scholarly journals Autonomous Ration Shops Using Database Management System and Embedded System

Author(s):  
Vivek Sharma

This paper centres around structure and execution of Automation of Ration Shop. In ongoing situation, all general society and private parts go for computerization in their procedure. Common Supplies Corporation is the significant open segment which oversees and conveys the basic items to all the residents. A portion of the restrictions of traditional proportion shop framework are because of manual estimations in the ordinary framework, consequently the client can not ready to get the precise amount of material. And furthermore there is an opportunity for the unlawful utilization of the items in the regular framework. for example the materials are taken by making incorrectly sections in the register without the information on the apportion card holder. And furthermore the moderate preparing keeps a long line before the shop. To defeat these issues we go for the mechanization of the apportion shops. This article aims for the sequential recording of ration shop transactions to a database using a network of clients with a server. The paper involves a client side and server side.  The client PC is the one which is in the ration shop and the server side contains the database and a PC. The client PC is connected with a weighing machine. The client module consists of arduino microcontroller, which is with the weighing machine. The customer with a ration card can have his allotted items and which will be updated to the server as he receives it. The weight of the item is recorded by the microcontroller based weighing machine to the PC. The customer can access the details of his purchase and the amount of items left in the shop through an ASP.NET based webpage. The server stores all the allotted items to a ration shop for each and every customer and also the total items allotted for the ration shop. This project aims in the minimization of ration related corruption including the black-market reselling of goods and also the incorrect weights of items supplied and price related issues.

Author(s):  
Putri Maharani ◽  
Zulhendra Zulhendra ◽  
Dedy Irfan

The Development of science nowadays develop rapidly furthermore lead make human activity more easily especially in technology and communication. The development in science has made a change how people nowaday get information. Wall magazine is one of media for college student to get some information. Wall magazine for college student not only about lecture activity but also about many information e.g. announcement about loss something, advertisement,event information and etc. This application “WallOn” is designed to help college student to get the latest news or information about campus. This application can reduce paper as a media for news and information. The method used based on UML model object oriented. In the server side using PHP as programming language with MySQL as database management system and Sublime Text as text editor meanwhile in the client side using JAVA as proramming language, JSON and android studio that can run in android. An android base application is designed to obtained an application that can accommodate needed e.g give an information or news, not only in campus area but also out of campus.Keywords: Android Application, Wall Magazine, client-server, php, MySql


Author(s):  
Kostyantyn Kharchenko

The approach to organizing the automated calculations’ execution process using the web services (in particular, REST-services) is reviewed. The given solution will simplify the procedure of introduction of the new functionality in applied systems built according to the service-oriented architecture and microservice architecture principles. The main idea of the proposed solution is in maximum division of the server-side logic development and the client-side logic, when clients are used to set the abstract computation goals without any dependencies to existing applied services. It is proposed to rely on the centralized scheme to organize the computations (named as orchestration) and to put to the knowledge base the set of rules used to build (in multiple steps) the concrete computational scenario from the abstract goal. It is proposed to include the computing task’s execution subsystem to the software architecture of the applied system. This subsystem is composed of the service which is processing the incoming requests for execution, the service registry and the orchestration service. The clients send requests to the execution subsystem without any references to the real-world services to be called. The service registry searches the knowledge base for the corresponding input request template, then the abstract operation description search for the request template is performed. Each abstract operation may already have its implementation in the form of workflow composed of invocations of the real applied services’ operations. In case of absence of the corresponding workflow in the database, this workflow implementation could be synthesized dynamically according to the input and output data and the functionality description of the abstract operation and registered applied services. The workflows are executed by the orchestrator service. Thus, adding some new functions to the client side can be possible without any changes at the server side. And vice versa, adding new services can impact the execution of the calculations without updating the clients.


2020 ◽  
Vol 15 ◽  
Author(s):  
Fahad Layth Malallah ◽  
Baraa T. Shareef ◽  
Mustafah Ghanem Saeed ◽  
Khaled N. Yasen

Aims: Normally, the temperature increase of individuals leads to the possibility of getting a type of disease, which might be risky to other people such as coronavirus. Traditional techniques for tracking core-temperature require body contact either by oral, rectum, axillary, or tympanic, which are unfortunately considered intrusive in nature as well as causes of contagion. Therefore, sensing human core-temperature non-intrusively and remotely is the objective of this research. Background: Nowadays, increasing level of medical sectors is a necessary targets for the research operations, especially with the development of the integrated circuit, sensors and cameras that made the normal life easier. Methods: The solution is by proposing an embedded system consisting of the Arduino microcontroller, which is trained with a model of Mean Absolute Error (MAE) analysis for predicting Contactless Core-Temperature (CCT), which is the real body temperature. Results: The Arduino is connected to an Infrared-Thermal sensor named MLX90614 as input signal, and connected to the LCD to display the CCT. To evaluate the proposed system, experiments are conducted by participating 31-subject sensing contactless temperature from the three face sub-regions: forehead, nose, and cheek. Conclusion: Experimental results approved that CCT can be measured remotely depending on the human face, in which the forehead region is better to be dependent, rather than nose and cheek regions for CCT measurement due to the smallest


2003 ◽  
Vol 3 (2) ◽  
pp. 170-173 ◽  
Author(s):  
Karthik Ramani, ◽  
Abhishek Agrawal, and ◽  
Mahendra Babu ◽  
Christoph Hoffmann

New and efficient paradigms for web-based collaborative product design in a global economy will be driven by increased outsourcing, increased competition, and pressures to reduce product development time. We have developed a three-tier (client-server-database) architecture based collaborative shape design system, Computer Aided Distributed Design and Collaboration (CADDAC). CADDAC has a centralized geometry kernel and constraint solver. The server-side provides support for solid modeling, constraint solving operations, data management, and synchronization of clients. The client-side performs real-time creation, modification, and deletion of geometry over the network. In order to keep the clients thin, many computationally intensive operations are performed at the server. Only the graphics rendering pipeline operations are performed at the client-side. A key contribution of this work is a flexible architecture that decouples Application Data (Model), Controllers, Viewers, and Collaboration. This decoupling allows new feature development to be modular and easy to develop and manage.


