The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The research and commerce communities have a need to understand and use the Single-Page Application (SPA) framework written in JavaScript for knowledge discovery and global sharing of information. It is important to develop user-friendly web-based tools which efficiently process, analyze, and visualize scientific data. The efficient use of languages and tools such as HTML5, CSS3, and JavaScript Libraries...
Software testing is an important aspect for the quality of software. Different levels of experience, types of application and needs enforce differences in performing testing activity for same features of applications. Testing as an activity within a development house usually includes testing of recurrent situation e.g., testing of security features etc. Development of a homogeneous test ground requires...
Cyber-Physical Production System (CPSS) and Service Provisioning are two inevitable trends and challenges for factories of the future. Existing literature in the Internet of Things (IoT) landscape detail opportunities and difficulties, but performance data to evaluate the overheads and suitability of services provisioning for industrial applications is not readily available. So, we designed and developed...
Affiliate marketing (AM) is a popular and cost-effective marketing model for e-commerce practitioners to drive visitor traffic, to their e-commerce sites. Nevertheless, this popular marketing model is associated with inherent risks and known frauds, which could have a detrimental effect on its popularisation. Many studies have been carried out to explore risks and frauds that are typically associated...
The research background of management system of Hainan Li brocade pattern gene database and the meaning of Li ethnic cultural inheritance were introduced in the paper. And the overall structure of management system of Hainan Li brocade pattern gene database was introduced also. The functional implementation of modules in the system was elaborated, such as: the design of the data table structure, add,...
Nowadays, many school teachers start to execute E-testing in classrooms due to its time and labor-saving. It is not easy that teachers want to block access to the Internet for online cheating activities. Therefore, an offline E-testing system is needed. However, existing offline E-testing systems are always developed ad hoc for particular purpose and procedures. This paper presents a general-purpose...
Spacecraft Checkout operations form a crucial part in clearing the satellite along with its subsystems for launch. The environment presents numerous challenges where multiple tests are to be carried out meticulously and study the impact on different subsystems to ensure the proper and efficient behavior of those. Automatic Checkout System aims at providing an integrated system where tests can be carried...
One of the most critical and costly decisions made in emergency departments (EDs) is whether to admit a patient into the hospital. These decisions require investment in time for patient testing and treatment, delaying care to other patients. Short-stay units (SSUs) are an alternative to discharging or fully admitting ED patients, allowing extended patient observation. However, little is understood...
One of the primary concerns that the developers of mobile banking applications should strive to is to ensure the security of user information originating from any of these applications. However, implementing even basic security features, like performing encryption on user data or using HTTPS while connection establishment, on such mobile applications, is often found to be absent either due to the...
As more and more consumers access streaming video content over the internet, enterprises across the entire video distribution value chain experience tremendous pressure to deliver better performance and high quality of experience (QoE) to the end users. Enhanced video performance is highly desirable, starting from the Video Origin Servers through the core network and Content Delivery Networks (CDN)...
Large-scale parallel file systems are of prime importance today. However, despite of the importance, their failure-recovery capability is much less studied compared with local storage systems. Recent studies on local storage systems have exposed various vulnerabilities that could lead to data loss under failure events, which raise the concern for parallel file systems built on top of them.This paper...
This paper presents the preparation work and first testing of a real-time monitoring application framework. The framework has been proposed and created for a small turbojet engine iSTC-21V. The main motivation is to provide data for educational purposes in a nearby multimedia lecture room and to wider public that is not able to access the laboratory, due to lack of room in the laboratory or travel...
The analysis of the threats of identity theft and infection of websites indicates that antivirals are ineffective for websites, because hosting does not conduct continuous monitoring for viruses on their servers due to large amounts of user data, and RAID cannot save data, because they only duplicate them, and in the case of infection with a virus they merely memorize a changed file. We have developed...
The paper proposes a concept to unify the tools used by software developers. The goal of the paper is to describe a conceptual framework, based on client-server architecture, which aims to simplify the introduction to new development tools for new users. The framework also tries to solve the issue with multiple tools serving the same purpose as well as making the process of switching between these...
Stroke is a growing global public health issue in low and middle income countries, where prevalence rates for cerebrovascular events now exceed those in industrialized nations. Limited access to stroke rehabilitation, which includes prevention of physical inactivity and deconditioning to better manage risk factors for recurrent vascular events, remains a major barrier to care. In the Caribbean Community,...
Security testing is a pivotal activity in engineering secure software. It consists of two phases: generating attack inputs to test the system, and assessing whether test executions expose any vulnerabilities. The latter phase is known as the security oracle problem. In this work, we present SOFIA, a Security Oracle for SQL-Injection Vulnerabilities. SOFIA is programming-language and source-code independent,...
Stored procedures in database management systems are often used to implement complex business logic. Correctness of these procedures is critical for correct working of the system. However, testing them remains difficult due to many possible states of data and database constraints. This leads to mostly manual testing. Newer tools offer automated execution for unit testing of stored procedures but the...
The U. S. Preventive Services Task Force recommends that clinicians engage in shared decision making with women at high-risk for breast cancer about medications to reduce their risk, also known as chemoprevention. However, uptake has been low (
The online transaction has some security issues. Some attacks such as spoofing, phishing, and key-logger may threat the security of online transaction. The use of a token is one of solutions to increase its security. This paper presented the design and implementation of an android-based authentication system using One-time pad (OTP) algorithm. The use of a mobile phone gives advantage in avoiding...
Multimodal biometric continuous authentication systems allow to improve security, making user identity verification a continuous process rather than a one-time occurrence. Unfortunately, the usability of these systems and their adequacy for working activities are often questioned. This paper presents a usability study for a multimodal biometric continuous authentication system capable of continuously...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.