Literatura académica sobre el tema "Simple Object Access Protocol (Computer network protocol)"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Simple Object Access Protocol (Computer network protocol)".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Simple Object Access Protocol (Computer network protocol)"

1

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman y Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging". Energies 13, n.º 13 (30 de junio de 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Texto completo
Resumen
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

HONG, PENGYU, SHENG ZHONG y WING H. WONG. "UBIC2 — TOWARDS UBIQUITOUS BIO-INFORMATION COMPUTING: DATA PROTOCOLS, MIDDLEWARE, AND WEB SERVICES FOR HETEROGENEOUS BIOLOGICAL INFORMATION INTEGRATION AND RETRIEVAL". International Journal of Software Engineering and Knowledge Engineering 15, n.º 03 (junio de 2005): 475–85. http://dx.doi.org/10.1142/s0218194005001951.

Texto completo
Resumen
The Ubiquitous Bio-Information Computing (UBIC2) project aims to disseminate protocols and software packages to facilitate the development of heterogeneous bio-information computing units that are interoperable and may run distributedly. UBIC2 specifies biological data in XML formats and queries data using XQuery. The UBIC2 programming library provides interfaces for integrating, retrieving, and manipulating heterogeneous biological data. Interoperability is achieved via Simple Object Access Protocol (SOAP) based web services. The documents and software packages of UBIC2 are available at .
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Selvan, Satiaseelan y Manmeet Mahinderjit Singh. "Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm". Computers 11, n.º 2 (24 de enero de 2022): 16. http://dx.doi.org/10.3390/computers11020016.

Texto completo
Resumen
The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. It has unsupported features such as low latency, location awareness, and geographic distribution that are important for a few IoT applications. Fog computing is integrated into IoT to aid these features to increase computing, storage, and networking resources to the network edge. Unfortunately, it is faced with numerous security and privacy risks, raising severe concerns among users. Therefore, this research proposes a contextual risk-based access control model for Fog-IoT technology that considers real-time data information requests for IoT devices and gives dynamic feedback. The proposed model uses Fog-IoT environment features to estimate the security risk associated with each access request using device context, resource sensitivity, action severity, and risk history as inputs for the fuzzy risk model to compute the risk factor. Then, the proposed model uses a security agent in a fog node to provide adaptive features in which the device’s behaviour is monitored to detect any abnormal actions from authorised devices. The proposed model is then evaluated against the existing model to benchmark the results. The fuzzy-based risk assessment model with enhanced MQTT authentication protocol and adaptive security agent showed an accurate risk score for seven random scenarios tested compared to the simple risk score calculations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mitts, H�kan y Harri Hans�n. "A simple and efficient routing protocol for the UMTSA Access network". Mobile Networks and Applications 1, n.º 2 (junio de 1996): 167–81. http://dx.doi.org/10.1007/bf01193335.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Polgar, Jana. "Using WSRP 2.0 with JSR 168 and 286 Portlets". International Journal of Web Portals 2, n.º 1 (enero de 2010): 45–57. http://dx.doi.org/10.4018/jwp.2010010105.

Texto completo
Resumen
WSRP—Web Services for Remote Portlets—specification builds on current standard technologies, such as WSDL (Web Services Definition Language), UDDI (Universal Description, Discovery and Integration), and SOAP (Simple Object Access Protocol). It aims to sol
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Zientarski, Tomasz, Marek Miłosz, Marek Kamiński y Maciej Kołodziej. "APPLICABILITY ANALYSIS OF REST AND SOAP WEB SERVICES". Informatics Control Measurement in Economy and Environment Protection 7, n.º 4 (21 de diciembre de 2017): 28–31. http://dx.doi.org/10.5604/01.3001.0010.7249.

Texto completo
Resumen
Web Services are common means to exchange data and information over the network. Web Services make themselves available over the Internet, where technology and platform are independent. These web services can be developed on the basis of two interaction styles such as Simple Object Access Protocol (SOAP) and Representational State Transfer Protocol (REST). In this study, a comparison of REST and SOAP web services is presented in terms of their applicability in diverse areas. It is concluded that in the past both technologies were equally popular, but during the rapid Internet development the REST technology has become the leading one in the area of access to Internet services.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ge, Jian Xia y Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research". Applied Mechanics and Materials 347-350 (agosto de 2013): 2071–76. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2071.

