The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Extensible Personal Learning Environments (PLEs) and Cloud Learning Environments (CLEs) that facilitate the lone or collaborative study of user-chosen blends of content and courses from heterogeneous sources, including Open Educational Resources (OERs), are gradually gaining ground in the landscape of distance learning. In this paper, we examine the use of ontologies for modelling and supporting learner...
This essay starts from the characteristic of data and key technology of the National Petroleum Resources Database. The authors realize the system architecture based on B/S using Ajax and resolve the problem of extraction and transformation of multiple data between C/S and B/S using ETL, and so on. In this way, the authors expound the Designing proposal in details, including software architecture,...
As a new generation of basal construction has been established on Internet, Grid has great potentials and advantages. This paper focus on establishing a security architecture for E-Business in the grid environment based on OGSA grid security system structure. It is shown that the security framework not only can satisfy all of the security demands of e-business in grid, but also may better protect...
Today's e-learning environments are still far from being accessible for people with disability. Furthermore, the availability of accessibility guidelines, the diversity of the e-learning platforms and evolution of assistive technologies do represent just a partial solution. In fact, adopting the accessibility since the design phases could provide a rational solution. Therefore, the application of...
The cloud computing is a kind of technique like this which dispatches the resource from the Internet on the basis of the users' service application to satisfy them. It makes use of the transverse extension methods of computer clustering to assign data and computing task on different machines hoping to finish the task cooperatively. The spread of the cloud computing will be beneficial to the development...
The basic tenet of Service-Oriented Computing (SOC) is the possibility of building distributed applications on the Web by using Web Services as fundamental building blocks. The proliferation of such services is considered the second wave of evolution in the Internet age, moving the Web from a collection of pages to a collections of services. Consensus is growing that this Web Service “revolution”...
Cloud Computing raises numerous questions about the implementation and deployment of Service-Oriented Architecture (SOA) and virtualization. It also raises questions related to services contracts, their management and verification, independently of services migration within the Cloud(s). Issues and solutions related to the verification of contracts compliance are referred as Service Level Checking...
This paper presents the architecture and the organization of a Mashup Container that supports the deployment and the execution of Event Driven Mashups (i.e., Composite Services in which the Services interact through events rather than through the classical Call-Response paradigm) following the Platform as a Service model in the Cloud Computing paradigm. We describe the two main modules of the container,...
Growing long-term cost of managing an onsite medical imaging archive has been a subject which the health care industry struggles with. Based on the current trend, it is estimated that over 1 billion diagnostic imaging procedures will be performed in the United States during year 2014, generating about 100 Petabytes of data. The high volume of medical images is leading to scalability and maintenance...
Mobile agent technology has been evolving since late 1990s and its development is essentially independent of developments in distributed computing technology such as SOA, Semantic web and Web services. Incorporating mobile agents bring undeniable benefits to a distributed application. Present mobile agent technology fails to leverage the interoperable web infrastructure developed in a standard compliant...
The modern Web architecture basically follows the Representational State Transfer (REST) style. This style offers the architectural properties necessary to implement the Internet-scale Web. However, most authentication and delegation technologies that rely on session state actually deviate from the REST style. It must be noted, however, that the diversity of these technologies is imperative for the...
Organic software architecture is promising software architecture that provides easiness in its maintenance and support in grow-able environment of software system. In the previous research, this software architecture has been implemented in building web-based healthcare information system. By now, it is still not evaluated yet. Evaluating software architecture is important in the software development...
The concern about understanding the effects of climate change on the environment, such as the decline of pollinators found in nature, the need to support researchers to run experiments efficiently and to share those results, makes it necessary to study and develop virtual laboratories through the web, in order to gain greater insight on the behavior of bees, which is the main pollinator of plants...
Security analysis is a knowledge intensive process, in which the attackers and the system owners are competing with their knowledge about how the system is built, what are the weakest points of the system, and how to exploit or to protect them. In other words, it is a race of knowledge. In this paper, we present a service security modeling approach based on the agent-oriented requirement modeling...
The widespread use of Web applications, in conjunction with large number of vulnerabilities, makes them very attractive targets for malicious attackers. The increasing popularity of Web 2.0 applications, such as blogs, wikis, and social sites, makes Web servers even more attractive targets. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction...
CUBIQ is a common and shared platform which mediates diversified sensor systems and ubiquitous applications. The platform enhances ubiquitous applications through diversified federations among sensors, services and applications. The platform offer transparent context data access, real-time and scalable data dissemination and processing and intelligent service collaborations.
We present N2Cloud, a novel Cloud-based neural network simulation system, which provides and exchanges neural network knowledge and simulation resources to and between arbitrary users on a world-wide basis following the Web 2.0 principle. N2Cloud enables the exchange of knowledge, as neural network objects and paradigms, by a virtual organization environment and delivers ample resources by exploiting...
Wireless sensor networks (WSNs) have many applications in home and industrial automation, and the management and integration of WSNs into Internet and IP-based networks is still getting tremendous interesting. This paper presents a micro SOA-model as part of a 4-layered, SOA-based architecture targeting resource-constrained devices with 48 KB of ROM and 10 KB of RAM. The key idea in this model is...
This paper aims to explore the cloud computing based service innovation in home textile industrial clusters, which is regarded as a service system. Firstly, the challenges facing home textile industrial clusters (industrial upgrading, structural adjustment, and brand building & management) are analyzed. Secondly, the producer services in the cluster service system are studied. Moreover, it is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.