The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
XACML is a precise and complete access control language that defines an architecture to deploy access control services in a fine-grained way. However, when the number and complexity of policies increases, XACML suffers from performance problems. This problem has been analyzed by the research community, and the solutions proposed in the literature aim toward changing how security policies are stored...
According to GJB6600, this paper firstly analyses Interactive Electrical Technical Manual's (IETM) read and use, and puts forward an independent and controllable IETM reader platform framework and software realization technical architecture, which is based on GJB6600 and satisfied national safety and confidentiality requirements. Then design IETM reader platform framework. Some key techniques are...
It's necessary to realize the standardization and rationalization of the knowledge representation during the milling process of Aeronautical Structural Parts. Meanwhile, It's also important to make it convenient for sharing knowledge and improve the efficiency of processing reasoning considering the intermediate status of knowledge processing. XML language is used to carry on the parametric representation...
The paper presents the Big data definition and the main characteristics description The model of association between entities and characteristics is constructed. The method of heterogeneous data sharing and bringing to relational data model “entity-characteristic” was created. The testing results of developed methods and algorithms are presented.
Conceptual Graphs (CGs) are a knowledge representation language based on the existential graphs of Ch. S. Peirce and the semantic networks of Artificial Intelligence. CGs are also a modeling and design language, which is human readable and computer tractable. This makes CGs suitable for a large variety of applications. The novelty of this paper, is a new approach to XML data modeling based on Conceptual...
Scientific workflow plays an important role in complex scientific computing. It can integrate various data and analysis functions to solve complicated geoprocessing problems which usually involve a couple of steps. They could be accomplished manually step by step in Geographic Resources Analysis Support System (GRASS), an open source Geographic Information System (GIS) software, or automated through...
The aim of this work is to provide some insights regarding the effort of building a representative and wide coverage audio base of syllables for Romanian. The audio base comprises audio recordings of syllables extracted from the following types of syllable embedding: isolated-syllable, isolated-word and continuous speech. The list of syllables has been computed over the syllabified form of single-word...
Models are the cornerstone of Model-Driven Engineering (MDE). Their size is constantly growing, becoming one of the main problems when it comes to manipulating them, via model-to-model transformations, model-to-text transformations or simply parsing them. In this paper we propose a way of distributing Ecore models representing them as JSON and URLs as identifiers, since HTTP is one of the most successful...
Curriculum design and implementation in higher medical education can be a great challenge. Although there are well-defined standards, such as the Curriculum Inventory and Competency Framework by MedBiquitous Consortium, existing systems are incapable of a visual representation of the various components, attributes, and relations. In this paper, we present the MEDCIN platform, a pilot tool which uses...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
Data citation is of growing concern for owners of curated databases, who wish to give credit to the contributors and curators responsible for portions of the dataset and enable the data retrieved by a query to be later examined. While several databases specify how data should be cited, they leave it to users to manually construct the citations and do not generate them automatically. We report our...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
Keeping pace with the market requires software to be shipped quickly, in rapid release cycles with a strong feedback loop. Managing and controlling these changes become complex, especially in the mobile world. In mobile applications, unlike in the Web world, the user chooses whether to download updates or to ignore them, and rollbacks are typically not an option. This paper describes a centralized...
Software development process encompasses multiple types of and differentiated versions of artefacts during the corresponding lifecycle. These artefacts are vulnerable to artefact drift or erosion when the product being developed gets changed. As a result different artefacts are subject to differential rates of updates compared to each other. Managing the software artefacts is one of the major problems...
Printing good-sized complicated practical report forms is one puzzle in application system with B/S architecture. In order to solve this problem, performing data exchange using XML to come true printing is explored. Windows Form in the framework of .NET is embedded in FrontPage. By self-programming, XML document is analyzed and client-side printing is controlled. Fundamental technique on implementing...
NewsOne is a dedicated platform that aggregates all the latest news updates from multiple national and international resources and summarizes them to present in a short and crisp words. This online platform provides a service oriented interaction among the users from across web. The main motto of this application is to access the news fast. It will bring news directly without wasting any time for...
This paper presents a study for generate digital business reporting using the language XBRL (Extensible Business Reporting Language) and its applicability in Ecuador. XBRL is a common language for the exchange of financial information, a specialized version based on XML. This standard has been implemented in Europe, USA, Canada, Oceania, Asia and some countries in Latin America, Ecuador have not adopted...
The UAV intelligence support mode is studied in the article in order to improve the ability of intelligence support in the battlefield. Three kinds of UAV intelligence distribution mode are put forward and their advantages and disadvantages are analyzed. The UAV intelligence sharing mode based on existing battlefield network is proposed which could contact all intelligence processing system, command...
In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection...
We first provide an example to show that two previously published results in [2] and [4] on tree pattern containment under schema graphs are incorrect. We then show that the original result in [2] holds under some special conditions on the schema graph.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.