Journal articles on the topic 'Hypertext Transfer Protocol (HTTP)'

To see the other types of publications on this topic, follow the link: Hypertext Transfer Protocol (HTTP).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hypertext Transfer Protocol (HTTP).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Musliyana, Zuhar, Teuku Yuliar Arif, and Rizal Munadi. "Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia." Jurnal Rekayasa Elektrika 12, no. 1 (March 25, 2016): 21. http://dx.doi.org/10.17529/jre.v12i1.2896.

Full text
Abstract:
Single Sign On (SSO) merupakan model autentikasi independen yang diimplementasikan Universitas Ubudiyah Indonesia (UUI) menggunakan Message-Digest Algorithm 5 (MD5) dan web service NuSOAP berbasis bahasa pemograman PHP. Sistem ini berjalan pada protokol Hypertext Transfer Protocol (HTTP). Faktanya penggunaan protokol HTTP ini sangat rentan terhadap berbagai jenis serangan karena data dikirim dalam bentuk plaintext tanpa ada proses enkripsi dan penerapan algoritma MD5 pada autentikasi login juga rentan terhadap serangan dictionary attacks dan rainbow tables. Disisi lain, Penggunaan web service NuSOAP juga menciptakan celah keamanan karena pengiriman dan penerimaan payload tidak dienkripsi. Saat ini diketahui sudah ada beberapa metode yang dapat digunakan untuk meningkatkan pengamanan kerentanan tersebut diantaranya yaitu menggunakan Hypertext Transfer Protocol Secure (HTTPS), Secure Hypertext Transfer Protocol (SHTTP) dan Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Namun beberapa hasil penelitian terkait memperlihatkan masih terdapat beberapa kelemahan dari penggunaan HTTPS, SHTTP dan CAPTCHA. Penelitian ini mengusulkan penggunaan algoritma Advanced Encryption Standard (AES) dengan pembangkit kunci dinamis dan metode One-Time Password (OTP) berbasis sinkronisasi waktu dengan kombinasi salt untuk meningkatkan keamanan pada autentikasi SSO UUI. Hasil pengujian menunjukkan penerapan algoritma AES dan OTP dapat mengamankan proses autentikasi SSO dari serangan dictionary attack dan rainbow table.
APA, Harvard, Vancouver, ISO, and other styles
2

SUSANA, RATNA, ANGGA NUGRAHA, and DECY NATALIANA. "Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP)." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 3, no. 1 (January 1, 2015): 1. http://dx.doi.org/10.26760/elkomika.v3i1.1.

Full text
Abstract:
ABSTRAKHypertext Transfer Protocol (HTTP) merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW). Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website.Kata kunci: basis data, data logger, Hypertext Transfer Protocol (HTTP), website, protokol jaringan.ABSTRACTHypertext Transfer Protocol (HTTP) is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW). This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16. Website could receive and process the data transmitted by the data logger and organize system entities. Changes in analog data and status logic 0 and 1 of digital data could be seen on display at the website.Keywords: database, data logger, Hypertext Transfer Protocol (HTTP), network protocol, website.
APA, Harvard, Vancouver, ISO, and other styles
3

Dimitrova, Biljana, and Aleksandra Mileva. "Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)." Journal of Computer and Communications 05, no. 05 (2017): 98–111. http://dx.doi.org/10.4236/jcc.2017.55008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Almanza Olmedo, Moreno. "e-commerce cybersecurity vulnerability, http protocol case." Minerva 2, no. 6 (November 22, 2021): 23–31. http://dx.doi.org/10.47460/minerva.v2i6.39.

Full text
Abstract:
This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.
APA, Harvard, Vancouver, ISO, and other styles
5

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.

Full text
Abstract:
Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attacks. Enc-DNS-HTTP is based on the distribution of a web server public key, which is transferred via a secure communication between client and a Domain Name System (DNS) server. This key is used to encrypt client-server communication. The scheme is implemented in the C programming language and tested on a Linux platform. In comparison with Apache HTTPS, this scheme is shown to have more effective resistance to attacks and improved performance since it does not involve a high number of time-consuming operations.
APA, Harvard, Vancouver, ISO, and other styles
6

Mattson, Robert L. R., and Somnath Ghosh. "HTTP-MPLEX: An enhanced hypertext transfer protocol and its performance evaluation." Journal of Network and Computer Applications 32, no. 4 (July 2009): 925–39. http://dx.doi.org/10.1016/j.jnca.2008.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Riswandi, Kasim, and Muh Fajri Raharjo. "Evaluasi Kinerja Web Server Apache menggunakan Protokol HTTP2." Journal of Engineering, Technology, and Applied Science 2, no. 1 (April 6, 2020): 19–31. http://dx.doi.org/10.36079/lamintang.jetas-0201.92.

Full text
Abstract:
Hypertext Transfer Protocol (HTTP) adalah protokol jaringan lapisan aplikasi yang digunakan untuk sistem informasi terdistribusi, kolaboratif, dan menggunakan hipermedia. Penggunaan internet meningkat mencapai dari tahun 2014-2016, akan tetapi peningkatan tersebut tidak didukung dengan peningkatan kinerja protokol. HTTP/2 hadir sebagai protokol generasi terbaru yang merupakan versi terbaru dari protokol HTTP. Protokol ini sudah dilengkapi dengan sistem keamanan, karena berjalan di atas HTTPS yang merupakan mode security dari protokol HTTP. Penelitian ini dilakukan untuk mengukur kinerja dari protokol HTTP/2 dan cara untuk mengaktifkan protokol ini, sehingga protokol ini dapat diimplementasi dan mempercepat kinerja dari berbagai web server. Berdasarkan hasil penelitian ini, ditunjukkan bahwa pengimplementasian protokol ini dapat berjalan pada web server apache versi 2.4.17 karena versi sebelumnya tidak mendukung dan pada web server nginx versi 1.9.5 karena versi yang sebelumnya juga tidak mendukung protokol ini. Pada pengukuran kinerja yang dilakukan bahwa kecepatan response time yang dihasilkan HTTP/2 dalam mentransfer data lebih kecil dari pada HTTP/1 dapat dilihat dari hasil response time HTTP/1 web server apache sebesar 128,6 ms sedangkan pada HTTP/2 86,3 ms, dan pada web server nginx juga menunjukkan response time HTTP/2 lebih kecil dari pada HTTP/1 yang sebesar 184,3 ms dan 141,6 pada HTTP/2. Dari hasil pengujian response time HTTP/2 menunjukkan performa kecepatan yang lebih cepat jika diterapkan dalam web server apache dari pada menggunakan web server nginx.
APA, Harvard, Vancouver, ISO, and other styles
8

Cheng, An Yu, Xiao Yu Lin, and Wen Long Feng. "Implementation of Multi-Vehicle Terminals' Data Transmission Based on HTTP Communication Protocol." Applied Mechanics and Materials 556-562 (May 2014): 5098–101. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5098.

Full text
Abstract:
Vehicle terminal can upload the vehicle status information to the server in time, to provide service for the users with more security. But vehicle terminal in the process of upload information to the server need to solve many issues, such as a large number of terminals connecting to the server, large amount of data, the data of transmission in various forms, the server is not stable enough and many other issues. This design uses the Hypertext Transfer Protocol (HTTP) to achieve reliable data transmission between the WEB server and vehicle terminals, and the load of server is lower, so the server can support more vehicle terminals’ connection.
APA, Harvard, Vancouver, ISO, and other styles
9

Yi, Shi, Quan Liu, and Jing Song Li. "Design and Realization of Large File Asynchronous Upload and Broken-Point Continuingly-Transferring Based on ASP.NET MVC." Applied Mechanics and Materials 543-547 (March 2014): 3165–68. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3165.

