scholarly journals Storing JWT Token in Local Variables

2020 ◽  
pp. 55-63
Author(s):  
Oleksandra S. Bulgakova ◽  
◽  
Vjacheslav V. Zosimov ◽  
Pavlo D. Popravkin ◽  
◽  
...  

The article discusses the problem of storing structured information over the Internet (JSON format) in local storage and pieces of information transmitted to the browser from the site visited by the user (cookies), and a method is proposed for storing the JSON web key in a local variable inside the closure (functions that refer to into independent variables). Based on user authorization, the interaction of the JSON web key with the server is shown, and the solution to the main problems of authorization and storage of the token (JWT – JSON Web Token).

Author(s):  
Dan J. Bodoh

Abstract The growth of the Internet over the past four years provides the failure analyst with a new media for communicating his results. The new digital media offers significant advantages over analog publication of results. Digital production, distribution and storage of failure analysis results reduces copying costs and paper storage, and enhances the ability to search through old analyses. When published digitally, results reach the customer within minutes of finishing the report. Furthermore, images on the computer screen can be of significantly higher quality than images reproduced on paper. The advantages of the digital medium come at a price, however. Research has shown that employees can become less productive when replacing their analog methodologies with digital methodologies. Today's feature-filled software encourages "futzing," one cause of the productivity reduction. In addition, the quality of the images and ability to search the text can be compromised if the software or the analyst does not understand this digital medium. This paper describes a system that offers complete digital production, distribution and storage of failure analysis reports on the Internet. By design, this system reduces the futzing factor, enhances the ability to search the reports, and optimizes images for display on computer monitors. Because photographic images are so important to failure analysis, some digital image optimization theory is reviewed.


2016 ◽  
Vol 11 (3) ◽  
pp. 163
Author(s):  
Muhamad Abu-Jalil ◽  
Ashraf Aaqoulah

This study aimed to identify the role of Internet technology in transforming the role of its users to promoters of medical products in Jordan. The study found that there are statistically significant effects of independent variables (multipurpose and advanced Internet programs, reduced costs of the use of Internet programs, collective and interactive communication via the Internet, and Internet information abundance and variety of its resources) on the dependent factor, which is transformation of the role of Internet users to promoters of medical products in Jordan. The study recommended increasing attention on networks to promote medical products in Jordan. This is consistent with the fact that promotion via networks has become an effective way to support and enhance the image of products and its delivery to the target group in all markets around the world.


2020 ◽  
Vol 10 (4) ◽  
pp. 41-50
Author(s):  
A.A. Osin ◽  
A.K. Fomin ◽  
G.B. Sologub ◽  
V.I. Vinogradov

The work is aimed at researching the possibility of using machine learning methods to build models for forecasting demand for new products in the online store Ozon. ru. Approaches to the solution that were not previously used in a specific task are proposed for consideration. Data on sales history and storage of goods at Ozon.ru are used as a sample. There is a description and analysis of the approximate loss of the Ozon.ru website, the data used, the process of building a base model, and the results obtained. It describes the metrics used to evaluate the prediction results and makes a comparative analysis between the prediction results of the built model and the results of heuristically selected values.


Author(s):  
Rodrigo Dos Santos Costa

In spite of a contemporary discussion about the management of knowledge and the deep use of technologies focused on architecture, organization and knowledge detection based on organization inner data analysis, as well as public data available on the internet, it is necessary a critic look above the organization knowledge creation processes even as the load of tacit knowledge there is in an organization. It is observed that the evolution of technologies, such as mobile computing, the web, besides the architecture of the computers and their ability of handling and storage data, has brought to the information economy or the age of knowledge, diverting focus on people, the central axis of organizational knowledge, and their ability to reason, infer, make decisions, and above them all the processes of knowledge creation focused on the collaborative solution of problems and generation of innovation based on the socialization of knowledge.


2018 ◽  
pp. 2124-2138
Author(s):  
Priya Makarand Shelke ◽  
Rajesh Shardanand Prasad

Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.


Semantic Web ◽  
2020 ◽  
pp. 1-31
Author(s):  
Genet Asefa Gesese ◽  
Russa Biswas ◽  
Mehwish Alam ◽  
Harald Sack

Knowledge Graphs (KGs) are composed of structured information about a particular domain in the form of entities and relations. In addition to the structured information KGs help in facilitating interconnectivity and interoperability between different resources represented in the Linked Data Cloud. KGs have been used in a variety of applications such as entity linking, question answering, recommender systems, etc. However, KG applications suffer from high computational and storage costs. Hence, there arises the necessity for a representation able to map the high dimensional KGs into low dimensional spaces, i.e., embedding space, preserving structural as well as relational information. This paper conducts a survey of KG embedding models which not only consider the structured information contained in the form of entities and relations in a KG but also its unstructured information represented as literals such as text, numerical values, images, etc. Along with a theoretical analysis and comparison of the methods proposed so far for generating KG embeddings with literals, an empirical evaluation of the different methods under identical settings has been performed for the general task of link prediction.


