The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fast data analytics at an increasingly large scale has become a critical task in any Internet service company. For example, in Baidu, the major search engine company in China, large volumes of Web and business data in PB-scale are timely and constantly acquired and analyzed for the purposes of evaluating product revenue, tracking product demanding activities on market, predicting user behavior, upgrading...
For the existing assessment methods, there are many weakness like the complex process, the high cost and the mismatching between experts and the projects, which have an significant effect on the scientificity and efficiency. In this study, an online assessment system was proposed based on lightweight composite framework Spring+Struts+iBATIS. This system can voluntarily select the auto fit experts...
The number of behavior-support services for user activities has been increasing lately. To provide a highly convenient service, it is necessary to recognize detailed activities of users. However, in reality, to provide a service in a real environment, some issues need to be resolved such as developing devices required for recognizing activity, handling the vast workload involved in creating features...
Scalability is an important requirement in the development and the operation of applications in a cloud environment. To handling heavy concurrency in the input load, many design-related and operational factors should be considered. The microservice architecture patterns provide better means to increase the scalability than traditional software architecture patterns. However, certain aspects of applications...
Named Data Networking (NDN) uses content names as routing entries, and thus the scalability of NDN routing is of primary concern. NDN allows in-network caching as a built-in functionality; however, if network nodes make caching decisions individually, duplicate copies of the same content may exist among nearby nodes. To address these problems, we propose Coordinated Routing and Caching (CoRC) that...
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness...
Advance in ICT and convergence technology, latest trend of e-commercial is O2O. Scale of O2O market is growing and famous platform firms start to invest this industry. However, O2O service's security requirements for safe O2O service has not been researched yet. In O2O Service, Data flows from Online to Offline or from Offline to Online, So, Traditional Online Security countermeasures is not appropriate...
College mental health is an area of significant importance. A number of stressors relating to career, relationships and life events collide during this life phase, when young adults learn to be autonomous. A major developmental task is making appropriate life choices in the face of freedom and contradictory messages from a wide range of sources. Thus identifying individuals in distress and building...
In this work, we present a prototype of multi-user system for access control to datasets stored in a cloud. In the system, each user is assigned a set of attributes that characterize his identity in the system. The encrypted datasets to be shared among users are stored in the cloud, and the access control is provided by cryptographic methods. The basis of the system is multi-authority attribute-based...
Business analytics is an important means of gaining new insights and understanding of business performance. Data mining technology provides information needed by business analytics based on data. But due to the barriers of skill, resource and cost, business analytics is hard to carry out and put into practice for small and even medium sized enterprises. This paper presents a novel concept named Highly...
Software as a Service (SaaS) is a concept for delivering software applications, the service runs on cloud and provides benefits to small and medium enterprise (SMEs), offering the advantage of 7 day 24 hour access ability and is truly ubiquitous. This case study examines the implementation of combining Scrum and Waterfall approaches to develop a set of Tailor-made Software as a Service to assist SMEs...
In today's open market, e-commerce has developed its strategy to process various business applications. There applications are developed with the platforms like Magento, Zen Cart, Prestashop, Spree etc., to run a successful online store. These are also used for customer e-commerce apps and require a scalable database for storing the data. The NoSQL database provides an efficient storage access and...
With the rapid development of network systems, many of our daily life activities can be performed via the Internet. Online shopping is one of the most common of these activities, which include group buying behavior. Group buying is a trading way, which is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain...
The construction of data analysis infrastructures that handle continuously accumulating data is quickly becoming an essential requirement for many organizations such as the U.S. Department of Energy (DOE). While DOE supports some of the largest computing facilities in the world, new analysis infrastructures like Apache Spark are difficult to implement. In this paper, we propose an on-demand Spark...
IT services built from cloud applications are subject of several maintenance operations like upgrades, reconfigurations, or redeployments. Monitoring those changes is crucial to detect operator errors, which are a main source of service failures. Another challenge, which exacerbates operator errors is the increasing frequency of changes, e.g. because of continuous deployments. In this paper we propose...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
Modern mobile communication technology had solved many problems for business and individuals. Modern open source android applications are featured individually. The integration of such applications will be essential for team managers or seniors. Many trials of integration do exist such as TripIt, Gist, TouchDown and iSolve, as an example. In this paper we introduced an integrated third party application...
Due to recent integration of SCADA systems with business systems, SCADA systems became open(unprotected), leading to not only security vulnerabilities increase but also sophisticated and intelligent cyber-attacks specifically targeting SCADA systems. A whitelist based security control technique that has attracted a lot of attention, is an emerging systems control, currently can be applied to solve...
A new era of Business Intelligence Applications has started in-order to solve the problems of Relational Database Management System (RDBMS). If the data is coming from different sources, the data couldn't be sent to any one of the target RDBMS. To overcome this problem BI Apps evolved, i.e. applying ETL (Extraction Transformation and Loading) on different schemas, flat files and many other sources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.