Full text
Abstract:
In this paper, discusses the design and realization of large file asynchronous upload and Broken-point continuingly-transferring based on ASP.NET MVC. At the first, brief review the traditional upload method based on HTTP(Hypertext transfer protocol) protocol and ASP.NET(C#), point out the existed malpractices, while introduce the basic principles of asynchronous upload and broken-point continuingly-transferring, and in-depth analysis of the design and realization of the function of asynchronous upload and broken-point continuingly-transferring in ASP.NET MVC.
APA, Harvard, Vancouver, ISO, and other styles
10

Yi, Shi, Quan Liu, and Jing Song Li. "Design and Realization of Large File Asynchronous Upload and Broken-Point Continuingly-Transferring Based on ASP.NET MVC." Applied Mechanics and Materials 556-562 (May 2014): 5636–39. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5636.

Full text
Abstract:
In this paper, discusses the design and realization of large file asynchronous upload and Broken-point continuingly-transferring based on ASP.NET MVC. At the first, brief review the traditional upload method based on HTTP(Hypertext transfer protocol) protocol and ASP.NET(C#), point out the existed malpractices, while introduce the basic principles of asynchronous upload and broken-point continuingly-transferring, and in-depth analysis of the design and realization of the function of asynchronous upload and broken-point continuingly-transferring in ASP.NET MVC.
APA, Harvard, Vancouver, ISO, and other styles
11

Dempsey, B. J., and J. Herrin. "WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 39, no. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.

Full text
Abstract:
Abstract:An increasing number of clinical databases are being adapted to allow access through Internet protocols, particularly Hypertext Transfer Protocol (HTTP). The World Wide Web (WWW) provides a user-friendly, standardized, broadly distributed database interface; at the same time, it may also present a threat to the security and confidentiality of patient data. However, there is little empirical evidence concerning such threats. Using publicly available records we estimate the additional risk of security violations due to web-enabling a database. The evidence, though limited, suggests that the additional risk may be small relative to more traditional security threats.
APA, Harvard, Vancouver, ISO, and other styles
12

Peacock, Sylvia E. "Politics, Public Goods, and Corporate Nudging in the HTTP/2 Standardization Process." SAGE Open 10, no. 4 (October 2020): 215824402097161. http://dx.doi.org/10.1177/2158244020971611.

Full text
Abstract:
The goal is to map out some policy problems attached to using a club good approach instead of a public good approach to manage our internet protocols, specifically the HTTP (Hypertext Transfer Protocol). Behavioral and information economics theory are used to evaluate the standardization process of our current generation HTTP/2 (2.0). The HTTP update under scrutiny is a recently released HTTP/2 version based on Google’s SPDY, which introduces several company-specific and best practice applications, side by side. A content analysis of email discussions extracted from a publicly accessible IETF (Internet Engineering Task Force) email server shows how the club good approach of the working group leads to an underperformance in the outcomes of the standardization process. An important conclusion is that in some areas of the IETF, standardization activities may need to include public consultations, crowdsourced volunteers, or an official call for public participation to increase public oversight and more democratically manage our intangible public goods.
APA, Harvard, Vancouver, ISO, and other styles
13

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO, and other styles
14

Ady Kusuma, I. Gusti Ngurah. "PERANCANGAN SIMPLE STATELESS AUTENTIKASI DAN OTORISASI LAYANAN REST-API BERBASIS PROTOKOL HTTP." Jurnal Manajemen Informatika dan Sistem Informasi 4, no. 1 (January 22, 2021): 78. http://dx.doi.org/10.36595/misi.v4i1.325.

Full text
Abstract:
Arsitektur Microservice merupakan arsitektur pembangunan sistem yang sering digunakan saat ini. Konsepnya adalah memisahkan komponen program / fungsionalitas ke dalam aplikasi yang berbeda. Antar komponen menggunakan protokol Hypertext Transfer Protocol (HTTP) untuk berkomunikasi karena HTTP mendukung multiplatform layaknya sebuah website ditambah lagi munculnya skema REST API. REST API memungkinkan pengguna dan layanan untuk bertukar data antar platform. Permasalahan yang muncul berasal dari semua komunikasi pada protokol HTTP bersifat stateless, yang dimana setiap permintaan yang diterima akan dijalankan secara independen. Termasuk apakah klien sebelumnya sudah diautentikasi atau belum. Hal ini akan rentan terhadap penyusup yang belum terotentikasi sehingga tidak dapat dipastikan otoritasnya dalam mengakses suatu fungsi. Berdasarkan permasalahan tersebut, diperlukan skema otentikasi dan otorisasi yang dapat mengakomodasi skema layanan mikro. Metode yang dapat digunakan adalah dengan pemanfaatan kode otorisasi yang bersifat unik yang ditempelkan pada setiap permintaan layanan yang divalidasi oleh sebuah server independent. Alur dari skemanya digambarkan menggunakan sequence diagram dan didukung dengan konseptual database. Penelitian ini menghasilkan sebuah rancangan metode autentikasi dan otorisasi sederhana yang dapat digunakan sebagai alternatif kemanan pada arsitektur microservice
APA, Harvard, Vancouver, ISO, and other styles
15

Akanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (June 11, 2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets. However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS. Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability. This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.89%, 99.89%, 99.95%, 0.18%, and 0.05% respectively. Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented. This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.
APA, Harvard, Vancouver, ISO, and other styles
16

Vitria, Rikki, Ratna Dewi, and Ariq Naufal. "ANALYSIS OF DATA COMMUNICATION BETWEEN ANDROID APPLICATIONS AND WEB SERVER." JURNAL INTEGRASI 11, no. 2 (October 17, 2019): 91–96. http://dx.doi.org/10.30871/ji.v11i2.1654.

Full text
Abstract:
Aplikasi android sudah banyak diterapkan dalam berbagai bidang, seperti dalam bidang pendidikan, kesehatan, perbankan, transportasi dan yang lainnya. Aplikasi ini banyak digunakan untuk kemudahan untuk mendapatkan informasi. Pada penelitian ini Aplikasi Android digunakan untuk informasi keberadaan dosen. Aplikasi digunakan untuk memudahkan sesorang untuk mengetahui keberadaan dari dosen yang ingin mereka cari. Tujuan dari penelitian ini adalah untuk menganalisa komunikasi data antara aplikasi android dan web server. Analisa komunikasi data ini menggunakan aplikasi wireshark. Hasil penelitian ini menunjukkan informasi pada masing-masing lapisan Open System Interconnection (OSI) ketika terjadi komunikasi antara aplikasi android dengan web server. Perbandingan komunikasi data menggunakan Hypertext Transfer Protocol (HTTP) dan HTTPS juga dilakukan. Hasil studi ini menunjukkan data-data yang dikirimkan baik dari aplikasi android maupun webserver dapat terbaca dengan mudah ketika yang digunakan HTTP, akan tetapi ketika menggunakan HTTPS data tersebut tidak bisa terbaca lagi karena data-data tersebut sudah di enkripsi.
APA, Harvard, Vancouver, ISO, and other styles
17

Jaafar, Ghafar A., Shahidan M. Abdullah, and Saifuladli Ismail. "Review of Recent Detection Methods for HTTP DDoS Attack." Journal of Computer Networks and Communications 2019 (January 10, 2019): 1–10. http://dx.doi.org/10.1155/2019/1283472.

