273 results on '"User management"'
Search Results
2. Perancangan Dasbor yang Secure Scalable dan Reusable dengan Microservices Case Study Di PT. XYZ.
- Author
-
Shofyan and Isa, Sani Muhamad
- Subjects
DASHBOARDS (Management information systems) ,DATA protection ,CYBERTERRORISM ,COMPUTER architecture ,SYSTEMS development - Abstract
Copyright of Journal of Social & Technology / Jurnal Sosial dan Teknologi (SOSTECH) is the property of Green Publisher and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
3. Discuss the Technical Application of Cloud Data Center and Cloud Management Platform
- Author
-
Li, Ming, Cheng, Hang, Dong, Xiaoling, Yu, Dongbo, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Hung, Jason C., editor, Yen, Neil, editor, and Chang, Jia-Wei, editor
- Published
- 2024
- Full Text
- View/download PDF
4. Usability of 'icollege' learning management system in University Environment
- Author
-
Wijesinghe, K.H., Dilshan, U.K.T, Dilshan, K.B.G.L, Tharupathi, M.A.U, De Silva, D. I., and De Zoysa, R.R.P.
- Published
- 2022
- Full Text
- View/download PDF
5. Automobile spare parts system - Web solution
- Author
-
Jayathilake, S. M. D. A. R., Bartholomeusz, S. V., Perera, M. S. D., Dushya, Shivani R., De Silva, D. I., and Dias, S. M. D. H.
- Published
- 2022
- Full Text
- View/download PDF
6. Biobanking IT Systems, Database Structure and Web Applications
- Author
-
Mitchell, Christine, Gramatiuk, Svetlana, Sarkisian, Tamara, Kozlakidis, Zisis, Sargsyan, Karine, Sargsyan, Karine, editor, Huppertz, Berthold, editor, and Gramatiuk, Svetlana, editor
- Published
- 2022
- Full Text
- View/download PDF
7. Security Security & Integrity in FHIR Fast Healthcare Interoperability Resources (FHIR)
- Author
-
Benson, Tim, Grieve, Grahame, Benson, Tim, Series Editor, and Grieve, Grahame
- Published
- 2021
- Full Text
- View/download PDF
8. An Analysis of Content Management and User Status in Iranian Digital Library Software
- Author
-
Yaghoub Norouzi, Nayereh Jafarifar, and Azam Kanani
- Subjects
content management ,digital library ,evaluation studies ,software portlet ,user management ,Bibliography. Library science. Information resources - Abstract
Objective: Identifying the status of Iranian digital library software in terms of the use of various content management and user portlets.Methodology: This is an applied research done as a heuristic survey. The research was conducted to evaluate the capabilities of various portlets in the field of digital library management in two general areas of content management (collection process management, content production management, classification management, documentation management, loading management, content indexing management, link management and news management) and user management (user management, staff management and user security management) are used in digital library software. Statistical population of the study consists of five Digital Library Softwares Pars Azarsa, Simorgh, Tebyan, and Parwan Farakavash produced by five major library software companies in Iran (Pars Azarakhsh, Nosa, Tebyan, kavash, and Parvanpajooh). Their software products and know-how have matured over time in tandem with technological advancements in their field, with critical inputs from field experts, associated companies, organizations and institutions. They, in the recent ten years, have undertaken many landmark projects that include database and archive automation for their clients. Their knowledge base and software products are unsurpassed in the field of digital data management for libraries and document centers, and this includes the full spectrum of related requirements. All their software products are web based, integrated and user friendly Some of their major clients include the governmental institutions, private companies, national libraries and universities. The needed data was collected using a researcher-made check-list. Different types of descriptive statistical techniques in collaboration with Kolmogorov–Smirnov test, Shapiro-Wilk test and Kruskal-Wallis H test were used for analyzing the data.Findings: In terms of content management, Simorgh had the best performance. The statistical population had the best performance in the "category management" section of the content management field and the weakest performance in the "link management" section. In the field of user management, "Azarsa" had the best performance. The statistical community had the weakest performance in this area in the "forum management" section. Test of research hypotheses showed that there is no significant difference between the digital library software in the use of content management portals and user management.Conclusion: The performance of the statistical population was evaluated for 114 management portlets. The statistical population in the field of content management according to the check-list had an average performance of 80 percent and the average performance of the statistical population in the field of user management was below 63 percent, among which even "Farakavash" and "Parvan" had a performance below 50 percent. Therefore, in general comparison, it was concluded that the statistical community in the field of content management has performed better than user management.
- Published
- 2022
- Full Text
- View/download PDF
9. The Design and Application of an Web-Based Online Examination System
- Author
-
Jiang, Jilu, Wu, Baoxian, Chang, Liang, Liu, Kui, Hao, Tianyong, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Popescu, Elvira, editor, Hao, Tianyong, editor, Hsu, Ting-Chia, editor, Xie, Haoran, editor, Temperini, Marco, editor, and Chen, Wei, editor
