Design and Development of Trade Detector Based on Distributed Computing Technology

2014 ◽  
Vol 608-609 ◽  
pp. 550-554
Author(s):  
Qi Wang ◽  
Wei Lai

J2EE is set for the distributed computing realization of API, services and protocols developed by SUN. The design objective of J2EE computer development tool is to provide a simple, easy operation development platform for developers, which can reduce the cost of development, shorten the development cycle, and improve the comprehensive performance of computer system. In this paper, we use JSP calculation vessel function module of J2EE to improve the computer economic detection system, and establish data connection between system and the HTML Webpage, which realizes the real-time and continuous detection of the economy. Finally, based on the external demand and exports of industrial products in an area, we detect trade transactions in the region, and do mathematical statistics using the J2EE system, and finally get the trade scale. It provides a new computer method for the research of export trade and economic detection.

2011 ◽  
Vol 383-390 ◽  
pp. 308-314
Author(s):  
Lin Li ◽  
Zhi Ming Peng ◽  
Bi Cong Zhang ◽  
Zhang Tie

This paper presents a Rapid Control Prototyping (RCP) development platform based on Matlab/Simulink, Real-Time Workshop and Embedded Target for C2000 and DSP development board. It also designs TMS320F2812 DSP-based motion controller under the proposed RCP. The controller using saturated integral PID algorithm produces PWM signal to control DC motor. Experimental results show that the designed controller can control motor accurately. Engineers can complete all design tasks such as modeling, automatic code generation, and download, running and parameters adjustment on this RCP platform when developing DSP application system. Thus the proposed RCP can shorten the DSP development cycle and improve the portability and modularity of program.


2012 ◽  
Vol 263-266 ◽  
pp. 1961-1968
Author(s):  
Yong Chao Song ◽  
Bu Dan Wu ◽  
Jun Liang Chen

According to the feature of the JBPM workflow system development, the target code generated is determined by analyzing the process of JBPM workflow development and the architecture of J2EE. The code generation tool generates code by parsing the static form source code and loading the code generation template. The code generation tool greatly shortens the JBPM workflow system development cycle and reduces the cost of software development which has the good practicality and scalability.


2021 ◽  
Vol 7 (2) ◽  
pp. 79-89
Author(s):  
Indra Swarna ◽  
James Purnama ◽  
Randy Anthony

Kunyahku is an online catering platform that provides catalogs of menus from local caterer near the user and become the distributor that will take the order and deliver them. In developing an application, the most important aspect for small start-up companies is to have a development stack that can deliver the app into multiple platform by using a single code base to reduce the cost of developers, improve efficiency and reduce the time to develop the application itself. To provide the necessity of building an application for Kunyahku, this paper is aimed to find the most suitable cross platform framework for developing the Kunyahku application. This research focuses on comparison between existing popular cross-platform and proving the suitable one to be used in development cycle in the case of Kunyahku requirements. Sets of test and comparison were conducted in order to compare the most suitable cross platform between React Native and Flutter such as render test and comparing each advantage coming out from using each of the cross-platform.After all the requirements are gathered and then the most suitable framework will be chosen which is Flutter. Performance analysis and the benefits of using Flutter framework are elaborated and thus proving it is the most suitable development stack to be used in Kunyahku case and the development time can be reduced since it is a cross-platform technology that output the application into three different platform rather than managing separate platform for each different one. Testing shows that flutter also met all the requirements thus proving flutter address the problems of scalability and faster development compared to developing each native platform one by one.


Author(s):  
Balal Sohail Et. al.

Macro based Malware has taken a great rise is these recent years, Attackers are now using this malware for hacking purposes. This virus is embedded inside the macro of a word document and can be used to infect the victim’s machine. These infected files are usually sent through emails and all antivirus software are unable to detect the virus due to the format of the file. Due to the format being a rich text file and not an executable file, the infected file is able to bypass all security. Hence it is necessary to develop a detection system for such attacks to help reduce the threat. Technical research is carried out to identify the tools and techniques essential in the completion of this system. Research on methodology is done to finalise which development cycle will be used and how functions will be carried out at each phase of the development cycle. This paper outlines the problems that people face once they are attacked through macro malwares and the way it can be mitigated. Lastly, all information necessary to start the implementation has been gathered and analysed


