To see the other types of publications on this topic, follow the link: Server remoti.

Journal articles on the topic 'Server remoti'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Server remoti.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fukatsu, Tokihiro, and Masayuki Hirafuji. "Field Monitoring Using Sensor-Nodes with a Web Server." Journal of Robotics and Mechatronics 17, no. 2 (April 20, 2005): 164–72. http://dx.doi.org/10.20965/jrm.2005.p0164.

Full text
Abstract:
In order to realize field and environment monitoring over long periods, we propose remote monitoring that responds flexibly and dynamically to change. Field Servers are one of the small monitoring sensor-nodes having a Web server accessed via the Internet and using a wireless LAN to provide a high-speed transmission network differing from traditional sensor-nodes. Monitoring with Field Servers enables easy installation, monitoring field information, and remote operation in any field. By providing a Web server for all modules, we can treat them collectively via the Internet. To evaluate this monitoring, we managed numerous Field Servers in different countries using an agent program. Field experiments show the system is safe and effective for remote monitoring applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Sierra-Fernandez, Jose María, Olivia Florencias-Oliveros, Manuel Jesús Espinosa-Gavira, José Carlos Palomares-Salas, Agustín Agüera-Pérez, and Juan José González-de-la-Rosa. "Reconfigurable Web-Interface Remote Lab for Instrumentation and Electronic Learning." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 14 (November 30, 2020): 69. http://dx.doi.org/10.3991/ijoe.v16i14.16951.

Full text
Abstract:
Lab sessions in engineering education are designed to reinforce theoretical concepts. However, usually there are not enough time to reinforce all of them. Remote and virtual lab give students more time for reinforce those concepts. In particular, with remote labs, this can be done interacting with real lab equipment and specific configurations. This work proposes a flexible configuration for Remote Lab Sessions, based on some of 2019 most popular programming languages (Python and JavaScript). This configuration needed minimal network privileges, it is easily to scale and reconfigure. Its structure is based on a unique Reception-Server (which hosts User database, and Time Shift Manager, it is accessible from The Internet, and connect Users with Instruments-Servers) and some Instrument-Servers (which manage hardware connection and host experiences). Users always connect to Reception-Server, and book a shift for an experience. During the time range associate to that shift, User is internally forwarded to Instrument-Server associated with selected experience, so User is still connected to Reception-Serer. In this way, Reception-Server acts as a firewall, protecting Instrument-Servers, which never are open to The Internet. A triple evaluation system is implemented, User session logging and auto-evaluation (objectives accomplished) a knowledge test and an interaction survey. An experience is implemented, controlling a DC source using Standard Commands for Programmable Instruments.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Wei Chen. "A New Remote User Authentication Scheme on Three Dimensions." Advanced Materials Research 846-847 (November 2013): 1707–10. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1707.

Full text
Abstract:
The authors present a new remote user authentication scheme on three dimensions for multi-server environments. The merits include: the scheme can be used in multi-server environments; the system does not need to maintain any verification table; the users who have registered with various servers do not need to remember different login passwords for each; the ability to choose passwords freely and change them offline; mutual authentication is provided between the user and the remote system; a session key agreed by the user and the remote system is generated in every session. Furthermore, we propose a specific Access Right (AR). The AR means the legal users have different level of authorization based on which server in the multi-server environment in used.
APA, Harvard, Vancouver, ISO, and other styles
4

Tao, Ling Yang, Ling Song He, Jun Jiang Zhu, and Chang Fan Zhang. "A Remote Monitoring System of Three-Client/Server Architecture." Advanced Materials Research 718-720 (July 2013): 675–80. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.675.

Full text
Abstract:
This paper proposes a remote monitoring system that consists of three clients and servers. A web server is adopted to supply a remote visiting interface for browsers from Internet. A video server is installed to capture the live streaming video, and broadcast it to video clients that are embedded in browsers. More ever, a TCP DAQ (Data Acquisition) server is designed to acquire data from sensors, and then transmit them to VI (Virtual Instrument) clients that are also embedded in browsers. To support VI clients that are designed by different languages, such as C++, Flex or HTML5, multiple protocols are integrated in the TCP DAQ server. Through identifying the type of virtual instrument client that is connected to it, the TCP DAQ server can select a protocol automatically.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhe, Chen, and Li Zheng Xu. "Research on Account Management System Based on Openldap and SUDO." Applied Mechanics and Materials 513-517 (February 2014): 1967–70. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1967.

Full text
Abstract:
During our daily management of server cluster, different administrators use the same account (usually root) and password to log on from different remote clients. So logs on servers couldnt trace specific operator once encountering security incident, for only administrator root was recorded. Therefore, its of great practical significance to discuss some new server access methods with multiple administration accounts. Considering the UNIX server cluster management of large enterprises, this paper provides a feasible solution of account management system based on Openldap and SUDO. This system establishes a strict behavior-monitoring framework of each servers operation commands and maintenance process.
APA, Harvard, Vancouver, ISO, and other styles
6

Hussain, Mohamed Abdullah, Mumtaz Mohamed Ali El-Mukhtar, and Wrya Mohamed Ali. "Secure Client- Server Based Remote Process Control." Journal of Zankoy Sulaimani - Part A 11, no. 1 (August 12, 2007): 67–80. http://dx.doi.org/10.17656/jzs.10182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Peng, Qiaoyan Wen, Wenmin Li, Zhengping Jin, and Hua Zhang. "An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs." Scientific World Journal 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/419592.

