Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Client application for Domain Name System.

Zeitschriftenartikel zum Thema „Client application for Domain Name System“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Client application for Domain Name System" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Akbar, Lalu A. Syamsul Irfan, Rayasa Puringgar Prasadha Putra, and Suthami Ariessaputra. "WEBSITE INTERFACE MONITORING CLIENT ACTIVITIES USING MIKROTIK ON UBUNTU SERVER 18.04 LTS." DIELEKTRIKA 10, no. 1 (2023): 41–51. http://dx.doi.org/10.29303/dielektrika.v10i1.332.

Der volle Inhalt der Quelle
Annotation:
Internet network is beneficial to be able to support the needs of the learning process. However, a large number of internet users, for example, who access university data, can cause weaknesses in a system, making it very vulnerable to data theft, damage, and leakage of confidential documents. The obstacle faced is that the internet is getting slower due to many users using the internet network and not knowing the amount of bandwidth usage. A system is needed to determine the bandwidth usage for each client. This system To simplify the process of monitoring the internet network. It can view cli
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.

Der volle Inhalt der Quelle
Annotation:
Many applications are developed on education domain. Information and data for each application are stored in distributed locations with different data representations on each database. This situation leads to heterogeneity at the level of integration data. Heterogeneity data may cause many problems. One major issue is about the semantic relationships data among applications on education domain, in which the learning data may have the same name but with a different meaning, or learning data that has a different name with same meaning. This paper discusses on semantic data mapping process to han
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ma, Liang, and Xiaole Zhao. "Research on the multi-terminal adapting Web system construction." MATEC Web of Conferences 232 (2018): 01028. http://dx.doi.org/10.1051/matecconf/201823201028.

Der volle Inhalt der Quelle
Annotation:
Among the various applying patterns of Internet programs, the Web system based on B/S architecture has the congenital advantage of cross platform. The same application could be accessed via the same domain name with any operating system, as long as the client-side software (browser) is installed. Thus, in the development of Internet application, if the function could meet the requirement, the Web system construction should be given the top priority. With the wide development of information technology, such as intelligent terminal, mobile interconnection and cloud computing, how to construct th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (2022): 9191. http://dx.doi.org/10.3390/app12189191.

Der volle Inhalt der Quelle
Annotation:
The addressing and discovering service is a vital infrastructure of the Internet. New applications and scenarios in next-generation networks rely on the secure and stable operation of domain name services, which puts forward new security challenges for the original domain name mechanism. While previous security enhancements of network services struggled to strike a balance between security, performance, and compatibility, hindering further use of core network services, the TEE (Trusted Computing Environment) technology can provide trusted and confidential services in untrusted network environm
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Sitorus, Sahat Parulian, Elysa Rohayani Hasibuan, and Rohani Rohani. "Analysis performance of content delivery network by used Rateless Code method." Sinkron 7, no. 4 (2022): 2348–59. http://dx.doi.org/10.33395/sinkron.v7i4.11651.

Der volle Inhalt der Quelle
Annotation:
Content Delivery Network (CDN) is a server system network to content contribution in an application/web to various accessors around the world so that data sent and received by users was faster. Server selection algorithm determines the extent to which the quality of server service to client requests. This study to analyze CDN performance, used Geographical algorithm Domain Name Server (GeoDNS), Round Robin (RR), Weigthed Round Robin (WRR), dan Least Connection (LC). In addition, Rateless Code (RLC) is also applied to reduce packet loss, there are two methods used, namely the first method is ra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Khudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (2019): 442. http://dx.doi.org/10.3390/electronics8040442.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ndichu, Samuel, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, and Daisuke Inoue. "Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods." Applied Sciences 12, no. 1 (2021): 60. http://dx.doi.org/10.3390/app12010060.