Full text
Abstract:
With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack.
APA, Harvard, Vancouver, ISO, and other styles
18

Ahmadzai, Abdul Shabir, Qurban Yazdani, and Adamu Abubakar. "Analysis of Business Intelligence Systems Transmission Session." Journal of Science and Technology 27, no. 1 (December 6, 2022): 16–28. http://dx.doi.org/10.20428/jst.v27i1.1984.

Full text
Abstract:
Information and Communication Technology (ICT) is the central part of Intelligent systems. Business Intelligence (BI) utilizes ICT resources and capabilities to enhance decision-making from the available information. One of the core components of ICT resources is the network. Hypertext Transfer Protocol (HTTP) is an application layer protocol in a network model responsible for handling "requests" in a transmission session. Transmission Control Protocol (TCP) establishes connections session and keeps track of the state of the communication session. Unfortunately, a request from a critical online transaction over TCP in a BI environment is bound to face some uncertainty. There is a lack of studies on the impact of communication over transmission sessions on BI operations. This paper presented an experimental evaluation of the BI transaction transmission session. Various transactions were performed to monitor and analyze the request made with HTTP over a TCP transmission session. Both the HTTP and TCP features for all transactions were captured. The finding indicates that time is highly associated with less traffic congestion and transaction overhead.
APA, Harvard, Vancouver, ISO, and other styles
19

Willoughby, Alexander A., Ayodele O. Soge, Muiz A. Adeleke, and Oluwaseyi A. Ilori. "An IoT-Based Home Automation and Weather Monitoring System." International Journal of Research and Innovation in Applied Science 07, no. 03 (2022): 26–29. http://dx.doi.org/10.51584/ijrias.2022.7302.

Full text
Abstract:
This paper reports an IoT-based home automation and weather monitoring system developed for remote control of household appliances and weather monitoring. The proposed system comprises a Wi-Fi enabled ESP32 microcontroller as the network gateway, a relay module, and a DHT11 sensor for monitoring temperature and humidity. The status of the household devices and the weather data are continuously collected and stored in a MySQL database, which is set up on the IoT platform. A user interface was created using two different protocols – HyperText Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT). The IoT-based home automation and weather monitoring system is designed to be low cost, user-friendly and can remotely control home appliances and monitor weather data over the internet.
APA, Harvard, Vancouver, ISO, and other styles
20

Maulana, M. Rizqi. "Detection of Attacks on Apache2 Web Server Using Genetic Algorithm Based On Jaro Winkler Algorithm." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 4, no. 1 (July 20, 2020): 185–92. http://dx.doi.org/10.31289/jite.v4i1.3873.

Full text
Abstract:
Web server is software that provides data services in the form of HTTP (Hypertext Transfer Protocol) requests and responses in the form of HTML documents (Hypertext Markup Language) with the aim of managing data in the form of text files, images, videos and files. But in managing large amounts of data, good security monitoring is needed so that the data stored on the web server is not easily hacked. To protect the web server from hackers need an application to detect activities that are considered suspicious or possible hacking activities. By utilizing logs from a web server that is processed using the Jaro Winkler algorithm to see hacking attempts that produce a matrix and hacking activity reports to the admin. Thus the web server admin can see suspicious activity on the web server directly.Keywords: Web Server, Jaro Winkler Algorithm.
APA, Harvard, Vancouver, ISO, and other styles
21

ANSARI, SALIM G., PAOLO GIOMMI, and ALBERTO MICOL. "ESIS ON THE WORLD WIDE WEB." International Journal of Modern Physics C 05, no. 05 (October 1994): 805–9. http://dx.doi.org/10.1142/s0129183194000921.

Full text
Abstract:
On 3rd November, 1993, ESIS announced its Homepage on the World Wide Web (WWW) to the user community. Ever since then, ESIS has steadily increased its Web support to the astronomical community to include a bibliographic service, the ESIS catalogue documentation and the ESIS Data Browser. More functionality will be added in the near future. All these services share a common ESIS structure that is used by other ESIS user paradigms such as the ESIS Graphical User Interface (Giommi and Ansari, 1993), and the ESIS Command Line Interface. A forms-based paradigm, each ESIS-Web application interfaces to the hypertext transfer protocol (http) translating queries from/to the hypertext markup language (html) format understood by the NCSA Mosaic interface. In this paper, we discuss the ESIS system and show how each ESIS service works on the World Wide Web client.
APA, Harvard, Vancouver, ISO, and other styles
22

Jia, Xi, and Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer." Security and Communication Networks 2022 (August 24, 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.

Full text
Abstract:
Deep packet inspection (DPI) is widely used in detecting abnormal traffic and suspicious activities in networks. With the growing popularity of secure hypertext transfer protocol (HyperText Transfer Protocol over Secure Socket Layer, HTTPS), inspecting the encrypted traffic is necessary. The traditional decryption-and-then-encryption method has the drawback of privacy leaking. Decrypting encrypted packets for inspection violates the confidentiality goal of HTTPS. Now, people are faced with a dilemma: choosing between the middlebox’s ability to perform detection functions and protecting the privacy of their communications. We propose OTEPI, a system that simultaneously provides both of those properties. The approach of OTEPI is to perform the deep packet inspection directly on the encrypted traffic. Unlike machine and deep learning methods that can only classify traffic, OTEPI is able to accurately identify which detection rule was matched by the encrypted packet. It can facilitate network managers to manage their networks at a finer granularity. OTEPI achieves the function through a new protocol and new encryption schemes. Compared with previous works, our approach achieves rule encryption with oblivious transfer (OT), which allows our work to achieve a better balance between communication traffic consumption and computational resource consumption. And our design of Oblivious Transfer and the use of Natural Language Processing tools make OTEPI outstanding in terms of computational consumption.
APA, Harvard, Vancouver, ISO, and other styles
23

Park, Jiwoo, Minsu Kim, and Kwangsue Chung. "Buffer-based rate adaptation scheme for HTTP video streaming with consistent quality." Computer Science and Information Systems, no. 00 (2021): 21. http://dx.doi.org/10.2298/csis200820021p.

Full text
Abstract:
Recently, HyperText Transfer Protocol (HTTP) based adaptive streaming (HAS) has been proposed as a solution for efficient use of network resources. HAS performs rate adaptation that adjusts the video quality according to the network conditions. The conventional approaches for rate adaptation involve accurately estimating the available bandwidth or exploiting the playback buffer in HAS clients rather than estimating the network bandwidth. In this paper, we present a playback buffer model for rate adaptation and propose a new buffer-based rate adaptation scheme. First, we model the playback buffer as a queueing system that stores video segments. The proposed scheme selects the next video bitrate that minimizes the difference between the current buffer occupancy and the expected value from the playback buffer model. The evaluation results indicated that the proposed scheme achieves higher video quality than conventional algorithms and can cope with various environments without the tuning of the configuration parameters.
APA, Harvard, Vancouver, ISO, and other styles
24

Akasiadis, Charilaos, Vassilis Pitsilis, and Constantine D. Spyropoulos. "A Multi-Protocol IoT Platform Based on Open-Source Frameworks." Sensors 19, no. 19 (September 28, 2019): 4217. http://dx.doi.org/10.3390/s19194217.