Full text
Abstract:
With advancement of computer community and widespread dissemination of network applications, users generally need multiple servers to provide different services. Accordingly, the multiserver architecture has been prevalent, and designing a secure and efficient remote user authentication under multiserver architecture becomes a nontrivial challenge. In last decade, various remote user authentication protocols have been put forward to correspond to the multi-server scenario requirements. However, these schemes suffered from certain security problems or their cost consumption exceeded users’ own constrained ability. In this paper, we present an anonymous remote user authentication with key agreement scheme for multi-server architecture employing self-certified public keys without pairings. The proposed scheme can not only retain previous schemes’ advantages but also achieve user privacy concern. Moreover, our proposal can gain higher efficiency by removing the pairings operation compared with the related schemes. Through analysis and comparison with the related schemes, we can say that our proposal is in accordance with the scenario requirements and feasible to the multi-server architecture.
APA, Harvard, Vancouver, ISO, and other styles
8

Muc, Adam, Tomasz Muchowski, Albert Zawadzki, and Adam Szeleziński. "Containerization of Server Services." Multidisciplinary Aspects of Production Engineering 3, no. 1 (September 1, 2020): 320–30. http://dx.doi.org/10.2478/mape-2020-0028.

Full text
Abstract:
AbstractBusinesses are increasingly confronted with server-related problems. More and more, businesses are enabling remote working and need to rely on network services. The provision of network services requires rebuilding the network infrastructure and the way employees are provided with data. Web applications and server services use common dependencies and require a specific network configuration. This often involves collisions between network ports and common dependencies’ configuration. This problem can be solved by separating the conflicting applications into different servers, but this involves the cost of maintaining several servers. Another solution may be to isolate applications with virtual machines, but this involves a significant overhead on server resources, as each virtual machine must be equipped with an operating system. An alternative to virtual machines can be application containerization, which is growing in popularity. Containerization also allows to isolate applications, but operates on the server’s native operating system. This means eliminating the overhead on server resources present in virtual machines. This article presents an example of web application containerization.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Hai Lang, and Xiao Hu Liu. "Embedded Web-Based Remote Monitoring System of the Motor." Advanced Materials Research 189-193 (February 2011): 2856–59. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.2856.

Full text
Abstract:
At present the application layer in the network data transmission and expression of the most widely used protocol is Http protocol, embedded devices through the Internet network remote monitoring of data transmission direction to one of the main focus in the Web server for embedded systems. Embedded web server to achieve this, no operating system support, embedded system itself Common Gateway Interface, to complete web page publishing, the most important is the use of embedded devices that can be used as remote monitoring software system.The key equipment for the motor system for remote network monitoring, this paper describes the design of the specific structure of web servers and for system implementation and realization of the key technologies used to give a detailed exposition, in the end PC to run on the results of the test.
APA, Harvard, Vancouver, ISO, and other styles
10

Hiraga, Kohei, Osamu Tatebe, and Hideyuki Kawashima. "Scalable Distributed Metadata Server Based on Nonblocking Transactions." JUCS - Journal of Universal Computer Science 26, no. 1 (January 28, 2020): 89–106. http://dx.doi.org/10.3897/jucs.2020.006.

Full text
Abstract:
Metadata performance scalability is critically important in high-performance computing when accessing many small files from millions of clients. This paper proposes a design of a scalable distributed metadata server, PPMDS, for parallel file systems using multiple key-value servers. In PPMDS, hierarchical namespace of a file system is efficiently managed by multiple servers. Multiple entries can be atomically updated using a nonblocking distributed transaction based on an algorithm of dynamic software transactional memory. This paper also proposes optimizations to further improve the metadata performance by introducing a server-side transaction processing, multiple readers, and a shared lock mode, which reduce the number of remote procedure calls and prevent unnecessary blocking. Performance evaluation shows the scalable performance up to 3 servers, and achieves 62,000 operations per second, which is 2.58x performance improvement compared to a single metadata performance.
APA, Harvard, Vancouver, ISO, and other styles
11

Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH." Jurnal Teknologi Informasi 4, no. 1 (June 2, 2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.

Full text
Abstract:
Abstract - System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure shell (SSH) to enter the system with a secure channel. By default, SSH is not secure because there is a great chance that the account will be taken over by brute force techniques. The application of asymmetric cryptography on SSH accounts is considered safe than SSH remote login by default. However, this is still not enough because hackers could control the computer that is used by administrators to do remote servers. It also can be hacked with key scanning techniques. The combination of asymmetric cryptography and two-step authentication can be a solution so that the server will be very difficult to penetrate.Keywords - Server Security, SSH, Asymmetric Cryptosystems, Two-Step Authentication.Abstrak - Keamanan sistem menjadi syarat mutlak yang harus diperhatikan oleh pengguna, khususnya administrator jaringan guna melindungi data. Setiap melakukan pemeliharaan dan monitoring sistem, seorang administrator membutuhkan akses masuk dengan cara remote seperti secure shell (SSH) ke dalam sistem dengan saluran yang aman. Secara default, SSH tidak aman karena berpeluang besar akun diambil alih dengan teknik brute force. Penerapan kriptografi asimetris pada akun SSH dinilai aman daripada remote login SSH secara default. Akan tetapi hal tersebut masih belum cukup karena bisa saja peretas justru mengendalikan komputer yang digunakan oleh administrator dalam melakukan remote server. Selain itu juga dapat diretas dengan teknik key scanning. Kombinasi kriptografi asimetris dan autentikasi dua langkah dapat menjadi solusi sehingga server akan sangat susah ditembus.Kata Kunci – Keamanan Server, SSH, Kriptografi Asimetris, Autentikasi Dua Langkah.
APA, Harvard, Vancouver, ISO, and other styles
12

Hossain, Md Delowar, Tangina Sultana, Md Alamgir Hossain, Md Imtiaz Hossain, Luan N. T. Huynh, Junyoung Park, and Eui-Nam Huh. "Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks." Sensors 21, no. 4 (February 20, 2021): 1484. http://dx.doi.org/10.3390/s21041484.

