The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
In this paper, an embedded Linux-based platform named Digital Invoice ARchiving InSTrument (DIARIST) is proposed. While the DIARIST system is located on the tax payer's side, it is responsible for the processing of e-Archive invoices, it distinguishes e-Archive invoices from e-Invoices, it communicates with the remote server and it allows tax-payers to print their e-Archive invoices for their customers...
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often...
Web applications have grown very unexpectedly in these recent years but due to difference between web applications and software applications, their development methodologies differ in many ways. The distinction between these two different types of applications acquire for introduction of development methodologies dedicated to web applications. The thesis work represents various development approaches...
In order to satisfy the need of cross platform, fault information standard description, and network transmission in networked fault diagnosis, the paper introduced the specific planning and implementation method based on LabVIEW. Relevant research was based on the capacities of LabVIEW cross platform and of XML standard description. The XML description method of typical fault information was given...
Nowadays systems can evolve quickly, and to this growth is associated, for example, the addiction of new features, or even the change of system perspective, required by the stakeholders. Consequently, these cause an increase in the number of developed tests. Run a large battery of tests sequentially can take hours. However, tests can run faster in a distributed environment with rapid availability...
The sensor node signal interface is the channel for sensor connecting to sensor node. Therefore, in order to verify the conformance between sensor network signal interface and signal interface standard, the design and implementation of WSN signal interface conformance test system based on web wsa presented. The test content included the signal interface description file, signal type supported by interface,...
We introduce the web-based simulation and visualization tool Webdemo, designed for supplementing science, technology, engineering and mathematics (STEM) courses in higher education with interactive examples. The flexible simulation system supports a great variety of visualizations and mathematical operations. To ensure open access, the web front end does neither require additional software nor user...
The management of distributed e-infrastructures introduces additional requirements in the monitoring system. The main issue is to enable users to achieve the awareness of the global status, and to present the information in function of the role: simple user, system admin, manager. In this work we present the solution created for the ReCaS infrastructure that federates four datacenters in south of...
Supervisory Control and Data Acquisition (SCADA) systems are omnipresent in production operation worldwide. Failure detection within these systems remains a challenging task as the level of granularity in terms of location-based identification is low. The systems are able to identify and display failing components, but the situation becomes even more severe in case one of the failing components is...
Owl Computing Technologies provides software and hardware that facilitates secure unidirectional data transfer across the internet. Bash scripts are used to facilitate customer installation of Owl's client/server software, and to provide high level management, control, and monitoring of client/server interfaces. With the evolution of more robust scripting languages, Owl now wishes to convert their...
Logs are the files which contain the information about all the events occurring on the system. Logs have been playing a vital role in providing all kinds of information which can be used for several purposes like detecting a suspicious behaviour over the system. The aim of this paper is to study, analyse and generate results by observing host. Log files consist of different header information which...
The satellite equivalent device is used to check the electrical interface of satellite ground power supply and distribution (PSD) test system and verify its functional correctness. Previous equivalent device is usually customized for particular satellite. A general equivalent device for satellite was designed and developed in this paper. Firstly, the design requirements and specifications of general...
Nowadays, the use of remote laboratories is a common feature in order to get students involved in practical experiences. This is particularly important in distance learning environment. The regular practice is to develop a particular laboratory, required by the student competence's curricula. Usually, this involves a lack of methodology or a standard procedure so, new developments must be done to...
Aiming at the lack of adequate and flexible access control in 3D virtual environment when used in education, according to RBAC model, we present an authority control method which can manage manipulations to all objects, e.g. a variety of assets, avatars, scripts and network communication pipes in 3D virtual environment. The proposed technique overcomes the insufficiency on access control aspect in...
e-lab is a remote laboratory infrastructure, powered by a specific software framework, that allows to perform experiments and retrieve data from a remote apparatus. The deployment of new experiments on this platform is a complex and demanding process and an integrated overview for it is missing. An overview of e-lab's specifications is presented taking into account software development requirements...
Many software applications today are written as web-based applications to be run in an Internet browser. Selenium is a set of powerful different software tools working with many browsers, operating systems, programming languages, and testing frameworks each with a different approach to supporting automation test for testing web-based applications. JMeter is used to simulate a heavy load on a server,...
JSON is moving from being an underground secret, known and used by very few, to becoming the clear choice for mainstream data applications. The first Web extra is a video interview with Douglas Crockford on the creation of JavaScript Object Notation (JSON). The second Web extra is an audio podcast by Charles Severance, author of Computing Conversations.
IT-based services existing today, such as the ones supporting e-commerce systems or corporate applications, demand complex architectures to address enterprise-class requirements (high availability, vast user demand, etc.). In particular, most enterprise-class applications are multi-tiered and multi-node, i.e. composed of many independent systems with complex relationships among them. In recent years,...
Data centers need to manage a large amount of configuration information for a variety of computational, storage and networking assets at multiple levels (e.g., individual devices to entire data center). The increasingly sophisticated configuration management required to support virtualization significantly enhances chances of misconfigurations and exploitation by hackers that could impact data center...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.