Full text
Abstract:
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
APA, Harvard, Vancouver, ISO, and other styles
25

Indrajaya, Muh Aristo, Rizana Fauzi, Hajra Rasmita Ngemba, and Syaiful Hendra. "Penerapan dan Analisis Perbandingan Metode Antrian Jaringan (Network Queuing) Pada Jaringan Local Area Network Fakultas Teknik Universitas Tadulako." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 9, no. 1 (April 11, 2022): 79–86. http://dx.doi.org/10.33019/jurnalecotipe.v9i1.2921.

Full text
Abstract:
Membanjirnya konten yang diakses oleh civitas akademika di lingkungan kampus menuntut kinerja jaringan yang handal, terutama dalam menangani beban trafik data yang tinggi. Seringkali yang terjadi adalah ketika beban trafik data meningkat, kualitas layanan data yang dapat diberikan akan menurun. Hal ini tentu saja berdampak buruk, terutama layanan komunikasi yang membutuhkan kehandalan tinggi seperti layanan VoIP atau video conference. Untuk mengatasi hal tersebut maka perlu diterapkan suatu metode antrian data yang mampu mengatur distribusi beban lalu lintas data secara efektif dan mampu bekerja dengan baik di segala kondisi beban lalu lintas. Penelitian ini akan mensimulasikan jaringan komputer lokal yang berada di Fakultas Teknik Universitas Tadulako menggunakan tiga jenis metode antrian trafik data yaitu First In First Out (FIFO), Priorityt Queuing (PQ), dan Weighted Fair Queuing (WFQ) dimana tiga protokol akan diuji untuk mengelola tiga jenis layanan yang sering digunakan, antara lain layanan konferensi video, Voice Over Internet Protocol (VoIP), dan Hypertext Transfer Protocol (HTTP) dalam kondisi beban trafik tinggi. Hasil penelitian ini menunjukkan bahwa metode PQ memiliki keunggulan dalam menangani beban trafik data yang tinggi.
APA, Harvard, Vancouver, ISO, and other styles
26

Indrajaya, Muh Aristo, Rizana Fauzi, Hajra Rasmita Ngemba, and Syaiful Hendra. "Penerapan dan Analisis Perbandingan Metode Antrian Jaringan (Network Queuing) Pada Jaringan Local Area Network Fakultas Teknik Universitas Tadulako." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 9, no. 1 (April 11, 2022): 79–86. http://dx.doi.org/10.33019/jurnalecotipe.v9i1.2921.

Full text
Abstract:
Membanjirnya konten yang diakses oleh civitas akademika di lingkungan kampus menuntut kinerja jaringan yang handal, terutama dalam menangani beban trafik data yang tinggi. Seringkali yang terjadi adalah ketika beban trafik data meningkat, kualitas layanan data yang dapat diberikan akan menurun. Hal ini tentu saja berdampak buruk, terutama layanan komunikasi yang membutuhkan kehandalan tinggi seperti layanan VoIP atau video conference. Untuk mengatasi hal tersebut maka perlu diterapkan suatu metode antrian data yang mampu mengatur distribusi beban lalu lintas data secara efektif dan mampu bekerja dengan baik di segala kondisi beban lalu lintas. Penelitian ini akan mensimulasikan jaringan komputer lokal yang berada di Fakultas Teknik Universitas Tadulako menggunakan tiga jenis metode antrian trafik data yaitu First In First Out (FIFO), Priorityt Queuing (PQ), dan Weighted Fair Queuing (WFQ) dimana tiga protokol akan diuji untuk mengelola tiga jenis layanan yang sering digunakan, antara lain layanan konferensi video, Voice Over Internet Protocol (VoIP), dan Hypertext Transfer Protocol (HTTP) dalam kondisi beban trafik tinggi. Hasil penelitian ini menunjukkan bahwa metode PQ memiliki keunggulan dalam menangani beban trafik data yang tinggi.
APA, Harvard, Vancouver, ISO, and other styles
27

Et al., Abed. "Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms." Baghdad Science Journal 16, no. 1 (March 11, 2019): 0130. http://dx.doi.org/10.21123/bsj.2019.16.1.0130.

Full text
Abstract:
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual resource, by combining two types of algorithms: dynamic algorithm (adaptive firefly) and static algorithm (weighted round robin). The results show improvement in resource utilization, increased productivity, and reduced response time.
APA, Harvard, Vancouver, ISO, and other styles
28

Chaubet, Allan, George Henrique de Oliveira, Gustavo Valeira, and Cristiano Akamine. "Practical tests with MMT and ROUTE/DASH on the transport layer of ATSC 3.0." SET INTERNATIONAL JOURNAL OF BROADCAST ENGINEERING 2020, no. 6 (August 1, 2020): 56–65. http://dx.doi.org/10.18580/setijbe.2020.5.

Full text
Abstract:
The development of new technologies allowed television systems to evolve over time. For the transport layer, the Movie Pictures Expert Group (MPEG) developed several standards to deliver multimedia content, including the MPEG-2 Transport Stream (TS), which has been widely explored for years. However, it was developed before the spread of the internet, which led to the interest in a new standard that could fulfill the needs from a connected world. One of these standards is the MPEG Multimedia Transport (MMT), which has inherited some features from the MPEG-2 TS, adapting them to be compatible with the Internet Protocol (IP). The broadband systems also needed a new standard compatible with Hypertext Transfer Protocol (HTTP), resulting in the development of the MPEG-Dynamic Adaptive Streaming over HTTP (DASH). To deliver DASH on broadcast channels, it was combined with the Real-time Object delivery over Unidirectional Transport (ROUTE) protocol. The Advanced Television Systems Committee 3.0 (ATSC 3.0) adopted many technologies to attend the requirements for the next generation of television systems, including both MMT and ROUTE/DASH. This paper presents a historic background of these delivery methods, as well as a brief technical review, focusing on a practical setup to test the methods mentioned, analyzing the differences and similarities of their properties.
APA, Harvard, Vancouver, ISO, and other styles
29

Madani, Krisna, Rahmi Hidayati, and Uray Ristian. "Sistem Update Firmware Perangkat IoT Menggunakan Teknik OTA Berbasis HTTP." JURIKOM (Jurnal Riset Komputer) 9, no. 4 (August 30, 2022): 1160. http://dx.doi.org/10.30865/jurikom.v9i4.4685.

Full text
Abstract:
Firmware is software that resembles an operating system and embedded in the hardware. On Internet of Things (IoT) devices, the already installed firmware will not be updated for the specified time or will not even be updated at all. This is because the firmware is considered a system whose needs and functions do not need to be changed. However, in reality the firmware that is already installed and is being run definitely needs a change. The update process generally also uses conventional methods, namely by connecting devices on a computer using a cable. This method is of course not effective and efficient to do, especially if you have many devices installed and running. Therefore, in this study, an update system was created to update devices using the internet network. The update system built on this study using Over The Air (OTA) techniques and Hypertext Transfer Protocol (HTTP). In testing the update process with 3 IoT devices simultaneously, the average time needed by device 1, device 2 and device 3 is 43 seconds, 44 seconds and 45 seconds. In the QoS analysis carried out, the results obtained throughput of 100% (very good), packet loss of 0% (very good), average delay of 93,931ms (very good) and jitter of 98,948ms (medium) on the network used for updating
APA, Harvard, Vancouver, ISO, and other styles
30

Warsito, Ary Budi, Ajeng Ananda, and Dian Triyanjaya. "Penerapan Data JSON Untuk Mendukung Pengembangan Aplikasi Pada Perguruan Tinggi Dengan Teknik Restfull Dan Web Service." Technomedia Journal 2, no. 1 (August 27, 2017): 26–36. http://dx.doi.org/10.33050/tmj.v2i1.313.

