The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On the basis of the research of the traditional B/S application structure, this paper introduces a design of an on-line Monitoring System for key pollution Sources with the asynchronous transmission mechanism of Ajax B/S structure. The use of the system is able to improve interactivity and performance of real-time.
There is currently an undeniable increase of maritime goods exchanges. As a consequence, maritime threats and risks are also rising. Innovative solution has to be developed to improve the security of this huge economic activity. Future generation of maritime surveillance system should allow: permanent and all weather coverage of maritime border areas, continuous collection of heterogeneous data provided...
Nowadays production grids such as EGEE, Teragrid, DEISA adopt several tools in order to monitor jobs, check the status of the grid, manage accounting information, etc. Anyway, from the end-user perspective, monitoring the global status of the grid taking into account machines, networks, services, databases, job, etc. is not straightforward, uniform, and tightly coupled. What we present in this paper...
SQL injection is one of the most prominent vulnerabilities for web-based applications. Exploitation of SQL injection vulnerabilities (SQLIV) through successful attacks might result in severe consequences such as authentication bypassing, leaking of private information etc. Therefore, testing an application for SQLIV is an important step for ensuring its quality. However, it is challenging as the sources...
The specialities in ocean environmental information data prevent themselves from being exploited efficiently in ocean science research. The combination of the data grid technology with ocean science provides the promising future for sharing and exchanging of ocean environmental information data. This paper illustrates the construction of OceanGrid, which is the data grid of ocean environmental information...
The dynamic nature of the Internet poses various challenges to the successful execution of composite Web services. Failures are samples of these challenges. It needs to be addressed for the smooth progress of Web service composition. Unfortunately, the de facto standard for modeling composition namely BPEL is not equipped with mechanisms that let Web services "heal" themselves in case of...
Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
This paper presents a new similarity measure method on a combination of color and texture feature representations. In this method, the YIQ color space is chosen, because it can describe both color images and gray images and the transform from RGB to YIQ is linear and simple than other color space. In the proposed method, we firstly segment image using texture feature by combination of wavelet transform...
The aim of this paper is to invent a security system against motorcycles theft by using RFID (radio frequency identification) technology. It is based on RFID technology on ultra high frequency range (905-925 MHz) which can be applied to use in access control by using RFID tag attached to motorcycles. Additionally, the system can be modified to use for protecting other kinds of assets stealing such...
Errors in estimating page counts can lead to poor choice of access methods and in turn to poor quality plans. Although there is past work in using execution feedback for accurate cardinality estimation, the problem of inaccurate estimation of page counts has not been addressed. In this paper, we present novel mechanisms for diagnosing errors in page count by monitoring query execution at low overhead...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.