The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The process of knowledge discovery applied in distributed databases implies finding useful knowledge from mining data sets stored in real implementations of distributed databases. Distributed Databases represents a software system that allows a multitude of applications to access the data stored in local or remote databases. In this scenario, the data distribution is achieved through the process of...
The ‘DevOps’ phenomenon that advocates a collaborative and unified method for delivering software, has been gaining tremendous attention from various sectors of the IT industry with organizations adopting this movement exhibiting significant growth in performance. It can be challenging for an organization to commence their DevOps journey owing to the abundant and diverse resources available. There...
In this paper, we consider the structure and main components of the digital radio receiving center in terms of reliability of hardware and software for digital signal processing. We talk about the methods of development, improvement and empowerment of testing tools and diagnostics hardware and software of the radio receiver center. The article presents the basic methods of testing and diagnostics...
Several studies have been conducted where authors compared the performance of open source Intrusion detection systems, namely Snort and Suricata. However, most studies were limited to either security indicators or performance measurements under the same operating system. The objective of this study is to give a comprehensive analysis of both products in terms of several security related and performance...
CDNs are today the most scalable way of distributing content. Thanks to CDN interconnection even smaller operators can achieve global footprint. The main cost of this operation is the added latency because requests have to traverse multiple autonomous networks. The work in this article was able to quantify the real impact of this phenomenon and to point to its drawbacks and potential solutions.
Software testing is a process of finding bugs by comparing actual and expected result of the software. Depending upon the type of applications i.e. desktop or web based, different types of testing performed. Web based application are set of programs run on web browser and access over a network connection. Different types of testing performed for web based application for check correctness, completeness,...
This paper cover the importance of performance testing of the web application. The performance of any web application has been depend on the some different type of the testing process like load testing, soak testing, smoke testing and stress testing etc. In this paper we applied smoke testing on a web application. This web application has been developed for the customer before delivering the software...
This paper covers the importance of performance testing of web applications and analysing the application's bottleneck based on hardware, software and resource utilization. Mainly, the focus would be to performance test the application on different parameters like load, stress, scalability, reliability, security and capacity front. Now a days everyone expects everything to be very fast but at the...
Internet Protocol version 6 (IPv6) is a new routing protocol which has been deploying dramatically over the past years. This is introduced by IETF to overcome some of IPv4 limitations. People believe that IPv6 is secure more than IPv4, which this idea is not correct. IPv6 requires attention because of develop a secure and safe IPv6 deployment. It is important to know that it should be assessed regularly...
An embedded functions feature was implemented to specify functionally dependent relations among test factors. Functions embedded in a combinatorial test case generator specified test factor constraints to which the resulting test cases conformed. The functions were defined in a general-purpose programming language widely used among software engineers. Examples with and without embedded functions were...
While modern web development technologies enhancethe capabilities of web applications, they introduce challengesfor testers. This paper introduces, evaluates, and refinesweb mutation operators that target interaction faults in web applications. An experimental study is conducted on 11 subject webapplications using 15 web mutation operators. The effectivenessof 12 independently developed test sets...
Web applications are used by companies across the world to deploy their products and services. Because of the technologies used to build web applications, they are by nature concurrent, for example, multiple users can have problems when accessing the same limited resources. The combination of the stateless nature of web applications and concurrent behavior creates unique challenges. Models have traditionally...
Indoor localization remains a hot topic and receives tremendous research efforts during the last few decades. While most previous efforts focus on the designing issue, little effort has been paid to the impact of different environmental parameters on the system performance. To this end, we present an extensive empirical study with real-world experiments to provide sufficient data for analysis. By...
The Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) program is a long-term modernization and transformation of the current National Airspace System (NAS) into a more effective and coordinated decision-making system. NextGen provides a more reliable, secure, and dependable aviation capability for both users and operators ensuring more capacity, throughput, and safety...
This paper investigates the biometric data emulation and encryption for the sports wearable devices, including data generation performance with different data encryptions for a NoSQL document database. We discuss more deeply a specific topic, related to testing data generation and data encryption for the performance and stress testing of our NoSQL database.
The LTE “Long Term Evolution” technology was introduced to reduces the DATA network latency, in addition to provide higher data throughput. But the nature of LTE prohibits the transmission of voice related services. VoLTE “Voice over LTE” is a solution to transfer voice packets with special treatment over the LTE network, and get benefits from its low latency and quality of services capabilities to...
Paper presents a methodology and experimental measurements of communication performance in testing environment between virtual power plant (VPP) and remote terminal units (RTUs) that are normally installed at the distributed energy resources (DERs) for monitoring and control purposes. Experimental measurements were conducted during one-week testing period with VPP and two RTUs, placed in geographically...
SQL Injection Attack (SQLIA) has been consistently ranked among the top security threats against web applications for more than a decade. Nowadays, attackers use sophisticated tools to launch automated injection attacks. The problem of prevention and detection of SQLIA has been long attended by the research community, but hardly any solution exists for protecting multiple websites in a shared hosting...
Penetration Testing is a security research and study of exploitation methods with counter measures to protect web applications from attacks and intruders. It is the art of exploiting the weakness that has been identified in the system under test. Identifying the insecure areas is the major task; the goal is to protect sensitive and the valuable data. All the safety vulnerabilities which are present...
Reciprocating compressors are widely used in the petroleum industry, and a small fault in reciprocating compressors may cause serious issues in operation. Monitoring and detecting potential faults help compressors to continue normal operation. This paper proposes a fault-diagnosis system for compressors using machine-learning techniques to detect potential faults. The system has been evaluated using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.