- Published
- 2020
- Full Text
- View/download PDF
10. Remote Laboratory Offered as Hardware-as-a-Service Infrastructure.
- Author
-
Domski, Wojciech
- Subjects
RASPBERRY Pi ,DISTANCE education ,COMPUTER software development ,SYSTEMS availability ,ARCHITECTURE students ,VIDEO monitors - Abstract
This paper presents a solution for remote classes where hardware is offered as a service. The infrastructure was based on Raspberry Pi mini computers to which a set of different developments boards were connected. The proposed software architecture allows students to connect to remote resources and interact with them. Moreover, the services monitoring status of remote resources were introduced to facilitate software development and the learning process. Furthermore, live video feedback is available to visually monitor operation of the resources. Finally, a debugging server was deployed allowing us to establish a remote debugging session between a user's PC and the dev board on the server premises. The solution offers a comprehensive remote service including user management. Safety risks of the Internet-exposed infrastructure and safety precautions were discussed. The presented RemoteLab system allows students of WUST to gain knowledge, practise and realize exercises in scope of academic courses such as robot controllers and advanced robot control. Thanks to advances in remote education and utilized tools, the RemoteLab was designed and deployed, allowing stationary classes to be substituted with remote ones, while maintaining a high level of class knowledge transfer. Up to the present, the system has been utilized by over 100 students who could realize exercises and prepare for classes thanks to 24 h system availability. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. The Blockchain Random Neural Network in Cybersecurity and the Internet of Things
- Author
-
Serrano, Will, Rannenberg, Kai, Editor-in-Chief, Sakarovitch, Jacques, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Pras, Aiko, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Furbach, Ulrich, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, MacIntyre, John, editor, Maglogiannis, Ilias, editor, Iliadis, Lazaros, editor, and Pimenidis, Elias, editor
- Published
- 2019
- Full Text
- View/download PDF
12. تحليلى بروضعيت مديريت محتواوكاوبوى درفرمافؤاره(ى كتابخافه ديجيتالى ايران
- Author
-
يعقوب ذوروزى, نيره جعغرىفر, and اعظم كتعانى
- Abstract
Objective: Identifying the status of Iranian digital library software in terms of the use of various content management and user portlets. Methodology: This is an applied research done as a heuristic survey. The research was conducted to evaluate the capabilities of various portlets in the field of digital library management in two general areas of content management (collection process management, content production management, classification management, documentation management, loading management, content indexing management, link management and news management) and user management (user management, staff management and user security management) are used in digital library software. Statistical population of the study consists of five Digital Library Softwares Pars Azarsa, Simorgh, Tebyan, and Parwan Farakavash produced by five major library software companies in Iran (Pars Azarakhsh, Nosa, Tebyan, kavash, and Parvanpajooh). Their software products and know-how have matured over time in tandem with technological advancements in their field, with critical inputs from field experts, associated companies, organizations and institutions. They, in the recent ten years, have undertaken many landmark projects that include database and archive automation for their clients. Their knowledge base and software products are unsurpassed in the field of digital data management for libraries and document centers, and this includes the full spectrum of related requirements. All their software products are web based, integrated and user friendly. Some of their major clients include the governmental institutions, private companies, national libraries and universities. The needed data was collected using a researcher-made check-list. Different types of descriptive statistical techniques in collaboration with Kolmogorov-Smirnov test, Shapiro-Wilk test and Kruskal-Wallis H test were used for analyzing the data. Findings: hl terms of content management, Simorgh had the best performance. The statistical population had the best performance in the "category management" section of the content management field and the weakest performance in the "link management" section. In the field of user management, "Azarsa" had the best performance. The statistical community had the weakest performance in this area in the "forum management" section. Test of research hypotheses showed that there is no significant difference between the digital library software in the use of content management portals and user management. Conclusion: The performance of the statistical population was evaluated for 114 management portlets. The statistical population in the field of content management according to the check-list had an average performance of 80 percent and the average performance of the statistical population in the field of user management was below 63 percent, among which even "Farakavash" and "Parvan" had a performance below 50 percent. Therefore, in general comparison, it was concluded that the statistical community in the field of content management has performed better than user management. [ABSTRACT FROM AUTHOR]
- Published
- 2021
13. Patient-centric medical service matching with fine-grained access control and dynamic user management.
- Author
-
Wu, Shu, Zhang, Aiqing, Gao, Ya, and Xie, Xiaojuan
- Subjects
- *
MEDICAL supplies , *ACCESS control , *MEDICAL records , *MEDICAL personnel , *MEDICAL care , *MEDICAL care costs - Abstract
Personal health records (PHR) offer significant benefit for patients, such as reducing medical cost and improving the quality of medical care. Majority of the current schemes lack provisions for tracking and revoking malicious doctors. The explicit access policies are prone to leaking patient private information. What is more, owning to the uneven distribution of medical supplies, shocking computational overhead during decryption is a burden that cannot be ignored for busy medical workers. This paper proposed a patient-centric medical service matching scheme that supports policy hiding, attribute matching, fine-grained access control, and user dynamic management. The scheme uses ciphertext policy-based attribute encryption (CP-ABE) to achieve fine-grained access control and supports policy hiding. It utilizes white-box tracking technology and binary tree structure to achieve malicious doctor tracking. Revocation information is ciphertext to achieve dynamic management of doctors. From the experimental results, it can be concluded that our protocol achieves both patient-centric security and performance advantages. • A secure patient-centric medical service matching scheme with policy hiding. • Achieve fine-grained access control and withdraw untrustworthy doctors. • Low computational and communication overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. User Management
- Author
-
Cheng, Fu and Cheng, Fu
- Published
- 2017
- Full Text
- View/download PDF
15. Revisión Sistemática de Literatura sobre el protocolo LDAP como mecanismo centralizado para la autentificación de usuarios en múltiples sistemas.
- Author
-
Cueva-Hurtado, Mario, Figueroa-Diaz, Roberth, Aguilar-Soto, Wilmer, and Armijos-Ordoñez, Manuel
- Abstract
Copyright of KnE Engineering is the property of Knowledge E DMCC and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
- Full Text
- View/download PDF
16. Aplicación móbil para o recoñecemento de enfermedades por medio de imaxes
- Author
-
Puente-Castro, Alejandro, Universidade da Coruña. Facultade de Informática, Roade Conejo, Jaime, Puente-Castro, Alejandro, Universidade da Coruña. Facultade de Informática, and Roade Conejo, Jaime
- Abstract
[Resumen]: En este Trabajo de Fin de Grado se aborda la clasificación de imágenes con fines médicos. Se pretende que esto ayude a los pacientes en una detección más temprana de las siguientes enfermedades digestivas: pólipos, esofagitis y colitis ulcerosa. Mientras que la segunda se produce en el esófago, las dos restantes se producen en el colon y en el recto, pero tienen en común que no son fácilmente distinguibles para alguien que no se haya informado bien sobre éstas. Para lograr este fin, se ha diseñado y desarrollado una aplicación móvil que permita el reconocimiento de las siguientes cuatro clases: tres de ellas representando cada una de las tres enfermedades mencionadas anteriormente y, por otro lado, una clase representando imágenes de aparatos digestivos sanos. También se ofrece la posibilidad de que un administrador gestione la creación y eliminación de cuentas asignadas a médicos para que éstos puedan asignarse sus pacientes y observar sus historiales con el fin de controlar sus estados de salud. A pesar de que esta aplicación está orientada a la clasificación de las enfermedades, se le otorga gran importancia a la gestión de usuarios y las funciones que pueden realizar cada uno para diferenciarlos claramente. Se pretende ofrecer una interfaz sencilla y amigable para los usuarios nuevos, pero también útil para los que pretendan utilizarla más habitualmente como pueden ser médicos o administradores. La aplicación no pretende ser un sustitutivo de la atención médica, si no un complemento de ella. Se ha pretendido seguir todo el proceso de desarrollo de un proyecto software, no únicamente la codificación. A lo largo de esta memoria se irán explicando los pasos seguidos para su completa realización, como pueden ser el análisis y diseño previos., [Abstract]: This Degree Thesis addresses the classification of images for medical purposes. This is intended to help patients in earlier detection of the following digestive diseases: polyps, esophagitis and ulcerative colitis. While the second occurs in the esophagus, the remaining two occur in the colon and rectum, but they have in common that they are not easily distinguishable for someone who has not been well informed about them. To achieve this end, a mobile application has been designed and developed that allows the recognition of the following four classes: three of them representing each of the three diseases mentioned above and, on the other hand, one class representing images of healthy digestive systems. There is also the possibility for an administrator to manage the creation and deletion of accounts assigned to doctors so that they can assign their patients and observe their records in order to monitor their health status. Although this application is oriented towards the classification of diseases, great importance is given to user management and the functions that each one can perform to clearly differentiate them. The aim is to offer a simple and friendly interface for new users, but also useful for those who intend to use it more regularly, such as doctors or administrators. The application is not intended to be a substitute for medical care, but rather a complement to it. The aim has been to follow the entire development process of a software project, not just the coding. Throughout this report, the steps followed for its complete implementation will be explained, such as the previous analysis and design.
