scholarly journals Using LoRa Networks in Automatic Band Dendrometer

2001 ◽  
Vol 14 (5) ◽  
pp. 600-605
Author(s):  
Yuri N. Bezborodov ◽  

This article describes the experience of using wireless LoRa data transfer in an automatic band dendrometer, developed by the author early [1]. Previously was developed an automatic band dendrometer with web data storage, we provided information about the process of creating the device and the result of its testing. As the result of the tests, the necessary improvements were formulated, one of which was the need to use a network of several sensors located in one area for measurements and transmit their measurements wirelessly to a central data logger for processing and transmission to the web server. Thus, it became necessary to select and implement an energy-saving data exchange protocol with a sufficient range and reliable performance in a taiga

2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Author(s):  
Naresh P ◽  
Rajyalakshmi P ◽  
Krishna Vempati ◽  
Saidulu D

Cloud acts as a data storage and also used for data transfer from one cloud to other. Here data exchange takes place among cloud centers of organizations. At each cloud center huge amount of data was stored, which interns hard to store and retrieve information from it. While migrating the data there are some issues like low data transfer rate, end to end latency issues and data storage issues will occur. As data was distributed among so many cloud centers from single source, will reduces the speed of migration. In distributed cloud computing it is very difficult to transfer the data fast and securely. This paper explores MapReduce within the distributed cloud architecture where MapReduce assists at each cloud. It strengthens the data migration process with the help of HDFS. Compared to existing cloud migration approach the proposed approach gives accurate results interns of speed, time and efficiency.


2019 ◽  
Vol 5 (2) ◽  
pp. 141-146
Author(s):  
Ahmad Faisol ◽  
Imam Izzat Muttaqin

The wireless networking application besides giving the simplicity in communication or data exchange, also has a weakness in security system. Every user's tools that connected to the wireless network must be ready towards the appearance of the destruction or attack, because wireless network doesn't have a clear defense track. On this research, monitoring sensor application based on Snort is being suggested as one of the solutions that can be used to help the network arrangement in monitoring the condition of the network and analyze every dangerous package that is in the network. Snort will detect the intruder and analyze the package that cross the network directly and recording into the data storage media. Monitoring sensor is using rule-base system that will detect every package based on the directions that has defined to the direction data collection. The result of the research shown every new data package that entry the sensor, so the change of the event's amount of the monitoring sensor will change automatically based on the admin's arrangements. More data that cross the sensor, can influence the activity from the server that shown by the slow response from the web server.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 2356-2367

The rapid advancements in data digitization, the most powerful inventions of learning methodologies in data collection and reduced cost of data storage further enabled the World Wide Web with immense amount of data at significant rate in all the key domains. The generated web data is non-scalable, high dimensional, widely distributed, heterogeneous, dynamic in nature and having useful insights, and thus, it evolved as big data. This situation creates inevitably increasing opportunities in extracting structured solutions from unstructured weblog data for the present big data researchers. Moreover, to provide value addition to any key domain and derive actionable knowledge for various applications, such as, web usage analysis for improvements in fraud detection, product analysis and customer segmentation, got the focus in big data era by the web analysts. To improve operational performance and to discover hidden insights accurately, a comprehensive process is required to investigate the web user usage behavior by analyzing big web data. Towards this, the authors concentrate on reviewing the techniques and technologies of web data collection and preparation for investigating web user usage behavior effectively. In the present paper, the researchers initially pay an attention to explore web log data preparation methods in the traditional approach. Later, the review emphasizes on Hadoop approach for big data preparation and processing. This approach able to concentrate comprehensively on both the stages: distributed data storage and parallel processing of weblog data and to leverage the strengths of techniques and technologies of individual stages. Moreover, the authors deliberately review the possible potential research paths that results in an improved methodologies for data storage and optimized processing speed in the era of big web data


2011 ◽  
Vol 403-408 ◽  
pp. 1062-1067 ◽  
Author(s):  
Payalpreet Kaur ◽  
Raghu Garg ◽  
Ravinder Singh ◽  
Mandeep Singh

Web data mining is a field that has gained popularity in the recent time with the advancement in web mining technologies. Web data mining is the extraction of data on web. The term Web Data Mining is a technique used to crawl through various web resources to collect required information, which enables an individual or a company to promote business, understanding marketing dynamics, new promotions floating on the Internet, etc. The data on web is unstructured, irregular and lacks a fixed unified pattern as it is presented in HTML format that represents data in the presentation format and is unable to handle semi-structured or unstructured data . These difficulties lead to the emergence of XML based web data mining. XML was created so that richly structured documents could be used over the web.XML provides a standard for the data exchange and data storage .This paper presents a web data mining model based on XML. In this model first of all unstructured data is transformed to XML and then XML document is stored in database in the form of the string tree, then specific records are searched using a LINQ query. If record does not exist in the database then check the updates of specific website and repeat the same steps. At last data selected by LINQ Query is displayed on web browser. The feature that helped to increase the speed of data extraction and that also reduces the time of extraction is the presence of database that stores the data that have been extracted earlier by a user and can be used by other users by passing a LINQ query .In this model there is no need to create an extra separate XSL file because this model stores xml document in the database in the form of the string tree. This model is implemented using C# with XML.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Rizka Dwi Pratiwi ◽  
Surya Darma Nasution ◽  
Fadlina Fadlina