Full text
Abstract:
Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and utilizes neighboring edge servers. The main objective of the FTOM scheme is to select the optimal target node for task offloading based on server capacity, latency sensitivity, and the network’s condition. Our proposed scheme can make dynamic decisions where local or nearby MEC servers are preferred for offloading delay-sensitive tasks, and delay-tolerant high resource-demand tasks are offloaded to a remote cloud server. Simulation results affirm that our proposed FTOM scheme significantly improves the rate of successfully executing offloaded tasks by approximately 68.5%, and reduces task completion time by 66.6%, when compared with a local edge offloading (LEO) scheme. The improved and reduced rates are 32.4% and 61.5%, respectively, when compared with a two-tier edge orchestration-based offloading (TTEO) scheme. They are 8.9% and 47.9%, respectively, when compared with a fuzzy orchestration-based load balancing (FOLB) scheme, approximately 3.2% and 49.8%, respectively, when compared with a fuzzy workload orchestration-based task offloading (WOTO) scheme, and approximately 38.6%% and 55%, respectively, when compared with a fuzzy edge-orchestration based collaborative task offloading (FCTO) scheme.
APA, Harvard, Vancouver, ISO, and other styles
13

Sadreyev, R. I., M. Tang, B. H. Kim, and N. V. Grishin. "COMPASS server for remote homology inference." Nucleic Acids Research 35, Web Server (May 8, 2007): W653—W658. http://dx.doi.org/10.1093/nar/gkm293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Waliulu, Raditya Faisal, and Santrinita Trhessya Jumame. "Desain dan Implementasi Deteksi WebShell Malicious Web Shell (Backdoor Trap)." JURNAL SISTEM INFORMASI BISNIS 10, no. 2 (November 4, 2020): 188–94. http://dx.doi.org/10.21456/vol10iss2pp188-194.

Full text
Abstract:
We present a report on hacker attacks against production servers on increased PHP vulnerabilities through SQL Injection attacks, XSS (Cross Site-Scripting), Cookie hijack, miss configuration, social engineering, CSRF (cross site request forgery), OTP bypass (take over account) and others. Hacker attacks leave a backdoor or webshell that will be accessed remotely (remote), this is common in blackhat hackers. Provides a shelltrap framework to use for and perform and clean the backdoor on the server. Because the back door has characteristics, namely: (1) taking over the physical server or localrooting; (2) adaptation to the run time environment; (3) using global variables to access the server. Have evaluated shelltrap on realworld server tame PHP Script and PHP backdoor. The experimental results get high level detection results of 98 %.
APA, Harvard, Vancouver, ISO, and other styles
15

Kelkkanen, Viktor, Markus Fiedler, and David Lindero. "Synchronous Remote Rendering for VR." International Journal of Computer Games Technology 2021 (July 19, 2021): 1–16. http://dx.doi.org/10.1155/2021/6676644.

Full text
Abstract:
Remote rendering for VR is a technology that enables high-quality VR on low-powered devices. This is realized by offloading heavy computation and rendering to high-powered servers that stream VR as video to the clients. This article focuses on one specific issue in remote rendering when imperfect frame timing between client and server may cause recurring frame drops. We propose a system design that executes synchronously and eliminates the aforementioned problem. The design is presented, and an implementation is tested using various networks and hardware. The design cannot drop frames due to synchronization issues but may on the other hand stall if temporal disturbances occur, e.g., due to network delay spikes or loss. However, experiments confirm that such events can remain rare given an appropriate environment. For example, remote rendering on an intranet at 90 fps with a server located approximately 50 km away yielded just 0.002% stalled frames while rendering with extra latency corresponding to the duration of exactly one frame (11.1 ms at 90 fps). In a LAN without extra latency setting, i.e., with latency equal to locally rendered VR, 0.009% stalls were observed while using a wired Ethernet connection and 0.058% stalls when using 5 GHz wireless IEEE 802.11 ac.
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Gang, Yan Xiang Lou, and Sheng Li Liu. "Data Integrity Check and Repair in Design and Manufacture of Distributed Storage Network." Advanced Materials Research 548 (July 2012): 753–57. http://dx.doi.org/10.4028/www.scientific.net/amr.548.753.

Full text
Abstract:
When clients store large files on a remote network of unreliable distributed servers, they want to verify that their files are properly stored in the servers without any modification. This can be achieved by the techniques of data integrity. In this paper, we consider how to implement data integrity check by a third party auditor (TPA) in a distributed storage network, with the help of BLS signature. We also consider how the distributed storage network restores data when some server fails or some server crushes down. We present a data integrity check and repair (DICR) scheme, which makes use of a random linear code for data restoration and BLS signature to implement data integrity check. Our scheme is robust in the way that the storage network can reconstruct the data when a limited number of servers fail. In the mean time, public auditing on the storage network liberates clients from computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
17

Fontelo, Paul, John Faustorilla, Alex Gavino, and Alvin Marcelo. "Digital Pathology – Implementation Challenges in Low-Resource Countries." Analytical Cellular Pathology 35, no. 1 (2012): 31–36. http://dx.doi.org/10.1155/2012/125695.

Full text
Abstract:
Background: Medical education in pathology and histology in low-resource countries face many obstacles because of equipment cost and telecommunication deficiencies. Digital Pathology may provide solutions. We report student experience to virtual slides on a local network and a remote image server.Methods: Using an iPad tablet device, fifty 3rd and 4th year medical students viewed digital pathology slides from a Web server at the National Library of Medicine and a mirror server on the local network.Results: The quality of images from both servers was found to be satisfactory, but the local server was deemed faster and preferred by the participants in this study (p< 0.005).Conclusions: Virtual slides on a local network server may provide solutions to equipment and technical obstacles and could enhance student learning in developing countries.
APA, Harvard, Vancouver, ISO, and other styles
18

Cobourne, Sheila, Lazaros Kyrillidis, Keith Mayes, and Konstantinos Markantonakis. "Remote E-Voting Using the Smart Card Web Server." International Journal of Secure Software Engineering 5, no. 1 (January 2014): 39–60. http://dx.doi.org/10.4018/ijsse.2014010103.