Der volle Inhalt der Quelle
Annotation:
Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to perpetrate malicious activities on the Internet are rampant and continuously evolving. Methods such as blocklisting, client honeypots, domain reputation inspection, and heuristic and signature-based systems are used to detect these malicious activities. Recently, machine learning approaches have been proposed; however, challenges still exist. First, blocklist systems are easily evaded by new URLs and JS code content, obfuscation, fast-flux, cloaking, and URL shortening. Second, heuristic and signature-base
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sudip, Chakraborty, and S. Aithal P. "Demonstration of Modbus Protocol for Robot Communication Using C#." International Journal of Applied Engineering and Management Letters (IJAEML) 5, no. 2 (2021): 119–31. https://doi.org/10.5281/zenodo.5709235.

Der volle Inhalt der Quelle
Annotation:
Purpose: The Modbus is the trusted name in the industrial automation communication domain. It is a pretty simple protocol to implement and so very popular to the industrial communication personnel. Nowadays, some industrial robots are also capable of communicating through Modbus. So, our robot researchers frequently face the challenge of communicating with Modbus-enabled devices or robots. They need to know the protocol in detail before integrating it into their project. Its learning curves are a bit higher because of the lack of document which is practical oriented. The protocol selection, pa
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Nguyen, Tuan Anh, and Minho Park. "DoH Tunneling Detection System for Enterprise Network Using Deep Learning Technique." Applied Sciences 12, no. 5 (2022): 2416. http://dx.doi.org/10.3390/app12052416.

Der volle Inhalt der Quelle
Annotation:
In spite of protection mechanisms for Domain Name System (DNS), such as IP blacklist and DNS Firewall, DNS still has privacy issues in reality, since DNS is a plain-text protocol. Recently, to resolve this problem, an encrypted DNS, called DNS-over-HTTPS (DoH), has been developed, and is becoming more widespread. As the secured version of DNS, DoH guarantees privacy and security to prevent various attacks such as eavesdropping and manipulating DNS data by using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. DoH is one of the best security options
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Rizal, Saepul, Popy Novita Pasaribu, and Nandang Sutisna. "Understanding Zalora's Neuromarketing-Based Online Marketplace Customer Choices." inovator 12, no. 2 (2023): 264–87. https://doi.org/10.32832/inovator.v12i2.17633.

Der volle Inhalt der Quelle
Annotation:
The development of the internet has popularized Digital commerce (e-commerce). There are various types online marketplaces with unique customer bases. Customers develop preferences or choices for certain online marketplaces over competitors. This research is to find out the choice variables that can influence. This study looks at online parameters that affect user experience when shopping. Included in this research are the discoveries of neuroscience, a type of limbic system that is basically similar to a client's personality. Descriptive analysis was used to analyze the customer's limbic pers
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Der volle Inhalt der Quelle
Annotation:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-uni
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Korobeinikova, Tetiana, and Taras Fedchuk. "OVERVIEW OF SECURE ACCESS TO DOMAIN NAME SYSTEM RESOURCES." Information technology and computer engineering 59, no. 1 (2024): 40–53. http://dx.doi.org/10.31649/1999-9941-2024-59-1-40-53.

Der volle Inhalt der Quelle
Annotation:
Abstract. The Domain Name System (DNS) is responsible for translating server's IP address into a domain name, enabling an end user to access a resource without having to remember it’s IP address. This protocol is the basis of the modern Internet, but all messages between the client and the server pass through an unprotected communication channel, which makes it vulnerable to various types of attacks (Spoofing, Eavesdropping, Phishing and others). To overcome this problem, DNSSEC (DNS Secure), DoT (DNS over TLS) and DNS over HTTPS (DoH) protocols were developed. The last one was the most effect
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Xiao, Yu Zhi. "On the Research of Internet Equipment Naming Methods." Advanced Materials Research 664 (February 2013): 1021–27. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1021.