Texto completo
Resumen
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ge, Jian Xia y Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research". Applied Mechanics and Materials 380-384 (agosto de 2013): 1327–32. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1327.

Texto completo
Resumen
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Song, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong y Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.

Texto completo
Resumen
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Tan, Wenken y Jianmin Hu. "Design of the Wireless Network Hierarchy System of Intelligent City Industrial Data Management Based on SDN Network Architecture". Security and Communication Networks 2021 (10 de noviembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/5732300.

Texto completo
Resumen
With the rapid development of the industrial Internet of Things and the comprehensive popularization of mobile intelligent devices, the construction of smart city and economic development of wireless network demand are increasingly high. SDN has the advantages of control separation, programmable interface, and centralized control logic. Therefore, integrating this technical concept into the smart city data management WLAN network not only can effectively solve the problems existing in the previous wireless network operation but also provide more functions according to different user needs. In this case, the traditional WLAN network is of low cost and is simple to operate, but it cannot guarantee network compatibility and performance. From a practical perspective, further network compatibility and security are a key part of industrial IoT applications. This paper designs the network architecture of smart city industrial IoT based on SDN, summarizes the access control requirements and research status of industrial IoT, and puts forward the access control requirements and objectives of industrial IoT based on SDN. The characteristics of the industrial Internet of Things are regularly associated with data resources. In the framework of SDN industrial Internet of Things, gateway protocol is simplified and topology discovery algorithm is designed. The access control policy is configured on the gateway. The access control rule can be dynamically adjusted in real time. An SDN-based intelligent city industrial Internet of Things access control function test platform was built, and the system was simulated. The proposed method is compared with other methods in terms of extension protocol and channel allocation algorithm. Experimental results verify the feasibility of the proposed scheme. Finally, on the basis of performance analysis, the practical significance of the design of a smart city wireless network hierarchical data management system based on SDN industrial Internet of Things architecture is expounded.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Simple Object Access Protocol (Computer network protocol)"

1

Abu-Ghazaleh, Nayef Bassam. "Optimizing communication performance of web services using differential deserialization of SOAP messages". Diss., Online access via UMI:, 2006.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Head, Michael Reuben. "Analysis and optimization for processing grid-scale XML datasets". Diss., Online access via UMI:, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Texto completo
Resumen
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Pather, Maree. "A framework for promoting interoperability in a global electronic market-space". Thesis, 2005. http://hdl.handle.net/10500/2510.

Texto completo
Resumen
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order):  A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective.  A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework.  A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context.  An open standards-based security model for the global message handler. Conceptually, the framework comprises the following:  An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages).  An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints.  A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations).
Theoretical Computing
PHD (INFORMATION SYSTEMS)
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Fornasier, Patric Computer Science &amp Engineering Faculty of Engineering UNSW. "An empirical investigation of SSDL". 2007. http://handle.unsw.edu.au/1959.4/40514.

Texto completo
Resumen
The SOAP Service Description Language (SSDL) is a SOAP-centric language for describing Web Service contracts. SSDL focuses on message abstraction as the building block for creating service-oriented applications and provides an extensible range of protocol frameworks that can be used to describe and formally model Web Service interactions. SSDL's natural alignment with service-oriented design principles intuitively suggests that it encourages the creation of applications that adhere to this architectural paradigm. Given the lack of tools and empirical data for using SSDL as part of Web Services-based SOAs, we identified the need to investigate its practicability and usefulness through empirical work. To that end we have developed Soya, a programming model and runtime environment for creating and executing SSDL-based Web Services. On the one hand, Soya provides straightforward programming abstractions that foster message-oriented thinking. On the other hand, it leverages contemporary tooling (i.e. Windows Communication Foundation) with SSDL-related runtime functionality and semantics. In this thesis, we describe the design and architecture of Soya and show how it makes it possible to use SSDL as an alternative and powerful metadata language without imposing unrealistic burdens on application developers. In addition, we use Soya and SSDL in a case study which provides a set of initial empirical results with respect to SSDL's strengths and drawbacks. In summary, our work serves as a knowledge framework for better understanding message-oriented Web Service development and demonstrates SSDL's practicability in terms of implementation and usability.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Simple Object Access Protocol (Computer network protocol)"