Full text
Abstract:
Data adalah salah satu komponen penting dalam sebuah aplikasi. Di perlukan sebuah database untuk menyimpan data dalam jumlah besar sebagai media pendistribusian data dari server ke client. Banyak nya aplikasi pada sebuah perguruan tinggi membutuhkan bandwidth yang besar untuk keperluan pengambilan data untuk di sajikan sebagai sistem informasi yang sangat berguna untuk berbagai kepentingan. Web Service sangat berperan penting pada kasus ini dimana, client yang seharusnya mengakses melalui jalur yang berbeda ke database akan di alihkan ke dalam web service dalam proses pengambilan data untuk meringankan kerja database yang harus berulang ulang melayani permintaan dari client. Arsitektur REST, yang pada dasarnya di oprasikan melalui HTTP (Hypertext Transfer Protocol), yang mengacu pada proses pembacaan halaman web tertentu yang berisi sebuah file JSON. File inilah yang menguraikan dan memuat konten yang hendak disajikan kepada konsumen. Setelah melalui sebuah proses definisi tertentu, konsumen akan bisa mengakses antarmuka aplikasi yang tersedia. Kata Kunci : Database, Web Service, permintaan Data is one of the important components in an application. In need of a database to store large amounts of data as a medium for the distribution of data from the server to the client. Many of its application on a college requires a large bandwidth for data retrieval purposes toserved as an information system that is very useful for various purposes. Web Service is very important in this case where, clients should access through different pathways to the database will switch to the web service in the data collection process to alleviate the database that should be repeated requests from the client. REST architecture, which is basically in oprasik an via HTTP (Hypertext Transfer Protocol), which refers to the process of reading a specific web page that contains a JSON file. It is this file that describes and includes the content to be presented to consumers. After going through a process of certain definitions, consumers will be able to access the application interface is available. Keywords: Database, Web Service, request
APA, Harvard, Vancouver, ISO, and other styles
31

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Full text
Abstract:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as the attack parameter. Recently, a new type of XML-based Denial-of-Service (XDoS) attacks has surfaced, which targets the web services. The purpose of these attacks is to consume the system resources by sending SOAP requests that contain malicious XML content. Unfortunately, these malicious requests go undetected underneath the network or transportation layers of the Transfer Control Protocol/Internet Protocol (TCP/IP), as they appear to be legitimate packets.In this paper, a middleware tool is proposed to provide real time detection and prevention of XDoS and HTTP flooding attacks in web service. This tool focuses on the attacks on the two layers of the Open System Interconnection (OSI) model, which are to detect and prevent XDoS attacks on the application layer and prevent flooding attacks at the Network layer.The rule-based approach is used to classify requests either as normal or malicious,in order to detect the XDoS attacks. The experimental results from the middleware tool have demonstrated that the rule-based technique has efficiently detected and prevented theattacks of XDoS and HTTP flooding attacks such as the oversized payload, coercive parsing and XML external entities close to real-time such as 0.006s over the web services. The middleware tool provides close to 100% service availability to normal request, hence protecting the web service against the attacks of XDoS and distributed XDoS (DXDoS).\
APA, Harvard, Vancouver, ISO, and other styles
32

Pozo, Alejandro, Álvaro Alonso, and Joaquín Salvachúa. "Evaluation of an IoT Application-Scoped Access Control Model over a Publish/Subscribe Architecture Based on FIWARE." Sensors 20, no. 15 (August 4, 2020): 4341. http://dx.doi.org/10.3390/s20154341.

Full text
Abstract:
The Internet of Things (IoT) brings plenty of opportunities to enhance society’s activities, from improving a factory’s production chain to facilitating people’s household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices’ resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system’s performance.
APA, Harvard, Vancouver, ISO, and other styles
33

Khudhur, Dhuha Dheyaa, and Muayad Sadik Croock. "Developed security and privacy algorithms for cyber physical system." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5379. http://dx.doi.org/10.11591/ijece.v11i6.pp5379-5389.

Full text
Abstract:
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
APA, Harvard, Vancouver, ISO, and other styles
34

Daud, Guiamarudin S., and Mohaymin A. Maguid. "Secured Cotabato City State Polytechnic College Web-Based Student Clearance System." Randwick International of Social Science Journal 3, no. 1 (January 16, 2022): 61–66. http://dx.doi.org/10.47175/rissj.v3i1.372.

Full text
Abstract:
The study describes the Secured CCSPC Web-Based Student Clearance System's use and predicted effects. Hypertext Transfer Protocol (HTTP), Hypertext Preprocessor (PHP), Sublime editor, Bootstrap, and MySQL as the database tool were used to create the clearance system. This system includes two-factor authentication for students and designated offices. In the clearance system, a Secure Socket Layer (SSL) for data transit, as well as a software firewall and anti-SQL Injection attack, were offered and implemented. The CCSPC Portal was linked to the web-based student clearance system and Web API, with Web API acting as a bridge between SIMone and the clearance system. SIMone's role is to offer just a limited amount of information on the web-based clearing, such as designated office operations, account status from the Cashier, and student profiles from the Registrar. Students and the approved offices in charge of signing the student clearance include the Graduating Class Association (GCA) Treasurer, Laboratory Custodian, Cashier, Librarian, Academic Related Services (ARS), SPEED Director, Department Chairperson, College Dean, and the Registrar. The ISO 9126-1 International Standard Tool for Software Evaluation, on the other hand, was utilized in the CCSPC beneficiaries' surveys to test the system's effectiveness and reliability.
APA, Harvard, Vancouver, ISO, and other styles
35

Deroussi, Anass, Abdessalam Ait Madi, Imam Alihamidi, Lalla Amina Charaf, Mohammed Saber, Anass Erraoui, and Adnane Addaim. "A novel autonomous remote system applied in agriculture using transmission control protocol." International Journal of Reconfigurable and Embedded Systems (IJRES) 11, no. 1 (March 1, 2022): 1. http://dx.doi.org/10.11591/ijres.v11.i1.pp1-12.

Full text
Abstract:
<span lang="EN-US">An internet of things (IoT) irrigation system is challenged by several issues, such as cost, energy consumption, and data storage. This paper proposes a novel energy-efficient, cost-effective IoT system called "NewAgriCom" to monitor agricultural field water flow. NewAgriCom works with an embedded energy harvesting system, is an autonomous remote supervisory control and data acquisition (SCADA) based on a general packet radio service (GPRS) cellular network that effectively communicates irrigation field data to the Node.js server using SIM808 EVBV3.2 modem. In javascript object notation (JSON) format, data is transmitted over the hypertext transfer protocol (HTTP) protocol to the MySQL database. Then data are transferred to the proposed IoT platform, which gives us a hand to control actuators, visualise, store and download the data. NewAgriCom can significantly reduce water consumption. It can set a schedule to control water automatically at specific times in various modes, including normal, light, and deep sleep modes. It regularly provides the location, time, signal strength, and the state of actuators with the identifier of every device remotely on the IoT Platform.</span><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
36

Suthendra, Juan Andrew, and Magdalena Ariance Ineke Pakereng. "Implementation of Microservices Architecture on E-Commerce Web Service." ComTech: Computer, Mathematics and Engineering Applications 11, no. 2 (December 16, 2020): 89–95. http://dx.doi.org/10.21512/comtech.v11i2.6453.