Der volle Inhalt der Quelle
Annotation:
This paper analyzes the content of Internet naming problems as well as the current exist problems .We discuss the namespace and the major technologies, and then elaborating the important thinking on research of naming problems detailed and propose development direction in the future. In the paper, we propose a new method for devices naming due to the issues that exist in the Internet naming. Using this technical, it can solve the problem of the extremely scarce IPv4 and the IP address changed frequently on Internet devices. Equipment naming scheme has five major components: equipment name regi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Der volle Inhalt der Quelle
Annotation:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Ji, Hong. "Research on Design and Security Strategy of DNS." Applied Mechanics and Materials 378 (August 2013): 510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.378.510.

Der volle Inhalt der Quelle
Annotation:
DNS service plays a very important role in the Internet; each host must pass it to query the IP address of the destination host, and can communicate with each other. DNS uses a distributed database structure and server/client mode, which is stored domain name in the server and allowed a client to access the required data. DNS can resolve the host name to the corresponding IP address, while it also can resolve IP address to a host name. With the development of information technology, the network attacks become more and more frequent occurrence in the Internet. So DNS system has suffered a serie
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.

Der volle Inhalt der Quelle
Annotation:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Irwin, Barry V. W., and Christoffer Thorske Johnsen. "An Exploration of the Adoption of DNSSEC by Businesses within the Norwegian ccTLD." International Conference on Intelligent and Innovative Computing Applications 2022 (December 31, 2022): 22–29. http://dx.doi.org/10.59200/iconic.2022.003.

Der volle Inhalt der Quelle
Annotation:
The Domain Name System Security Extension (DNSSEC) is a cryptographic extension to the Domain Name System (DNS). The DNSSEC gives the DNS hierarchy a chain of trust from the root zone all the way down to the domain. By utilising DNSSEC, the client can verify that the DNS server’s response has not been tampered with in transit using strong trustworthy cryptographic algorithms. This paper presents a pilot research into the adoption of DNSSEC in Norwegian (.NO) ccTLD. The data set investigated in this researched a collection of Norwegian businesses that have a domain within the Norwegian ccTLD. T
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Jia, Bin. "The Research and Application of Short Message Name and Address Technology." Applied Mechanics and Materials 432 (September 2013): 571–74. http://dx.doi.org/10.4028/www.scientific.net/amm.432.571.

Der volle Inhalt der Quelle
Annotation:
This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Take advantages of the superiority of this system and innovates on the technology, we have completed a business software based on J2ME platform [1-.In the research and develop process we designed client-side functions and structural model combined with some functions used on the mobile phones, accordingly, the system technology has been practiced t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Zhang, Chen Guang, Yu Lan Zhao, Feng Xian Jiang, and Chao Ji. "The Research and Application of Short Message Name and Address System." Advanced Materials Research 225-226 (April 2011): 1008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1008.

Der volle Inhalt der Quelle
Annotation:
With the rapid development of mobile communication technology, the short message name and address system [1] has been developed swiftly nowadays. We make the short message to be a kind of carrier, for delivering the requirements which clients required and return the answers which clients seek for. This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Taking advantages of the superiority of this system
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Tian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.

Der volle Inhalt der Quelle
Annotation:
IPv4 and IPv6 will coexist for a long time, due to ISPes’ inertia in the transition from IPv4 to IPv6. Domain Name System (DNS) is a very important functional unit in the Internet. This paper describres the hierarchy and operating process of IPv6 DNS, IPv6 DNS resolver, and presents the DNS transition from IPv4 to IPv6 in particular. We suggest two methods to implement DNS service during the transition period: DNS-Application Level Gateway (DNS-ALG) with Network Address Translation-Protocol Translation (NAT-PT), and dual stacks. And we also propose their respective operational principles. This
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Schmitt, Paul, Anne Edmundson, Allison Mankin, and Nick Feamster. "Oblivious DNS: Practical Privacy for DNS Queries." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (2019): 228–44. http://dx.doi.org/10.2478/popets-2019-0028.