Full text
Abstract:
Voting in elections is the basis of democracy, but voting at polling stations may not be possible for all citizens. Remote (Internet) e-voting uses the voter's own equipment to cast votes, but is potentially vulnerable to many common attacks, which affect the election's integrity. Security can be improved by distributing vote processing over many web servers installed in tamper-resistant, secure environments, using the Smart Card Web Server (SCWS) on a mobile phone Subscriber Identity Module (SIM). A generic voting model is proposed, using a SIM/SCWS voting application with standardised Mobile Network Operator (MNO) management procedures to process the votes cast. E-voting systems Prêt à Voter and Estonian I-voting are used to illustrate the generic model. As the SCWS voting application is used in a distributed processing architecture, e-voting security is enhanced: to compromise an election, an attacker must target many individual mobile devices, rather than a centralised web server.
APA, Harvard, Vancouver, ISO, and other styles
19

Cojocaru, Alexandru, Léo Colisson, Elham Kashefi, and Petros Wallden. "On the Possibility of Classical Client Blind Quantum Computing." Cryptography 5, no. 1 (January 24, 2021): 3. http://dx.doi.org/10.3390/cryptography5010003.

Full text
Abstract:
Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to the client but remains hidden from the server. This primitive has many applications, most prominently, it makes blind quantum computing possible for classical clients. In this work, we give a protocol for classical client remote state preparation, that requires minimal resources. The protocol is proven secure against honest-but-curious servers and any malicious third party in a game-based security framework. We provide an instantiation of a trapdoor (approximately) 2-regular family of functions whose security is based on the hardness of the Learning-With-Errors problem, including a first analysis of the set of usable parameters. We also run an experimentation on IBM’s quantum cloud using a toy function. This is the first proof-of-principle experiment of classical client remote state preparation.
APA, Harvard, Vancouver, ISO, and other styles
20

Ilona, Clarissa. "Aplikasi Traffic Monitoring Server Menggunakan SMS." ComTech: Computer, Mathematics and Engineering Applications 1, no. 2 (December 1, 2010): 1106. http://dx.doi.org/10.21512/comtech.v1i2.2680.

Full text
Abstract:
This study aims to build traffic monitoring application that can help network administrator to monitor server anytime and anywhere, by using SMS. Things to be monitored are data traffic and server network connection. Literature study, and field study were done before designing the application.The result is application that can send and receive SMS to / from network administrator, check the connection to the server, and respond to network administrator in a relatively fast time when the connection to the server having problem.In addition, the application can monitor the details of data packets at the server and displays the bandwidth based on protocol. The details of data packets can also be sent via SMS. The conclusion is that traffic monitoring application is very useful because it can help network administrator to monitor servers anytime and anywhere. It is suggested to add a remote feature in this application.
APA, Harvard, Vancouver, ISO, and other styles
21

Al-Razgan, Muna, Taha Alfakih, and Mohammad Mehedi Hassan. "A Computational Offloading Method for Edge Server Computing and Resource Allocation Management." Journal of Mathematics 2021 (December 21, 2021): 1–11. http://dx.doi.org/10.1155/2021/3557059.

Full text
Abstract:
The emerging technology of mobile cloud is introduced to overcome the constraints of mobile devices. We can achieve that by offloading resource intensive applications to remote cloud-based data centers. For the remote computing solution, mobile devices (MDs) experience higher response time and delay of the network, which negatively affects the real-time mobile user applications. In this study, we proposed a model to evaluate the efficiency of the close-end network computation offloading in MEC. This model helps in choosing the adjacent edge server from the surrounding edge servers. This helps to minimize the latency and increase the response time. To do so, we use a decision rule based Heuristic Virtual Value (HVV). The HVV is a mapping function based on the features of the edge server like the workload and performance. Furthermore, we propose availability of a virtual machine resource algorithm (AVM) based on the availability of VM in edge cloud servers for efficient resource allocation and task scheduling. The results of experiment simulation show that the proposed model can meet the response time requirements of different real-time services, improve the performance, and minimize the consumption of MD energy and the resource utilization.
APA, Harvard, Vancouver, ISO, and other styles
22

Choi, Younsung, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won. "Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/281305.

Full text
Abstract:
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.
APA, Harvard, Vancouver, ISO, and other styles
23

Caron, Eddy, Bruno DelFabbro, Frédéric Desprez, Emmanuel Jeannot, and Jean-Marc Nicod. "Managing Data Persistence in Network Enabled Servers." Scientific Programming 13, no. 4 (2005): 333–54. http://dx.doi.org/10.1155/2005/151604.

Full text
Abstract:
The GridRPC model [17] is an emerging standard promoted by the Global Grid Forum (GGF) that defines how to perform remote client-server computations on a distributed architecture. In this model data are sent back to the client at the end of every computation. This implies unnecessary communications when computed data are needed by an other server in further computations. Since, communication time is sometimes the dominant cost of remote computations, this cost has to be lowered. Several tools instantiate the GridRPC model such as NetSolve developed at the University of Tennessee, Knoxville, USA, and DIET developed at LIP laboratory, ENS Lyon, France. They are usually called Network Enabled Servers (NES). In this paper, we present a discussion of the data management solutions chosen for these two NES (NetSolve and DIET) as well as experimental results.
APA, Harvard, Vancouver, ISO, and other styles
24

Myasischev, A., L. Komarova, R. Gritsky, and K. Kulik. "WEB SERVER ON ARDUINO WITH AUTHORIZATION AND GRAPHIC REPRESEN-TATION OF INFORMATION FROM SENSORS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 64 (2019): 99–112. http://dx.doi.org/10.17721/2519-481x/2019/64-10.

