client device
Recently Published Documents


TOTAL DOCUMENTS

41
(FIVE YEARS 15)

H-INDEX

4
(FIVE YEARS 1)

Author(s):  
Farah Tawfiq Abdul Hussien ◽  
Abdul Monem S. Rahma ◽  
Hala Bahjat Abdul Wahab

<p><br />The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on the system server. This problem may lead to server deadlock, especially at rush time, which reduce system performance. To solve security and performance problems, this research suggests a prototype design for agent software. This agent will play the role of broker between the clients and the electronic marketplace. This is done by providing security inside the client device and converting the client’s order into a special form which is called a record form to be sent to the commercial website. Experimental results showed that this method increase system performance in terms of page loading time, transaction processing and improves the utilization of system resources.</p>


2021 ◽  
Vol 35 (111) ◽  
pp. 73-82
Author(s):  
I. M. Zhuravska ◽  
◽  
V. Yu. Savinov ◽  
K. O. Obukhova

2021 ◽  
Vol 11 (2) ◽  
pp. 35-39
Author(s):  
S. Selvam

This paper presents a creativity data prefetching scheme on the loading servers in distributed file systems for cloud computing. The server will get and piggybacked the frequent data from the client system, after analyzing the fetched data is forward to the client machine from the server. To place this technique to work, the data about client nodes is piggybacked onto the real client I/O requests, and then forwarded to the relevant storage server. Next, dual prediction algorithms have been proposed to calculation future block access operations for directing what data should be fetched on storage servers in advance. Finally, the prefetching data can be pressed to the relevant client device from the storage server. Over a series of evaluation experiments with a group of application benchmarks, we have demonstrated that our presented initiative prefetching technique can benefit distributed file systems for cloud environments to achieve better I/O performance. In particular, configuration-limited client machines in the cloud are not answerable for predicting I/O access operations, which can certainly contribute to preferable system performance on them.


Author(s):  
Seniman Seniman ◽  
Baihaqi Siregar ◽  
Rani Masyithah Pelle ◽  
Fahmi Fahmi

Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a very high price. On the other hand, STM32F103 microcontrollers with a very affordable price even cheaper than the Arduino board has the opportunity to build secure data communication using SSL protocol based on MbedTLS library. In addition to wiznet W5100/W5500 ethernet shield, an STM32F103 SSL client device has been successfully built in this study. The SSL client device supports ECDHE ECDHA AES128 CBC SHA256 SSL cipher suite. The Apache web server must also be configured to support this cipher suite by generating OpenSSL ECC (elliptic curve cryptography) certificate. The system was tested with the LM35 analog temperature sensor, and as a result, the STM32F103 SSL client has successfully secured the data transmission to the Apache SSL web server. The communication time was 3 seconds for the first connection and 42 ms for the next data transmission.


TEM Journal ◽  
2021 ◽  
pp. 165-170
Author(s):  
Syifaul Fuada ◽  
Rosmianto Aji Saputro

The digital image, character/texts, audio (music), and video are the multimedia contents commonly used as objects to be transmitted on the VLC system. This paper has performed the real-time file transfer successfully using VLC technology with a UART connection. The FPGA was chosen as a DSP due to its capability in clocked-speed. We used an Ethernet connection due to its easy configuration and ability to meet the high-speed communication requirement. It was used for communicating between the host and the client device computer. This work covers the MAC layer implementation, SoC FPGA for UART connection, and analog front-end (AFE) transceiver. According to the functional test, the achieved bandwidth of the Ethernet connection is about 83.6 Mbps. However, the FPGA’s clock is set at 100 kHz only due to the transferred file does not require a high speed. Thus, the physical layer baud rate is fixed to 11520 bps; it can be used for real-time transfer of a digital image with 512 pixels with no compressed file and error at 22 cm of optical LoS channel (no lenses).