Der volle Inhalt der Quelle
Annotation:
Abstract Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers—the machines that receive a client’s query for a domain name and resolve it to a corresponding IP address—can learn significant information about client activity. Past work, for example, indicates that DNS queries reveal information ranging from web browsing activity to the types of devices that a user has in their home. Recognizing the privacy vulnerabilities associated with DNS queries,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Mahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.

Der volle Inhalt der Quelle
Annotation:
Authentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Zhang, Zhi Chun, Song Yan Lu, Kun Xu, Zhuang Xiong, and Yun He. "A Transparent Communication System in Distributed Systems." Advanced Materials Research 909 (March 2014): 311–16. http://dx.doi.org/10.4028/www.scientific.net/amr.909.311.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a communication system in order to facilitate the development of communication for distributed systems based on TCP/IP network. The system provides real-time communication service based on UDP, subnetting network, broadcast and multi-NIC(Network Interface Card) configuration in the same host. It also provides reliable communication service based on TCP. These services are some application programming interfaces (APIs) that can be called in client applications with IHBs (Information Harbors) to identify the communication end-points. An IHB is a name defined in a network conf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Singanamalla, Sudheesh, Suphanat Chunhapanya, Jonathan Hoyland, et al. "Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 575–92. http://dx.doi.org/10.2478/popets-2021-0085.

Der volle Inhalt der Quelle
Annotation:
Abstract The Internet’s Domain Name System (DNS) responds to client hostname queries with corresponding IP addresses and records. Traditional DNS is unencrypted and leaks user information to on-lookers. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting DNS messages from third parties. However, the small number of available public large-scale DoT and DoH resolvers has reinforced DNS privacy concerns, specifically that DNS operators could use query contents and client IP addresses to link activities with identities. O
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.

Der volle Inhalt der Quelle
Annotation:
Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attack
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Jeong, Taikyeong Ted. "Highly scalable intelligent sensory application and time domain matrix for safety-critical system design." International Journal of Distributed Sensor Networks 14, no. 4 (2018): 155014771774110. http://dx.doi.org/10.1177/1550147717741102.

Der volle Inhalt der Quelle
Annotation:
The designs of highly scalable intelligent sensory application—Ethernet-based communication architectures—are moving toward the integration of a fault recovery and fault-detection algorithm on the automotive industry. In particular, each port on the same network interface card design is required to provide highly scalable and low-latency communication. In this article, we present a study of intelligent sensory application for the Ethernet-based communication architecture and performance of multi-port configuration which is mainly used in safety-enhanced application such as automotive, military
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Blaise, Ohwo Onome, Ajayi Wumi, and Udosen Alfred. "Enhancing DNS Performance with Efficient Cryptographic Algorithms: A Comparative Study of DoT Frameworks." Asian Journal of Computer Science and Technology 13, no. 2 (2024): 48–55. https://doi.org/10.70112/ajcst-2024.13.2.4288.

Der volle Inhalt der Quelle
Annotation:
The Domain Name System (DNS) is a critical component of the Internet, and its disruption can significantly affect service quality. To enhance security and protect user privacy, encrypted protocols, such as DNS over TLS (DoT), DNS over Quick UDP Internet Connections (DoQ), and DNS over HTTPS (DoH), have been introduced. This study evaluates the performance impact of different cryptographic algorithms within the DoT framework, focusing on how encryption influences DNS query performance and resolver efficiency. Performance evaluations were conducted using various cryptographic algorithms under di
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Chen, Whai-En, Yi-Bing Lin, Tai-Hsiang Yen, Syuan-Ru Peng, and Yun-Wei Lin. "DeviceTalk: A No-Code Low-Code IoT Device Code Generation." Sensors 22, no. 13 (2022): 4942. http://dx.doi.org/10.3390/s22134942.