Full text
Abstract:
In the work on the basis of Arduino Mega and the W5100 controller, a web server is built for graphical display of remote client data obtained from temperature, pressure, humidity sensors. The server program is written in the Arduino IDE development environment. The Ethernet library for the W5100 has been updated, which for Arduino IDE ver. 1.0.3, 1.0.5-r2 caused the server to hang. The possibility of using the Dygraphs library for graphical visualization of data obtained with sensors is shown. Written scripts for drawing graphics for the projected web server. The data transfer rate from the Arduino web server for various network controllers ENC28J60, W5100, W5500 for the Arduino IDE programming environment and UIPEthernet, Ethernet, Ethernet2 libraries was analyzed. It is shown that with the lowest speed the data is transmitted by the web server with the ENC28J60 controller - 3.3Kb/s, with the largest controller W5500 - 23.4Kbytes/s. It is noted that these servers do not support multithreaded work. Therefore, they can not be used to create miniature universal web servers for processing multiple requests simultaneously. The server considered in the work can serve only one request from one remote client. The speed parameters of data transfer for the server on the ATmega328p microcontroller (Arduino UNO) with the network controller ENC28J60 are analyzed. The server program is implemented in C language in the AVR Studio programming environment. A high data transfer rate of 140Kb/s and a possibility of multithreading are noted. It is established that with simultaneous transmission of three files to different clients, the total transmission speed reaches 120-130Kb/s, and for each client 40-50Kb/s. It is shown that the use of such a server to solve the problem of graphical representation of data from sensors is difficult due to the complexity of transferring software to other microcontrollers and the limited library for working with a microSD card. The operation of the server developed here for three years has shown high reliability of its operation. The paper discusses the creation of a web server on the Arduino, which is a modernized HTTP basic authentication. The upgrade consists in the fact that for authorization a password is used from the list of passwords that is selected by the user on the basis of the key sent by the server. With each new login to the server, the previous password becomes invalid. Presents a practical example of a web server on Arduino Mega, Ethernet controllers: enc28j60 and w5500.
APA, Harvard, Vancouver, ISO, and other styles
25

Eskandari, Mojtaba, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira, and Bruno Crispo. "Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (January 1, 2017): 118–31. http://dx.doi.org/10.1515/popets-2017-0008.

Full text
Abstract:
Abstract The prevalence of mobile devices and their capability to access high speed internet has transformed them into a portable pocket cloud interface. Being home to a wide range of users’ personal data, mobile devices often use cloud servers for storage and processing. The sensitivity of a user’s personal data demands adequate level of protection at the back-end servers. In this regard, the European Union Data Protection regulations (e.g., article 25.1) impose restriction on the locations of European users’ personal data transfer. The matter of concern, however, is the enforcement of such regulations. The first step in this regard is to analyze mobile apps and identify the location of servers to which personal data is transferred. To this end, we design and implement an app analysis tool, PDTLoc (Personal Data Transfer Location Analyzer), to detect violation of the mentioned regulations. We analyze 1, 498 most popular apps in the EEA using PDTLoc to investigate the data recipient server locations. We found that 16.5% (242) of these apps transfer users’ personal data to servers located at places outside Europe without being under the control of a data protection framework. Moreover, we inspect the privacy policies of the apps revealing that 51% of these apps do not provide any privacy policy while almost all of them contact the servers hosted outside Europe.
APA, Harvard, Vancouver, ISO, and other styles
26

Coulibaly, Moussa, Ahmed Errami, Sofia Belkhala, and Hicham Medromi. "A Live Smart Parking Demonstrator: Architecture, Data Flows, and Deployment." Energies 14, no. 7 (March 25, 2021): 1827. http://dx.doi.org/10.3390/en14071827.

Full text
Abstract:
Smart Parking is essential for any future smart cities due to the tremendous growth of the car fleet. Such infrastructures require a certain amount of equipment. Indeed, smart parking integrates a lot of actors, to manage the parking its equipment must be managed accordingly. Here, is proposed a distributed architecture to manage them by collecting efficiently their data. Two types of data relating to the parking must be collected: those coming from the deployed equipment in the parking and those coming from the internet due to remote users. Thus, a system of two main servers based on the multi-agent concept is proposed. This system manages the parking platform. The first server is dedicated to the parking equipment data collection (Processing Server–PS). The second server (Processing Web Server–PWS) collects the users’ online data such as reservation, and it is responsible for pricing policies, and receive post-processed data from the Processing Server. The parking equipment integrates a lot of commercial solutions, an intelligent multi-platform application based on this two server philosophy is developed and can be used for parking operation by users and parking managers. The flowcharts of the agents from the two mains servers are presented. These flowcharts are currently used in our demonstrator and still under improvements. Here, we present the architecture (hardware and software) of our smart parking demonstrator developed by our department and suitable for the experimentation of our future work related to this hot topic.
APA, Harvard, Vancouver, ISO, and other styles
27

Callaghan, M. J., J. Harkin, E. McColgan, T. M. McGinnity, and L. P. Maguire. "Client–server architecture for collaborative remote experimentation." Journal of Network and Computer Applications 30, no. 4 (November 2007): 1295–308. http://dx.doi.org/10.1016/j.jnca.2006.09.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

O’Keefe, Christine M., and Norm M. Good. "Regression output from a remote analysis server." Data & Knowledge Engineering 68, no. 11 (November 2009): 1175–86. http://dx.doi.org/10.1016/j.datak.2009.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Hao, Guang Ming Sun, and Yi Chu. "Design of Integrated Monitoring System for Electric Vehicle Charging Station Based on Weblogic." Applied Mechanics and Materials 241-244 (December 2012): 2004–9. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2004.