1

C, Stiver Mark, ed. Understanding SOAP. Indianapolis, Ind: Sams, 2000.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Livingston, Dan. Advanced SOAP for Web professionals. Upper Saddle River, NJ: Prentice Hall, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Service design patterns: Fundamental design solutions for SOAP/WSDL and restful Web services. Upper Saddle River, NJ: Addison-Wesley, 2012.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

SOAP: Cross platform Web service development using XML. Upper Saddle River, NJ: Prentice Hall PTR, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Doug, Tidwell, Kulchenko Pavel, Safari Books Online (Firm) y ProQuest Information and Learning Company., eds. Programming Web services with SOAP. Sebastopol, CA: O'Reilly & Associates, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ray, Randy J. Programming Web services with Perl. Sebastopol, CA: O'Reilly, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Mark, Tomlinson y Peuser Stefan, eds. Perspectives on web services: Applying SOAP, WSDL and UDDI to real-world projects. Berlin: Springer, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Mellquist, Peter Erik. SNMP++: An object-oriented approach to developing network management applications. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

SNMP[plus plus]: An object-oriented approach to developing network management applications. Upper Saddle River, N.J: Prentice Hall, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

SOAP Programming with Java. Sybex Inc, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Simple Object Access Protocol (Computer network protocol)"

1

Al-Bahadili, Hussein y Haitham Y. Adarbah. "Modeling of TCP Reno with Packet-Loss and Long Delay Cycles". En Simulation in Computer Network Design and Modeling, 257–83. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch012.

Texto completo
Resumen
The Transport Control Protocol (TCP) is the dominant transport layer protocol in the Internet Protocol (IP) suite, as it carries a significant amount of the Internet traffic, such as Web browsing, file transfer, e-mail, and remote access. Therefore, huge efforts have been devoted by researchers to develop suitable models that can help with evaluating its performance in various network environments. Some of these models are based on analytical or simulation approaches. This chapter presents a description, derivation, implementation, and comparison of two well-known analytical models, namely, the PFTK and PLLDC models. The first one is a relatively simple model for predicting the performance of the TCP protocol, while the second model is a comprehensive and realistic analytical model. The two models are based on the TCP Reno flavor, as it is one of the most popular implementations on the Internet. These two models were implemented in a user-friendly TCP Performance Evaluation Package (TCP-PEP). The TCP-PEP was used to investigate the effect of packet-loss and long delay cycles on the TCP performance, measured in terms of sending rate, throughput, and utilization factor. The results obtained from the PFTK and PLLDC models were compared with those obtained from equivalent simulations carried-out on the widely used NS-2 network simulator. The PLLDC model provides more accurate results (closer to the NS-2 results) than the PFTK model.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Yau, Wei-Chuen y G. S. V. Radha Krishna Rao. "Web Services Security in E-Business". En Web Services Security and E-Business, 165–83. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch009.

Texto completo
Resumen
Web services enable the communication of application-to-application in a heterogeneous network and computing environment. The powerful functionality of Web services has given benefits to enterprise companies, such as rapid integrating between heterogeneous e-business systems, easy implementation of e-business systems, and reusability of e-business services. While providing the flexibility for e-business, Web services tend to be vulnerable to a number of attacks. Core components of Web services such as simple object access protocol (SOAP), Web services description language (WSDL), and universal description, discovery, and integration (UDDI) can be exploited by malicious attacks due to lack of proper security protections. These attacks will increase the risk of e-business that employs Web services. This chapter aims to provide a state-of-the-art view of Web services attacks and countermeasures. We examine various vulnerabilities in Web services and then followed by the analysis of respective attacking methods. We also discuss preventive countermeasures against such attacks to protect Web services deployments in e-business. Finally, we address future trends in this research area.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Yau, Wei-Chuen y G. S. V. Radha Krishna Rao. "Web Services Security in E-Business". En Electronic Business, 2115–30. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-056-1.ch131.