Full text
Abstract:
The research aimed to make e-commerce web services using a microservices architecture. Web service was built using Representational State Transfer Protocol (REST) with Hypertext Transfer Protocol (HTTP) method and JavaScript Object Notation (JSON) response format. Meanwhile, the microservices architecture was developed using Domain-driven Design (DDD) approach. The research began by analyzing e-commerce business processes and was modeled using Unified Modeling Language (UML) based on business process analysis. Next, the bounded context was used to make a small responsible service for a function. The Programming language used to make the system was Go programming language with Go-kit tool and apply database-per-service pattern for data management. The system also applied the concept of containerization using Docker as the container platform and using API Gateway to manage each endpoint. Last, the evaluation process was carried out using the Postman application by testing each endpoint based on the white-box testing method. Based on the results of the evaluation process, the e-commerce web service can work as expected. The results also show that the system has a high level of resilience. It means that the system has a low level of dependencies between services and adapts to future changes.
APA, Harvard, Vancouver, ISO, and other styles
37

Nur, M. Adnan, and Nurilmiyanti Wardhani. "Mobile Application Bimbingan Tugas Akhir Mahasiswa Pada Stmik Handayani Makassar Sebagai Media Pendukung Pembelajaran Daring." Jurnal Fokus Elektroda : Energi Listrik, Telekomunikasi, Komputer, Elektronika dan Kendali) 6, no. 4 (November 30, 2021): 181. http://dx.doi.org/10.33772/jfe.v6i4.20608.

Full text
Abstract:
Penelitian ini bertujuan untuk mengembangkan serta menguji akses antara mobile application yang dibangun dengan framework apache cordova dan web server apache melalui hypertext transfer protocol (HTTP) menggunakan Object XHR dari Javascript. Aplikasi yang dibangun menggunakan studi kasus bimbingan tugas akhir pada STMIK Handayani Makassar. Penelitian ini dilaksanakan menggunakan metode research and development (R & D) yang terdiri atas beberapa tahapan yaitu tahap analisis meliputi tinjauan terhadap penggunaan framework apache cordova dan web service, tahap perancangan menggunakan unified modelling language, tahap pembuatan aplikasi dan tahap pengujian menggunakan metode blackbox. Hasil penelitian menunjukkan bahwa seluruh fungsi aplikasi dapat mengakses data dari web service. Terdapat perbedaan waktu request data server ketika aplikasi dijalankan pada emulator (google chrome) dan aplikasi yang diinstalasi langsung pada perangkat android dengan sistem operasi MIUI OS dan ColorOS. Request data server dengan emulator lebih cepat dengan perbedaan waktu yang tidak begitu signifikan yaitu rata-rata selisih waktu hanya 41,76 ms untuk MIUI OS dan 46,52 ms untuk ColorOS.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Hongxian, Yanli Zeng, Xiaoting Guo, Honghe Chen, Guanlin Liu, and Qingya Wang. "Data Analysis System Based on REST Architecture for In-Pipe Inspection." Journal of Physics: Conference Series 2337, no. 1 (September 1, 2022): 012007. http://dx.doi.org/10.1088/1742-6596/2337/1/012007.

Full text
Abstract:
Abstract To solve the problems of high maintenance cost, low reusability and poor scalability of in-pipe inspection data analysis system, an in-pipe inspection data analysis system based on REST (Representational State Transfer) architecture is designed and implemented. A multilayer service-oriented architecture based on REST is designed, which decouples the functions of client, middleware, server and data storage to improve the maintainability of the software. REST APIs (Application Program Interfaces) based on HTTP (Hypertext Transfer Protocol) are designed, which encapsulate the core functions such as data analysis, signal processing, automatic identification and quantization into language and platform independent services to meet the needs of multiuser, cross platform and online data analysis. An adaptation method of in-line inspection tool based on metadata is designed, which abstracts the in-line inspection tool into a separate metadata file and decouples it from the client and server programs to improve the scalability of the software. Practice has proved the architecture can improve the maintainability, reusability and scalability of the software, and provide a basis for constructing online in-pipe inspection data analysis service based cloud.
APA, Harvard, Vancouver, ISO, and other styles
39

Priadi, Doni. "Measurement of Quality of Service (QoS) in File Sharing Applications with the Android-Based Client Server Method." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 6, no. 1 (May 7, 2018): 39–49. http://dx.doi.org/10.33795/jartel.v6i1.144.

Full text
Abstract:
In this research, an application is made that can make it easier to transfer files or data by utilizing a wifi connection on a network and then transferring files via a web browser using Hypertext Transfer Protocol (HTTP) server technology which will be installed on an Android-based smartphone. After that, it is necessary to measure network performance to determine the quality of the network in accessing the application. The measured performance is Quality of Service (QoS), which is a parameter that shows the quality of data packets on the network. Based on the results of measurements carried out by connecting the server to the AH building network and the client accessing from the AI ??building network at the State Polytechnic of Malang, when compared to the ITU-T standard, the application delay is in the very good category, jitter is in the bad category, the throughput value depends on the size. data sent. For packet loss, it is in the very good category. Meanwhile, based on measurements made using the Apache benchmark software, out of the 1000 requests that were tested, none of them failed or failed.
APA, Harvard, Vancouver, ISO, and other styles
40

Revay, Lukas, and Ivan Zelinka. "Swarm Inteligence in Virtual Environment." Journal of Advanced Engineering and Computation 3, no. 2 (June 30, 2019): 415. http://dx.doi.org/10.25073/jaec.201932.242.

Full text
Abstract:
To simulate some behavior of swarms, the malware was selected as a carrier of intelligence. This article describes the current solution which is fully virtual. This gives us a possibility to interfere environment and see how the improved malware will react. This common intention provides improvements related to docker images and also architectural that is related to code changes. Communication over network together with cooperation on particle level is a key part of this solution. Malware movements are the same as movements of swarm particles, which fully fit this requirement. Significance is also put on the swarming part, where the decision which swarms algorithm to utilize is crucial. The outcome from this work should be partly practical and theoretical related to environment setup, particles communication, movements and coordination which finally finishes in distributed denial of service (DDoS) coordinated attack via hypertext transfer protocol (HTTP) to some server. After this theoretical work, the practical simulation will be done to see if the swarm attack brings expected results. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.
APA, Harvard, Vancouver, ISO, and other styles
41

Varthis, Evagelos, Marios Poulos, Ilias Giarenis, and Sozon Papavlasopoulos. "A novel framework for delivering static search capabilities to large textual corpora directly on the Web domain: an implementation for Migne’s Patrologia Graeca." International Journal of Web Information Systems 17, no. 3 (May 19, 2021): 153–86. http://dx.doi.org/10.1108/ijwis-10-2020-0062.