2018 ◽  
Vol 1 (4) ◽  
pp. 37
Author(s):  
Gazmend Krasniqi ◽  
Petrit Rama ◽  
Blerim Rexha

Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted applications need to be fast, but not to lose their main security features. Authentication and encryption are the main processes in the security aspect, and are required for a secure communication. These processes can be executed in different devices, among them PCs, microprocessors, microcontrollers, biometric cards or mobile devices. Biometric identity cards are becoming increasingly popular, challenging traditional PC devices. This paper compares two processing systems, the efficiency of encryption and signatures on the data executed in national identity biometric card versus PC, known also as the match-on-card versus the match-off-card. It considers how different parameters impact the process and the role they play on the overall process. The results, executed with a predefined set of test vectors, determine which processing system to use in a certain situation. Final conclusions and recommendations are given taking into consideration the efficiency and security of the data.


2006 ◽  
Vol 23 (2-3) ◽  
pp. 591-596 ◽  
Author(s):  
Mike Featherstone

The archive is the place for the storage of documents and records. With the emergence of the modern state, it became the storehouse for the material from which national memories were constructed. Archives also housed the proliferation of files and case histories as populations were subjected to disciplinary power and surveillance. Behind all scholarly research stands the archive. The ultimate plausibility of a piece of research depends on the grounds, the sources, from which the account is extracted and compiled. An expanding and unstable globalizing archive presents particular problems for classifying and legitimating knowledge. Increasingly the boundaries between the archive and everyday life become blurred through digital recording and storage technologies. Not only does the volume of recordable archive material increase dramatically (e.g. the Internet), but the volume of material seen worthy of archiving increases too, as the criteria of what can, or should be, archived expands. Life increasingly becomes lived in the shadow of the archive.


2020 ◽  
Vol 45 (3) ◽  
pp. 44-52
Author(s):  
Dušan Marković ◽  
Ranko Koprivica ◽  
Biljana Veljković ◽  
Dejan Vujičić ◽  
Uroš Pešović ◽  
...  

The paper analyzes the geometric characteristics of seeds, uniformity and cross - sectional area of rapeseed, on the basis of which the equivalent diameter was calculated. Knowing the dimensions of seeds is important in seed production from sowing, harvesting, processing, and storage, to seed packaging. Manual determination of the dimensions of seeds is a rather slow process, so the aim of this work was to show a computer-aided device that contains a camera and can take seed samples, while determining the dimensions of seeds by program image analysis. Presented device is realized in accordance with the concept of the Internet of Things (IoT) so it has the ability to connect to the Internet and forward the image, or in another variant can directly perform the image analysis and further forward the results only. The purpose of the presented system for determining the size of seeds is providing a fast and efficient way for users to get the first results that will help them in the implementation of further activities related to working with small seeds.


Author(s):  
Yuliia Pyrih ◽  
Mykola Kaidan ◽  
Olena Hordiichuk-Bublivska

The paper considers the concept of "Internet of Things", which is increasingly penetrating into various spheres of human life and contributes to a significant qualitative change in economic, operational and technological processes. The stages of functioning of the Internet of Things and the levels of its architecture are considered. Based on an analysis of a number of literature sources, the IoT has the greatest impact on six industries such as electricity and housing, health, agriculture and livestock, freight transportation and storage, smart city and construction, and manufacturing. A description of the main types of services for each of these industries and the role of the Internet of Things for its development. It is determined that the application of IoT solutions: in energy - allows to reduce the cost of infrastructure operation, prevent serious accidents and increase the efficiency of asset use; in healthcare - provides real-time streaming of data from devices that monitor the human condition, which allows for accurate diagnosis, increase the accuracy of results and optimize the provision of medical care; in agriculture and livestock - allows to significantly increase the efficiency of cultivation and reduce losses of agricultural products by raising awareness in decision-making and the ability to respond quickly to changes in weather, prices, market situation, etc .; for transportation and storage of goods - allows to provide smooth movement of operations and reduction of underutilization of resources for profit maximization; for "smart city" and construction - allows you to fundamentally improve the city's economy, improve living standards and public safety through more efficient management of housing and communal services, transport and services for the population; for industrial production - allows you to optimize production processes, modify business models, as well as increase productivity and efficiency, while reducing costs. The scheme of intelligent transport system for the city of Kyiv is presented.


Sign in / Sign up

Export Citation Format

Share Document