business logic
Recently Published Documents


TOTAL DOCUMENTS

239
(FIVE YEARS 54)

H-INDEX

13
(FIVE YEARS 3)

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Huanxiang Hao

College English tutoring is an important content of current research, and how to provide more effective methods for teaching tutoring is currently a hot research topic. Therefore, this paper designs an Internet-based online tutoring platform for college English teaching, which is accelerated by using the K-means clustering algorithm. The data processing efficiency and processing methods to improve user satisfaction require more practical experience to summarize. In the business logic layer, the uploaded information is mined through the K-means clustering algorithm to form an online tutoring university English database to provide platform data support, realize the business logic judgment of the data, convert the data in the database, and return to the user interface of other formats, to provide users with browsing and consulting. In the data access layer, the data from the business logic layer is processed. After the processing is completed, data can be added, deleted, modified, and checked in the database. Finally, the operation result of the database is fed back to the business logic layer for processing. Experimental results show that the designed platform has good data mining performance, low connection speed and low response delay, good compatibility, low CPU usage, fast resource sharing speed, and high user satisfaction. It can be connected to different operating systems.


2021 ◽  
Vol 13 (24) ◽  
pp. 13710
Author(s):  
Jie Xin ◽  
Wan Ni ◽  
Zhiyuan Yu

In the digital content industry, the emerging multi-channel networks (MCNs) have dramatically changed the ways of content production and distribution in sustainable social media. As a result, it also brings an unprecedented impact and challenge to the traditional gatekeeping model, which play a vital role to describe and explain the reporting process regarding news events. In this paper, we propose a Ternary Interactive Gatekeeping (TIG) model and then discusse the gatekeeping behaviors of MCNs from the aspects of content production and distribution, which intend to integrate the roles of MCNs, content creators and social platforms all in one. In this way, MCNs are not only the intermediary, but also undertake the responsibility of gatekeeper in social media, which exerts the important role in online pseudo-environments. Semi-structured interviews are conducted with 15 interviewees that consist of the advertiser, creator, and staff in MCNs and platforms. For the content production, the gatekeeping behaviors of MCNs consist of selection, shaping and withholding. Those contents that satisfy the profits and development requirements of MCNs are chosen. For the content distribution, the gatekeeping behaviors of MCNs consist of display, timing and repetition, which aim to realize the high media exposure for Internet users. It can be seen that MCNs’ gatekeeping behaviors are affected by the business-logic. By the proposed gatekeeping scheme, we intend to provide a new perspective for future research on information management of social media.


Information ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 457
Author(s):  
Fang Zhang ◽  
Guiling Sun ◽  
Bowen Zheng ◽  
Liang Dong

This paper designs and implements an energy management system based on the Spring Boot framework. The system mainly includes three layers, which are the data collection layer, the business logic layer, and the display interface layer from bottom to top. The data collection layer is based on the RS-485 electrical standard and the MODBUS communication protocol. The two protocols connect all energy consumption monitoring points into a mixed topology communication network in the enterprise. The programs in the data collection layer poll each energy consumption monitoring point in the network to collect the data and transmit to the business logic layer. The business logic layer is developed on the basis of the Spring Boot framework and mainly includes two parts: the MySQL database and Tomcat server. In the MySQL database, the stored data are horizontally split according to the time column and stored in different data tables. The split of data reduces the load of a single data table and improves the query performance of the database. The Tomcat server is built into the Spring Boot framework to provide a basic environment for system operation. The Spring Boot framework is the core component of the system. It is responsible for collecting, storing, and analyzing data from energy consumption monitoring points, receiving and processing data requests from the display interface layer. It also provides standard data interfaces to the external programs. The display interface layer is developed on the basis of the Vue framework and integrated into the Spring Boot framework. The display layer combines an open-source visualization chart library called ECharts to provide users with a fully functional and friendly human–computer interaction interface. Through the calculation of hardware and software costs, considering the personnel cost in different regions, the total cost of the energy management system can be estimated. The cost of construction was approximately 210,000 USD in this paper. Since the system was actually deployed in a manufacturing company in December 2019, it has been operating stably for more than 600 days.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-35
Author(s):  
Juncheng Yang ◽  
Yao Yue ◽  
K. V. Rashmi

Modern web services use in-memory caching extensively to increase throughput and reduce latency. There have been several workload analyses of production systems that have fueled research in improving the effectiveness of in-memory caching systems. However, the coverage is still sparse considering the wide spectrum of industrial cache use cases. In this work, we significantly further the understanding of real-world cache workloads by collecting production traces from 153 in-memory cache clusters at Twitter, sifting through over 80 TB of data, and sometimes interpreting the workloads in the context of the business logic behind them. We perform a comprehensive analysis to characterize cache workloads based on traffic pattern, time-to-live (TTL), popularity distribution, and size distribution. A fine-grained view of different workloads uncover the diversity of use cases: many are far more write-heavy or more skewed than previously shown and some display unique temporal patterns. We also observe that TTL is an important and sometimes defining parameter of cache working sets. Our simulations show that ideal replacement strategy in production caches can be surprising, for example, FIFO works the best for a large number of workloads.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 2008
Author(s):  
George Hatzivasilis ◽  
Sotiris Ioannidis ◽  
Konstantinos Fysarakis ◽  
George Spanoudakis ◽  
Nikos Papadakis