Texto completo
Resumen
Web services enable the communication of application- to-application in a heterogeneous network and computing environment. The powerful functionality of Web services has given benefits to enterprise companies, such as rapid integrating between heterogeneous e-business systems, easy implementation of e-business systems, and reusability of e-business services. While providing the flexibility for e-business, Web services tend to be vulnerable to a number of attacks. Core components of Web services such as simple object access protocol (SOAP), Web services description language (WSDL), and universal description, discovery, and integration (UDDI) can be exploited by malicious attacks due to lack of proper security protections. These attacks will increase the risk of e-business that employs Web services. This chapter aims to provide a state-of-the-art view of Web services attacks and countermeasures. We examine various vulnerabilities in Web services and then followed by the analysis of respective attacking methods. We also discuss preventive countermeasures against such attacks to protect Web services deployments in e-business. Finally, we address future trends in this research area.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Prakash, Abhinav y Dharma Prakash Agarwal. "Data Security in Wired and Wireless Systems". En Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, 1–27. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0105-3.ch001.

Texto completo
Resumen
The issues related to network data security were identified shortly after the inception of the first wired network. Initial protocols relied heavily on obscurity as the main tool for security provisions. Hacking into a wired network requires physically tapping into the wire link on which the data is being transferred. Both these factors seemed to work hand in hand and made secured communication somewhat possible using simple protocols. Then came the wireless network which radically changed the field and associated environment. How do you secure something that freely travels through the air as a medium? Furthermore, wireless technology empowered devices to be mobile, making it harder for security protocols to identify and locate a malicious device in the network while making it easier for hackers to access different parts of the network while moving around. Quite often, the discussion centered on the question: Is it even possible to provide complete security in a wireless network? It can be debated that wireless networks and perfect data security are mutually exclusive. Availability of latest wideband wireless technologies have diminished predominantly large gap between the network capacities of a wireless network versus a wired one. Regardless, the physical medium limitation still exists for a wired network. Hence, security is a way more complicated and harder goal to achieve for a wireless network (Imai, Rahman, & Kobara, 2006). So, it can be safely assumed that a security protocol that is robust for a wireless network will provide at least equal if not better level of security in a similar wired network. Henceforth, we will talk about security essentially in a wireless network and readers should assume it to be equally applicable to a wired network.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Simple Object Access Protocol (Computer network protocol)"

1

Bang, Je-Sung, Jai-Kyung Lee, Seung-Ho Han, Seong-Whan Park, Jun-Ho Choi, Tae-Hee Lee y Tae-Woo Kwon. "Integration of PDM System and Web-Based CAE Supporting System for Small and Medium Enterprises". En ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35019.

Texto completo
Resumen
A web-based Computer-Aided Engineering (CAE) supporting system is integrated with a Product Data Management (PDM) system for Small and Medium Enterprises (SMEs) suffering from the lack of building hardware, software and related experts. An analysis of current business models and worksite requirements provides an improved process model and data to be shared between the PDM system and the CAE supporting system. Since all engineering tasks such as geometric modeling, mesh generation, static stress and vibration analysis, and fatigue durability analysis are automated in the CAE supporting system, the user in charge of the CAE have only to configure the concerned values of design variables and result data through the web page. The existing Change Management module of the PDM system is modified for seamless data exchange, i.e. sending the Engineering Change Order (ECO) data to the CAE supporting system and receiving the CAE result data back. The bi-directional data transfers between the PDM system and the CAE supporting system is made possible by adaptors based on the Simple Object Access Protocol (SOAP). The current approach will be very helpful for SMEs that only have the PDM system and have no adequate infrastructure for CAE.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía