The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is an increasing demand for applications in which users can easily browse different events organized by different institutions or organizations in a single place. Among these events are the following: theater or movie shows, cultural programs, presentations, meetups, etc. Most of the institutions (e.g. theaters) have their own web pages, where the programs along with the related news and pieces...
Caching plays an important role in many domains, as it can lead to important performance improvements. A key-value based caching system typically stores the results of popular queries in efficient storage locations. While caching enjoys widespread usage in the context of dynamic web applications, most mainstream caching systems store static binary items, which makes them impractical for many real-world...
Kaleido is a novel data system for multi-device synchronization. According to the theories of conflict-free replicated data types, Kaleido enables clients to synchronize replicated data types with operations, and gurantees high availability and eventual consistency. Implemented as a back-end as a service, Kaleido server is scalable so as to deal with a huge amount of requests from massive clients...
In heterogeneous database environment, data synchronization is a major issue. For on any government initiative which includes pan India roll out invariably brings along challenges related to fetching of data from various locations like respective zones/states/districts etc, its synchronization, transformation and standardization. Moreover this data usually resides in various different databases like...
Under the outfield condition, Portable Maintenance Aids (PMA) combined with Interactive Electronic Technical Manual (IETM) can assist maintenance personnel in doing maintenance training and fault diagnosis, which has an important research value. PMA-based IETM system is mostly developed by Client/Server (C/S) model. The systems based on C/S model are poor in compatibility, high in development cost...
Reverse Engineering benign or malicious samples can take a considerable amount of time. Reversing many samples, or tracking changes in malware families, can cause an analyst to see similar or even the same functions used over and over. The similar, or same, functions could be seen recently, allowing the analyst to recall the metadata they associated with it. However, most likely, the disassembly will...
Cloud Computing is a major field of study. Cloud Storage is regarded as an infrastructure to cloud computing and personal cloud storage are gaining popularity. This paper presents the development of a user friendly and efficient personal cloud synchronization and storage service using java and php. The application follows a new algorithm and its architecture is beyond the conventional client/server...
We introduce a new scheduling method that reduces the time required to deploy applications by parallelizing and optimizing a schedule on multiple virtual machines (VMs) in cloud computing. Enterprise solutions typically consist of multiple servers and clients with complicated installation dependencies. If users deploy such a solution, they need to install the software sequentially in the proper installation...
Mobility is one of the major feature in the present computing environment and in the present era of computing almost all the mobile devices have the ability that they can easily be move from one location to other and the data reside on a single system can be utilize via other systems generally using the client-server paradigm . The mobile device can extract needed amount of data from the server and...
A geographically isolated disaster-tolerant system for Distributed File System (DFS) is essential for its enhancement in data security. However, the plain disaster tolerant model performs poor quality while a switch happens in hot-backup. In this study, we proposed a Direct Data Fetch (DDF) technology for the hybrid model. The DDF can fetch data directly from the data chunk server while the main server...
The ability to provide isolate or standalone device data synchronization to the remote users is becoming more and more challenging for organizations nowadays. Several years ago, the term network was explicitly termed for wired-network but nowadays the accessibility of very high-speed broadband networks, small sized mobile devices, and easy carrying tabs have reduced dependency over wired-networks...
Web search histories can reveal detailed and sensitive information about people. Private information retrieval (PIR) tackles this potential privacy violation by allowing users to retrieve the th record of a database without revealing to the server. However, most known PIR schemes are either very inefficient (and therefore unlikely to gain traction in a practical sense) or reliant on some restrictive...
Property graphs are a promising data model for rich metadata management in high-performance computing (HPC) systems because of their ability to represent not only metadata attributes but also the relationships between them. A property graph can be used to record the relationships between users, jobs, and data, for example, with unique annotations for each entity. This high-volume, power-law distributed...
Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype...
Smart Home System is an inevitable trend of modern home due to its increasing affordability with development of IOT (Internet of Things). A complete Smart Home System empowers users to centralize the control of home devices, meanwhile, enables system administrators to manage them conveniently. For example, administrators can update/upgrade system data to support new equipment, push news and advertisements...
The replication mechanism of NoSQL database MongoDB includes Master/Slave structure and Replica Set. Write operation implement on Master, Slaves will send the synchronize data command asynchronously to Master to update its data. Read operation just implement on Master to provide the strong consistency, while read operation implement on Slave to provide the eventual consistency. Replica set is a group...
This paper describes a distributed sensor platform for a new breed of artificial pancreas devices. In recent work, a multi-variable adaptive algorithm has been proposed which incorporates physical activity of the patients for accurate prediction and control of glucose levels. In order to facilitate this algorithm, we integrate a smartphone and multiple sensors including activity trackers and a glucose...
Introduction: Continuity of care is critical in the delivery of health care services between health departments in a health facility and across different health facilities. It is mostly achieved through the use of unique patient identifiers, electronic medical record systems (EMRs), and data connectivity services, which promote access to and exchange of data of patients who seek care from multiple...
We developed a new email client which runs on the browser and is not dependent on a particular server, based on the Unhosted web application architecture. The client can connect to any standard mail server directly from the browser, using IMAP and SMTP protocols so that the user is not limited to the webmail clients provided by various email service providers. As our client runs in a browser, it is...
The mapping of reads, i.e. short DNA base pair strings, to large genome databases has become a critical operation for genetic analysis and diagnosis. The underlying alignment operation essentially is a string search tolerating some character mismatches and possibly character deletions or insertions with respect to a reference genome. Its output comprises the locations within the reference that are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.