Although blockchain technology is gaining popularity, there is no clear guideline or widely available education tool for amateurs to learn this new technology. In this research project, we build a web-based simulation...
详细信息
ISBN:
(纸本)9781665414906
Although blockchain technology is gaining popularity, there is no clear guideline or widely available education tool for amateurs to learn this new technology. In this research project, we build a web-based simulation to serve as an educational tool on blockchain technology. As a simulative webapplication, it is to be used to help IT students (particularly computer science students) understand the basic structure of blockchain and why it can be considered as a decentralized system. We describe theoretical aspects and architecture of the developed webapplication, and present sample execution to explain how it works.
In the recent years there are more and more mobile devices appearing which are running Android operating system. Nowadays there is a trend of information availability anytime and anywhere. Main goal of this paper is t...
详细信息
ISBN:
(纸本)9781479921621
In the recent years there are more and more mobile devices appearing which are running Android operating system. Nowadays there is a trend of information availability anytime and anywhere. Main goal of this paper is to present the solution for interconnection of mobile device application environment and universal programmable microcontroller based on ARDUINO board withthe goal of monitoring and remote control of small water and wind power plant. One of the application oriented outputs of this research is web-based solution for remote control withthe ability to review measured parameters anywhere around the world. the solution is used as a learning module for understanding AD transmission of signals over the Internet. Students can create their own custom configuration of hardware components and thus monitoring system in the laboratory.
Security architecture model is an intractable research problem in webapplicationsystems. In the traditional three-layer architecture model, there is no specific structure and safeguard mechanism for the overall safe...
详细信息
ISBN:
(纸本)9812565329
Security architecture model is an intractable research problem in webapplicationsystems. In the traditional three-layer architecture model, there is no specific structure and safeguard mechanism for the overall safety of the system, this paper analyzes the security problems of existing webapplicationsystems and proposes a new four-layer architecture model for secure webapplicationsystems. the four layers of this new architecture are: presentation layer, business layer, data layer and security control layer. Access control and communication security are implemented in our four-layer architecture by adding new functions on top of existing ones to the first three layers, i.e., presentation layer, business layer, and data layer. the new security control layer is mainly used to provide safety services, such as two-way certification of end to end communication, secrecy and integrity of communication data, undeniable service of end to end communication, algorithm of digital signature and security key distribution etc. this paper also defines functions for each layer and describes authentication, encryption, decryption and transmitting data flow for the new architecture. the deficiencies and security problems in the traditional three-layer architecture are resolved in the safeguard mechanism in our new four-layer architecture;moreover this four-layer architecture has preferable universality and opening performance.
Significant effort is invested towards creating innovative applications for the emerging Smart Grid. However, many of these efforts use the old modus operandi of the energy domain providers i.e. offer of a monolithic ...
详细信息
ISBN:
(纸本)9781479907526
Significant effort is invested towards creating innovative applications for the emerging Smart Grid. However, many of these efforts use the old modus operandi of the energy domain providers i.e. offer of a monolithic application residing on proprietary or provider-only data, with little thought about cross-application collaboration and information exchange. However, the future of Smart Grid applications resides on sophisticated multi-channel applications that can rely on multi-source data and Internet provided basic services that can be easily customized for the specific end-user groups. Such a webapplication for monitoring and managing a Smart Grid neighborhood, where real-time energy monitoring, prediction and management of energy trading takes place, has been realized and piloted. We present here some of the key functionalities, as well as an assessment of the application and its design decisions.
in Internet of things (IoT), both physical things (such as devices, gateways and commodities etc.) and virtual things (like multimedia content and application software) are assigned unique IoT identifiers (IoT ID), wh...