Eco-friendly systems are necessitated nowadays, as the global consumption is increasing. A data-driven aspect is prominent, involving the Internet of Things (IoT) as the main enabler of a Circular Economy (CE). Henceforth, IoT equipment records the system’s functionality, with machine learning (ML) optimizing green computing operations. Entities exchange and reuse CE assets. Transparency is vital as the beneficiaries must track the assets’ history. This article proposes a framework where blockchaining administrates the cooperative vision of CE-IoT. For the core operation, the blockchain ledger records the changes in the assets’ states via smart contracts that implement the CE business logic and are lightweight, complying with the IoT requirements. Moreover, a federated learning approach is proposed, where computationally intensive ML tasks are distributed via a second contract type. Thus, “green-miners” devote their resources not only for making money, but also for optimizing operations of real-systems, which results in actual resource savings.


Through interviews, this research investigated the business logic of two legal technology (legal tech) startup companies and revealed the crucial value of human-centered thinking for technological innovation. In this research, the social values of technological innovation are described from the humanistic perspective. Based on the practical achievements of the companies, a new humanistic dimension was verified, which involved combining technological innovation and a human-centered path and adopting altruistic thinking, which was of great value in traditional thinking. Such practice contributed to the companies' achievements and carried profound significance to artificial intelligence (AI) development in the age of big data. Moreover, incorporating human-centered into businesses is crucial in controlling the use of AI to prevent the possible social destruction caused by AI applications. This research maintains that an approach combining data-driven and human-centered thinking is based on technological advances and social influences.


2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Bilal Rauf ◽  
Haider Abbas ◽  
Muhammad Usman ◽  
Tanveer A. Zia ◽  
Waseem Iqbal ◽  
...  

Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound interface (NBI) bridges the control and application planes to execute the third-party applications business logic. Due to the software bugs in applications and existing vulnerabilities such as illegal function calling, resource exhaustion, lack of trust, and so on, NBIs are susceptible to different attacks. Based on the extensive literature review, we have identified that the researchers and academia have mainly focused on the security of the control plane, data plane, and southbound interface (SBI). NBI, in comparison, has received far less attention. In this article, the security of the least explored, but a critical component of the SDN architecture, i.e., NBI, is analyzed. The article provides a brief overview of SDN, followed by a detailed discussion on the categories of NBI, vulnerabilities of NBI, and threats posed by malicious applications to NBI. Efforts of the researchers to counter malicious applications and NBI issues are then discussed in detail. The standardization efforts for the single acceptable NBI and security requirements of SDN by Open Networking Foundation (ONF) are also presented. The article concludes with the future research directions for the security of a single acceptable NBI.


2021 ◽  
Vol 23 (06) ◽  
pp. 421-430
Author(s):  
Bhargav N ◽  
◽  
Dr. Jayanthi P N ◽  

Real-time Seat Allocation System is a web application that assists employees and employers in handling modern-day seating issues at work. Currently, seats are assigned to employees manually, which is a time-consuming process. This might cause issues if seats were not assigned or if none were available for some employees. Furthermore, during pandemics, social distance rules must be followed, making it difficult to manage the workforce. The proportion of individuals allowed in the workplace must adhere properly. As the firm grows, so does the number of employees, which necessitates the expansion of infrastructure, which costs money and time. These issues can be addressed to some extent by a shared office concept, in which employees have access to a desk and can work as needed. This article presents a responsive web application through which company employees can registerusingtheircompanyIDandreserveaseatifoneisavailableonaspecified day and time. Admins can add or remove offices, floors, and seats with certain permissions. To implement the business logic, the application uses Java, Spring MVC web framework with Tomcat server, renders the views using Java Server Pages, and uses front-end technologies like HTML, CSS, and JavaScript for the front-end design of the User Interface. The web application built promotes the concept of using a shared workspace to maximize resource use. It also aids in increasing employee productivity by providing them with workplace seating and schedule flexibility.


Author(s):  
Vladimir Janjic ◽  
Christopher Brown ◽  
Adam D. Barwell

AbstractParallel patterns are a high-level programming paradigm that enables non-experts in parallelism to develop structured parallel programs that are maintainable, adaptive, and portable whilst achieving good performance on a variety of parallel systems. However, there still exists a large base of legacy-parallel code developed using ad-hoc methods and incorporating low-level parallel/concurrency libraries such as pthreads without any parallel patterns in the fundamental design. This code would benefit from being restructured and rewritten into pattern-based code. However, the process of rewriting the code is laborious and error-prone, due to typical concurrency and pthreading code being closely intertwined throughout the business logic of the program. In this paper, we present a new software restoration methodology, to transform legacy-parallel programs implemented using pthreads into structured farm and pipeline patterned equivalents. We demonstrate our restoration technique on a number of benchmarks, allowing the introduction of patterned farm and pipeline parallelism in the resulting code; we record improvements in cyclomatic complexity and speedups on a number of representative benchmarks.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


Sign in / Sign up

Export Citation Format

Share Document