Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Consumption charge on electricity is one of the issues faced by dormitories, room for rent, apartment and the like. Ideally, tenants must only pay what they have used for a specific period of time, but inevitably sometimes, they pay beyond their actual use simply because of unavailability of a meter or machine that could measure their actual use individually. Due to this practice and the current scheme...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
Teaching programming using Massive Open Online Courses (MOOCs) is gaining popularity due to their scalability and efficiency of knowledge distribution. However, participating in these courses usually means fully committing to the supplied programming environment in the browser. While this allows a consistent and controllable setup, learners do not gain experience with actual development tools, such...
Multiple SDN applications can make several harmful interferences unintentionally, although each individual application may be properly developed. This paper proposes a Multiple SDN Applications Interference Detector (MSAID). To bridge the gap between the source code of applications and the actual interferences, we leverage symbolic execution and constraint solving to obtain how the event handler handles...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
The Kansas City National Security Campus (KCNSC) collects a large amount of test data used to accept high value and high rigor product. Data has been used historically to support root cause analysis when anomalies are detected in down-stream processes (bottom portion of Fig. 1). The opportunity to use the data for predictive failure analysis however, had never been exploited (top portion of Fig. 1)...
With the increasing technological complexity modern SoC designs continue to grow in size and involve increasingly more IPs. Therefore, it becomes much harder to complete testing of large SoCs within the desired schedule and cost. Usually an automated hierarchical test helps to solve this problem efficiently but for such systems the preparation of input data, especially IP level information and description...
Continuous Integration (CI) and Continuous Delivery (CD) are widespread in both industrial and open-source software (OSS) projects. Recent research characterized build failures in CI and identified factors potentially correlated to them. However, most observations and findings of previous work are exclusively based on OSS projects or data from a single industrial organization. This paper provides...
With the rapid development of Internet technologies such as cloud computing and big data, the scales of distributed information systems in big companies have grown to enormous sizes. Automatic detection and diagnosis of system faults in the large-scale information systems is complicated and important in both practice and research. In this paper, we propose a Graph-based Fault Diagnosis approach in...
In this paper, a hybrid broadcast broadband TV (HbbTV) test system with the automatic testing subsystem is proposed. The proposed system is based on Node.js framework with SQLite database on the backend side and Polymer framework on the front-end side. The paper covers basic testing metodology and design process with the emphasis on the implementation and testing.
The school shuttle system commonly uses the vehicle to facilitate students to go and go home from school. However, there needs to be a development in terms of monitoring the students. In this paper explains the development of school shuttle system with IoT concept to apply Smart School application. The system will be designed uses a reader that will identify the identity card of students using Bluetooth...
In this paper, Transcriber that can be used to automatically transcribe interviews in Indonesian using speech-to-text and speaker diarization technology is described. The main feature of the software is generating interview transcription automatically and providing an option if grouping by group of speakers is required. Transcriber is designed to work in two modes that give users the freedom to provide...
This work focuses on how to provide the best virtual desktop technology, virtualization performance and hardware in the computer classroom. There are using the three popular virtualization technologies in the same environment to establish the same conditions, pure performance comparison: VMware Horizon, Citrix XenDesktop, and Microsoft VDI. Test software used to the current popular software, system...
Wind-flow around a long-span bridge, as a bluff body, will generate an aerodynamic force that interacts with the flow, causing vibration to the bridge deck. This phenomenon can lead to structural fatigue or worst, the bridge collapse. A continuous and comprehensive measurement system is needed for early detection and maintenance reference of a long-span bridge. Another benefit this system is aiming...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
As a new product to promote the development of mobile Internet application, wechat has completely changed people's traditional living habits and accelerated the transformation of related industries. Especially, the openness of wechat public platform interface is brought to the education industry a new opportunity. In this paper, we do the micro-course system research based on the wechat platform system,...
IRONSIDES is an open-source Domain Name System (DNS) server designed using formal methods to reduce DNS vulnerabilities to cyber attacks. The use of formal methods gives IRONSIDES provable security properties, including the absence of numerous security flaws that plague BIND and Windows DNS. It also raises an empirical question: Does the use of formal methods to generate provably secure code require...
Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of its most popular kind. A RESTful web service will provide data via an API over the network using HTTP, possibly interacting with databases and other web services. Testing a RESTful API poses challenges,...
Recently, a framework has been developed to automate the training of prediction algorithms but has only been tested on one system. In order to generalize the approach a few key functions must be performed. One of these functions is load generation. Unfortunately, a valid load generator has not been developed for a Microsoft Windows active directory environment. In this paper we introduce and detail...
As software engineering researchers, we are also zealous tool smiths. Building a research prototype is often a daunting task, let alone building an industry-grade family of tools supporting multiple platforms to ensure the generalizability of results. In this paper, we give advice to academic and industrial tool smiths on how to design and build an easy-to-maintain architecture capable of supporting...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.