file transfer
Recently Published Documents


TOTAL DOCUMENTS

620
(FIVE YEARS 127)

H-INDEX

13
(FIVE YEARS 2)

Author(s):  
Ahmed Swar ◽  
Ghada Khoriba ◽  
Mohamed Belal

<span lang="EN-US">Data integration enables combining data from various data sources in a standard format. Internet of things (IoT) applications use ontology approaches to provide a machine-understandable conceptualization of a domain. We propose a unified ontology schema approach to solve all IoT integration problems at once. The data unification layer maps data from different formats to data patterns based on the unified ontology model. This paper proposes a middleware consisting of an ontology-based approach that collects data from different devices. IoT middleware requires an additional semantic layer for cloud-based IoT platforms to build a schema for data generated from diverse sources. We tested the proposed model on real data consisting of approximately 160,000 readings from various sources in different formats like CSV, JSON, raw data, and XML. The data were collected through the file transfer protocol (FTP) and generated 960,000 resource description framework (RDF) triples. We evaluated the proposed approach by running different queries on different machines on SPARQL protocol and RDF query language (SPARQL) endpoints to check query processing time, validation of integration, and performance of the unified ontology model. The average response time for query execution on generated RDF triples on the three servers were approximately 0.144 seconds, 0.070 seconds, 0.062 seconds, respectively.</span>


Author(s):  
Prof. Roshan R. Kolte

Abstract: The aim of this paper proposes a project based implementation File Tracking System (FTS) used in private and mostly in government sector. This project is built on Railway System using three tier architecture. This application is used to prevent corruption. There are a large number of departments in the Railway Department where file transfer is done from one department to another. The number of files moving within the specific time duration, file allocated to any employee and whether the file has been forwarded or not. Sometimes if someone has to do corruption then they does not send that file forward, seeing all this problem we have developed File Tracking System (FTS), which track the movements of the file within the organization. This application will keep track the movement of files from one desk to another inside the department.


Mathematics ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 30
Author(s):  
Irina Kochetkova ◽  
Yacov Satin ◽  
Ivan Kovalev ◽  
Elena Makeeva ◽  
Alexander Chursin ◽  
...  

The data transmission in wireless networks is usually analyzed under the assumption of non-stationary rates. Nevertheless, they strictly depend on the time of day, that is, the intensity of arrival and daily workload profiles confirm this fact. In this article, we consider the process of downloading a file within a single network segment and unsteady speeds—for arrivals, file sizes, and losses due to impatience. To simulate the scenario, a queuing system with elastic traffic with non-stationary intensity is used. Formulas are given for the main characteristics of the model: the probability of blocking a new user, the average number of users in service, and the queue. A method for calculating the boundaries of convergence of the model is proposed, which is based on the logarithmic norm of linear operators. The boundaries of the rate of convergence of the main limiting characteristics of the queue length process were also established. For clarity of the influence of the parameters, a numerical analysis was carried out and presented.


2021 ◽  
Author(s):  
Martin Paul Eve

When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media – music, videos, games, and software – before their official sale date and then racing against one another to release the material for free. Warez: The Infrastructure and Aesthetics of Piracy is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers (“topsites”) in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations. The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms. Even though forms of digital piracy are often framed within ideological terms of equal access to knowledge and culture, Eve uncovers in the Warez Scene a culture of competitive ranking and one-upmanship that is at odds with the often communalist interpretations of piracy. Broad in scope and novel in its approach, Warez is indispensible reading for anyone interested in recent developments in digital culture, access to knowledge and culture, and the infrastructures that support our digital age.


2021 ◽  
Vol 36 (11) ◽  
pp. 1973-1976
Author(s):  
Немања Васиљевић
Keyword(s):  

У овом раду описан је DNP3 про­токол и његова конкретна имплементација у dSCADA софтверском систему са нагласком на пренос дато­тека (File transfer), функционалност коју, као опцију, имају само протоколи новије генерације. У самом стандарду, конкретна примена File transfer-а није специфично описана и дефинисана, што омогућава разноврсну примену ове функционалности у реалном раду. Једна од могућих примена је описана у овом раду, која омогућује упис специфичних догађаја који су се десили у процесном систему и аквизицију истих путем File transfer-a, чиме се омогућује накнадна  детаљна анализа тих догађаја.