2013 ◽  
Vol 739 ◽  
pp. 628-631
Author(s):  
Xiao Meng Chen ◽  
Wei Chang Feng

E-Box multimedia system is developed for the rich audio and video resource on the Internet and on its server side, it can automatically search and integration of network video and audio resources, and send to the client side for the user in real-time broadcast TV viewing, full use of remote control operation, Simply its a very easy to use multimedia system. This article introduces its infrastructure, main technical ideas and you can also see some details about server side and client side.


2011 ◽  
Vol 338 ◽  
pp. 796-799
Author(s):  
Wei Chang Feng

E-Yuan multimedia system is developed for the rich audio and video resource on the Internet and on its server side, it can automatically search and integration of network video and audio resources, and send to the client side for the user in real-time broadcast TV viewing, full use of remote control operation, Simply it’s a very easy to use multimedia system. This article introduces its infrastructure, main technical ideas and you can also see some details about server side and client side. At the same time, the improvement on how to collect and integrate video resources is comprehensively elaborated.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 230
Author(s):  
C. Vasan Sai Krishna ◽  
Y. Bhuvana ◽  
P. Pavan Kumar ◽  
R. Murugan

In a typical DoS attack, the attacker tries to bring the server down. In this case, the attacker sends a lot of bogus queries to the server to consume its computing power and bandwidth. As the server’s bandwidth and computing power are always greater than attacker’s client machine, He seeks help from a group of connected computers. DDoS attack involves a lot of client machines which are hijacked by the attacker (together called as botnet). As the server handles all these requests sent by the attacker, all its resources get consumed and it cannot provide services. In this project, we are more concerned about reducing the computing power on the server side by giving the client a puzzle to solve. To prevent such attacks, we use client puzzle mechanism. In this mechanism, we introduce a client-side puzzle which demands the machine to perform tasks that require more resources (computation power). The client’s request is not directly sent to the server. Moreover, there will be an Intermediate Server to monitor all the requests that are being sent to the main server. Before the client’s request is sent to the server, it must solve a puzzle and send the answer. Intermediate Server is used to validate the answer and give access to the client or block the client from accessing the server.


2015 ◽  
Vol 12 (2) ◽  
pp. 655-681 ◽  
Author(s):  
Tomas Cerny ◽  
Miroslav Macik ◽  
Michael Donahoo ◽  
Jan Janousek

Increasing demands on user interface (UI) usability, adaptability, and dynamic behavior drives ever-growing development and maintenance complexity. Traditional UI design techniques result in complex descriptions for data presentations with significant information restatement. In addition, multiple concerns in UI development leads to descriptions that exhibit concern tangling, which results in high fragment replication. Concern-separating approaches address these issues; however, they fail to maintain the separation of concerns for execution tasks like rendering or UI delivery to clients. During the rendering process at the server side, the separation collapses into entangled concerns that are provided to clients. Such client-side entanglement may seem inconsequential since the clients are simply displaying what is sent to them; however, such entanglement compromises client performance as it results in problems such as replication, fragment granularity ill-suited for effective caching, etc. This paper considers advantages brought by concern-separation from both perspectives. It proposes extension to the aspect-oriented UI design with distributed concern delivery (DCD) for client-server applications. Such an extension lessens the serverside involvement in UI assembly and reduces the fragment replication in provided UI descriptions. The server provides clients with individual UI concerns, and they become partially responsible for the UI assembly. This change increases client-side concern reuse and extends caching opportunities, reducing the volume of transmitted information between client and server to improve UI responsiveness and performance. The underlying aspect-oriented UI design automates the server-side derivation of concerns related to data presentations adapted to runtime context, security, conditions, etc. Evaluation of the approach is considered in a case study applying DCD to an existing, production web application. Our results demonstrate decreased volumes of UI descriptions assembled by the server-side and extended client-side caching abilities, reducing required data/fragment transmission, which improves UI responsiveness. Furthermore, we evaluate the potential benefits of DCD integration implications in selected UI frameworks.


Author(s):  
Subrata Acharya

There is a need to be able to verify plaintext HTTP content transfers. Common sense dictates authentication and sensitive content should always be protected by SSL/HTTPS, but there is still great exploitation potential in the modification of static content in transit. Pre-computed signatures and client-side verification offers integrity protection of HTTP content in applications where SSL is not feasible. In this chapter, the authors demonstrate a mechanism by which a Web browser or other HTTP client can verify that content transmitted over an untrusted channel has not been modified. Verifiable HTTP is not intended to replace SSL. Rather, it is intended to be used in applications where SSL is not feasible, specifically, when serving high-volume static content and/or content from non-secure sources such as Content Distribution Networks. Finally, the authors find content verification is effective with server-side overhead similar to SSL. With future optimization such as native browser support, content verification could achieve comparable client-side efficiency.


Sign in / Sign up

Export Citation Format

Share Document