Full text
Abstract:
Purpose This study aims to provide a system capable of static searching on a large number of unstructured texts directly on the Web domain while keeping costs to a minimum. The proposed framework is applied to the unstructured texts of Migne’s Patrologia Graeca (PG) collection, setting PG as an implementation example of the method. Design/methodology/approach The unstructured texts of PG have automatically transformed to a read-only not only Structured Query Language (NoSQL) database with a structure identical to that of a representational state transfer access point interface. The transformation makes it possible to execute queries and retrieve ranked results based on a specialized application of the extended Boolean model. Findings Using a specifically built Web-browser-based search tool, the user can quickly locate ranked relevant fragments of texts with the ability to navigate back and forth. The user can search using the initial part of words and by ignoring the diacritics of the Greek language. The performance of the search system is comparatively examined when different versions of hypertext transfer protocol (Http) are used for various network latencies and different modes of network connections. Queries using Http-2 have by far the best performance, compared to any of Http-1.1 modes. Originality/value The system is not limited to the case study of PG and has a generic application in the field of humanities. The expandability of the system in terms of semantic enrichment is feasible by taking into account synonyms and topics if they are available. The system’s main advantage is that it is totally static which implies important features such as simplicity, efficiency, fast response, portability, security and scalability.
APA, Harvard, Vancouver, ISO, and other styles
42

Mahzabin, Rahnuma, Fahim Hossain Sifat, Sadia Anjum, Al-Akhir Nayan, and Muhammad Golam Kibria. "Blockchain associated machine learning and IoT based hypoglycemia detection system with auto-injection feature." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (July 1, 2022): 447. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp447-455.

Full text
Abstract:
Hypoglycemia is an unpleasant phenomenon caused by low blood glucose. The disease can lead a person to death or a high level of body damage. <br /> To avoid significant damage, patients need sugar. The research aims at implementing an automatic system to detect hypoglycemia and perform automatic sugar injections to save a life. Receiving the benefits of the internet of things (IoT), the sensor’s data was transferred using the hypertext transfer protocol (HTTP) protocol. To ensure the safety of health-related data, blockchain technology was utilized. The glucose sensor and smartwatch data were processed via Fog and sent to the cloud. A Random Forest algorithm was proposed and utilized to decide hypoglycemic events. When the hypoglycemic event was detected, the system sent a notification to the mobile application and auto-injection device to push the condensed sugar into the victim’s body. XGBoost, k-nearest neighbors (KNN), support vector machine (SVM), and decision tree were implemented to compare the proposed model's performance. The random forest performed 0.942 testing accuracy, better than other models in detecting hypoglycemic events. The system’s performance was measured in several conditions, and satisfactory results were achieved. The system can benefit hypoglycemia patients to survive this disease.
APA, Harvard, Vancouver, ISO, and other styles
43

Ciuffoletti, Augusto. "Design of an Open Remote Electrocardiogram (ECG) Service." Future Internet 11, no. 4 (April 24, 2019): 101. http://dx.doi.org/10.3390/fi11040101.

Full text
Abstract:
Currently, the deployment of services for real-time delivery of an electrocardiogram to a remote site has a cost that prevents its widespread diffusion, which would contribute to saving lives with prevention, assistance and rescue efficiency. To fill this gap, we introduce the design of a remote electrocardiogram service that privileges open, low-cost options. The architecture is based on the HyperText Transfer Protocol (HTTP) and uses commercial off-the-shelf devices to implement the sensor on the patient’s side. The doctor uses a laptop browser to display the tracing, and a cloud computing instance connects the two using WebSockets. A prototype is built to evaluate overall performance, the power consumption of the patient’s side device, and the quality of rendering on doctor’s browser. The patient’s sensor prototype device is portable, and its power consumption is below 1 Watt, thus allowing a daylong autonomy when operated on batteries. Its cost is below 50$, and the required hardware is commercially available. The whole design is ready for on-field evaluation, and it is available in a public repository.
APA, Harvard, Vancouver, ISO, and other styles
44

Ala-Laurinaho, Riku, Juuso Autiosalo, and Kari Tammi. "Open Sensor Manager for IIoT." Journal of Sensor and Actuator Networks 9, no. 2 (June 19, 2020): 30. http://dx.doi.org/10.3390/jsan9020030.

Full text
Abstract:
Data collection in an industrial environment enables several benefits: processes and machinery can be monitored; the performance can be optimized; and the machinery can be proactively maintained. To collect data from machines or production lines, numerous sensors are required, which necessitates a management system. The management of constrained IoT devices such as sensor nodes is extensively studied. However, the previous studies focused only on the remote software updating or configuration of sensor nodes. This paper presents a holistic Open Sensor Manager (OSEMA), which addresses also generating software for different sensor models based on the configuration. In addition, it offers a user-friendly web interface, as well as a REST API (Representational State Transfer Application Programming Interface) for the management. The manager is built with the Django web framework, and sensor nodes rely on ESP32-based microcontrollers. OSEMA enables secure remote software updates of sensor nodes via encryption and hash-based message authentication code. The collected data can be transmitted using the Hypertext Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT). The use of OSEMA is demonstrated in an industrial domain with applications estimating the usage roughness of an overhead crane and tracking its location. OSEMA enables retrofitting different sensors to existing machinery and processes, allowing additional data collection.
APA, Harvard, Vancouver, ISO, and other styles
45

Ohe, K., S. Kaihara, and T. Kiuchi. "Using a WWW-based Mail User Agent for Secure Electronic Mail Service for Health Care Users." Methods of Information in Medicine 37, no. 03 (July 1998): 247–53. http://dx.doi.org/10.1055/s-0038-1634539.

Full text
Abstract:
AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.
APA, Harvard, Vancouver, ISO, and other styles
46

Maya Kadarina, Trie. "Otomatisasi Perekaman Foto Intraoral Gigi untuk Rekam Medis Elektronik Menggunakan Internet of Things." Jurnal Teknologi Elektro 11, no. 1 (February 1, 2020): 56. http://dx.doi.org/10.22441/jte.2020.v11i1.008.

Full text
Abstract:
Salah satu manfaat dari implementasi Internet of Things (IoT) dalam dunia kesehatan adalah otomatisasi pengumpulan data dari perangkat medis yang bertujuan untuk mengurangi peran manusia sehingga dapat meminimalisir kesalahan input data dan meningkatkan kualitas data yang dihasilkan. Dalam praktik kedokteran gigi, seringkali dibutuhkan penggunaan kamera yang mencakup rongga mulut pasien (intraoral). Akan tetapi, kamera intraoral yang ada saat ini umumnya menggunakan kabel yang dapat dihubungkan ke komputer. Adapula yang menggunakan kartu memori sebagai penyimpan sementara sebelum dipindahkan ke komputer tempat menyimpan rekam medis elektronik (RME). Penggunaan kabel atau kartu memori tersebut memunculkan keterbatasan, seperti permasalahan instalasi atau efisiensi waktu perekaman. Untuk itu dalam penelitian ini sebuah perangkat medis dibuat dengan memanfaatkan Raspberry Pi dan koneksi internet nirkabel sehingga gambar yang direkam melalui kamera intraoral tersebut dapat langsung dikirim ke server penyimpan data medis tanpa harus terhubung secara fisik dan berkas yang tersimpan dapat langsung dikelola oleh aplikasi server. Aplikasi pada Raspberry Pi mengolah citra dan menyeleksi foto intraoral gigi dengan metode histogram correlation untuk dikirim ke server menggunakan Hypertext Transfer Protocol (HTTP). Hasil pengujian sistem menujukkan bahwa sistem telah berhasil mengambil, memilah dan mengirim gambar dari kamera intraoral ke server dengan waktu respon antara 1,5 sampai 1,9 detik.
APA, Harvard, Vancouver, ISO, and other styles
47

Akinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (July 21, 2022): 2536. http://dx.doi.org/10.3390/math10142536.