Author(s):  
Richard Essah ◽  
Isaac Ampofo Atta Senior ◽  
Darpan Anand

The Analysis of common conceptual frameworks associated with Performance analysis of OSPFV3 and EIGRP in applications in IPV6 for analysis of articles published in Scopus between 2016 and 2021 by applying the Corresponding method analysis. The number of times an article is downloaded is also being considered as a measurement instrument or method of analysis. The Corresponding analysis method has analysis 117 articles from 2016 to 2021. All the articles are based on performance analysis of OSPFV3 AND IPV6.IPv6 has gained legitimacy and inevitability as a result of the internet's expansion, which has resulted in IPv4 address space exhaustion. An internet next-generation protocol that will replace eventually IPv4 is IPv6. Using Riverbed Modeler Academic Edition, 2state link protocols’ performance for IPv6, IS–IS and OSPFv3 was compared and tested for the greatest commonly utilized applications enterprise for example remote login, database query, file transfer, web surfing, and email. The major characteristics used to assess performance include IPv6 packets dropped, network convergence time, link utilization, throughput, remote login response time, file upload/download response times, http page response times, email, and database query response time,. The primary goal of this dissertation is to compare, simulate, and assess both routing protocols’ performance in order to decide which one is best for routing IPv6 network traffic. Based on the parameters utilized, the protocol that performed better than the others would be suggested for routing network traffic in IPv6. The study was separated into two scenarios to achieve this goal: the IS–IS and OSPFv3 scenario. After the simulation for the IS–IS scenario was completed, the data from both scenarios were compared and examined using the provided parameters to see which protocol worked better. Based on the majority of the simulation parameters employed, the simulation results showed that OSPFv3 was performed as compared toIS–IS.


Author(s):  
Takeru Nakazato

DNA barcoding and environmental DNA (eDNA) are increasing the need for the utilization of gene sequences in the field of biodiversity. GBIF (Global Biodiversity Information Facility) and GGBN (Global Genome Biodiversity Network) are taking action on the treatment of gene sequences in the field of biodiversity (Finstad et al. 2020). Gene sequences have been collected and published by INSDC (International Nucleotide Sequence Database Collaboration) for over 30 years (Arita et al. 2020). Biodiversity information has been collected using standards such as Darwin Core (Wieczorek et al. 2012), but INSDC gene sequences are stored in their own format. In the field of bioinformatics, researchers are also organizing the BioHackathon series, notably the NBDC/DBCLS BioHackathon and the spin-off Biohackathon Europe, to standardize data through the Semantic Web (Garcia Castro et al. 2021, Vos et al. 2020), but the linkage with biodiversity information has just begun. In this study, as an example of linking gene sequence information with biodiversity information, I attempted to construct an infrastructure for knowledge extraction by utilising gene sequence entries derived from museum specimens from GenBank (Sayers et al. 2020). I have previously surveyed the BOLD (The Barcode of Life Data System) (Ratnasingham and Hebert 2007) IDs listed in GenBank (Nakazato 2020). I downloaded the fish and insect data from the GenBank FTP (file transfer protocol) site. Then I extracted the descriptions in the "specimen_voucher" field and obtained 749,627 (28% of the fish entries in GenBank) and 1,621,890 (13%) specimen IDs, respectively. I also extracted from the "note" field approximately 1000 entries describing the type of the specimen, such as "holotype", "lectotype", and "paratype". These extracts include descriptions written in natural language. NCBI (National Center for Biotechnology Information) publishes the BioCollections database (Sharma et al. 2019), and these data may be able to refine the description. In the future, I plan to map these extracted IDs to the collection IDs in the biodiversity information database. This will enable us to enrich the biodiversity information with GenBank descriptions, for example, by adding articles listed in GenBank as references to the specimen data.


2021 ◽  
Vol 11 (17) ◽  
pp. 7915
Author(s):  
Mehrdad Shahmohammadi Beni ◽  
Hiroshi Watabe ◽  
Kwan Ngok Yu

Data security has become indispensable, with a view to keep sensitive information confidential. One important method is through image encryption, upon which features in an image would no longer be visible. The original image with its features could only be restored upon decryption using a set of keys. There are prestigious works in the literature regarding image encryption. However, there is a lack of easy-to-use, GUI-based, user-customizable computer programs for image encryption. In the present work, we developed a GUI-based image encryption and decryption program with server file transfer support, namely, SecureVision. A custom-made random number generator using the equation of an ellipse was developed to randomly shuffle the pixel positions. SecureVision was found to be robust, user-friendly and fast in both encryption and decryption. The program was highly sensitive to the supplied keys, which prevented brute-force attacks. SecureVision provided full user control, where users could modify the program modules to match their desired applications, which was particularly desirable for pedagogical purposes in that interested parties had the freedom to explore the concept of image encryption and decryption. SecureVision is distributed under a GPLv3 license, which would allow everyone to use, modify and distribute the program without any restriction.


Sign in / Sign up

Export Citation Format

Share Document