- Published
- 2023
17. Using Principal component analysis to identify latent factors affecting cost- and time overrun in public construction projects
- Author
-
Simon Wyke, Søren Munch Lindhard, and Jesper Kranker Larsen
- Subjects
Cost ,Project preparation ,Quality control ,User management ,Building and Construction ,General Business, Management and Accounting ,Management ,Time ,Latent factors ,Principal component analysis (PCA) ,Project management ,Architecture ,Public construction ,Civil and Structural Engineering - Abstract
PurposeCost and time are two of the primary benchmarks in which construction projects are measured. A variety of factors, however, affect cost and time on construction projects, as identified in previous research. This has led to a need for better understanding how factors affecting cost and time overruns on public construction projects can be managed more efficiently. The purpose of this paper is to address these issues.Design/methodology/approachIn this study 26 factors affecting cost and time overruns on construction projects were identified, through qualitative interviews with project managers from Danish governmental agencies and through a literature review. Through principal component analyses the 26 factors were subsequently narrowed down to four primary latent factors.FindingsThe identified four latent factors affecting cost and time overruns on public construction projects were lack of quality management, lack of project pre-planning, lack of user management and lack of project management.Originality/valuePrevious research has focussed on increasing knowledge by identifying and ranking factors affecting time and cost performance. This has led to the identification of an overwhelming number of factors to use for managing construction projects. The present research reduced the number of factors by clustering them into key latent factors responsible for most of the deviation in performance, narrowing the scope of construction cost and time management into a few tangible key focus areas. This supports and improves fast decision-making that is necessary in a changeable environment such as construction.
- Published
- 2023
18. Development of a service for collecting data on attestation of students. Development application authorization
- Subjects
веб пÑиложение ,ÑпÑавление полÑзоваÑелÑми ,web application ,security methods ,меÑÐ¾Ð´Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи ,ÑÑÐµÑ Ð¾Ñенок ,аккÑмÑлÑÑÐ¸Ñ Ð´Ð°Ð½Ð½ÑÑ ,data accumulation ,оÑенка ÑÑпеваемоÑÑи ,authorization ,grade accounting ,performance assessment ,user management ,авÑоÑизаÑÐ¸Ñ - Abstract
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ â «РазÑабоÑка ÑеÑвиÑа ÑбоÑа даннÑÑ Ð°ÑÑеÑÑаÑии ÑÑÑденÑов. РазÑабоÑка авÑоÑизаÑии пÑиложениÑ». ÐадаÑей ÑабоÑÑ Ð¿Ð¾ ÑазÑабоÑке ÐвÑоÑизаÑии веб-пÑиложениÑ, докÑменÑообоÑоÑа,пÑи ÑÑом позволив вÑем пÑеподаваÑелÑм ÑвоевÑеменно пÑедоÑÑавлÑÑÑ Ð´Ð°Ð½Ð½Ñе Ð´Ð»Ñ Ð¾ÑÑеÑноÑÑи в полном обÑеме и не завиÑимо Ð¾Ñ Ð¼ÐµÑÑа в коÑоÑом Ñеловек на Ñ Ð¾Ð´Ð¸ÑÑÑ. Ðнализ пÑедмеÑной облаÑÑи, ÑекÑÑем ÑÑнке ÑеÑений дал возможноÑÑÑ Ð²ÑбÑаÑÑ Ð¾Ð¿ÑималÑно Ð¿Ð¾Ð´Ñ Ð¾Ð´ÑÑий ÑоÑÐ¼Ð°Ñ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ðµ ÑÑого пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½ÐµÐ¾Ð±Ñ Ð¾Ð´Ð¸Ð¼Ð¾ пÑодÑмаÑÑ ÑиÑÑÐµÐ¼Ñ ÐвÑоÑизаÑии, Ð´Ð»Ñ Ð½Ð¾ÑмалÑной ÑабоÑÑ Ð±Ð¸Ð·Ð½ÐµÑÑ Ð»Ð¾Ð³Ð¸ÐºÐ¸ и ÑазгÑаниÑÐµÐ½Ð¸Ñ Ð¿Ñав полÑзоваÑелей, за ÑÑÐµÑ ÐвÑоÑизаÑии могÑÑ Ð´Ð¾Ð±Ð°Ð²Ð»ÑÑÑÑÑ Ð±Ð¸Ð·Ð½ÐµÑ ÑÑнкÑионал, огÑаниÑиваÑÑÑÑ Ð¸Ð»Ð¸ ÑаÑÑиÑÑÑÑÑÑ Ð´Ð¾ÑÑÑп к новÑм Ñазделам или возможноÑÑи . Так же за ÑÑÐµÑ ÐвÑоÑизаÑии закÑÑÐ²Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ ÐºÑажи неÑазÑаеÑеннÑÑ Ð´Ð°Ð½Ð½ÑÑ Ð¿Ð¾Ð»ÑзоваÑелей и инÑоÑмаÑÐ¸Ñ ÑÐ¾Ñ ÑаненнÑÑ\загÑÑженнÑÑ Ð² пÑилоежении. РпÑоÑеÑÑе Ñ Ð¾Ð´Ð° ÑабоÑÑ, ÑазÑабаÑÑвалоÑÑ ÐºÐ»Ð¸ÐµÐ½Ñ-ÑеÑвеÑное пÑиложение, Ñ Ð½ÑжнÑм ÑÑнкÑионаклом,в ÑазÑабоÑке бÑли иÑполÑÐ·Ð¾Ð²Ð°Ð½Ñ ÑледÑÑÑие ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸: Java , Spring Boot , база даннÑÑ , PostgreSQL, Docker ,Hibernate и ÑÑеймвоÑк Ñаблон - Thymeleaf,Gradle. Ðак дополниÑелÑнÑе инÑÑÑÑменÑÑ ÑазÑабоÑки - IDE - IntelliJ IDEA и Postman., The theme of the final qualification work is âDevelopment of a service for collectingstudent assessment data. Development of application authorization.The task of working on the development of Authorization web application,workflow, while allowing all teachers to timelyprovide data for reporting in full and regardless of locationin which the person is.Analysis of the subject area, the current market of solutions made it possible to chooseoptimally suited application formatfor this application, it is necessary to think over the Authorization system, fornormal operation of business logic and differentiation of user rights,due to Authorization, business functionality can be added, limited orexpand access to new sections or opportunities.Also, due to Authorization, it closes the possibility of stealing unauthorizeduser data and information saved/loaded inapplication.In the course of the work, a client-server application was developed,with the desired functionality, the following were used in the developmenttechnologies: Java, Spring Boot, database, PostgreSQL, Docker, Hibernate andframework template - Thymeleaf, Gradle.As additional development tools - IDE - IntelliJ IDEA and Postman.
- Published
- 2023
- Full Text
- View/download PDF
19. A Three-Dimensional Role Based User Management Model in Web Information Systems
- Author
-
Li, Jiangfeng, Zhang, Chenxi, Lu, Wei, editor, Cai, Guoqiang, editor, Liu, Weibin, editor, and Xing, Weiwei, editor
- Published
- 2013
- Full Text
- View/download PDF
20. Research on News Recommendation System Based on Deep Network and Personalized Needs
- Author
-
Feng Ling and Weijia Zhang
- Subjects
Technology ,Article Subject ,Computer Networks and Communications ,Computer science ,Process (engineering) ,media_common.quotation_subject ,User management ,TK5101-6720 ,Recommender system ,Set (abstract data type) ,World Wide Web ,Order (business) ,Telecommunication ,Electrical and Electronic Engineering ,Function (engineering) ,Information Systems ,media_common - Abstract
In order to solve the problems of poor performance of the recommendation system caused by not considering the needs of users in the process of news recommendation, a news recommendation system based on deep network and personalized needs is proposed. Firstly, it analyzes the news needs of users, which is the basis of designing the system. The functions of the system module mainly include the network function module, database module, user management module, and news recommendation module. Among them, the user management module uses the deep network to set the user news interest model, inputs the news data into the model, completes the personalized needs of the news, and realizes the design of the news recommendation system. The experimental results show that the proposed system has good effect and certain advantages.
- Published
- 2021
21. Shibboleth and Community Authorization Services: Enabling Role-Based Grid Access
- Author
-
Gao, Fan, Tan, Jefferson, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Xiang, Yang, editor, Cuzzocrea, Alfredo, editor, Hobbs, Michael, editor, and Zhou, Wanlei, editor
- Published
- 2011
- Full Text
- View/download PDF
22. Authentication and User Management
- Author
-
Fox, Tim, Scott, John Edward, Spendolini, Scott, Fox, Tim, Scott, John Edward, and Spendolini, Scott
- Published
- 2011
- Full Text
- View/download PDF
23. Security and User Management
- Author
-
Krause, Jörg
- Published
- 2009
- Full Text
- View/download PDF
24. User Management
- Author
-
Baclit, Ryan, Sicam, Chivas, Membrey, Peter, Newbigin, John, Baclit, Ryan, Sicam, Chivas, Membrey, Peter, and Newbigin, John
- Published
- 2009
- Full Text
- View/download PDF
25. User Management and Data Loading
- Author
-
Fernandez, Iggy
- Published
- 2009
- Full Text
- View/download PDF
26. Authentication and User Management
- Author
-
von Weitershausen, Philipp
- Published
- 2008
- Full Text
- View/download PDF
27. Automobile Spare Parts System – Web Solution
- Author
-
Jayathilake S. M. D. A. R, S. V. Bartholomeusz, M. S. D Perera, Shivani Dushya R., D. I. De Silva, S. M. D. H. Dias, Jayathilake S. M. D. A. R, S. V. Bartholomeusz, M. S. D Perera, Shivani Dushya R., D. I. De Silva, and S. M. D. H. Dias
- Abstract
“With the right spare parts on hand, your business can continue without ceasing operations even after a major malfuction, allowing you to avoid loss of crucial time and profits as you wait for the right parts to be delivered”. This system which is specialized in trading automobile spare parts claims to provide sufficient spare parts throughout the life cycle of products, to the clients in need, so as to achieve sustainability. This research discusses how such a system can be designed and implemented to assist clients in search of the best automobile parts that fits their purpose. The research paper has been divided in such a manner to explore and comprehend each and every aspect of the system in detail. Initially, the introduction will provide a simple overview of the system with details regarding what the system will achieve; this will be followed by the methodology of the implementation process. The functionalities of the proposed system will then be discussed with the entails of the testing methodologies and the outcomes.
- Published
- 2022
28. Usability of “iCollege” Learning Management System in University Environment
- Author
-
K.H. Wijesinghe, Dilshan.U.K.T, Dilshan.K.B.G.L, Tharupathi.M.A.U, D. I. De Silva, R.R.P. De Zoysa, K.H. Wijesinghe, Dilshan.U.K.T, Dilshan.K.B.G.L, Tharupathi.M.A.U, D. I. De Silva, and R.R.P. De Zoysa
- Abstract
In recent years, there has been an increasing demand in integrating new technologies into educational procedures. The Learning Management System (LMS), a web-based educational technology, helps teachers meet their pedagogical objectives, organize course materials, and support students. Learning Management Software (LMS) has been implemented in many universities across the world to assist link faculty and students outside of the classroom setting. It is a digital environment that allows the efficient distribution of academic materials, Easy access to information, instant access to up-to-date content, maintain a library virtually and enhanced communication through a single location. The main scope of developing this Learning Management System is to resolve above-described features and address many issues in the Academic process and content deliverables. The software solution has been implemented by addressing each requirement of administrators, Students, and Lecturers following each phase of the software life cycle in order to provide real time operations and advanced functions for the web based LMS system
- Published
- 2022
29. Authentication and User Management
- Author
-
von Weitershausen, Philipp
- Published
- 2007
- Full Text
- View/download PDF
30. User Management for Virtual Organizations
- Author
-
Denemark, Jiří, Matyska, Luděk, Ruda, Miroslav, Jankowski, Michal, Meyer, Norbert, Wolniewicz, Pawel, Gorlatch, Sergei, editor, and Danelutto, Marco, editor
- Published
- 2007
- Full Text
- View/download PDF
31. Authentication and user management
- Author
-
von Weitershausen, Philipp
- Published
- 2005
- Full Text
- View/download PDF
32. User Management and Database Security
- Author
-
Alapati, Sam R.
