The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents creating web system models. The aim of the work was to develop models of the distributed Internet system that allow the performance evaluation. From many possible methods we have selected Queueing Petri Nets consisted of two classes of formal models (Queuing Nets and Petri Nets). In the paper web systems are modeled by Queueing Petri Nets tool. The paper includes the selected results...
This paper presents an application of Natural Language Tool (NLT) to support the VPRG extraction of text based vulnerability description. The NLT is used to analyze the text-based vulnerability descriptions to retrieve vulnerability properties and evaluate their relationships. Then, a graph based VPRG model that describes the vulnerability can be established. Finally, with fine-tuning from domain...
The Reliability Information Analysis Center (RIAC), under contract to the Defense Technical Information Center (DTIC), is developing and implementing a Web-Accessible Repository of Physics-based Models (WARP) database and website to centrally organize and make available information and data on physics-based models. In addition to providing access to available Physics-of-Failure (PoF) model information...
In this paper we propose a web log mining-based network user behavior analysis scheme, which plays an important role in network structure optimization and website server configuration. Based on clustering and regression model, we studied the network user's visit model in a university by analyzing a large amount of web log data which is collected from the university campus network. The data analyzing...
Software plus Services might be the next step in the evolution of computing. Software plus Services is a concept that Software as a Service (SaaS) complements the traditional packaged software running on both client and server by services adding value. CephSmileV2 is dental application software for 2D cephalometric analysis, dental model analysis and focusing on orthodontics treatment planning and...
As knowledge and rules are hided in e-commerce data, how to mine them is not achieved well in the present e-commerce. IEC (Intelligent E-commerce) is proposed as the next period e-commerce and main feature is to mine e-commerce knowledge and rules from e-commerce data. An Extended K-Means algorithm is proposed to analyze customers' consumptions in the IEC and results indicate that the performance...
Information technology and network technology is developing rapidly, the relationship between firms and customers are becoming increasingly important. According to the management characteristics of CRM, the paper applies modeling methods and tools of UML to analyze and design sale management system online. This paper builds system development models, including the use case diagrams, the class diagrams,...
In current times, information system is a key part of the infrastructure for enterprises to run business. The efficiency and agility of the systems are vitally important for enterprises to survive. Business rule approach is a relevant new technique and can be used to assist enterprises to achieve business agility. This paper introduces briefly the concepts relating to business rule management techniques,...
The difficult issue of Web data mining is proposed to achieve Web data mining method, which is based on XML-based Web database in the face of semi-structured data structure excavation process, the data feature extraction process, we found the hidden rules and knowledge, the method is simple, effective and low cost. The paper first gives the definition of data mining; describes the process and commonly...
In this paper, we present a Decision Support System (DSS) framework for innovation management. The proposed framework utilizes the data acquired by a web based questionnaire which is filled in by the upper managers of the manufacturing companies. The DSS compares their answers with the responds of the other companies existing in the database of the DSS and determines the weak points of the company...
Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection...
The paper introduces knowledge service and its realization process, combined with the requirements of e-Learning, discusses the basic structure of e-Learning system, knowledge object, and gives the knowledge service model of the system. Based on Web applications as background, it presents framework and working process of e-Learning system, which satisfies the needs of Internet learning. The use effect...
Web service combination, which integrates independent and modular distributed services, has loosely coupled, location transparent, protocol independent and other characteristics, but it is still lack of autonomic, self-adaptive and self-organized characteristics, and it's difficult to deal with the complex, dynamic, open and uncertain Internet environment. A framework to improve composition adaptability...
With the wide range of community needs, the rapid development of information technology and the rapid extension of the Internet, modern distance education has been more and more widely used. However, the current prevalence distance education system has series of drawbacks such as poor intelligence, lacking interactive tools, the loose knowledge structure, not high degree of resource sharing. According...
Cultivating student-teacher's teaching ability has aroused more and more study, and in order to integrate theory with practices student-teacher needs classroom teaching experience. The Characteristics and advantages of streaming media and network can fulfill the needs of student-teacher. This paper provides some strategies and recommendations by using streaming media and internet to cultivating student-teacher's...
A real-time discrete event simulation platform for Internet end-system targeted attacks, EA-CPNsim, is presented in this paper. This platform provides support for modeling the targeted end-systems behavior and the attack effect, helping the system administrator chooses and verifies the defense schemes, and evaluating the system consequences. EA-CPNsim is constructed based on the CPN tools, a widespread...
SQL injection attack (SQLIA) is a prevalent method which makes it possible for the attackers to gain direct access to the database and culminates in extracting sensitive information from the firm's database. In this survey, we have presented and analyzed six different SQL Injection prevention techniques which can be used for securing the data storage over the Internet. The survey starts by presenting...
Data(base) reverse engineering is the process through which the missing technical and/or semantic schemas of a database (or, equivalently, of a set of files) are reconstructed. If carefully performed, this process allows legacy databases to be safely maintained, extended, migrated to modern platforms or merged with other, possibly heterogeneous, databases. Although this process is mostly pertinent...
Scientific workflows have gained popularity for modeling and executing in silico experiments by scientists for problem-solving. These workflows primarily engage in computation and data transformation tasks to perform scientific analysis in the Science Cloud. Increasingly workflows are gaining use in managing the scientific data when they arrive from external sensors and are prepared for becoming science...
Database interactions are a vital source of information in the analysis of highly dynamic systems such as web applications. Most web application security vulnerabilities, such as SQL injection and broken access control, can be traced to problems in database interactions. which are implemented as a set of embedded or constructed SQL statements. The identification and analysis of these embedded statements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.