Full text
Abstract:
To provide a low-cost methodical way for inference-driven insight into the assessment of SDN operations, a behavioral study of key network parameters that predicate the proper functioning and performance of software-defined networks (SDNs) is presented to characterize their alterations or variations, given various emulated SDN scenarios. It is standard practice to use simulation environments to investigate the performance characteristics of SDNs, quantitatively and qualitatively; hence, the use of emulated scenarios to typify the investigated SDN in this paper. The key parameters studied analytically are the jitter, response time and throughput of the SDN. These network parameters provide the most vital metrics in SDN operations according to literature, and they have been behaviorally studied in the following popular SDN states: normal operating condition without any incidents on the SDN, hypertext transfer protocol (HTTP) flooding, transmission control protocol (TCP) flooding, and user datagram protocol (UDP) flooding, when the SDN is subjected to a distributed denial-of-service (DDoS) attack. The behavioral study is implemented primarily via univariate and multivariate exploratory data analysis (EDA) to characterize and visualize the variations of the SDN parameters for each of the emulated scenarios, and linear regression-based analysis to draw inferences on the sensitivity of the SDN parameters to the emulated scenarios. Experimental results indicate that the SDN performance metrics (i.e., jitter, latency and throughput) vary as the SDN scenario changes given a DDoS attack on the SDN, and they are all sensitive to the respective attack scenarios with some level of interactions between them.
APA, Harvard, Vancouver, ISO, and other styles
48

Mihalkovich, Aleksejus, Eligijus Sakalauskas, and Kestutis Luksys. "Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem." Symmetry 12, no. 9 (August 20, 2020): 1389. http://dx.doi.org/10.3390/sym12091389.

Full text
Abstract:
In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial complete (NP-Complete) decisional problem. Recently there are no known quantum cryptanalysis algorithms effectively solving NP-Complete problems. So far, KEPs are widely used in secure communication channel creation, e.g., in hypertext transfer protocol secure (https://) and are based on traditional cryptographic primitives representing commutative cryptography. However, the security of these protocols does not rely on NP-Complete problems and hence, according to P. W. Shorr, they are vulnerable to quantum cryptanalysis. We use one of seven non-commuting groups of order 16 which is not isomorphic to any other group to define a platform group for a key exchange protocol based on previously considered matrix power function (MPF). By investigating basic properties on the group M16 and their implementation for our goals we fix the order of actions in MPF from left to right. Furthermore, we define a special form of the base matrix and separate templates for left and right power matrices. Using properties of the specified templates and Schaeffer criteria we prove that the security of the proposed key exchange relies on an NP-Complete decisional problem.
APA, Harvard, Vancouver, ISO, and other styles
49

Ashok Kumar, Ponnai Manogaran, Lakshmi Narayanan Arun Raj, B. Jyothi, Naglaa F. Soliman, Mohit Bajaj, and Walid El-Shafai. "A Novel Dynamic Bit Rate Analysis Technique for Adaptive Video Streaming over HTTP Support." Sensors 22, no. 23 (November 29, 2022): 9307. http://dx.doi.org/10.3390/s22239307.

Full text
Abstract:
Recently, there has been an increase in research interest in the seamless streaming of video on top of Hypertext Transfer Protocol (HTTP) in cellular networks (3G/4G). The main challenges involved are the variation in available bit rates on the Internet caused by resource sharing and the dynamic nature of wireless communication channels. State-of-the-art techniques, such as Dynamic Adaptive Streaming over HTTP (DASH), support the streaming of stored video, but they suffer from the challenge of live video content due to fluctuating bit rate in the network. In this work, a novel dynamic bit rate analysis technique is proposed to model client–server architecture using attention-based long short-term memory (A-LSTM) networks for solving the problem of smooth video streaming over HTTP networks. The proposed client system analyzes the bit rate dynamically, and a status report is sent to the server to adjust the ongoing session parameter. The server assesses the dynamics of the bit rate on the fly and calculates the status for each video sequence. The bit rate and buffer length are given as sequential inputs to LSTM to produce feature vectors. These feature vectors are given different weights to produce updated feature vectors. These updated feature vectors are given to multi-layer feed forward neural networks to predict six output class labels (144p, 240p, 360p, 480p, 720p, and 1080p). Finally, the proposed A-LSTM work is evaluated in real-time using a code division multiple access evolution-data optimized network (CDMA20001xEVDO Rev-A) with the help of an Internet dongle. Furthermore, the performance is analyzed with the full reference quality metric of streaming video to validate our proposed work. Experimental results also show an average improvement of 37.53% in peak signal-to-noise ratio (PSNR) and 5.7% in structural similarity (SSIM) index over the commonly used buffer-filling technique during the live streaming of video.
APA, Harvard, Vancouver, ISO, and other styles
50

Маслов, Н. Д., and Е. В. Попова. "INVESTIGATION OF THE WEB SERVICE ACCESS MODEL ASP.NET USING A PROXY ASSEMBLY ON THE EXAMPLE OF DEVELOPING A VIDEO RENTAL SERVICE." Южно-Сибирский научный вестник, no. 5(39) (October 31, 2021): 23–28. http://dx.doi.org/10.25699/sssb.2021.39.5.023.

Full text
Abstract:
В статье рассматривается исследование модели соединения Web-приложения и Web-службы напрямую и через прокси. Рассматривается кроссплатформенная высокопроизводительная среда ASP.NET. При разработке используется паттерн MVC. Формирование запросов реализуется с помощью архитектурного стиля REST и протокола передачи гипертекста HTTP. Строится модель взаимодействия Web-приложения и Web-службы. Целью данной работы является исследование данной модели взаимодействия напрямую и через прокси. Были разработаны Web-приложение, являющееся сервисом по аренде видеофильмов и Web-служба, функциональное назначение которой – работа с базой данных Web-сервера. Для реализации прокси сборки было создан отдельный проект. В настройках проекта были прописаны протокол передачи данных, хост API, порт и роутинги перенаправления запросов. Исследование модели проводилось с помощью программного обеспечения Postman и инструментов браузера. Результаты исследования показывают плюсы и минусы использования прокси при взаимодействии Web-приложения и Web-службы. Данная статья поможет заказчикам, разработчикам Web-приложений выбрать модель соединения Web-приложения и Web-службы, соответствующую решаемым задачам. The article considers the study of the connection model of a Web application and a Web service directly and through a proxy. A cross-platform high-performance environment is considered ASP.Net. The MVC pattern is used during development. Request generation is implemented using the REST architectural style and the HTTP hypertext transfer protocol. A model of interaction between a Web application and a Web service is being built. The purpose of this work is to study this model of interaction directly and through a proxy. A Web application was developed, which is a video rental service and a Web service, the functional purpose of which is to work with a Web server database. A separate project was created to implement the build proxy. In the project settings, the data transfer protocol, API host, port and request forwarding routings were registered. A previously developed service was used as an API. The model was studied using Postman software and browser tools. The results of the study show the pros and cons of using a proxy when interacting with a Web application and a Web service. This article will help customers, developers of Web applications to choose a model for connecting a Web application and a Web service that corresponds to the tasks being solved.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography