摘要 :
Incorporating advanced programming concepts into an introductory programming course can provide motivation, yet care must be taken to avoid overwhelming students. We describe our experiences teaching network programming in a CS1 c...
展开
Incorporating advanced programming concepts into an introductory programming course can provide motivation, yet care must be taken to avoid overwhelming students. We describe our experiences teaching network programming in a CS1 course using Python. The simplicity of the built-in libraries allows a fair amount of networking to be introduced in a week-long module of the course. In this short time, students write both multi-threaded clients and servers.
收起
摘要 :
Using a sample of 350 companies, this paper investigates the benefits of client-server systems and links them to a set of implementation factors. The paper reveals that companies can expect competitive, operational, financial and ...
展开
Using a sample of 350 companies, this paper investigates the benefits of client-server systems and links them to a set of implementation factors. The paper reveals that companies can expect competitive, operational, financial and technical benefits. It reports several important steps, activities and tasks that are positively related to those benefits, including defining clear organizational objectives and strategies, re-organizing corporate data and testing multiple levels of clients and servers. Furthermore, they list some of the problems that companies may encounter during a client-server implementation. The paper is relevant to managers and academicians who want to better understand the implementation of client-server.
收起
摘要 :
The client-server model conforms to the trend of the development of MIS. Based on a project of the Guangzhou Power Supply Bureau, the research method and optimization strategy of MIS are put forward using The client-server computa...
展开
The client-server model conforms to the trend of the development of MIS. Based on a project of the Guangzhou Power Supply Bureau, the research method and optimization strategy of MIS are put forward using The client-server computation model in a power system enterprise. The structure and function are also intro- Duced.
收起
摘要 :
Agent-based computing is increasing regarded as an elegant and efficient way of providing access to computational resources. Several metacomputing research projects are using intel- ligent agents to manage resource space and to ma...
展开
Agent-based computing is increasing regarded as an elegant and efficient way of providing access to computational resources. Several metacomputing research projects are using intel- ligent agents to manage resource space and to map user computation to these resources in an optimal fashion. Such a project is NetSolve, developed at the University of Tennessee and Oak Ridge National Laboratory. NetSolve provides the user with a variety of interfaces that afford Direct access to preinstalled, freely available numerical libraries.
收起
摘要 :
The aim of this research is to develop an examining system of students' registration to protect the rule violation problems, such as taking two subjects where one is prerequisite of the other, in the same semester. Another problem...
展开
The aim of this research is to develop an examining system of students' registration to protect the rule violation problems, such as taking two subjects where one is prerequisite of the other, in the same semester. Another problem is taking unrequired courses more than those stated in the academic rules causing the total Units of unrequired courses over those of required courses. In the former system the advisors checked various Problems by themselves which was time consuming. This developing system will held the advisors to reduce Not only time wasted in examining the registration but also errors which may occur.
收起
摘要 :
Internet is a medium to connect millions of computers which share and access information all over the world. With the evolution of the web and its increased use in every aspect of life, the need for web security has become imperat...
展开
Internet is a medium to connect millions of computers which share and access information all over the world. With the evolution of the web and its increased use in every aspect of life, the need for web security has become imperative. As websites opt for commercial viability, the threat of hackers, viruses, or annoyance attacks becomes more pronounced. Organizations face several security-related challenges. If organizational information is hacked either through the network or through other means, it could incur a heavy cost to the company. A failure in network security could also cost the organization in terms of its goodwill and reputation. This paper identified common threats on the web and classified these threats into various categories, such as accidental, malicious, authorization, application, privacy, and access control threats. This also highlights the three main areas in which web can be secured ie. client side threats, server side threats and network side threats. This paper discusses the primary goals and objectives of security contained within the CIA Triad: Confidentiality, Integrity and Availability. Different types of attackers which are responsible for security of web are also depicted. This paper shows different attacks related to client side, server side and network side threats. Client-side Security threats are classified into: Cross Site Scripting, Cross Site Request Forgery, Broken Authentication and Session Management, Security Misconfiguration and Failure to Restrict URL Access. Server-side Security consists of Structured Query Language (SQL) Injection, Malicious File Execution, Insecure Direct Object Reference, Insecure Cryptographic Storage and Unvalidated Redirects and Forwards. The network threats highlighted are Denial of Service (DoS), Insufficient Transport Layer Protection, Eavesdropping, Data Modification, IP Address Spoofing, Sniffer attacks, Man-in-the-Middle Attack, Phishing, Brute force attack and TCP Session Hijacking. The paper shows the causes of each of the attacks and the web application metrics which were earlier defined are also highlighted. A metric named Web Application Security Metric (WASM) is proposed in this regard to make the web page secure. This metric calculates the sum of the weight of the categories like: Input validation, Authentication, Authorization, Configuration management, Sensitive data, Session management, Cryptography, Parameter manipulation, Exception management and Auditing and logging.
