The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web applications have grown very unexpectedly in these recent years but due to difference between web applications and software applications, their development methodologies differ in many ways. The distinction between these two different types of applications acquire for introduction of development methodologies dedicated to web applications. The thesis work represents various development approaches...
IT complexity in enterprise today continues to grow at a dizzying rate. Technology innovation, vendor heterogeneity, and business demands are major reasons why organizations are exposed to new risks, based on the gaps opened between the options and features of each IT element and product, and how they are implemented to support a well-defined policy and company strategy. Moreover, the impact of such...
Today, there is a need for faster network systems wherein the information exchange can take place in fraction of seconds. In applications involving image, audio, video, server overloading problems may arise if client-server model is used. And hence, to avoid this problem XMPP can be used. The Extensible Messaging and Presence Protocol (XMPP) is an Open technology for Realtime communication. XMPP uses...
This paper presents a general authentication scheme for User-Centric IdM. To satisfy the authentication framework's requirements of User-Centric IdM such as consistent user experience, simple message format, and the user's participation, the proposed scheme provides a negotiation service of authentication level and a multiple authentication service in user's point of view. The proposed scheme extends...
The exponential development of information exchange today has updated the difficulties to find the relevant information wished by an end user. Indeed, the information is represented and stored in a multitude of information sources in a very heterogeneous way.
Adaptive User Interfaces (AUIs) provide better usability, user satisfaction as well as personalized experience. AUIs bring broad benefits to end users, but their construction introduces numerous difficulties caused by extended development and maintenance efforts. One option to deal with the above problems is to generate various User Interface (UI) descriptions from a model or existing code. This paper...
Classified advertisements are moving to push their services to the mobile application due to a wide base of users. The potential challenge for this type of service in the data exchange model due to the enormous amount of information transferred to the mobile client in an asynchronous fashion. In this paper two data exchange methods are compared; XML and JSON. JSON outperforms in term of data size...
In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M...
This paper presents a design, implementation and evaluation of a web-based application called MergeXML (MXML). MXML was developed to integrate XML documents that are similar in terms of structure and content to complete information which can be used for information retrieval. XML documents are clustered into subtrees representing as instances using leaf-node parents as clustering points. The system...
In order to satisfy the need of cross platform, fault information standard description, and network transmission in networked fault diagnosis, the paper introduced the specific planning and implementation method based on LabVIEW. Relevant research was based on the capacities of LabVIEW cross platform and of XML standard description. The XML description method of typical fault information was given...
Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart...
In this paper unified structure formation method (ETL) development for operative analysis of data stored in different SQL and NoSQL databases are considered. Unified structure formation method (ETL) is based on work with Map Reduce parallel model. In order to perform the method following steps should be considered: development of searching forms (pattern) for data searching in different database,...
We describe here an agent-based Distributed Analytical Search (DAS) tool to search and query distributed “big data” sources regardless of data's location, content or format. DAS semantically analyzes natural language queries from a web-based user interface. It automatically translates the query to a set of sub-queries by deploying a combination of planning and traditional database query optimization...
From the viewpoint of the distribution system, distribution automation (DA) is one of the important functions in Smart Grid (SG) technology. In this paper, the field experience of DAS in KEPCO is briefly described. Note that there is a significant difference in DAS between theory and practice since DAS is achieved using computer and communication technology, advanced software, and remotely operable...
The development of a distributed simulation is a complex multidisciplinary task. It brings together computer science, systems engineering, operational research and a range of domain specific expertise. Thus, MATLAB introduced many distributed connectivity for developers, this connectivity with other environments requires some resources. In this paper, a new software connector is introduced to facilitate...
In this paper, we present our work on designing and implementing a cloud-based robot system, the RC-Cloud Robot System, which connects cloud computing infrastructure for accessing distributed computing resources and big data and executing multitask like face detection, face recognition and etc. We have deployed one application, “real-time face recognition application” in the RC-Cloud robot system...
In home automation (HA) industry, various roles are involved such as device manufactures, system integrators, and installers. Engineering tools are required not only to improve installation efficiency and reduce the engineering cost, but also to simplify information exchange among different stakeholders. In this paper, a RESTful information exchange method among installer-friendly engineering tools...
For many Internet applications, the contents are built based on multiple data sources that change continually, and yet the presentation formats have to be tailored according to various user profiles. This paper investigates the dynamic content applications that are modeled as workflows of XML objects. Each content object can be constructed from its predecessors by executing the transformation scripts...
A Web Service is a software system designed to support interoperable machine-to-machine interaction over a network, it also provides a standard means of interoperating between different software applications. However, Web Services have raised new challenges on information security, this technology is susceptible to XML Injection attacks, which would allow an attacker to collect and manipulate information...
Execution traces are frequently used to study system run-time behavior and to detect problems. However, the huge amount of data in an execution trace may complexify its analysis. Moreover, users are not usually interested in all events of a trace, hence the need for a proper filtering approach. Filtering is used to generate an enhanced trace, with a reduced size and complexity, that is easier to analyse...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.