Search results for "Operating system"
showing 10 items of 134 documents
Embedding the Remote Application Control: Visual API for PDA Programming
2009
PDAs are more and more used as advanced adaptive HEI (human-environment interaction) interfaces, thus enabling their users to easily operate applications remotely running in pervasive computing scenarios. Based on a previous implementation, in this paper we discuss the development of a new set of .NET-compliant Application Programming Interfaces to be used within the Visual Studio IDE. Our main goal is to provide programmers with a set of components to be used with the common drag-and-drop operation, in order to embed a remote application control within an application running on the PDA and vice-versa. The interaction relies on ad-hoc communication protocols over a framework devoted to pair…
Simulation-Based Performance Study of e-Commerce Web Server System – Results for FIFO Scheduling
2013
The chapter concerns the issue of overloaded Web server performance evaluation using a simulation-based approach. We focus on a Business-to-Consumer (B2C) environment and consider server performance both from the perspective of computer system efficiency and e-business profitability. Results of simulation experiments for the Web server system under First-In-First-Out (FIFO) scheduling are discussed. Much attention has been paid to the analysis of the impact of a limited server system capacity on business-related performance metrics.
The Myths of and Solutions for Android OS Controlled and Secure Environment
2015
<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords">…
Web Monitoring System and Gateway for Serial Communication PLC
2012
Abstract An industrial process requires interacting with the rest of the plant, being able to exchange data with other devices and monitoring systems in order to optimize production, reporting information and providing control capabilities to distant users. Internet, and, especially web browsers are an excellent tool to provide information for remote users, allowing not only monitoring but also controlling the industrial process as an SCADA software or HMI system. The proposed system does not need specific proprietary software and its associated license costs. In this work, a webserver system is implemented under a Freescale microcontroller, acting as a gateway for a simple PLC with single …
Comparing the Capabilities of Mobile Platforms for Business App Development
2015
Businesses increasingly embrace the possibilities of mobile computing. While there is broad advice for app developers in general, development of apps for enterprises is hardly covered. Business apps support internal processes and contribute to customer relationship management. The heterogeneity of platforms for mobile devices makes development difficult. At the same time, companies seek to support several platforms with their apps to maximize customer acceptance and to support the platforms best suited for their employees. Aiming at improving the knowledge on business app development, we present a framework for assessing mobile platforms. For this purpose, we have developed a distinct set o…
The Web Computer and Its Operating System: A New Approach for Creating Web Applications
2019
Web applications require not only more sophisticated infrastructure than traditional single-PC applications, but also a different way of thinking, where network-specific aspects have to be considered. In this paper, we introduce the web computer concept, which factors out network-related issues and provides an illusion of a single computer with directly attached CPUs, memory, and I/O devices. By assuming the web computer and its open operating system (webAppOS) as a target platform for web applications, developers can preserve the same level of thinking as when developing classical desktop applications. With this approach, which corresponds to the physiology of the human brain, web applicat…
Scheduling independent stochastic tasks under deadline and budget constraints
2018
This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…
The Computer Control Software for MAMI
1980
The computer control system of the Mainz Microtron is designed to keep track with the modular and step-by-step construction of the three accelerator stages. The system is up to now based on two loosely coupled HP1000 minicomputers, interfaced via CAMAC to the accelerator components and to the operator desk. The control software is divided into several layers of portable processes distributed to both computers. Communication between the processes, access to the data bank and the routing of CAMAC interrupts are handled via a message system which operates with symbolic addresses.
Robustly correlated key‐medical image for DNA‐chaos based encryption
2021
Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…
Smart Technologies for Improved Software Maintenance
2015
Steadily increasing complexity of software systems makes them difficult to configure and use without special IT knowledge. One of the solutions is to improve software systems making them “smarter”, i.e. to supplement software systems with features of self-management, at least partially. This paper describes several software components known as smart technologies, which facilitate software use and maintenance. As to date smart technologies incorporate version updating, execution environment testing, self-testing, runtime verification and business process execution. The proposed approach has been successfully applied in several software projects.