Der volle Inhalt der Quelle
Annotation:
The deployment of a client–server-based distributed intelligent system involves application development in both the network domain and the device domain. In the network domain, an application server (typically in the cloud) is deployed to execute the network applications. In the device domain, several Internet of Things (IoT) devices may be configured as, for example, wireless sensor networks (WSNs), and interact with each other through the application server. Developing the network and the device applications are tedious tasks that are the major costs for building a distributed intelligent sy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Setiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jeei.2017.v01.i01.p02.

Der volle Inhalt der Quelle
Annotation:
This paper presents a system to display traffic density in real time based on speed of vehicles on the main roads in the city of Denpasar. With this application, users who are in a vehicle can get the density of roads information. The software will run on the Android platform created with the help of Google maps with visualization density of roads are being reviewed. Measurement of vehicle speed using the frame difference method, so the computational process can be run quickly and in real time. The trial results of this paper, user (vehicle speed measurement) produces the same data as the data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Setiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jeei.v01i01p02.

Der volle Inhalt der Quelle
Annotation:
This paper presents a system to display traffic density in real time based on speed of vehicles on the main roads in the city of Denpasar. With this application, users who are in a vehicle can get the density of roads information. The software will run on the Android platform created with the help of Google maps with visualization density of roads are being reviewed. Measurement of vehicle speed using the frame difference method, so the computational process can be run quickly and in real time. The trial results of this paper, user (vehicle speed measurement) produces the same data as the data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Setiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jteei.v01i01p02.

Der volle Inhalt der Quelle
Annotation:
This paper presents a system to display traffic density in real time based on speed of vehicles on the main roads in the city of Denpasar. With this application, users who are in a vehicle can get the density of roads information. The software will run on the Android platform created with the help of Google maps with visualization density of roads are being reviewed. Measurement of vehicle speed using the frame difference method, so the computational process can be run quickly and in real time. The trial results of this paper, user (vehicle speed measurement) produces the same data as the data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Goularas, Dionysis, Khalifa Djemal, and Yannis Mannoussakis. "3D Image Modelling and Specific Treatments in Orthodontics Domain." Applied Bionics and Biomechanics 4, no. 3 (2007): 111–24. http://dx.doi.org/10.1155/2007/248715.

Der volle Inhalt der Quelle
Annotation:
In this article, we present a 3D specific dental plaster treatment system for orthodontics. From computer tomography scanner images, we propose first a 3D image modelling and reconstruction method of the Mandible and Maxillary based on an adaptive triangulation allowing management of contours meant for the complex topologies. Secondly, we present two specific treatment methods directly achieved on obtained 3D model allowing the automatic correction for the setting in occlusion of the Mandible and the Maxillary, and the teeth segmentation allowing more specific dental examinations. Finally, the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Ardiyanto, Yudhi, and Muhamad Yusvin Mustar. "Color Blindness Testing Using A Client-Server Based on The Ishihara Method." Journal of Electrical Technology UMY 4, no. 2 (2020): 46–52. http://dx.doi.org/10.18196/jet.v4i2.10993.

Der volle Inhalt der Quelle
Annotation:
The Ishihara method is one way to detect whether or not someone suffers from color blindness. This method possesses several sets of plates or circle patterns containing various combinations of colored dots and sizes, forming numbers visible for people with normal eyes. A collection of several plates with the name Ishihara book is available in the market. However, the book has a weakness for being easily damaged or faded in color. Although there are some shortcomings, several researchers have developed applications to anticipate those weaknesses. Being unable to be used by several people at onc
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Arjumand, Ali. "An Approach for Effectively Handling Small Size Image Files in Hadoop." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1751–56. https://doi.org/10.31142/ijtsrd11516.