Full text
Abstract:
Dispersion characteristics for AC charging pile distribution and monitoring of electric vehicles in mobile state, it proposes a communication method with the server by centralized GPRS module and Electric Vehicle Terminal (EVT). In order to meet the design requirements of the comprehensive monitoring system for remote access, system uses Struts, Spring and Hibernate framework based on Browser/Server (B/S). Network servers use weblogic cluster together with the Oracle database server and Coherence real-time database to meet the high number of concurrent users. Client pages are based on the full-featured ExtJs library with beautiful interface. The system consists of five functional modules, which are structured and closed contact with each other. Test results show that the system is stable and the average response time is short.
APA, Harvard, Vancouver, ISO, and other styles
30

Buzys, Rytis, Rytis Maskeliūnas, Robertas Damaševičius, Tatjana Sidekerskienė, Marcin Woźniak, and Wei Wei. "Cloudification of Virtual Reality Gliding Simulation Game." Information 9, no. 12 (November 22, 2018): 293. http://dx.doi.org/10.3390/info9120293.

Full text
Abstract:
Cloud gaming provides cloud computing-based game as a service. In this paper we describe the development of a virtual reality base gliding game as a proof-of-concept. In the cloud, a cloud gaming platform is hosted on cloud servers with two principal components: game logic engaged in the implementation of game mechanics and game interactions, and video renderer that generates the game frames in real-time. The virtual gliding game was realized in the Unity gaming engine. To ensure smooth playability, and access for remote players, the computationally-intensive parts of the game were offloaded to a physically remote cloud server. To analyze the efficiency of the client-cloud interaction, three cloud servers were setup. The results of cloudification were evaluated by measuring and comparing computation offloading performance, network traffic, the probability of service drop, perceptual quality and video quality.
APA, Harvard, Vancouver, ISO, and other styles
31

Lim, Say Ying, and Siew Fan Wong. "Impact of Applying Aggregate Query Processing in Mobile Commerce." International Journal of Business Data Communications and Networking 8, no. 2 (April 2012): 1–17. http://dx.doi.org/10.4018/jbdcn.2012040101.

Full text
Abstract:
With the increased usage of mobile devices, society is seeing more and more users doing transactions wirelessly. Often, data from a single server may not be sufficient. Rather, data may need to be manipulated and to be gathered from multiple remote servers before useful information can be formed. Mobile transactions are constrained by small screen size of mobile devices, high communication cost, and high memory consumption. Existing techniques from traditional query processing in distributed environments cannot be directly applied to mobile environments. In this paper, the authors propose techniques for processing mobile queries that address the issue of high memory consumption. A set of walkthrough examples was provided and performances of various techniques were examined. The results show that the technique of first downloading primary keys only from one server and then sending a query to the second server using these primary keys before processing for qualified match in the second server gives the best performance.
APA, Harvard, Vancouver, ISO, and other styles
32

Irshad, Azeem, Shehzad Ashraf Ch, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, and Saru Kumari. "An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol." Information Technology And Control 48, no. 2 (June 25, 2019): 211–24. http://dx.doi.org/10.5755/j01.itc.48.2.17417.

Full text
Abstract:
The remote authentication has been advancing with the growth of online services being offered on remotely basis. This calls for an optimal authentication framework other than single-server authentication. In this connection, the multi-server authentication architecture has been introduced in the literature that enables the users to avail variety of services of various servers, using a single pair of identity and password. Lately, we have witnessed a few multi-server authentication schemes in the literature, although security with loopholes. One of those multi-server authentication schemes has been presented by Chang et al. recently. Our analysis shows that the Chang et al. is vulnerable to impersonation attack, stolen smart card attack. In this study, we have reviewed the protocol thoroughly, and proposed an improved model, that is resistant to all known and identified attacks. The formal and informal security analysis for proposed model is also presented in this study, besides performance and its evaluation analysis.
APA, Harvard, Vancouver, ISO, and other styles
33

.., Rajit, Miguel Botto Botto-Tobar, and Premnarayan Arya. "Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques." Fusion: Practice and Applications 3, no. 2 (2021): 83–99. http://dx.doi.org/10.54216/fpa.030204.

Full text
Abstract:
Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.
APA, Harvard, Vancouver, ISO, and other styles
34

Titov, Igor, and Evgeny Titov. "Labicom.net â?? Putting Online LabVIEW Based Remote Laboratory in Less than Four Minutes with WebPager Tool." International Journal of Online and Biomedical Engineering (iJOE) 9, S8 (December 4, 2013): 30. http://dx.doi.org/10.3991/ijoe.v9is8.3374.

Full text
Abstract:
Most of currently existing laboratory servers of remote labs were built fully or partially with LabVIEW programming language from National Instruments. While proving to be the best tool for fast development of excellent SCADA and data acquisition applications, it appeared to be inadequate when it comes to deploying an application to the web. This paper will analyze the tools that can be used for accomplishing this task in the remote laboratories. Various National Instruments and third parties technologies will be compared. It will be shown that LabVIEW application serving as laboratory server can easily be deployed on the standard pluginless web-page without any modifications in LabVIEW code with WebPager.
APA, Harvard, Vancouver, ISO, and other styles
35

Baig, Mirza Jabbar Aziz, M. Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "A Low-Cost, Open-Source Peer-to-Peer Energy Trading System for a Remote Community Using the Internet-of-Things, Blockchain, and Hypertext Transfer Protocol." Energies 15, no. 13 (July 2, 2022): 4862. http://dx.doi.org/10.3390/en15134862.