The higher activity of data exchange transactions both online and offline raises concerns for some parties, large data sizes result in a waste of memory and slow data transfer and delivery processes. For this reason, a technique is needed to change the size of the data to be smaller. This technique is called compression or better known as data compression. Data compression is a process of converting a set of data into a form of code to save data storage requirements. Fixed Length Binary Encoding Algorithm (FLBE) uses a lossless technique that does not eliminate information at all, only representing some of the same information. The results obtained from the application of Fixed Length Binary Encoding algorithm in the process of compression and decompression include compression capacity, compression ratio and compression and decompression time. In accordance with the results of the experiments carried out, it can be seen that the data originally having a larger size can be compressed well implemented in text files.


2021 ◽  
Vol 5 (1) ◽  
pp. 1
Author(s):  
Andria Andria ◽  
Ridho Pamungkas

<p class="infAbstract"><em>Abstrak : </em></p><p class="infAbstract">Penetration testing (Pentesting) merupakan sebuah metode evaluasi terhadap keamanan pada suatu sistem dan jaringan komputer dengan melakukan suatu pengujian, salah satu metode pengujian yang dapat digunakan adalah SQL Injection. SQL Injection merupakan suatu teknik hacking dengan fokus pengujian pada database sebagai media penyimpanan data pada sistem. Tool yang digunakan pada penelitian ini ialah SQLMap yang merupakan tool open source yang dapat menganalisa, mendeteksi dan melakukan exploit (sebuah kode yang dapat menyerang keamanan sistem komputer secara spesifik) pada bug SQL Injection. Pengujian dilakukan menggunakan perangkat Smartphone bersistem operasi Android dengan program aplikasi Termux sebagai emulator terminal berbasis linux. Tujuan dari penelitian ini untuk pengujian keamanan database web server dan membantu pengelola atau admin situs web untuk dapat memeriksa adanya celah kerentanan database yang dapat dieskploitasi oleh peretas.</p><p class="infAbstract">____________________________</p><p class="infAbstract">Abstract :</p><p><em>Penetration testing</em><em> (Pentest</em><em>ing</em><em>) is a method of evaluating the security of a computer system and network by conducting a test, one of the testing methods that can be used is SQL Injection . SQL Injection  is a hacking technique that focuses on testing the database as a data storage medium on the system. The tool used in this study is SQLMap which is an open source tool that can analyze, detect and exploit (a code that can specifically attack computer system security) on the SQL Injection  bug. Testing was carried out using a Smartphone device with the Android operating system with the Termux application program as a linux-based terminal emulator. The purpose of this research is to test the security of the web server database and help the website manager or admin to be able to check for any database vulnerabilities that can be exploited by hackers.</em></p><p class="infAbstract"><em><br /></em></p>


Biomimetics ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 32
Author(s):  
Tomasz Blachowicz ◽  
Jacek Grzybowski ◽  
Pawel Steblinski ◽  
Andrea Ehrmann

Computers nowadays have different components for data storage and data processing, making data transfer between these units a bottleneck for computing speed. Therefore, so-called cognitive (or neuromorphic) computing approaches try combining both these tasks, as is done in the human brain, to make computing faster and less energy-consuming. One possible method to prepare new hardware solutions for neuromorphic computing is given by nanofiber networks as they can be prepared by diverse methods, from lithography to electrospinning. Here, we show results of micromagnetic simulations of three coupled semicircle fibers in which domain walls are excited by rotating magnetic fields (inputs), leading to different output signals that can be used for stochastic data processing, mimicking biological synaptic activity and thus being suitable as artificial synapses in artificial neural networks.


2009 ◽  
Vol 43 (1) ◽  
pp. 203-205 ◽  
Author(s):  
Chetan Kumar ◽  
K. Sekar

The identification of sequence (amino acids or nucleotides) motifs in a particular order in biological sequences has proved to be of interest. This paper describes a computing server,SSMBS, which can locate and display the occurrences of user-defined biologically important sequence motifs (a maximum of five) present in a specific order in protein and nucleotide sequences. While the server can efficiently locate motifs specified using regular expressions, it can also find occurrences of long and complex motifs. The computation is carried out by an algorithm developed using the concepts of quantifiers in regular expressions. The web server is available to users around the clock at http://dicsoft1.physics.iisc.ernet.in/ssmbs/.


Sign in / Sign up

Export Citation Format

Share Document