- Published
- 2005
- Full Text
- View/download PDF
33. Remote Laboratory Offered as Hardware-as-a-Service Infrastructure
- Author
-
Wojciech Domski
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,Electrical and Electronic Engineering ,remote laboratory ,remote education ,hardware as a service ,STM32 ,Raspberry Pi ,micro services ,user management ,security ,open source - Abstract
This paper presents a solution for remote classes where hardware is offered as a service. The infrastructure was based on Raspberry Pi mini computers to which a set of different developments boards were connected. The proposed software architecture allows students to connect to remote resources and interact with them. Moreover, the services monitoring status of remote resources were introduced to facilitate software development and the learning process. Furthermore, live video feedback is available to visually monitor operation of the resources. Finally, a debugging server was deployed allowing us to establish a remote debugging session between a user’s PC and the dev board on the server premises. The solution offers a comprehensive remote service including user management. Safety risks of the Internet-exposed infrastructure and safety precautions were discussed. The presented RemoteLab system allows students of WUST to gain knowledge, practise and realize exercises in scope of academic courses such as robot controllers and advanced robot control. Thanks to advances in remote education and utilized tools, the RemoteLab was designed and deployed, allowing stationary classes to be substituted with remote ones, while maintaining a high level of class knowledge transfer. Up to the present, the system has been utilized by over 100 students who could realize exercises and prepare for classes thanks to 24 h system availability.
- Published
- 2022
- Full Text
- View/download PDF
34. IMPLEMENTASI APLIKASI USER MANAGEMENT HOTSPOT MIKROTIK BERBASIS PHP DENGAN APPLICATION PROGRAMING INTERFACE (API) DAN FRAMEWORK BOOTSTRAP
- Author
-
Nyoman Bagus Suweta Nugraha and I Kadek Juni Arta
- Subjects
Network development life cycle ,Router ,Flowchart ,User profile ,Application programming interface ,business.industry ,Computer science ,User management ,law.invention ,Software ,law ,Interfacing ,Software engineering ,business - Abstract
The rapid development of technology has had an influence on people's lives, one of which is the need for hotspot network facilities. The rise of various kinds of businesses, government agencies and educational institutions that provide free hotspots that aim to facilitate the teaching and learning process and due to the rapid development of hotspot technology requires a tool called a router to manage hotspot nets and interfacing applications for easier operation of the router system mikrotik and one of the implementing agencies implementing this technology is STMIK Campus Denpasar. The method used in the design and manufacture of this software is the NDLC method (Network Development Life Cycle. Then the design is carried out with the Flowchart process and applied to the application using PHP and API (Application Programming Interface) for the creation of web-based applications and microtic links with software which are made. The advantages possessed by proxy and user management applications this can facilitate in managing and monitoring users who are connected to managed hotspots, and can also provide bandwidth limitations for each user according to the limits that we have given to the user profile settings.
- Published
- 2020
35. Analysis of the Problems, Causes and Countermeasures in the Brand Construction of the Postgraduate Entrance Examination Institutions
- Author
-
Yuanle Cheng and Hai Hu
- Subjects
Service quality ,Process (engineering) ,Brand awareness ,media_common.quotation_subject ,05 social sciences ,User management ,Investment (macroeconomics) ,Maturity (finance) ,Popularity ,0502 economics and business ,Institution ,050211 marketing ,Business ,Marketing ,050203 business & management ,media_common - Abstract
In the theory of brand life cycle, there are three stages of brand: entry, growth, maturity and decline. In the initial stage of establishing a brand, the postgraduate entrance examination institution paid a huge cost of human and material resources. When the brand has a little popularity, there is little investment in continuing to expand the popularity, and there is a lack of continuous investment. At present, the brand of the postgraduate entrance examination institution is in the growing period. Maintaining the brand popularity, making it not decline, even more brilliant needs to carry on the brand operation. Brand marketing needs both internal and external innovation of the brand [1], combining the four elements of marketing products, prices, channels and services, and achieving brand maintenance through advertising monitoring, word-of-mouth marketing, user management and other ways. Promote the brand image, increase the brand awareness, and realize the continuous brilliance of the brand. This paper analyzes the problems and causes in the brand construction of postgraduate entrance examination, and puts forward corresponding solutions. This paper analyzes the problems and causes in the process of building the brand, and finds out the rules and ways to build and maintain the brand of education and training institutions.
- Published
- 2020
36. Web-aplikacija za administraciju korisnika u sustavima s provjerom autentičnosti protokolima OAuth2 i OpenID Connect
- Author
-
Kovač, Vinko and Milašinović, Boris
- Subjects
KeyCloak ,TEHNIČKE ZNANOSTI. Računarstvo ,SQLite ,access control ,web application ,kontrola pristupa ,web-aplikacija ,upravljanje korisnicima ,autentifikacija ,OAuth2 ,IdentityServer ,NET ,jedinstvena prijava ,Single Sign On ,TECHNICAL SCIENCES. Computing ,authentication ,user management - Abstract
U sklopu ovog završnog rada su napravljene dvije web-aplikacije, jedna koja koristi IdentityServer i druga koja koristi KeyCloak. Cilj ovog rada je bio pokazati kako napraviti jednostavnu klijentsku aplikaciju za upravljanje korisnicima, a u kojoj se jednostavno promijeni usluga za autentifikaciju. Aplikacije omogućuju prijavu i odjavu korisnika, pregled informacija o trenutnom korisniku, registraciju novog korisnika i pregled informacija o svim korisnicima. U sklopu ovog rada su prikazani i neki mehanizmi provjere autentičnosti te je napravljen pregled ostalih usluga za autentifikaciju. Obje web-aplikacije su izrađene u programskom jeziku C#, u .NET okviru, a kao baza podataka za web-aplikaciju koja koristi IdentityServer je korištena SQLite baza podataka. As part of this final thesis, two web applications were made, one that uses IdentityServer and the other one that uses KeyCloak. The aim of this paper was to demonstrate how to build simple client application for user management, in which the authentication service can be easily changed. Applications allow users to log in and log out, view information about the current user, registrate new user and to view information about all registered users. As part os this paper, some authentication mechanisms were presented and overview of other authentication services was made. Both web applications were made using C# programming language, in .NET framework, and the SQLite database was used as the database for web application that uses IdentityServer.
- Published
- 2022
37. Gestión de un servidor de identidad y su relación con los usuarios
- Author
-
Navío Torrecilla, David, Universitat Autònoma de Barcelona. Escola d'Enginyeria, and Bolta Torrell, Helena
- Subjects
Cadena de suministro ,SQL ,Traçabilitat ,Cadena de subministrament ,Gestión de usuarios ,Gestión de tokens ,Traceability ,User management ,Trazabilidad ,Supply chain ,C# ,ZETES ,Innovació ,Token management ,NET ,Innovación ,Seguretat ,API ,Security ,Gestió d'usuaris ,Innovation ,Gestió de tokens ,Seguridad - Abstract
El objetivo de este trabajo es realizar una aplicación de gestión de un servidor de identidad para mejorar la seguridad y acceso a distintos servicios de la empresa de trazabilidad ZETES. Esto se consigue mediante una API realizada en el framework de Microsoft .NET y la utilización del BackOffice y la base de datos de identidades de clientes de la empresa, de los cuales necesitamos gestionar sus permisos y brindarles seguridad. The objective of this project is to make a management application of an identity server to improve security and access to different services of the traceability company ZETES. This is achieved through an API made in the Microsoft .NET framework and the use of the BackOffice and customer identities of the company, of which we need to manage their permissions and provide them with security. L' objectiu d' aquest treball és realitzar una aplicació de gestió d' un servidor d' identitat per millorar la seguretat i accés a diferents serveis de l' empresa de traçabilitat ZETES. Això s'aconsegueix mitjançant una API realitzada en el framework de Microsoft .NET i la utilització del BackOffice i la base de dades d'identitats de clients de l'empresa, dels quals necessitem gestionar els seus permisos i brindar-los seguretat.
- Published
- 2022
38. A Room Management System
- Author
-
Falkowski, Christian, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Streitz, Norbert A., editor, Konomi, Shin’ichi, editor, and Burkhardt, Heinz-Jürgen, editor
- Published
- 1998
- Full Text
- View/download PDF
39. Basic Web App Authentication
- Author
-
Tshepo Chris Nokeri
- Subjects
World Wide Web ,Authentication ,User authentication ,business.industry ,restrict ,Computer science ,Dash ,Organizational context ,Web application ,User management ,business - Abstract
If you intend on sharing a Dash web app across users, especially in an organizational context, ensure that you amply secure the app and restrict certain functionalities based on the user level. The considerable complexity of user management and privacy varies tremendously from one organization to another, one project to another; thus, there is no universal approach to user authentication.
- Published
- 2021
40. Desarrollo de una aplicación web para la gestión de recetas de cocina
- Author
-
Moreira Barrionuevo, Roberth Paul
- Subjects
Gestión de usuarios ,Grado en Ingeniería Informática-Grau en Enginyeria Informàtica ,Web design ,Angular ,User management ,Diseño web ,ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES ,Cocina ,Web application ,Spring Boot ,Cooking ,Aplicación web ,Web development - Abstract
[ES] La siguiente memoria detalla el desarrollo de una aplicación web, cuyo objetivo es proveer un sitio donde compartir y gestionar recetas de cocina y discutir acerca de temas culinarios. La aplicación se encuentra estructurada en dos partes, el desarrollo del back-end empleando el framework de desarrollo Spring, con el cual se construirá un API REST de consultas HTTP. Por otro lado el desarrollo del front-end, la interfaz de usuario, que se construirá con el framework de desarrollo web Angular empleando el lenguaje de programación web TypeScript. A lo largo de la memoria se van a detallar las fases de desarrollo empleadas para construir la aplicación web, la especificación de requisitos, el análisis, la implementación y pruebas, además de otros aspectos relacionados con la resolución de problemes y como se ha llegado a la solución propuesta., [EN] The following report details the development of a web application, whose objective is to provide a site to share and manage cooking recipes and discuss about culinary topics. The application is structured in two parts, the back-end development using the Spring development framework, with which a REST API forHTTP queries will be built. On the other hand, the front-end development, the user interface, which will be built with the Angular web development framework using the Ty-peScript web programming language. Throughout the report we will detail the development phases used to build the web application, the requirements specification, analysis, implementation and testing, as well as other aspects related to problem solving and how the proposed solution has been reached., [CA] La següent memòria detalla el desenvolupament d’una aplicació web, l’objectiu de la qual és proveir un lloc on compartir i gestionar receptes de cuina i discutir sobre temes culinaris. L’aplicació es troba estructurada en dues parts, el desenvolupament del back-end emprant el framework de desenvolupament Spring, amb el qual es construirà un API REST de consultes HTTP. D’altra banda el desenvolupament del front-end, la interfície d’usuari, que es construirà amb el framework de desenvolupament web Angular emprant el llenguatge de programació web TypeScript. Al llarg de la memòria es detallaran les fases de desenvolupament emprades per a construir l’aplicació web, l’especificació de requisits, l’anàlisi, la implementació i proves, a més d’altres aspectes relacionats amb la resolució problemes i com se ha arribat a la solució proposada.
- Published
- 2021
41. Design and Implementation of Art Design Teaching Information System Based on Multimedia Technology
- Author
-
Yadong Zhang
- Subjects
Multimedia ,Process (engineering) ,business.industry ,Art design ,Computer science ,Information technology ,User management ,computer.software_genre ,Order (business) ,Digital art ,ComputingMilieux_COMPUTERSANDEDUCATION ,Information system ,Informatization ,business ,computer - Abstract
With the rapid development of information technology, the construction of social informatization has become an important part of all walks of life in the process of reform and development, and the construction of teaching resources is an important part of realizing educational informatization. At the same time, with the rise of digital art craze, the demand for digital talents is very urgent, and training high-quality digital talents has become an issue of great concern to the society. For the purpose of improving teaching efficiency, this paper designs an art design teaching information system based on multimedia technology, which realizes the functions of user management, course management, homework management and online practice module. Using multimedia technology and database technology to build an open art design teaching information system. In order to better serve the education, teaching and educational administration of art design specialty, and promote the informationization process of school teaching.