Full text
Abstract:
A low-cost, open-source peer-to-peer (P2P) energy trading system for a remote community is presented in this paper. As a result of its geographic location, this community has never been able to access electricity and other modern amenities. This study aims to design and implement a P2P energy trading system for this remote community that allows residents to take advantage of distributed energy resources. A Raspberry Pi 4 Model B (Pi4B) hosts the main server of the trading system that includes the user interface and a local Ethereum blockchain server. The Ethereum blockchain is used to deploy smart contracts. The Internet-of-Things (IoT) servers run on ESP32 microcontrollers. Sensors and actuators connected to the ESP32 are field instrumentation devices that facilitate acquiring, monitoring, and transferring energy data in real-time. To perform trading activities, React.JS open-source library was used to develop the blockchain-enabled user interface. An immutable blockchain network keeps track of all transactions. The proposed system runs on a local Wi-Fi network with restricted authorization for system security. Other security measures such as login credentials, private key, firewall, and secret recovery phrases are also considered for information security and data integrity. A Hypertext Transfer Protocol is implemented for communication between the servers and the client. This explains the overall system design, implementation, testing, and results.
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, Jun, Wen Long Li, Ruo Xin Zhu, and Guang Hui Cai. "Design and Implementation of Remote Intelligent Control System Based on Cortex-M3." Applied Mechanics and Materials 513-517 (February 2014): 3336–39. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.3336.

Full text
Abstract:
With the rapid development of the Internet, the remote control technology was demanded more. In this paper, we designed a simple and practical remote intelligent control system, using CGI technology to complete the construction of Web servers and embedding uCOSII as the real-time operating system in Cortex-M3 core processor. By porting TCP/IP protocol stack, users could login in the server to access and control the system via the Internet. Using NRF2401 wireless technology to build a terminal network, the terminal carried out intelligent control with field data collected by sensors. Meanwhile, users could make monitor and control on a control terminal via a Web browser on a PC or mobile. The remote intelligent control system was stable, real-time, low cost, fit for the smart home, industrial remote monitor and so on, so it would have a better application prospects.
APA, Harvard, Vancouver, ISO, and other styles
37

Hua, Zhu Peng, and Hou Xiao Fang. "The Research and Design on the Monitoring Platform Based on the Internet of Things." Applied Mechanics and Materials 513-517 (February 2014): 2240–43. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2240.

Full text
Abstract:
Multiple sensors with ZigBee wireless communication module composed of environmental monitoring network platform. With ZigBee server/gateway support, this platform could achieve the connection to the Internet, remote monitor temperature, humidity, smoke, noise, etc. through the Internet network, and achieve ZigBee LAN monitoring and status display. The main contents of this paper are as follows : 1the analysis of ZigBee protocol stack layers of protocol network routing protocols, network topology , etc. 2the research of networking in the form of ZigBee, to build the ZigBee network with a star network topology. 3research ARM platform, understand the Linux operating system, and build embedded Web server. Meanwhile, ZigBee server hardware and software platform is built on this ARM platform, porting ZigBee transceiver modules to realize the ZigBee-based wireless gateway. 4the research of checking buildings , humidity, smoke , noise, heat hydroelectric and other states which need to be monitored remotely through servers.
APA, Harvard, Vancouver, ISO, and other styles
38

TARAU, PAUL, and VERONICA DAHL. "High-level networking with mobile code and first order AND-continuations." Theory and Practice of Logic Programming 1, no. 3 (May 2001): 359–80. http://dx.doi.org/10.1017/s1471068401001193.

Full text
Abstract:
We describe a scheme for moving living code between a set of distributed processes coordinated with unification based Linda operations, and its application to building a comprehensive Logic programming based Internet programming framework. Mobile threads are implemented by capturing first order continuations in a compact data structure sent over the network. Code is fetched lazily from its original base turned into a server as the continuation executes at the remote site. Our code migration techniques, in combination with a dynamic recompilation scheme, ensure that heavily used code moves up smoothly on a speed hierarchy while volatile dynamic code is kept in a quickly updatable form. Among the examples, we describe how to build programmable client and server components (Web servers, in particular) and mobile agents.
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Bo, and Reza Curtmola. "Remote data integrity checking with server-side repair1." Journal of Computer Security 25, no. 6 (August 24, 2017): 537–84. http://dx.doi.org/10.3233/jcs-16868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Nurjaman, Yoga, Dhami Johar Damiri, and Ate Susanto. "Pengembangan Sistem Remote Access Jaringan Berbasis Client Server." Jurnal Algoritma 9, no. 1 (March 1, 2012): 67–75. http://dx.doi.org/10.33364/algoritma/v.9-1.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gilmore, C., D. Kormann, and A. D. Rubin. "Secure remote access to an Internet Web server." IEEE Network 13, no. 6 (1999): 31–37. http://dx.doi.org/10.1109/65.806985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Y., R. I. Sadreyev, and N. V. Grishin. "PROCAIN server for remote protein sequence similarity search." Bioinformatics 25, no. 16 (June 3, 2009): 2076–77. http://dx.doi.org/10.1093/bioinformatics/btp346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sudakov, Aleksandr N., Evgeniy A. Andrianov, Aleksandr V. Zakabunin, and Oksana A. Lipa. "Development of an Educational and Research Poultry Laboratory with Remote Access." Elektrotekhnologii i elektrooborudovanie v APK 48, no. 4 (December 2021): 88–94. http://dx.doi.org/10.22314/2658-4859-2021-68-4-88-94.

Full text
Abstract:
Training of specialists is the most important stage of technological renewal of the agricultural industry in Russia. The introduction of remote access technologies in the learning process serves as a response to the growth of digitalization of production and allows for the implementation of distance learning programs. Poultry laboratories and experimental farms with remote access are currently unavailable for educational and research purposes. The solution may be to create a model laboratory of digital poultry farming. (Research purpose) The research purpose is in studying and systematization of the domestic and foreign experience in creating laboratories with remote access paying attention to the possibility of its application by specialists for the development of a poultry laboratory with remote access. (Materials and methods) The article reviews the documentary studies of the current state of remote access technologies. Authors conducted search experiments and analyzed the obtained data. (Results and discussion) The laboratories of a technical orientation with remote access are widely represented in Russia and abroad, whose experience can be partially used. They provided links to existing laboratories and materials on their development. At the first stage, it was proposed to use low-budget schemes for organizing remote access based on video surveillance systems and microcontrollers. A simple way to organize remote access is video surveillance with the placement of instrument screens in the field of view of the camera. The Smart Home technology can be used to organize two-way remote access. The article presents the results of an experiment using microcontrollers as a local server with information output to a remote server. (Conclusions) Poultry breeding laboratories with remote access are promising in the study of specialties: private animal husbandry, agricultural mechanization, electrical engineering, veterinary medicine and zoopsychology, they expand the opportunities of remote students.
APA, Harvard, Vancouver, ISO, and other styles
44

