remote client
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 6)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 8 (4) ◽  
pp. 307
Author(s):  
Walaa Elsayed

The study developed a set of universal challenges for social workers and investigated the impact thereof on social workers in the United Arab Emirates (UAE). Based on a qualitative analysis of previous research, a set of 10 universal challenges was developed. A questionnaire was created, and a survey was conducted among 304 respondents currently employed as social workers in the UAE. The survey results showed that most survey respondents selected the risk of infection as the strongest challenge. Emotional burnout, lack of reliable information, limited resources, staff capacity, problems with social distancing, lack of instructions/protocols, remote client service, and inadequate education obtained average scores meaning that they are important but not critical. Scientists and practitioners can use this set of universal challenges to investigate pandemic-related challenges for social workers in various countries and regions.


Author(s):  
Ch. Supraja

Spotify is a music streaming service that was developed in Stockholm, Sweden. The first version was released back in 2008 and today it doesn't only provide music, but video and podcasts as well. Growing rapidly from a startup in Sweden to the biggest music service in the world, Spotify has apps running on video game consoles and mobile phones, and has integration with many social networks. Luckily, Spotify is also a great platform for developers and provides a really nice and well-documented REST API where it's possible to make searches by artists, search by albums, search by tracks and play songs. Our project enables us to access the Spotify through the remote client i.e., Terminal. We will implement two types of authentication flow that Spotify supports i.e., client credentials and authorization flow. Finally, we will implement a remote client where the users can search for artists, browse artist’s albums and tracks and play a song in the user’s active device.


2021 ◽  
pp. 189-198
Author(s):  
Kun Tan ◽  
Sanmin Sun ◽  
Liangzong Du ◽  
Shaoliang Zhou

This research aimed to develop an information acquisition and intelligent irrigation decision system based on the agricultural Internet of Things (IoT). The system consists of a field control terminal and a remote client, realizing control, real-time display, alarm, and other functions. The user may apply the upper and lower limit of soil relative water content as the irrigation decision threshold. The system automatically controls irrigation according to the threshold. In the calculation and analysis part of the system, the programming software Keil 5 was used for data collection and monitoring, database comparison, calculation and analysis, irrigation decision, and other functions.


Author(s):  
Benjamin Höller ◽  
Annette Mossel ◽  
Hannes Kaufmann

AbstractWe introduce a novel framework for 3D scene reconstruction with simultaneous object annotation, using a pre-trained 2D convolutional neural network (CNN), incremental data streaming, and remote exploration, with a virtual reality setup. It enables versatile integration of any 2D box detection or segmentation network. We integrate new approaches to (i) asynchronously perform dense 3D-reconstruction and object annotation at interactive frame rates, (ii) efficiently optimize CNN results in terms of object prediction and spatial accuracy, and (iii) generate computationally-efficient colliders in large triangulated 3D-reconstructions at run-time for 3D scene interaction. Our method is novel in combining CNNs with long and varying inference time with live 3D-reconstruction from RGB-D camera input. We further propose a lightweight data structure to store the 3D-reconstruction data and object annotations to enable fast incremental data transmission for real-time exploration with a remote client, which has not been presented before. Our framework achieves update rates of 22 fps (SSD Mobile Net) and 19 fps (Mask RCNN) for indoor environments up to 800 m3. We evaluated the accuracy of 3D-object detection. Our work provides a versatile foundation for semantic scene understanding of large streamed 3D-reconstructions, while being independent from the CNN’s processing time. Source code is available for non-commercial use.


Author(s):  
Subhash Chandra Patel ◽  
Sumit Jaiswal ◽  
Ravi Shankar Singh ◽  
Jyoti Chauhan

The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.