Der volle Inhalt der Quelle
Annotation:
Small size file handling problem is a big challenge in Hadoop framework. Many approaches have been proposed and evaluated to deal with the small size file handling problem in Hadoop. File merging strategy is one of the most popular approaches used in literature. To deal with the small size file handling problem this paper evaluates a merging strategy in the domain of "Content based Image Retrieval Systems CBIRS ". CBIRS form a perfect application domain for evaluating solutions for small size file handling problem in Hadoop by incorporating a huge number of image files small files .T
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

B.Jayaram, R.Rahul, R. Rishvaanth A, et al. "India and different nations are battling with fake items." International Journal of Innovative Science and Research Technology 7, no. 12 (2022): 36–40. https://doi.org/10.5281/zenodo.7450370.

Der volle Inhalt der Quelle
Annotation:
India and different nations are battling with fake items. The worldwide improvement of an item or innovation consistently accompanies hazard factors, for example, forging and duplication. Forging items can influence the organization's name and the client's wellbeing. Fake items are causing a significant impact on the organization and the client's wellbeing. Hence, item creators are confronting enormous misfortune. So this project will be helpful in avoiding these situations by using this application. In the proposed framework, the framework produces Barcode utilizing Blockchain inn
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Luo, Xi, Yixin Li, Hongyuan Cheng, and Lihua Yin. "AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism." Mathematics 12, no. 5 (2024): 640. http://dx.doi.org/10.3390/math12050640.

Der volle Inhalt der Quelle
Annotation:
Domain Name System (DNS) plays an infrastructure role in providing the directory service for mapping domains to IPs on the Internet. Considering the foundation and openness of DNS, it is not surprising that adversaries register massive domains to enable multiple malicious activities, such as spam, command and control (C&C), malware distribution, click fraud, etc. Therefore, detecting malicious domains is a significant topic in security research. Although a substantial quantity of research has been conducted, previous work has failed to fuse multiple relationship features to uncover the dee
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Adler, Jeffrey L., and Eknauth Persaud. "Knowledge Acquisition for Large-Scale Expert Systems in Transportation." Transportation Research Record: Journal of the Transportation Research Board 1651, no. 1 (1998): 59–65. http://dx.doi.org/10.3141/1651-09.

Der volle Inhalt der Quelle
Annotation:
One of the greatest challenges in building an expert system is obtaining, representing, and programming the knowledge base. As the size and scope of the problem domain increases, knowledge acquisition and knowledge engineering become more challenging. Methods for knowledge acquisition and engineering for large-scale projects are investigated in this paper. The objective is to provide new insights as to how knowledge engineers play a role in defining the scope and purpose of expert systems and how traditional knowledge acquisition and engineering methods might be recast in cases where the exper
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Sekhar, Sirish. "Serverless Deployment of a Next.js Application Using AWS." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2617–20. https://doi.org/10.22214/ijraset.2025.72702.

Der volle Inhalt der Quelle
Annotation:
This paper presents a practical and scalable approach to deploying a modern web application built with Next.js using Amazon Web Services (AWS) in a serverless environment. The deployment architecture incorporates AWS Amplify for frontend hosting and continuous integration/continuous deployment (CI/CD), Amazon Simple Notification Service (SNS) for programmatically sending emails from a contact form, and Route 53 for robust Domain Name System (DNS) management. We detail the configuration of each component, design rationale, and encountered challenges. The solution significantly reduces infrastru
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Raj, Adarsh. "Neonatal Screening Application." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (2022): 89–99. http://dx.doi.org/10.22214/ijraset.2022.39619.

Der volle Inhalt der Quelle
Annotation:
Abstract: Neonatal screening is a set of medical diagnostics that are performed on infants. Our project deals with the problem of a centralized management system for hospitals making it easier for doctors as well as patients to view reports and compare current reports with the previous reports. Our app would also help in reducing errors that are generally caused when this process of comparing and contrasting the report is done manually by doctors. The main objective of this project is to develop a Client Server based environment, for transferring the medical report details from the bio medical
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

G. Albino, Michael, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, and Kris Danica P. Paña. "Automated Hotel Booking and Cancellation Web-Based Application: A Prototype." Oriental journal of computer science and technology 15, no. 010203 (2022): 53–63. http://dx.doi.org/10.13005/ojcst15.010203.05.