Koner, C., C. T. Bhunia, and U. Maulik. "An Efficient and Reliable Three-Entity Remote User and Server Authentication Technique." International Journal of Engineering and Technology 1, no. 2 (2009): 188–93. http://dx.doi.org/10.7763/ijet.2009.v1.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Song, Yixin, Junyang Yu, Bohan Li, Han Li, Xin He, Jinjiang Wang, and Rui Zhai. "RCM: A Remote Cache Management Framework for Spark." Applied Sciences 12, no. 22 (November 12, 2022): 11491. http://dx.doi.org/10.3390/app122211491.

Full text
Abstract:
With the rapid growth of Internet data, the performance of big data processing platforms is attracting more and more attention. In Spark, cache data are replaced by the Least Recently Used (LRU) Algorithm. LRU cannot identify the cost of cache data, which leads to replacing some important cache data. In addition, the placement of cache data is random, which lacks a measure to find efficient cache servers. Focusing on the above problems, a remote cache management framework (RCM) for the Spark platform was proposed, including a cache weight generation module (CWG), cache replacement module (CREP), and cache placement module (CPL). CWG establishes initial weights from three main factors: the response time of the query database, the number of queries, and the data size. Then, CWG reduces the old data weight through a time loss function. CREP promises that the sum of cache data weights is maximized by a greedy strategy. CPL allocates the best cache server for data based on the Kuhn-Munkres matching algorithm to improve cooperation efficiency. To verify the effectiveness of RCM, RCM is implemented on Redis and deployed on eight computing nodes and four cache servers. Three groups of benchmark jobs, PageRank, K-means and WordCount, is tested. The result of experiments confirmed that compared with MCM, SACM and DMAOM, the execution time of RCM is reduced by 42.1% at most.
APA, Harvard, Vancouver, ISO, and other styles
46

Nkenyereye, Lionel, and Jong-Wook Jang. "Performance Evaluation of Server-side JavaScript for Healthcare Hub Server in Remote Healthcare Monitoring System." Procedia Computer Science 98 (2016): 382–87. http://dx.doi.org/10.1016/j.procs.2016.09.058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Zhi Zhong, Shi Chun Yang, and Zi Tao Liu. "Development of Electric Vehicle Remote Monitoring System's Server and Client Application." Applied Mechanics and Materials 535 (February 2014): 26–31. http://dx.doi.org/10.4028/www.scientific.net/amm.535.26.

Full text
Abstract:
This paper analyzed the practical needs of remote monitoring of electric vehicle and illustrates the overall architecture of a remote monitoring system, and further developed a remote monitoring system of the Server and client application with the ASP.NET and Microsoft SQL Server database language, basically can meet the electric cars remote monitoring of the Server and client needs.
APA, Harvard, Vancouver, ISO, and other styles
48

Trehub, O. D. "Cloud technologies in problem-based learning in computer science disciplines." CTE Workshop Proceedings 1 (March 21, 2013): 152–53. http://dx.doi.org/10.55056/cte.180.

Full text
Abstract:
The modern system of professional training of future technology teachers involves the use of many computer-oriented learning technologies. Among them, today, the use of "cloud" technologies deserves attention, allowing to place educational materials, electronic libraries and editorial offices, websites, presentations, archives, e-mail reports, etc. on the virtual server of the educational institution and provide remote access to them.This technology also makes it possible to place and execute programs used in the educational process on virtual servers, as well as to store the results of the execution of these programs.
APA, Harvard, Vancouver, ISO, and other styles
49

Buchade, Sunitha, and P. R. Devale. "A study on searchable encryption schemes." International Journal of Engineering & Technology 7, no. 2 (April 25, 2018): 617. http://dx.doi.org/10.14419/ijet.v7i2.10995.

Full text
Abstract:
To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. Since the remote servers are untrusted party, the data has to be encrypted to achieve security and privacy. But encryption and decryption causes communication overhead for many data utilization operations like searching and updating. To overcome this contradiction, searchable encryption notion was introduced. Searchable encryption (SE) is an ability of a server to search upon the ciphertext and retrieve the data without decrypting it. By searching on the ciphertext it protects the user’s tactful data. This article concentrates on study of various resil-ient keyword search schemes in area of Cloud SE. The main basis for SE evolution is attaining the challenging task of efficient enci-phered data utilization with privacy check. Thus schemes are developed considering their search capability, efficiency and security. In this paper we summarize and analyze various available keyword searchable schemes based on query expressiveness and query correct-ness. We review articles which have extensively researched in the field of SE with various keyword search schemes.
APA, Harvard, Vancouver, ISO, and other styles
50

Xu, Shu Ping, Jun Li, and Yu Feng Zhao. "The Remote PLC Control System Based on the Embedded Web Server." Applied Mechanics and Materials 556-562 (May 2014): 2321–24. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2321.

Full text
Abstract:
Since the resource of the sever in embedded remote control system is limited, an approach is presented which use CGI and XML technology to realize remote monitoring computer and embedded Web server for dynamic interaction. Combined with the basic requirements of embedded remote control system, the idea of component design is proposed, the major components of system functions are defined. According to the system functional requirement, the software is designed and realized. The practice prove , the scheme realize the remote control of the transmitter by the small cost . And the system is convenient and safe. The definite reference value is offered to the offspring complex remote control system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography