scholarly journals GPT: a web-server to map phylogenetic trees on a virtual globe

Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.

2015 ◽  
Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.


2017 ◽  
Vol 2017 ◽  
pp. 1-28 ◽  
Author(s):  
Gabriela Bosetti ◽  
Sergio Firmenich ◽  
Silvia E. Gordillo ◽  
Gustavo Rossi ◽  
Marco Winckler

The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based) functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features.We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.


Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


2014 ◽  
Vol 971-973 ◽  
pp. 1866-1869
Author(s):  
Jin Sheng Sun ◽  
Zhi Pan Guo

With the rapid growth of the Internet, the interest for connecting devices such as frequency converters into Internet has increased. Web browser is used by remote operator to control and monitor frequency converters via Internet and this application will be widely utilized. This article makes a study of web-based monitoring for frequency converters with USS interface. It is based on TCP/IP stack and the real time operating systemμC/OS-II. Then this paper presents a detailed analysis of the Web server, and the interactive method of the browser and the Web server. In the design of the server, it emphasizes the USS protocol telegram processing method. The architecture of embedded monitoring system, hardware and software implementation are also described in this article.


2017 ◽  
Vol 1 (1) ◽  
pp. 25-29
Author(s):  
Hastings M. Libati ◽  
Captain F. Kanungwe ◽  
Fines Miyoba ◽  
Ndiwa Mutemwa

With the evolution of technology that has occurred in digital systems, new services have appeared that can be applied in railways. Radio communications play an important role in the management of, exploration and maintenance of railway transports. Due to the importance of efficient service delivery and security in railways, there is need to integrate the use of the Global System for Mobile communication and global positioning systems. Transportation is a large and important part of the economy of any country. Railway transportation is one of the main transportation systems worldwide. To this effect, we should have a good and strong monitoring system that can locate a train at every instant. In this research, a proposal has been made for the implementation of a Global Positioning System (GPS) and global system for mobile communication (GSM) based train monitoring system on Tanzania Zambia Railway Authority (TAZARA) railway network that will enable controllers locate their trains at every instant. The GPS-GSM/GPRS (General Packet Radio System) module will be incorporated in the system. A GSM/GPRS module will transmit the location information to a web server. Every track and locomotive will be assigned a unique number for identification. The information of the train location will be continuously updated when the train is moving and the users will be accessing the information via the web. The updated information will be stored in the web server. Clients will request for particular train status and a designed web application will show the status in a Google map. An alternative radio voice communication system will be incorporated in the locomotives in case of failure on the monitoring system. This implementation will greatly improve service delivery to the company.


2020 ◽  
Vol 48 (W1) ◽  
pp. W553-W557 ◽  
Author(s):  
Uciel Chorostecki ◽  
Manuel Molina ◽  
Leszek P Pryszcz ◽  
Toni Gabaldón

Abstract Inferring homology relationships across genes in different species is a central task in comparative genomics. Therefore, a large number of resources and methods have been developed over the years. Some public databases include phylogenetic trees of homologous gene families which can be used to further differentiate homology relationships into orthology and paralogy. MetaPhOrs is a web server that integrates phylogenetic information from different sources to provide orthology and paralogy relationships based on a common phylogeny-based predictive algorithm and associated with a consistency-based confidence score. Here we describe the latest version of the web server which includes major new implementations and provides orthology and paralogy relationships derived from ∼8.2 million gene family trees—from 13 different source repositories across ∼4000 species with sequenced genomes. MetaPhOrs server is freely available, without registration, at http://orthology.phylomedb.org/


Author(s):  
Aurora Popescu

During the nineties the main trend in the development of the applications was the supply of support and accessibility for the computers connected on the internet to a wide range of informational resources (data basis, applications). A witness in this are the numerous languages and technologies which permit an easy development of the applications for the processing of data bases with a simple web browser as, for example, the script languages ASP, PHP, JSP etc. Many changes took place in the last years regarding the informational needs or the equipments used by different users. So, today not only the computers are connected on the internet, but also a wide range of equipments as mobile phones and many home utility devices. As a result of these needs, it became an imperative necessity the conception of an universal language that be understood by all these diverse equipments. XML is the answer to this requirement, this language representing a new step in the development of the informational epoch. XML appeared as a consequence of the limits of the HTML (the language of the web pages), this last one being incapable to use data for other applications.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2113
Author(s):  
Simun Yuk ◽  
Youngho Cho

The webpage steganography technique has been used for a covert communication method for various purposes in which a sender embeds a secret message into a plain webpage file like an HTML file by using various steganography methods. With human eyes, it is very difficult to distinguish between the original webpage (cover webpage) and the modified webpage with the secret data (stego webpage) because both are displayed alike in a web browser. In this approach, when two communicating entities want to share a secret message, a sender uploads a stego webpage to a web server or modifies an existing webpage in the web server by using a webpage steganography method, and then a receiver accesses the stego webpage to download and extract the embedded secret data from it. Meanwhile, according to our extensive survey, we observed that most webpage steganography methods focused on proposing or improving steganography algorithms but did not well address how to operate a stego webpage as time passes. However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will limit or badly affect the hiding capacity and undetectability of a webpage steganography method. By this motivation, in this paper, we proposed a time-based dynamic operation model (TDOM) that improves the performance of existing webpage steganography methods in terms of hiding capacity and undetectability by dynamically replacing the stego webpage with other stego webpages or the original webpage. In addition, we designed two time-based dynamic operation algorithms (TDOA-C and TDOA-U), which improve the hiding capacity of existing methods and TDOA-U for improving the undetectability of existing methods, respectively. To validate our model and show the performance of our proposed algorithms, we conducted extensive comparative experiments and numerical analysis by implementing two webpage steganography methods with our TDOM (CCL with TDOA-C and COA with TDOA-C) and tested them in the web environment. According to our experiments and analysis, our proposed algorithms could significantly improve the hiding capacity and undetectability of two existing webpage steganography methods.


Cyber Crime ◽  
2013 ◽  
pp. 83-100
Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


Author(s):  
Ramandeep Kaur ◽  
Navpreet Kaur

The cloud computing can be essentially expressed as aconveyance of computing condition where distinctive assets are conveyed as a support of the client or different occupants over the web. The task scheduling basically concentrates on improving the productive use of assets and henceforth decrease in task fruition time. Task scheduling is utilized to allot certain tasks to specific assets at a specific time occurrence. A wide range of systems has been exhibited to take care of the issues of scheduling of various tasks. Task scheduling enhances the productive use of asset and yields less reaction time with the goal that the execution of submitted tasks happens inside a conceivable least time. This paper talks about the investigation of need, length and due date based task scheduling calculations utilized as a part of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document