Der volle Inhalt der Quelle
Annotation:
The purpose of this study is to provide new insights into the factors that influence cancellation behaviour with respect to hotel bookings. Cancellations of bookings are one of the most common concerns in the hotel sector. Before the specified arrival date, the client would cancel their reservation. The cancellation has had a major impact on hotel operations as well. The researchers developed a prototype system called Automated Hotel Booking Cancellation that can assist a hotel in better anticipating consumer cancellations and booking transactions. The researchers utilized a survey questionnai
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

J, Ravikumar, and Ramakanth Kumar P. "A framework for named entity recognition of clinical data." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 946. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp946-952.

Der volle Inhalt der Quelle
Annotation:
With emergence of technologies like big data, the healthcare services are also being explored to apply this technology and reap benefits. Big Data analytics can be implemented as a part of e-health which involves the extrapolation of actionable insights from sources like health knowledge base and health information systems. Present day medical data creates a lot of information consistently. At present, Hospital Information System is a quickly developing innovation. This data is a major asset for getting data from gathering of gigantic measures of surgical information by forcing a few questions
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Ravikumar, J., and Kumar P.. Ramakanth. "A framework for named entity recognition of clinical data." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 2 (2020): 946–52. https://doi.org/10.11591/ijeecs.v18.i2.pp946-952.

Der volle Inhalt der Quelle
Annotation:
With emergence of technologies like big data, the healthcare services are also being explored to apply this technology and reap benefits. Big Data analytics can be implemented as a part of e-health which involves the extrapolation of actionable insights from sources like health knowledge base and health information systems. Present day medical data creates a lot of information consistently. At present, Hospital Information System is a quickly developing innovation. This data is a major asset for getting data from gathering of gigantic measures of surgical information by forcing a few questions
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Sihite, Muhammad Hafiz Taruligani, Ardiansyah Ardiansyah, Rizky Prabowo, and Febi Eka Febriansyah. "Aplikasi Mobile Periklanan Digiprom Berbasis Android." Jurnal Pepadun 3, no. 3 (2022): 353–60. http://dx.doi.org/10.23960/pepadun.v3i3.133.

Der volle Inhalt der Quelle
Annotation:
Digiprom is a startup that provides ad serving services. These advertisements will later be shown in public places, such as supermarkets, cafes, malls, and others. The problem faced by Digiprom is that there is no information technology to help interact between Digiprom and its clients (businessman). The interactions in question are such as registration as a client, the process of making a contract between the client and Digiprom, the process of monitoring the contract that has been made and the delivery of other information about Digiprom. To solve this problem, an Android-based mobile applic
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Iovescu, Daniel, and Cătălin Tudose. "Real-Time Document Collaboration—System Architecture and Design." Applied Sciences 14, no. 18 (2024): 8356. http://dx.doi.org/10.3390/app14188356.

Der volle Inhalt der Quelle
Annotation:
This article explores the world of dependable systems, specifically focusing on system design, software solutions, and architectural decisions that facilitate collaborative work on shared text documents across multiple users in near real time. It aims to dive into the intricacies of designing robust and effective document collaboration software focusing on understanding the requirements of such a system, the working principle of collaborative text editing, software architecture, technology stack selection, and tooling that can sustain such a system. To examine the pros and cons of the proposed
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

K R, Dhruva. "Development of Client-Specific Web Service for Manipulating Real-Time Contextual Data." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1860–62. http://dx.doi.org/10.22214/ijraset.2022.45577.

