the web-based result display systems are introduced. Towards the evaluation agent, the interface relationships are depicted. Then the structure and principle of evaluation...
Nagios is a popular network monitoring tool that can be used to monitor network services as well as data like processor load due to an SNMP interface. The visualization of status and alert messages can be conducted with a Web interface. Many plugins for the Nagios system are available that extend its features, also wrt. visualization of data. But so far, none of them allows users of PDAs like, e.g...
Current complex Web information system development normally consists of two independent steps: creating backend database structure using the underlying DBMS and implementing user interface by constructing dynamic Web pages using DB connectives such as JDBC, SQLJ, etc. These two steps lead to long development time, high costs and lacking of data independence. In this paper, we propose a novel personalized...
Before placing a web based application in the real servers of the real world with millions of users and going to serve them, it is needed to examine the functionality of the application which is under real work load stress to evaluate server and application for final conditions. This paper is focused on modeling of the user behavior by using data mining methods and extracting different types of application...
This paper presents an implementation of a platform-independent embedded Web server and its integration into a network of wireless sensor nodes. The embedded Web server is designed and built as an expansion module for one of the nodes in the wireless sensor network (WSN). It allows authorized Internet users to establish two-way communication with the sensor network. The server uses limited available...
The purpose of this research is to design and construct a prototype training management system (TMS) enabling university students in physical education to easily establish the Plan-Do-See Cycle (PDSC) for running. In system design, firstly, we considered required functions of the TMS. Secondly, we adopted a platform-independent Web-based system to the TMS. Thirdly, we considered security, privacy,...
Drive-by download is a term used to describe a download that happens without the knowledge or conscious intervention of the computer user. In computer security terms, a drive-by download is usually triggered by the exploitation of a vulnerability in an Internet browser. The file that is downloaded is usually a malicious program that installs itself on the victims computer, or is an installer for another...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.