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Wenmin Li ◽  
Sanqi Sun ◽  
Shuo Zhang ◽  
Hua Zhang ◽  
Yijie Shi

Aim. The purpose of this study is how to better detect attack traffic in imbalance datasets. The deep learning technology has played an important role in detecting malicious network traffic in recent years. However, it suffers serious imbalance distribution of data if the traffic model skews towards the modeling in the benign direction, because only a small portion of traffic is malicious, while most network traffic is benign. That is the reason why the authors wrote this manuscript. Methods. We propose a cost-sensitive approach to improve the HTTP traffic detection performance with imbalanced data and also present a character-level abstract feature extraction approach that can provide features with clear decision boundaries in addition. Finally, we design a spark-based HTTP traffic detection system based on these two approaches. Results. The methods proposed in this paper work well in imbalanced datasets. Compared to other methods, the experiment results indicate that our system has F1-score in a high precision. Conclusion. For imbalanced HTTP traffic detection, we confirmed that the method of feature extraction and the cost function is very effective. In the future, we may focus on how to use the cost function to further improve detection performance.


2014 ◽  
Vol 590 ◽  
pp. 130-134 ◽  
Author(s):  
Jun Feng Zhang ◽  
Lin Deng

This paper, taking a mine dump truck as the research object, analyzes CAE by the principle of the finite element’s inertia and finds out the initial problem of the design, thus optimizing the frame structure reasonably. Thereby it can reduce the cost of the production’s design and shorten development cycle of new models.


2019 ◽  
Vol 7 (4) ◽  
pp. 162-176
Author(s):  
Rajendran N. ◽  
Jawahar P.K. ◽  
Priyadarshini R.

Purpose The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network. Design/methodology/approach It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node. Findings The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches. Research limitations/implications In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA). Practical implications It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time. Social implications When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput. Originality/value The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.


2016 ◽  
Vol 5 (2) ◽  
pp. 437-449 ◽  
Author(s):  
Sindulfo Ayuso ◽  
Juan José Blanco ◽  
José Medina ◽  
Raúl Gómez-Herrero ◽  
Oscar García-Población ◽  
...  

Abstract. Conventional real-time coincidence systems use electronic circuitry to detect coincident pulses (hardware coincidence). In this work, a new concept of coincidence system based on real-time software (software coincidence) is presented. This system is based on the recurrent supervision of the analogue-to-digital converters status, which is described in detail. A prototype has been designed and built using a low-cost development platform. It has been applied to two different experimental sets for cosmic ray muon detection. Experimental muon measurements recorded simultaneously using conventional hardware coincidence and our software coincidence system have been compared, yielding identical results. These measurements have also been validated using simultaneous neutron monitor observations. This new software coincidence system provides remarkable advantages such as higher simplicity of interconnection and adjusting. Thus, our system replaces, at least, three Nuclear Instrument Modules (NIMs) required by conventional coincidence systems, reducing its cost by a factor of 40 and eliminating pulse delay adjustments.


2014 ◽  
Vol 1079-1080 ◽  
pp. 1061-1063 ◽  
Author(s):  
Hong Ying Li

This paper can be used as acar key toothed recognition and detection technology and computer vision, imageprocessing technology combined with interdisciplinary applications. Car lockassembly complicated procedures, identification and car keys tooth detection isone of the key aspects of automotive lock assembly, lock a direct impact on theefficiency of the assembly process. The system can effectively improve theexisting car key tooth detection technology to reduce the cost of car keystooth detection recognition, while also rapid and accurate identification, sothat the entire lock assembly process much more efficient.


2014 ◽  
Vol 940 ◽  
pp. 521-525
Author(s):  
De Bao Zhang ◽  
Wen Qing Huang ◽  
Zhong Wei Li ◽  
Xiao Bin Zhao

Now, aiming at the equipment maintenance and simulation training system development are based on single model equipment , it leads to a situation that a long development cycle of repair and simulation system and high cost for each type of equipment. Starting from the general mode of equipment’s maintaining and simulation training, research on the general methods of the operation of operation and repair realization of equipment maintaining simulation ,the core technology of equipment maintenance and its simulation training, we need to develop a general development platform for different types of equipment, especially for the complex equipment , to enhance the commonality of equipment maintenance simulation training system , reduce the costs, improve the level of equipment maintenance training and its maintenance support ability.


Sign in / Sign up

Export Citation Format

Share Document