Rich Client Internet Applications

2017 ◽  
pp. 1775-1775
2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Fu Jie Tey ◽  
Tin-Yu Wu ◽  
Chiao-Ling Lin ◽  
Jiann-Liang Chen

AbstractRecent advances in Internet applications have facilitated information spreading and, thanks to a wide variety of mobile devices and the burgeoning 5G networks, users easily and quickly gain access to information. Great amounts of digital information moreover have contributed to the emergence of recommender systems that help to filter information. When the rise of mobile networks has pushed forward the growth of social media networks and users get used to posting whatever they do and wherever they visit on the Web, such quick social media updates already make it difficult for users to find historical data. For this reason, this paper presents a social network-based recommender system. Our purpose is to build a user-centered recommender system to exclude the products that users are disinterested in according to user preferences and their friends' shopping experiences so as to make recommendations effective. Since there might be no corresponding reference value for new products or services, we use indirect relations between friends and “friends’ friends” as well as sentinel friends to improve the recommendation accuracy. The simulation result has proven that our proposed mechanism is efficient in enhancing recommendation accuracy.


2002 ◽  
Vol 41 (05) ◽  
pp. 414-418 ◽  
Author(s):  
I. Mavridis ◽  
C. Ilioudis ◽  
C. Georgiadis ◽  
G. Pangalos

Summary Objectives: Internet technologies provide an attractive infrastructure for efficient and low cost communications in regional health information networks. The advantages provided by the Internet come however with a significantly greater element of risk to the confidentiality and integrity of information. This is because the Internet has been designed primarily to optimize information sharing and interoperability, not security. The main objective of this paper is to propose the exploitation of public-key cryptography techniques to provide adequate security to enable secure healthcare Internet applications. Methods: Public-key cryptography techniques can provide the needed security infrastructure in regional health networks. In the regional health-care security framework presented in this paper, we propose the use of state-of-art Public Key Infrastructure (PKI) technology. Such an e-Health PKI consists of regional certification authorities that are implemented within the central hospitals of each region and provide their services to the rest of the healthcare establishments of the same region. Results: Significant experience in this area has been gained from the implementation of the PKI@AUTH project. Conclusions: The developed PKI infrastructure already successfully provides its security services to the AHEPA university hospital. The same infrastructure is designed to easily support a number of hospitals participating in a regional health information network.


Sign in / Sign up

Export Citation Format

Share Document