- Published
- 2021
42. Construction and Application on Parallel Corpus for College Japanese Translation Teaching
- Author
-
Xiaoling Yu
- Subjects
Collocation ,Computer science ,business.industry ,Process (engineering) ,media_common.quotation_subject ,Teaching method ,Carry (arithmetic) ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,User management ,Inverted index ,Translation (geometry) ,computer.software_genre ,ComputingMilieux_COMPUTERSANDEDUCATION ,Artificial intelligence ,business ,Function (engineering) ,computer ,Natural language processing ,media_common - Abstract
The bilingual parallel corpus has the closest relationship with translation teaching. It provides abundant teaching resources and convenient teaching methods, which is conducive to the formation of relatively stable translation skills in a large number of practices. In order to carry out college Japanese translation teaching based on parallel corpus, three subsystems including parallel corpus function, corpus management, query statistics and user management, as well as several functional frameworks under each sub-subsystem are designed; the inverted index file of parallel corpus is designed which is used to improve retrieval efficiency; specific application strategies are proposed: select language materials in a standardized manner, increase language input in the teaching process, cultivate students' technical awareness, apply students’ typical mistakes or translated works to teaching feedback, and make good marks of corpus work with alignment, carry out corpus-based translation collocation teaching, and cultivate students' autonomous learning ability.
- Published
- 2021
43. SINGLE SIGN ON AS AN EFFECTIVE WAY OF MANAGING USER IDENTITY IN DISTRIBUTED WEB SYSTEMS. THE ACTGO-GATE PROJECT CASE STUDY.
- Author
-
Kutera, Robert and Gryncewicz, Wiesława
- Subjects
ONLINE identities ,COMPUTER access control ,DISTRIBUTED computing - Abstract
Copyright of Business Informatics / Informatyka Ekonomiczna is the property of Uniwersytet Ekonomiczny we Wroclawiu and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
- Full Text
- View/download PDF
44. Desarrollo de una aplicación web para la gestión de recetas de cocina
- Author
-
Martí Campoy, Antonio, Rodríguez Ballester, Francisco, Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors, Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica, Moreira Barrionuevo, Roberth Paul, Martí Campoy, Antonio, Rodríguez Ballester, Francisco, Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors, Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica, and Moreira Barrionuevo, Roberth Paul
- Abstract
[ES] La siguiente memoria detalla el desarrollo de una aplicación web, cuyo objetivo es proveer un sitio donde compartir y gestionar recetas de cocina y discutir acerca de temas culinarios. La aplicación se encuentra estructurada en dos partes, el desarrollo del back-end empleando el framework de desarrollo Spring, con el cual se construirá un API REST de consultas HTTP. Por otro lado el desarrollo del front-end, la interfaz de usuario, que se construirá con el framework de desarrollo web Angular empleando el lenguaje de programación web TypeScript. A lo largo de la memoria se van a detallar las fases de desarrollo empleadas para construir la aplicación web, la especificación de requisitos, el análisis, la implementación y pruebas, además de otros aspectos relacionados con la resolución de problemes y como se ha llegado a la solución propuesta., [EN] The following report details the development of a web application, whose objective is to provide a site to share and manage cooking recipes and discuss about culinary topics. The application is structured in two parts, the back-end development using the Spring development framework, with which a REST API forHTTP queries will be built. On the other hand, the front-end development, the user interface, which will be built with the Angular web development framework using the Ty-peScript web programming language. Throughout the report we will detail the development phases used to build the web application, the requirements specification, analysis, implementation and testing, as well as other aspects related to problem solving and how the proposed solution has been reached., [CA] La següent memòria detalla el desenvolupament d’una aplicació web, l’objectiu de la qual és proveir un lloc on compartir i gestionar receptes de cuina i discutir sobre temes culinaris. L’aplicació es troba estructurada en dues parts, el desenvolupament del back-end emprant el framework de desenvolupament Spring, amb el qual es construirà un API REST de consultes HTTP. D’altra banda el desenvolupament del front-end, la interfície d’usuari, que es construirà amb el framework de desenvolupament web Angular emprant el llenguatge de programació web TypeScript. Al llarg de la memòria es detallaran les fases de desenvolupament emprades per a construir l’aplicació web, l’especificació de requisits, l’anàlisi, la implementació i proves, a més d’altres aspectes relacionats amb la resolució problemes i com se ha arribat a la solució proposada.
- Published
- 2021
45. EDA aided Virtual Simulation Electronic Experiment Design and Implementation
- Author
-
Chen Wang, Chengkai Tang, Yi Zhang, Lingling Zhang, Bao Tao, and Huajie Lin
- Subjects
Signal processing ,Coronavirus disease 2019 (COVID-19) ,Active learning (machine learning) ,Computer science ,Design of experiments ,Electronic design automation ,User management ,Software system ,Simulation ,Data transmission - Abstract
Due to the COVID-19, experimental opening time conflict and other reasons, online virtual simulation is a necessary supplement to electronic experiments. This article uses Electronic Design Automation (EDA) technology, combined with the existing software system, to establish a virtual simulation experiment platform, the platform includes user management module, data transmission module and simulation design module, which can be realized at any place, any time, and any platform. It effectively saves the school's hardware resources, and students can use the open characteristics of the system to freely conduct course experiments, so as to stimulate their experimental interest, cultivate open thinking, exercise active learning ability, and strengthen innovative experimental ability.
- Published
- 2021
46. Democratizing cellular access with CellBricks
- Author
-
Mark Theis, Sylvia Ratnasamy, Scott Shenker, Shaddi Hasan, Silvery Fu, and Zhihong Luo
- Subjects
Competition (economics) ,Authentication ,Operator (computer programming) ,Cellular architecture ,Computer science ,Overhead (engineering) ,User management ,Computer security ,computer.software_genre ,computer ,Barriers to entry - Abstract
Markets in which competition thrives are good for both consumers and innovation but, unfortunately, competition is not thriving in the increasingly important cellular market. We propose CellBricks, a novel cellular architecture that lowers the barrier to entry for new operators by enabling users to consume access on-demand from any available cellular operator — small or large, trusted or untrusted. CellBricks achieves this by moving support for mobility and user management (authentication and billing) out of the network and into end hosts. These changes, we believe, bring valuable benefits beyond enabling competition: they lead to a cellular infrastructure that is simpler and more efficient. We design, build, and evaluate CellBricks, showing that its benefits come at little-to-no cost in performance, with application performance overhead between -1.6% to 3.1% of that achieved by current cellular infrastructure.
- Published
- 2021
47. Noise Acquisition System of underwater propulsion device based on LabVIEW
- Author
-
Fu-Bin Tian, Fei-Xiang Li, Zhou-Li Li, and Yu-Jia Liang
- Subjects
Signal processing ,Noise ,Data acquisition ,Standardization ,Computer science ,business.industry ,User management ,Underwater ,Propulsion ,business ,Login ,Computer hardware - Abstract
In order to improve the performance of underwater vehicle, the noise produced by underwater vehicle is studied. In this design, PXIe-6366 data acquisition module and computer are used as the main hardware. By mastering the application technology of virtual instrument, a noise data acquisition system with the functions of configuration, acquisition and data playback is designed. At the same time, the login module and user management module are designed to ensure the security and standardization of the system.
