Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
E-Healthcare system plays a major role in the society. It monitors the health condition and helps in giving appropriate medical treatments. This system aims at gathering and storing patient's details and sharing health related information. It also has high legitimate concerns about patient's privacy and information security. This system minimizes the infrastructural barriers for the developing nations...
The exponential growth of internet traffic over the last twenty years presents a real challenge to ISP looking to ensure a reliable and efficient service to their customers. Network traffic is far from being straightforward to predict and a deep understanding of the routing domains is a first requirement to achieve proper management of the traffic. This paper focuses on the monitoring and characterization...
Based on the analysis of the data characteristics of typical business in distribution network, the data transmitted in the distribution communication network are classified. After studied the network scheduling algorithm based on the concept of "window", an improved dynamically time window sharing scheduling algorithm is proposed for distribution communication network. According to the differences...
IT services built from cloud applications are subject of several maintenance operations like upgrades, reconfigurations, or redeployments. Monitoring those changes is crucial to detect operator errors, which are a main source of service failures. Another challenge, which exacerbates operator errors is the increasing frequency of changes, e.g. because of continuous deployments. In this paper we propose...
In recent years patents have become increasingly important for businesses to protect their intellectual capital and as a valuable source of information. Patent information is, however, not employed to its full potential and the interpretation of structured and unstructured patent information in large volumes remains a challenge. We address this by proposing an integrated interdisciplinary approach...
There is a prominent connection between human health and human emotion. This connection has encouraged researchers to produce numerous applications in order to facilitate patients and therapists. In this paper, through a review study we highlight how the development of intelligent emotion aware e-health systems can facilitate patient's satisfaction, emotion wellbeing, and physical health, and improve...
In recent years, NoSQL databases have emerged as an answer to Internet scale datasets. However, these solutions do not support out of the box the necessary backup, restore and disaster recovery capabilities required by many big data scenarios. In this paper we address this gap: we present a novel disaster recovery approach designed for big data NoSQL workloads. This approach can support low recovery...
Today's Enterprises are facing many challenges in the service oriented, customer experience centric and customer demand driven global environment where ICT is becoming the leading enabler and partner of the modern enterprise. In the last decade, many enterprises have invested heavily in SOA-aligned IT transformations, but not harvested what SOA promised to provide. Now the API and Microservice paradigm...
The goals of the research were to identify, analyze, and design a web-based information system and implement business process improvement to support and enhance the current business processes in some banks in Indonesia who run Community development program to improve the economy of Indonesia. The System Development Life Cycle (SDLC) method was applied for the system analysis and design phases, utilizing...
Wireless communications and mobile web in the domain of mobile commerce (mcommerce) are growing and gaining significant momentum throughout the internet. Researchers all over the world are actively studying the standardization to understand the factors that affects the acceptance of upcoming innovations and development in mcommerce. The digitalization and its advancements have ensured that, until...
Network function virtualization (NFV) is a promising solution for cost reduction, service agility, and scalability to cope with the dynamic changes of traffic volume and business requirements. In the NFV framework, management and orchestration framework (MANO) plays an important roles in the automated provisioning, configuration, lifecycle management, and high availability of virtual network functions...
Enterprise networks have been a frequent target of data breaches and sabotage. In a widely used method, attackers establish a foothold in the target network by compromising a single computer or account. They then move laterally between computers to access valuable resources and information located deeper inside the network. To move laterally, attackers often steal valid user credentials. This paper...
The article touches upon issues pertaining to the domain of IT infrastructure modeling in electronic university. It describes the approach of IT infrastructure modeling based on system and process principals, and decomposition method. The functional modeling of business processes of providing e-learning services and designing IT infrastructure has been performed. Supporting ITIL/ITSM processes with...
Facing the problem and current situation of the power grid master-slave station dispatching system architecture, this paper using the master-slave station distributed file system and master-slave station two-level business platform to divide the traditional master station business into master-slave station interacted distribution business, also issued the master-slave station distributed integration...
Enterprises are under great pressure to be nimble and adjust quickly to ever shifting business priorities and constantly evolving technologies. This is usually seen as a driver to adopt Cloud technologies, however, the existing large investments in on premise IT infrastructure and data residency constraints combined with decreasing IT budgets precludes a fast and immediate migration to public or private...
Business goals monitoring and control measures are important process to achieve the target of business systematically in specified business area or project. Monitoring and control provide business goals with a measurable index to align directly in a specific area or project. In this paper, we generate all of the business process improvement goals by Capability Maturity Model Integration (CMMI) model...
Companies are increasingly incorporating commercial Business Process Management Systems (BPMSs) as mechanisms to automate their daily procedures. These BPMSs manage the information related to the instances that flow through the model (business data), and recover the information concerning the process performance (Process Performance Indicators). Process Performance Indicators (PPIs) tend to be used...
The food sector is challenged to provide safe and qualitative food to consumers at affordable price and to feed appropriately increasing population using natural resources, like soil and water, in a sustainable way. Consumers awareness about food origin, nutritional and wellness properties, attention to processed meals ingredients, due to health issues, and requests of new customized portions formats...
Big data becomes a real opportunity and a serious worry for data managers, data scientists, researchers and even for business managers. An opportunity as a set of powerful technologies and a bunch of interesting concepts that aim resolving business problems of an organization. A worry because big data implies big challenges and big resources that make harder the task of mining value from all the available...
Network packet capture and analysis technology is a cornerstone of network security and protocol analysis technology. On the analysis of the LAN IP network traffic monitoring requirements, this paper detailed introduces the design ideas of traffic monitoring system based on WinPcap technology, expounds the key technologies and features in the process of system implementation, focusing on huge amounts...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.