Der volle Inhalt der Quelle
Annotation:
Abstract: The aim of this work was to create a fully functional client-specific solution for accessing real-time context specific data. These kinds of interfaces have been all the buzz in the domain of banking and can help in achieving a faster turn-aroundtime for the queries being asked by the internal users spread all over the globe. These kinds of interfaces provide an effective way to communicate with a user and offer helpful support in a more economical way- saving both time and efforts being spent on accessing real-time data. The application built aims to provide more space for decision
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Rhodus*, Tim, and Bud Witney. "Developing New Approaches and Tools for Improved Management and Delivery of Online Digital Photos." HortScience 39, no. 4 (2004): 875C—875. http://dx.doi.org/10.21273/hortsci.39.4.875c.

Der volle Inhalt der Quelle
Annotation:
More and more of the Department's academic and outreach communications on the Internet involve the use of digital photos. While enhancing visual appeal and conveying information that cannot be communicated via text is an obvious benefit, it is critical that digital collections be efficiently and effectively managed at the client level (personal workstation) and also the server level. To assist faculty and staff who routinely publish on the web and those who contribute to the Ohio State Univ.'s WebGarden online image database, a new client application was developed to assist in viewing and orga
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Pallavi, P., and Shaik Salam. "Online Command Area Water Resource Management System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 70–74. http://dx.doi.org/10.34306/csit.v5i2.141.

Der volle Inhalt der Quelle
Annotation:
Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the activity of planning, developing, distributing and managing the optimum use of water resources. Successful management of water resources requires accurate knowledge of their resource distribution to meet up the competing demands and mechanisms to make good decisions using advanced recent technologies.Towards evolving comprehensive management plan in suitable conservation and utilization of water resource
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Barida, Baah, Lizzy Nwagbo Chioma, and Mmeah Shedrack. "Raspberry Pi Utilization in a Federated Machine Learning Domain." Journal of Scientific and Engineering Research 8, no. 3 (2021): 186–92. https://doi.org/10.5281/zenodo.10577630.

Der volle Inhalt der Quelle
Annotation:
<strong>Abstract</strong> Privacy and security is becoming a major challenge when it comes to the distributed systems like the federated machine learning system especially when data are been transmitted or learned on a network , this necessitated the reasons for this research work which is all about wireless federated machine learning process using a raspberry Pi. The raspberry Pi 4 is a single hardware board with built in Linux operating system. Data set of names where used from different languages and then we develop a training model using recurrent neural network to train this names compare
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Kart, Özge, Alp Kut, and Vladimir Radevski. "Decision Support System For A Customer Relationship Management Case Study." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 2 (2014): 88. http://dx.doi.org/10.11591/ijict.v3i2.pp88-96.

Der volle Inhalt der Quelle
Annotation:
&lt;span lang="EN-US"&gt;Data mining is a computational approach aiming to discover hidden and valuable information in large datasets. It has gained importance recently in the wide area of computational among which many in the domain of Business Informatics. This paper focuses on applications of data mining in Customer Relationship Management (CRM). The core of our application is a classifier based on the naive Bayesian classification. The accuracy rate of the model is determined by doing cross validation. The results demonstrated the applicability and effectiveness of the proposed model. Naiv
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Grepon, Benzar Glen, Paul John Labastida, Zichri Vicariato, and Caroline Laarni Sereñas. "School-IntegrIS: An Integrated System Approach to a School Management System of a State College in Northern Mindanao, Philippines." International Journal of Computing Sciences Research 9 (January 1, 2025): 3441–57. https://doi.org/10.25147/ijcsr.2017.001.1.228.

Der volle Inhalt der Quelle
Annotation:
Purpose⎯With the increasing demands of system development in the school in terms of converting manual transactions into digital and computer-based systems, some systems and modules useindependent URLs or subdomains in the school’s websitethat needto be memorizedtoaccess those systems. This project incorporates all independent systems into a single domainfor easy access and user control. Method⎯This study covers the system's primary functions, including its modules and subsystems, as well asthe Agile Model research technique and methodology. Results⎯The ISO/IEC 25010 quality evaluation system h
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!