Based on HTTP Protocol Android Phones to Access the Web Server

2014 ◽  
Vol 543-547 ◽  
pp. 3441-3444
Author(s):  
Ying Li Wang ◽  
Zhi Jiang Xu ◽  
Si Si Li

The rapid development of 3 g mobile internet technology and the extensive use of intelligent mobile phone system make a user access the Internet not only can through a computer which has networking conditions, but also can through the mobile phone whenever and wherever. This paper designed and developed the method of accessing to the Web server based on the Android platform, it provides a quick and convenient way for the developers.

2013 ◽  
Vol 1 (2) ◽  
pp. 28
Author(s):  
Dite Ardian ◽  
Adian Fatchur Rochim ◽  
Eko Didik Widianto

The development of internet technology has many organizations that expanded service website. Initially used single web server that is accessible to everyone through the Internet, but when the number of users that access the web server is very much the traffic load to the web server and the web server anyway. It is necessary for the optimization of web servers to cope with the overload received by the web server when traffic is high. Methodology of this final project research include the study of literature, system design, and testing of the system. Methods from the literature reference books related as well as from several sources the internet. The design of this thesis uses Haproxy and Pound Links as a load balancing web server. The end of this reaserch is testing the network system, where the system will be tested this stage so as to create a web server system that is reliable and safe. The result is a web server system that can be accessed by many user simultaneously rapidly as load balancing Haproxy and Pound Links system which is set up as front-end web server performance so as to create a web server that has performance and high availability.


2020 ◽  
Vol 12 (16) ◽  
pp. 6333
Author(s):  
Chan Liu ◽  
Raymond K. H. Chan ◽  
Maofu Wang ◽  
Zhe Yang

Harnessing the rapid development of mobile internet technology, the sharing economy has experienced unprecedented growth in the global economy, especially in China. Likely due to its increasing popularity, more and more businesses have adopted this label in China. There is a concern as to the essential meaning of the sharing economy. As it is difficult to have a universally accepted definition, we aim to map the sharing economy and demystify the use of it in China in this paper. We propose seven organizing essential elements of the sharing economy: access use rights instead of ownership, idle capacity, short term, peer-to-peer, Internet platforms mediated, for monetary profit, and shared value orientation. By satisfying all or only parts of these elements, we propose one typology of sharing economy, and to differentiate bona fide sharing economy from quasi- and pseudo-sharing economy. Finally, there are still many problems that need to be solved urgently in the real sharing economy from the perspective of the government, companies and individuals.


2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Qiang Yan ◽  
Lianren Wu ◽  
Lanli Yi

Through analyzing the data about the releases, comment, and forwarding of 120,000 microblog messages in a year, this paper finds out that the intervals between information releases and comment follow a power law; besides, the analysis of data in each 24 hours reveals obvious differences between microblogging and website visit, email, instant communication, and the use of mobile phone, reflecting how people use fragments of time via mobile internet technology. The paper points out the significant influence of the user's activity on the intervals of information releases and thus demonstrates a positive correlation between the activity and the power exponent. The paper also points out that user's activity is influenced by social identity in a positive way. The simulation results based on the social identity mechanism fit well with the actual data, which indicates that this mechanism is a reasonable way to explain people's behavior in the mobile Internet.


2020 ◽  
Author(s):  
Syufrijal .

This research aims to develop interactive PLC learning media based on virtual learning. The interactive PLC learning media uses a 3D simulator design to simulate the application of PLC in the industry, so it looks like real and makes students more interested in learning PLC This study uses experimental methods. The 3D simulation software is Factory I/O developed by Real Games. It enables us to build a conveyor virtual plant and to bring it into the classroom. The automatic controller used to control the virtual plant is the PLC Siemens S7-1200 with Tia Portal software. The PLC is connected to the computer server through an ethernet network via TCP/IP protocol. With the rapid development of current internet technology, PLC learning can be done in virtual learning. This PLC learning media can be run remotely through the internet with team viewer program so that PLC learning is not only done on campus but can be done anywhere. From the results of research that has been done, the user can create PLC programs remotely to control conveyor virtual plant on a computer server through an internet network without having to install the program on their computers. Keywords: PLC, interactive learning media, virtual learning, remote desktop