Information ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 9
Author(s):  
Marco Marto ◽  
Vladimir A. Bushenkov ◽  
Keith M. Reynolds ◽  
José G. Borges ◽  
Susete Marques

This research expands the applicability of the Feasible Goals (FGoal) Pareto frontier multiple criteria method to display the Edgeworth–Pareto hull using interactive decision maps (IDMs). Emphasis is placed upon the development of a communication architecture to display the Pareto frontiers, which includes a client device, a web server, and a dedicated computation server implemented with sockets. A standalone application on the latter processes client-server requests and responses to display updated information on the client. Specifically, the dedicated computation server is responsible for calculating the information needed to generate the Edgeworth–Pareto hull. This is delivered to the web server to generate the IDM to be displayed on the client device. The key innovation of this work is a tool that is developed to aid decision-makers with a network-based computational architecture that includes a computational server constantly in communication with a web server for fast responses to client requests to represent IDMs. Results show that this innovation avoids time-consuming communication, and this approach to represent IDMs on the web facilitates collaboration among decision-makers because they can analyze several complex problems in different browser windows and decide which problem and solution better correspond to their aims.


Author(s):  
Mika Maaspuro

A doorway counter, which detects a person underpass at a room entry/exit, may be the most accurate type of occupancy counters used in buildings. An occupancy counter, which uses a low-resolution IR-imager and   Raspberry Pi board has been constructed. The imager provides only 8 x 8 pixels initial resolution, but it has been enhanced using two-dimensional interpolation. Due to the low absolute accuracy in temperature measurements, the imager is set to measure temperature difference between a target and background. Signal-to-noise ratio is also increased using discrete two-dimensional convolution     filtering. The blob detection and tracking algorithm deduces the direction of an occupant and finally increments or decrements the counter. A heat signature varies between people and depends on person’s clothing. An on-board server on Raspberry Pi distributes the data via Wi-Fi to any client device in the net. The complete system includes also wireless PIR-sensors. The low-resolution IR   occupancy counter has been compared with counters based on different      technologies. The benefits of a low-resolution IR-imager are privacy preservation, operation capability in total darkness, energy-efficient passive operation and a low price.


2020 ◽  
Vol 76 (2) ◽  
pp. 14-29
Author(s):  
Myroslav I. Zhaldak ◽  
Vasyl M. Franchuk

The article deals with Gran software and the access to it through the remote desktop. The peculiarities of web-based remote desktop access and Gran software system for teaching mathematics at school are revealed. The paper also describes the application of open source software (Ulteo OVD) that allows users to remotely access their desktops and applications using one of the Desktop as a Service cloud components through a client device browser. The modes of using Ulteo OVD client software are described. Two servers (Application Server and Session Manager Server) have been organized to use Ulteo OVD by means of PROXMOX web-based virtual environment. The authors propose the way to use Ulteo OVD to access software installed on a remote server, in particular Gran software. The article also describes some examples of graphical problem solving using Gran1 that can be used in maths at school. The considered issues are quite complex and rather time-consuming without Gran1 software for graphical analysis of various tasks and approximate calculation of numerical measures of different objects (lengths of surfaces, areas of surfaces, volumes of bodies, probabilities of occurrence of different events, statistical analysis of observational data) of their solving. The range of tasks that can be solved with the use of the Gran software package, in particular Gran1 programme, is quite broad. By applying a creative approach, their analysis and solution can have a positive effect on the learners’ mental and cultural development. It is emphasized that the use of various technologies in educational process, as well as the selection of tasks and the content of training in general, should be pedagogically weighted, based on the harmonious combination of pedagogical heritage of the past and modern achievements of scientific and technological progress.


Author(s):  
Mahalakshmi M ◽  
Kalyanasundaran S.

The backbone of this research is to design and developed an effective cloud environment for pretending and protection of portable client device information put away in the cloud. Portable gadgets, for example, advanced mobile phones or tablets that are fundamentally more restricted than PCs as far as memory, processors, secured operating system, and accessible system data transmission bandwidth because of that all information migrate in to cloud environment. A portable client may go about as an information owner will demand key from the cloud administrator, scrambles the information and afterward it transfers the information in the cloud. In the cloud secured encryption is finished. Certificate Authority Based Encryption (CABE) approach is utilized for security and adaptability. Frequent monitoring is accomplished for Privacy, Security, trustworthiness and accessibility.


Sign in / Sign up

Export Citation Format

Share Document