The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of mobile Internet and FinTech (Financial Technology), clients are raising their expectations for online banking systems. They now expect bank information system to provide sustained services with high quality and require the online banking system to manage various operational risks. Existing research on the construction of highly available systems mainly solves the problems how...
Telecom Operators are going towards future of virtualization and cloud in order to provide new innovative services that are customer centric and to serve not so predictable Internet of Things (IoT). Transformation of Operation Support Systems (OSS) is recognized by TMForum as a key aspect in supporting upcoming technology changes and services agility. This article will show results of OSS transformation...
ERP to cloud integration is a widely debated topic, especially in the — so popular nowadays — cloud and mobility context. This article introduces a cloud based field service management solution that integrates with ERP back offices. To increase commercial adoption and obtain ERP vendor independence, a generic integration application is proposed, that abstracts communication complexity, decreases prototyping...
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose...
In order to assess an institute's mission and objectives, it is essential to have a framework for systematic collection, storage and analysis of course assessments for the students within the programs offered by the institute. This paper demonstrates such a framework and provides results from a Data Management System application to a KSA university as a case study.
Network management system (NMS) is important to ensure security and efficiency of network. Traditional NMS usually adopts SNMP as management protocol and has achieved great success. However, with emerging of various services, traditional network exposes shortcomings. Software-Defined Network (SDN) is a new paradigm which separates the control plane from the forwarding plane as opposed to the distributed...
In recent years, with the growth of P2P software, the operation mechanism has been much diversified. It is very difficult to classify P2P flow and normal flow based on single testing method. The increasing number of encrypted P2P protocols posed big challenge to testing. This thesis analyzes the identifying method for P2P flow based on port number, payload signature inspection, reverse connection...
It is well known that speculative behavior may do harm to the financial system and the market order. So, it is essential for us to make a research on how speculative behavior affects the market. And for this purpose, we developed a futures trading simulation system. We designed a configurable client to simulate traders and users can define trade strategies using different programming languages. We...
We consider the question of how to evaluate popularity of digital contents or goods over a distribution service using Oblivious Transfer (OT) protocol. The popularity of served content is the most important marketing data for data mining and analysis, but the idea of oblivious transfer is too privacy-protecting because the service provider cannot obtain any information about a user's queries. In this...
With the development of the electronic commerce (e-commerce), the untraceable electronic cash is an attractive payment tool for e-commerce, because its anonymity property can ensure the privacy of spenders. Recently, Ziba et al. proposed a new untraceable offline electronic cash system. The authors claimed that their scheme can detect a malicious consumer who spends a coin more than once. In this...
An interface adapter is used to allow a client application to transparently work with a service available in the local environment by converting the interface of an originally requested service into that of the available service. To generate adapters for users, interface matching is the first job to find out all the possible method matching pairs between a source interface and a target interface....
This paper reviews three kinds of information exchanging technology in the distributed computing environment, and introduces message-oriented middleware to implement the integration of todo-list distributed in the different business applications. Based on the analysis of the architecture and implementation framework of message-oriented middleware, the paper discusses the enterprise application integration...
In web service environment, long transactions always take long time to finish, which demands the resources - often the database - to be locked for a long time. This would bring down the performance of the transaction processing system. The normal solution is compensating transaction, which creates a relative transaction with the opposite effect. When the transaction is being executed, the sub-transactions...
Since the late 1980s, the simple network management protocol (SNMP) as the Internet management standard has been developed. The management of IP networks has exclusively relied on the SNMP. But the SNMP management framework has some weaknesses especially related to extensibility configuration management and efficient application development processes. Today, researchers and developers in the network...
The prepaid service is a valid method to assure the credit of users that is prevalent used by vendors at present, and it is a very important and applied function. Firstly, the generic AAA architecture and the work principle of RADIUS protocol used by prepaid service are introduced simply. Secondly, the system structure of VoIP authentication and accounting system based on RADIUS is described. Finally,...
In order to make the healthy and stable operation of the next generation Internet, this paper designs a network traffic monitoring system oriented IPv6. The System uses the collected Net Flow data to make statistics and analysis. The key technologies used in the system were introduced and the main framework of the system was given. The system has been tested in the cernet2, and the test results show...
In Guangzhou Higher Education Mega Center (HEMC), there are more than 30 million high-quality college teachers and students. With the development of wireless technology and mobile phone technology, as well as the continuous deepening of education reform, solely Internet-based information system has been far from enough to meet the needs of the HEMC's development. After deep analysis of the actual...
Data synchronous dynamic update is a main issue for the Service-Oriented Architecture (SOA) application system that is widely employed in distributed systems such as e-commerce and e-government. Technologies based redundancy is usually employed for building reliable service composition on top of unreliable Web-based application. Through the Caller-ID and the intelligence mobile phone use widely, the...
This article raised the traffic detection and analysis program based on more and more data services in GPRS networks. By bringing in the traffic acquisition module, data analysis and processing module, database module and WEB terminal blocks, this article achieves the function of traffic collection, analysis and processing of the GPRS.
As the trend of the Web is changing toward 'Web 2.0', OpenAPIs which is Web 2.0's core technology are used in many Web sites. In the past, services in Websites are used in their own Web site, but recently it is possible to use services in other Websites by using OpenAPI. There are already lots of OpenAPIs and the number of OpenAPI increases in very fast pace. So it is difficult to find a service that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.