收起
摘要 :
Customized cancer radiation treatment planning for each patient is very useful for both a patient and a doctor because it provides the ability to deliver higher doses to a more accurately defined tumor and at the same time lower d...
展开
Customized cancer radiation treatment planning for each patient is very useful for both a patient and a doctor because it provides the ability to deliver higher doses to a more accurately defined tumor and at the same time lower doses to organs at risk and normal tissues. This can be realized by building an accurate planning simulation system to provide better treatment strategies based on each patient's tomographic data such as CT, MRI, PET, or SPECT. In this study, we develop a real-time online client-server/client collaborative environment between the client (health care professionals or hospitals) and the server/client under a secure network using telematics (the integrated use of telecommunications and medical informatics). The implementation is based on a point-to-point communication scheme between client and server/client following the WYSIWIS (what you see is what I see) paradigm. After uploading the patient tomographic data, the client is able to collaborate with the server/client for treatment planning. Consequently, the level of health care services can be improved, specifically for small radiotherapy clinics in rural/remote-country areas that do not possess much experience or equipment such as a treatment planning simulator. The telematics service of the system can also be used to provide continued medical education in radiotherapy. Moreover, the system is easy to use. A client can use the system if s/he is familiar with the Windows(TM) operating system because it is designed and built based on a user-friendly concept. This system does not require the client to continue hardware and software maintenance and updates. These are performed automatically by the server.
收起
摘要 :
Internet technology has become the backbone of information management and usage of it has been growing multifold, demanding a solution to cater the service more effectively as well as efficiently. One major requirement is how well...
展开
Internet technology has become the backbone of information management and usage of it has been growing multifold, demanding a solution to cater the service more effectively as well as efficiently. One major requirement is how well the servers would be able to cater the requests from multiple clients during peak demands. Many solutions exist to meet this requirement, but popular solution is clustering servers and sharing the load among them. This paper explores one such opportunity, using the most cost effective solution with minimal hardware and software resources.
收起
摘要 :
Labour productivity growth is a necessary condition for social and economic progress, in general, and to overcome the economic crisis facing most of the world, in special. Applying innovative solutions, based on the ITC, is one of...
展开
Labour productivity growth is a necessary condition for social and economic progress, in general, and to overcome the economic crisis facing most of the world, in special. Applying innovative solutions, based on the ITC, is one of the straight ways for achieving that objective, both important and necessary. This paper presents a software solution applicable to industrial production based on numerically controlled machines. It involves a distributed client - server communication system, combined with MLP neural networks for the recognition of the 2D industrial objects, viewed from any angle. The information on prismatic and rotational parts to be processed by numerically controlled machine, are stored on a database server together with the corresponding processing programs. The client applications run on the numerically controlled machines and on the robots serving groups of machines. While the machines are fixed, the robots are mobile and can move from a machine to another. As a novelty of the proposed solution, in some well denned situations, the clients are allowed to change messages among them, in order to avoid the server overload. The neural networks are used to help robots to recognize the parts before and during manipulation.
收起