The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper briefly introduces the Command Query Responsibility Segregation (CQRS) and discusses the performance of the architecture. The pattern is separated from the business by modifying the behavior of modifying (adding, deleting, modifying the system state) and querying (without modifying the system state), making the logic clearer and easier to target different parts Optimization, and finally...
While Web applications have become pervasive in today's business, social interaction and information exchange, their usability is often deficient, even being a key factor for a website success. Usability problems repeat across websites, and many of them have been catalogued, but usability evaluation and repair still remains expensive. There are efforts from both the academy and industry to automate...
Monitoring of residences and businesses can be effectively performed using machine learning algorithms. As sensors and devices used for monitoring become more complex, having humans process the information to detect intrusions would be expensive and difficult to scale. We propose an automated home/business monitoring system which resides on edge servers performing online learning on streaming data...
Contemporary tools aimed at information system (IS) development often use models to generate system implementation. Starting from an IS model, these tools commonly generate database implementation schema as well as code for generic CRUD operations of business applications. On the other hand, at the level of platform-independent models (PIMs) there is a lack of support for specification of more complex...
Docker has been widely adopted in enterprise-level container environment. As an important part of Docker-based container ecosystem, Docker Registry provides the service of storing, distributing and managing Docker images, which is crucial to run Docker containers. In large-scale container platforms, deploying applications is prone to overburdening Docker Registry with flooding network traffic, and...
With the ever improving availability of social media platforms, the internet and mobile devices, crowdsourcing becomes a popular business development strategy in outsourcing various tasks to outside crowds. In product design and development, one of the crowdsourcing objectives is to engage various users into human-centered design processes and outsource tasks to crowds for better design efficiency,...
There are a few network environment used for institutions of higher learning for eLearning application. The world financial crises cause institution of higher learning struggling to maintain and update the technologies and infrastructures and try to provide the sufficient budget allocation for the network infrastructure. Cloud Services Data Centre network environment is one of the solution where they...
The use of online collaboration in developing documents is still not popular in Indonesian public institutions. Therefore, it takes many budgets and much time to make a public document. Meanwhile, the government should improve the quality of public services effectively and efficiently. This paper discusses the comparison of three selected document management system (DMS) features, Doccept, eFileCabinet,...
Failure in cloud system is defined as an even that occurs when the delivered service deviates from the correct intended service. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA)...
In this paper, we propose a mechanism for autoconfiguration of name-bound virtual networks (NBVNs) for Internet of Things (IoT). Some IoT standardization groups have defined APIs for IoT device communications, in which they indicate the correspondent nodes and resources by names. However, current technologies for the construction of Virtual Networks (VNs) rely on VLANs, IP routing, and OpenFlow control,...
The rapid development of intelligent terminals and mobile Internet industry has brought many challenges and opportunities to the mobile network. Mobile Network Open Services can provide users and developers with the open resources consisted of network infrastructure, network data and diversified services, so as to build an open, flexible, collaborative Internet ecosystem. The ability to open the mobile...
Cloud computing is an emerging business computing model whose basic idea is to transmit all kinds of resources through the Internet such as storage resources, computing resources, bandwidth and so forth. So users do not need to purchase a large of computing systems to manage their business, on the contrary they only need to purchase the resources according to their needs in order to reduce the cost...
The rapid development of Internet of Things (IoT) attracts growing attention from both industry and academia. IoT seamlessly connects the physical world and cyberspace via various sensors. It is more worth for us to pay attention to the mechanism of the events to work collaboratively rather than those standalone sensors. In this paper, we present a Distributed Event-centric Collaborative Workflows...
In this paper, a clinical data management and statistic system is implemented for authorized users such as doctors and medical researchers to manage clinical data. The system is able to inquiry patient particulars, diagnostic results, CT (Computerized Tomography) data and electrocardiogram (ECG) data, and it implements comparison function of Cardiodynamicsgram (CDG) data and statistic function for...
■ Presented BlueWall: Software Defined Network Management in Hybrid Enterprise Cloud Environments for managing firewall request when servers (or services) are created (via APIs). ■ Demonstrated hybrid network management design and self-service capabilities. ■ Discussed challenges arising in network management in the hybrid enterprise cloud environments.
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
“Network slicing” means creating logically isolated virtual networks (slices) running different network functions for different services. However, this technology imposes a loss of multiplexing gain available in monolithic networks as resources allocated to each slice become exclusive and isolated. This situation leads to resource wastage. In this paper, we propose a concept called “per-group slicing”...
With the constant increase of multimedia internet penetration as well as rapid spread and sharing of various information, people pay more and more attention to the information related to daily power utilization. In order to realize the interaction between power companies and power utilization information of users, the power companies apply and register their public accounts to establish their own...
The paper proposes the method of building the electric power marketing business application system based on the cloud computing and microservices architecture technologies to solve the issues of the current system with the concentrated infrastructure and the monolithic architecture which are difficult to support the business processing in very large scale and the evolution of the electric power marketing...
Zeus is a well-known and effective family of ‘man-in-the-browser’ malware. This qualitative case study analyses posts in online cybercrime forums that discuss Zeus configuration. Online cybercriminals were found to share, sell, steal, and trade configuration files. The discussions and advertisements on the forums, which span four years, were found to evolve with market conditions and externalities,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.