- Published
- 2021
48. Federated Access to Collaborative Data and Compute Infrastructures
- Author
-
Memon, Ahmed Shiraz, Morris Riedel, Faculty of Industrial Eng., Mechanical Eng. and Computer Science (UI), Iðnaðarverkfræði-, vélaverkfræði- og tölvunarfræðideild (HÍ), School of Engineering and Natural Sciences (UI), Verkfræði- og náttúruvísindasvið (HÍ), University of Iceland, and Háskóli Íslands
- Subjects
Notendastýring ,Authentication ,Open Standards ,Persónuskilríki ,Peer-to-peer ,Doktorsritgerðir ,User Management ,Federated Identity Management ,Auðkenni ,Deilitækni ,Staðlar ,Tölvunarfræði ,Service Discovery - Abstract
Distributed data and compute infrastructures aim to provide access to their data or compute services across disciplinary and geographical borders to their users for scientific research. The services are highly collaborative in nature yet independent and shared among multiple scientific communities. Information security and service discovery are two essential functions and precursors for enabling such research collaborations. Given the infrastructure’s heterogeneity in data, compute, or other service offerings, the services often require several kinds of authentication protocols. Moreover, the users bring their own organisational identity and relevant attributes to access the infrastructure services. Should the services’ authentication protocol differ from that of the user’s, the user may not be able to access the target service. Therefore credential translation, attribute harmonisation, scalable trust and authorisation policy management need to be incorporated. In addition to that, enabling service discovery in the federated infrastructures is crucial. Proprietary service registration and query interfaces hinder interoperability across infrastructures. Hence, instead of proprietary and centralised registry approaches, a federated and standard-based registry and discovery model is essential for interoperability across the collaborating infrastructures. This thesis is motivated by a case study consisting of three multi-national research infrastructures: compute (EGI), data management (EUDAT), and a community infrastructure supporting linguistic research (CLARIN). The thesis contributes EMIR, the European Middleware Initiative (EMI) Registry, a decentralised service registry that supports both hierarchical and peer-to-peer topologies and enables collaboration in large-scale infrastructures. The thesis also contributes the B2ACCESS service which implements a proxy model with credential translation and scalable trust and authorisation policy management. Finally, the thesis contributes an integrative architecture realised as a unified cross-infrastructure (or inter-federation) service access framework, which bridges EMIR and B2ACCESS to enable service discovery and access in federated environments., Dreifð gögn og reiknistoðkerfi leitast við að gefa þverfaglegum aðilum, jafnt innlendum sem erlendum, aðgengi að gögnum eða reikniþjónustum til nota við vísindarannsóknir. Reikniþjónusturnar eru samhæfðar en jafnframt sjálfstæðar í eðli sínu, dreifðar um fjöldamörg vísindasamfélög. Upplýsingaöryggi og þjónustuleitir eru tvö nauðsynleg hlutverk og undanfari slíkra vísinda samhæfinga. Vegna þess að stoðkerfin innihalda misleit gögn, reiknigetu, eða annara aðgengilegra þjónustna, þurfa þjónusturnar margar tegundir af auðkenningarleiðum. Ennfremur þurfa notendur að styðjast við auðkenni viðkomandi stofnanna ásamt öðrum viðeigandi eigindum til þess að fá aðgang að stoðkerfisþjónustunum. Ef auðkenningarleið þjónustunnar er frábrugðin frá leið notandans getur hann mögulega ekki fengið aðgang að tilgreindum þjónustum. Þar af leiðandi er þörf fyrir viðbót með skilríkjahliðrun, eigindasamhæfingu, stigfrjálsu trausti og heimildarstjórnun. Þar fyrir utan er mikilvægt að virkja þjónustuleitir í dreifðum inniviðum kerfisins. Innskráning í sérþjónustur og fyrirspurnaviðmót hindrar samvirkni stoðkerfanna. Þar af leiðandi er mikilvægt að styðjast við dreift kerfi byggð á staðlaðri skrásetningu og leitarmódeli í stað miðlægrar skrásetningar fyrir samvirkni á milli ólíkra samhæfðra stoðkerfa. Þessi doktorsritgerð er rökstudd með ferilsathugun sem notast við innviði þriggja fjölþjóðlegra rannsóknastofnanna: reiknistofnun (EGI), gagnaumsýsla (EUDAT), og samfélagsinnviði til styrktar tungumálarannsóknum (CLARIN). Framlag ritgerðinnar er EMIR, skráarsafn (e. registry) fyrir European Middleware Initiative (EMI), ómiðlæg þjónustuskrá sem styður bæði stigveldis grannfræði og deilitækni og býður upp á samvinnu í stórtækum innviðum. Að auki er framlag þessarar ritgerðar einnig B2ACCESS þjónustan sem nothæfir vefselsmódel með skilríkjahliðrun og stigfrjálsu trausti og auðkennisreglustýringum. Að lokum er framlag þessarar ritgerðar einnig samþætt högun innleidd sem þjónstuumgjörð um samtvinnaða margþætta innviði sem brúa EMIR og B2ACCESS til að leyfa þjónustuleit og aðgang í dreifðu sambandsumhverfi.
- Published
- 2021
49. Implementasi Jaringan Hotspot Kampus Menggunakan Router Mikrotik
- Author
-
Yogi Isro Mukti
- Subjects
Router ,Bandwidth management ,Multimedia ,business.industry ,Computer science ,Network on ,User management ,computer.software_genre ,Hotspot (Wi-Fi) ,ComputingMilieux_COMPUTERSANDEDUCATION ,Academic community ,Internet network ,The Internet ,business ,computer - Abstract
This research aims to implement the existing hotspot network on the campus of the Pagar Alam College of Technology by using a proxy router for the needs of all users, especially students and lecturers to support the academic process. This research is based on the existing internet network at the Pagar Alam College of Technology, which cannot be enjoyed entirely by students and lecturers on campus, because the internet network is only intended for the staff, LPPM room and multimedia lab room and the network lab room is only a few computers which is connected to the internet using a LAN cable. This study uses the method PPDIOO is prepare, plan, design, implement, operate, optimize network has been generated using a proxy router, starting with providing infrastructure, user management, bandwidth management and has been used by the academic community.
- Published
- 2019
50. Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment
- Author
-
Yean Jung Choi and Yanghoon Kim
- Subjects
Computer science ,Information and Communications Technology ,User management ,Convergence (relationship) ,Authentication system ,Computer security ,computer.software_genre ,computer - Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.