详细信息
ISBN:
(纸本)9781479957279
in Internet of things (IoT), both physical things (such as devices, gateways and commodities etc.) and virtual things (like multimedia content and application software) are assigned unique IoT identifiers (IoT ID), which are similar to the domain name used for locating online resources in Internet. However, until now the format of IoT ID is not globally unified due to all kinds of reasons and thus in the IoT world there are even thousands of types of IoT ID (such as EPC code in USA, uCode in Japan, CPC code in China etc.). Due to the heterogeneity of IoT ID, it becomes the key point of resolving an IoT ID to the information referring to it (just as resolving the domain name to IP address) to at first determine the standard that the given IoT ID belongs to. Towards this issue, an extraction mechanism of IoT ID characteristic is proposed where three kinds of IoT ID characteristics, namely length, value range and special algorithm, are captured from the IoT ID standards. Based on these IoT ID characteristics, a fast IoT ID recognition algorithm is proposed to highly reduce the times of characteristic matching. then a prototype system is built based on the above algorithm and the experiment results demonstrate that the IoT ID recognition algorithm has a high recognition ratio and low computational complexity.
the paper presents a theory of uncertainty and its modeling, emphasizing the situational property of uncertainty in problem solving process of complex systems. the design and implementation of tools and enablers based...
详细信息
ISBN:
(纸本)9781934272176
the paper presents a theory of uncertainty and its modeling, emphasizing the situational property of uncertainty in problem solving process of complex systems. the design and implementation of tools and enablers based on the model related algorithms are aimed to facilitating effective decision making and to optimize efficiency through alleviation of information uncertainty, such as fuzziness of observations and inconsistent understanding of terms. these tools and enablers are equipped in the specific decision support system WDSS to support the participants of a SBA task, as decision makers to make decisions in the SBA decision making processes. therefore, Simulation Based Acquisition and the SBA desired web-based decision support system WDSS have to be systematically introduced. To satisfy the technical challenges (1) providing decision traceability, (2) ensuring consistent analysis, and (3) supporting information access, understanding and management by both humans and software agents of the SBA desired DSS, it's functional, behavioral and consequently the technological characteristics responding to these challenges are necessarily explained. the fuzzy technological framework is embedded in the problem solving mechanism of decision making processes, and behaves as a comprehensive and, adaptive knowledge transformation paradigm aimed to form internal consistency.
webapplication vulnerability detection is critical to cybersecurity. webapplications are vulnerable to attacks from a variety of sources, with varying degrees of scale and complexity. therefore, it becomes essential...
详细信息
When it comes down to public transport systems, delays are a hot topic. For a quantitative conclusion whether a delay is just an incident or happens on a regular basis, we have to believe in the figures published in t...
详细信息
ISBN:
(纸本)9781509054763
When it comes down to public transport systems, delays are a hot topic. For a quantitative conclusion whether a delay is just an incident or happens on a regular basis, we have to believe in the figures published in the annual reports of public transport companies. However, even if some data is available online, it is quite hard to independently examine these numbers without information technologies. this paper presents an architecture for extracting web data from a local transport operator through automated web observations. By exploiting an already existing web infrastructure, we are not only able to collect vast amounts of transportation data but may also visualise all transportation units (bus or trams) interactively. Moreover, collecting web data enables us to make suggestions in order to reassess the performance figures of the annual report in terms of accuracy and precision. Monitoring key values help identifying the state of the transportation system.
An information hierarchy is a collection of relational informationthat is arranged in a ranking organization where each entity is subject to a single other entity, except for the top (root) element. the usefulness of...
详细信息
ISBN:
(纸本)9780769529004
An information hierarchy is a collection of relational informationthat is arranged in a ranking organization where each entity is subject to a single other entity, except for the top (root) element. the usefulness of a visualization of an information hierarchy depends on its capability of conveying the information quickly and clearly. the interaction withthe information hierarchy allows a user to further analyze its underlying structures and relationships, which is essential for the effectiveness of the visualization. In this paper we present a novel method to interactively visualize information hierarchies in real-time. We use the World Wide web as an application example of our techniques. the result is a novel web browsing and visualization method with an innovative combination of features: (i) web data is retrieved and displayed in real-time (i.e. web data is not prerecorded), (ii) browsing and visualization are synchronized together in the same interface, (iii) tree-based visualization engine, and (iv) space-efficient display of visualization. Our study shows that users are able to orient themselves better in cyberspace and locate web pages of interest faster.
暂无评论