Author(s):  
A. Myasischev ◽  
L. Komarova ◽  
R. Gritsky ◽  
K. Kulik

In the work on the basis of Arduino Mega and the W5100 controller, a web server is built for graphical display of remote client data obtained from temperature, pressure, humidity sensors. The server program is written in the Arduino IDE development environment. The Ethernet library for the W5100 has been updated, which for Arduino IDE ver. 1.0.3, 1.0.5-r2 caused the server to hang. The possibility of using the Dygraphs library for graphical visualization of data obtained with sensors is shown. Written scripts for drawing graphics for the projected web server. The data transfer rate from the Arduino web server for various network controllers ENC28J60, W5100, W5500 for the Arduino IDE programming environment and UIPEthernet, Ethernet, Ethernet2 libraries was analyzed. It is shown that with the lowest speed the data is transmitted by the web server with the ENC28J60 controller - 3.3Kb/s, with the largest controller W5500 - 23.4Kbytes/s. It is noted that these servers do not support multithreaded work. Therefore, they can not be used to create miniature universal web servers for processing multiple requests simultaneously. The server considered in the work can serve only one request from one remote client. The speed parameters of data transfer for the server on the ATmega328p microcontroller (Arduino UNO) with the network controller ENC28J60 are analyzed. The server program is implemented in C language in the AVR Studio programming environment. A high data transfer rate of 140Kb/s and a possibility of multithreading are noted. It is established that with simultaneous transmission of three files to different clients, the total transmission speed reaches 120-130Kb/s, and for each client 40-50Kb/s. It is shown that the use of such a server to solve the problem of graphical representation of data from sensors is difficult due to the complexity of transferring software to other microcontrollers and the limited library for working with a microSD card. The operation of the server developed here for three years has shown high reliability of its operation. The paper discusses the creation of a web server on the Arduino, which is a modernized HTTP basic authentication. The upgrade consists in the fact that for authorization a password is used from the list of passwords that is selected by the user on the basis of the key sent by the server. With each new login to the server, the previous password becomes invalid. Presents a practical example of a web server on Arduino Mega, Ethernet controllers: enc28j60 and w5500.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3695 ◽  
Author(s):  
Yuwen Chen ◽  
José-Fernán Martínez ◽  
Pedro Castillejo ◽  
Lourdes López

The Internet of Things (IoT) connects different kinds of devices into a network, and enables two-way communication between devices. A large amount of data are collected by these devices and transmitted in this network, it is necessary to ensure secure communications between these devices, to make it impossible for an adversary to undermine this communication. To ensure secure communication, many authentication protocols have been proposed, in this study, a fully anonymous authentication scheme for the Internet of things scenario has been proposed, it enables the remote client to anonymously connect to the server and being serviced by the server. The proposed scheme has been verified by AVISPA and BAN Logic, and the result shows that it is safe. Besides, the simulation shows that the proposed scheme is more efficient in computation cost and communication cost.


2018 ◽  
Vol 9 (2) ◽  
pp. 1-15 ◽  
Author(s):  
Subhash Chandra Patel ◽  
Sumit Jaiswal ◽  
Ravi Shankar Singh ◽  
Jyoti Chauhan

The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.


2018 ◽  
Vol 3 (1) ◽  
pp. 45
Author(s):  
Devi Ruwaida ◽  
Dian Kurnia

File Transfer Protocol (FTP) server merupakan jenis sistem yang menghubungkan hak pengakses (client) dan penyedia (server) dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dalam port 21, kemudian dengan OpenSSL ini di amankan agar data dapat sampai ke tujuan. Pada penelitian ini akan dibangun Rancang Bangun File Transfer Protocol (Ftp) Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smk Dwiwarna  yang akan di konfigurasi pada debian 9.1 dengan  di tambahnya pengaman sertifikat ssl , dengan harapan  melindungi proses dalam pengiriman data dapat dengan aman dan ditambahkannya sistem VPN PPTP pada mikrotik akan lebih memberikan keamanan yang lebih baik lagi, dimana pemanfaatan Point-to-Point Tunneling Protocol (PPTP) suatu protokol jaringan yang bisa memungkinkan client dalam pengiriman data secara aman melalui remote client kepada server sekolah dibangunnya suatu virtual private network (VPN).


2015 ◽  
Vol 2015 (1) ◽  
pp. 61-76 ◽  
Author(s):  
Roya Ensafi ◽  
Philipp Winter ◽  
Abdullah Mueen ◽  
Jedidiah R. Crandall

AbstractA nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using a hybrid idle scan technique that is able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel’s SYN backlog. We show that both techniques are practical by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that failures in the firewall occur throughout the entire country without any conspicuous geographical patterns.We give some evidence that routing plays a role, but other factors (such as how the GFW maintains its list of IP/port pairs to block) may also be important.


Sign in / Sign up

Export Citation Format

Share Document