Differential Synchronizaiton Mechanism for a Real-Time Collaborative Web Page Editing System WFE-S

Author(s):  
Tadachika Ozono ◽  
Robin M.E. Swezey ◽  
Shun Shiramatsu ◽  
Toramatsu Shintani ◽  
Takushi Goda ◽  
...  
Keyword(s):  
2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


Author(s):  
Neil C. Rowe

Content repurposing is the reorganizing of data for presentation on different display hardware (Singh, 2004). It has been particularly important recently with the growth of handheld devices such as personal digital assistants (PDAs), sophisticated telephones, and other small specialized devices. Unfortunately, such devices pose serious problems for multimedia delivery. With their tiny screens (150 by 150 for a basic Palm PDA or 240 by 320 for a more modern one, vs. 640 by 480 for standard computer screens), one cannot display much information (i.e., most of a Web page); with their low bandwidths, one cannot display video and audio transmissions from a server (i.e., streaming) with much quality; and with their small storage capabilities, large media files cannot be stored for later playback. Furthermore, new devices and old ones with new characteristics have been appearing at a high rate, so software vendors are having difficulty keeping pace. So some real-time, systematic, and automated planning could be helpful in figuring how to show desired data, especially multimedia, on a broad range of devices.


2014 ◽  
Vol 573 ◽  
pp. 519-522
Author(s):  
N.S. Sudharsan ◽  
K. Latha

. Phishing has become most notorious security issues in online real time web pages. Many studies and ideas have been proposed related to phishing attack in order to overcome the security issues. Phishing attack can be easily done by Uniform resource locator (URL) obfuscation. It is the trick where the user will be forwarded to fake web page which has look and feel effect as the original web page when they click through the fake link. Organizations which use online business and transaction like ebay, paypal use many preventive approaches like blacklist, whitelist of URL in order to prevent any online theft using phishing attack. This paper propose a novel idea for detecting Phishing attack by checking the URL patterns of the suspected page with generated legitimate common URL pattern by inspecting different international URL patterns of that particular banking site.


Author(s):  
Gregorio Rodríguez-Miranda ◽  
Rene Santos-Osorio ◽  
Carmen Sarahí Ordaz-Banda ◽  
José Armando Lopez-Rivera

In this work it present the development of a prototype for the control of spaces in a parking lot, which through a web page monitors and displays in real time the available places, for this project it is used: an Arduino Uno card, proximity sensors Lm393, male / female, male / male cables, ESP8266 WIFI module and two LEDs; all these connected to each other by a communication link developed with Arduino code, allowing to transmit and send data in the Arduino serial. An Arduino serial communication link is made with java language code, acting as an intermediary for the insertion of information in the database. The web application was developed with the programming language PHP and HTML and was connected to the database hosted on the MySQL server, using as a Sublime Text code editor. Thus achieving on the web page the monitoring in real time of the available parking places. The results shown by the prototype indicate that it is probably feasible to implement this technology to make the parking lots smart.


Author(s):  
G Sai Kiranmayi ◽  
B Bhanu ◽  
B Manikanta ◽  
N Ashok ◽  
G Govinda Raju

The main objective of this paper is to develop a virtual environment for detecting suspicious and targeted places for user without any loss of human life.The purpose of this project is to regulate robot with interface board of the raspberry pi,sensors and software to full fill real time equipment. There are sundry surveillance systems such as camera, CCTV etc. available in the market. In these systems, the person located in that particular area can only view what is transpiring in that place. We proposed a system to build an authentictime live streaming and monitoring system utilizing Raspberry pi with installed Wi-Fi connectivity. It can continuously monitor the objects. Robot can move in every direction (left, right,forward and backward). The webcam which is placed on the robotic unit will capture the video and it transmits vivacious to the remote end. The major application of this paper can be analysed utilizing HTML web page which can be acclimated to control the movement of the robot.


2021 ◽  
Vol 13 (6) ◽  
pp. 1-13
Author(s):  
Guangxuan Chen ◽  
Guangxiao Chen ◽  
Lei Zhang ◽  
Qiang Liu

In order to solve the problems of repeated acquisition, data redundancy and low efficiency in the process of website forensics, this paper proposes an incremental acquisition method orientecd to dynamic websites. This method realized the incremental collection on dynamically updated websites through acquiring and parsing web pages, URL deduplication, web page denoising, web page content extraction and hashing. Experiments show that the algorithm has relative high acquisition precision and recall rate, and can be combined with other data to perform effective digital forensics on dynamically updated real-time websites.


The Given dynamic web pages have many security issues, and it can be very difficult to handle.The goal of card and finger print system gives more security to dynamic web pages. In this paper, We clearly discuss and workout the real time example with the help of Internet. Specifically, by introducing this technology the cyber crime also be comes underthecontrol.Fingerprintverificationisanimportantbiometric techniqueforpersonalidentification.Inthispaper,wedescribethede signandimplementationofaprototypeautomaticidentityauthentic ationsystemwhichusesfingerprintstoauthenicatetheidentityofani ndividual.


1998 ◽  
Vol 25 (6) ◽  
pp. 992-1002
Author(s):  
Daniel Lavallée ◽  
Claude Marche ◽  
Francis Therrien

The development of watersheds complicates the management of hydraulic facilities. Managers are facing economic and social imperatives that are potentially conflicting. Generally, their decisions are based on operational rules established by experience. However, these rules do not ensure that certain minimal conditions be respected and they do not determine future conditions for the river as a whole. Therefore, the communication of these conditions between managers of a same river is difficult. The present paper provides an approach to improve this situation. The real time simulator XSIM, with a graphical interface, has been developed in order to assist managers in control, design, analysis, and information transmission. It is designed based on an intumescence model functioning in an unsteady flow regime. It allows the managers to input the considered operations and provides them with the design conditions in a format adapted to their needs. It ensures the distribution and the availability of the results by creating a web page automatically. Its application to the management of complex sections of a real river is presented in order to illustrate its usefulness for day-to-day management and in emergency situations, such as a sudden flood or the rupture of a dam.Key words: flood, decision aid, management, unsteady flow regime, hydrology, graphical interface, numerical simulation.


Sign in / Sign up

Export Citation Format

Share Document