2021 ◽  
Vol 236 ◽  
pp. 05014
Author(s):  
Dong Yue ◽  
Li Gang ◽  
Wu Zhenzhi

With the advent of the Internet Age, the rapid development of modern rural construction and urban-rural integration, the revival of traditional culture and environmental improvement and many other factors, the multi-semantic social relationship of the beautiful countryside has been formed gradually based on the space, culture and locality. The reconstruction and reshaping of beautiful countryside in the Mobile Internet Age takes Yuan Ye as a theory and path to improve the quality of Internet rural culture, and combines the current technological innovation to expound such design ideas as poetic charm, adaptation to local conditions and so on in garden culture, injecting new design vitality to the inheritance of cultural resources and construction of modern rural society.


Author(s):  
Ibrahim Mahmood Ibrahim ◽  
Siddeeq Y. Ameen ◽  
Hajar Maseeh Yasin ◽  
Naaman Omar ◽  
Shakir Fattah Kak ◽  
...  

Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance.


Author(s):  
Lilia Ervina Jeronimo Guterres ◽  
Ahmad Ashari

The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC).  On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.  


Author(s):  
Yunhua Xiao

With the progress of science and technology, the development and improvement of internet technology and smart phones are gradually popular in the daily life; this world has achieved a swift transition to the mobile internet era from the traditional internet era. Various tourist areas have established “Digital Scenic Spots” in recent years, making the internet combine tightly with tourism. The construction of scenic-spot marketing platforms based on internet is an important component of constructing “Digital scenic spot.” In this article, a tourism marketing platform on the mobile internet is established by analyzing the mobile internet mainstream technology and its application in tourism marketing. In this article, the architecture of the marketing system uses the MVC pattern with a three-tier distributed structure and the logic layer of the system uses a construction of JavaBean and EJB. The article also builds a WeChat marketing model based on MM-TIP. The result of research provides some reference for constructing tourism marketing platform based on mobile internet.


Author(s):  
Dieter Fink

While much attention is currently being devoted to solving technological challenges of the Internet, for example increasing the bandwidth on existing narrowband network platforms to overcome bottlenecks, little attention appears to be given to the nontechnical aspects. This has been a mistake in the past as human resistance to, or incompetence during, the introduction of new Information Technology (IT) often caused Information Systems (IS) to fail. By focusing on a broad range of technical and nontechnical elements early in the adoption of Internet technology, we have the opportunity to avoid the mistakes made in the past. The Internet has given rise to electronic commerce (e-commerce) through the use of the World Wide Web (Web). E-commerce, by its nature, offers enormous possibilities but in an uncontrolled environment. Therefore, for e-commerce to be accepted, trust must be established as soon as interaction with a Web site begins. In the virtual environment of the Web trust has become even more important because the parties are not in physical proximity. There are no handshakes or body language to be observed when closing a deal. Furthermore, jurisdiction is unclear. Developments on a global scale are required that provide assurance that e-commerce can be conducted in a ‘trusting’ manner.


2018 ◽  
Vol 173 ◽  
pp. 02029
Author(s):  
XU Jiahui ◽  
YU Hongyuan ◽  
WANG Gang ◽  
WANG Zi ◽  
BAI Jingjie ◽  
...  

The rapid development of mobile Internet technology and the wide spread of smart terminals have brought opportunities for the transformation of power grid business model. Compared to the non-real-time information, the real-time and running data of dispatch and control domain is easy to be intercepted and cracked. To solve this problem, this paper presents a new approach to mobile application security framework for the power grid control field. It is to realize secondary encryption by using the method of MD5+AES mixed encryption algorithm and combining the time stamp in real-time data transmission process. At the same time it is to prevent cross-border operations and brute force by using Token authentication and Session technology. China EPRI safety test results show that the application of the framework significantly improves the integrity, safety and reliability of real-time data in power grid control.


Sign in / Sign up

Export Citation Format

Share Document