眾賞文庫
全部分類
  • 抗擊疫情 >
    抗擊疫情
    病毒認知 防護手冊 復工復產(chǎn) 應急預案 防控方案 英雄事跡 院務工作
  • 成品畢設 >
    成品畢設
    外文翻譯 畢業(yè)設計 畢業(yè)論文 開題報告 文獻綜述 任務書 課程設計 相關資料 大學生活 期刊論文 實習報告
  • 項目策劃 >
    項目策劃
    土地準備 規(guī)劃設計 開工開盤 項目綜合 竣工移交 售后移交 智慧方案 安全專項 環(huán)境影響評估報告 可行性研究報告 項目建議書 商業(yè)計劃書 危害評估防治 招投標文件
  • 專業(yè)資料 >
    專業(yè)資料
    人文法律 環(huán)境安全 食品科學 基礎建設 能源化工 農(nóng)林牧畜 綜合待分類 教育經(jīng)驗 行政人力 企業(yè)管理 醫(yī)學衛(wèi)生 IT技術 土木建筑 考研專題 財會稅務 公路隧道 紡織服裝
  • 共享辦公 >
    共享辦公
    總結匯報 調(diào)研報告 工作計劃 述職報告 講話發(fā)言 心得體會 思想?yún)R報 事務文書 合同協(xié)議 活動策劃 代理加盟 技術服務 求職簡歷 辦公軟件 ppt模板 表格模板 融資協(xié)議 發(fā)言演講 黨團工作 民主生活
  • 學術文檔 >
    學術文檔
    自然科學 生物科學 天文科學 醫(yī)學衛(wèi)生 工業(yè)技術 航空、航天 環(huán)境科學、安全科學 軍事 政學 文化、科學、教育、 交通運輸 經(jīng)濟 語言、文字 文學 農(nóng)業(yè)科學 社會科學總論 藝術 歷史、地理 哲學 數(shù)理科學和化學 綜合性圖書 哲學宗教
  • 經(jīng)營營銷 >
    經(jīng)營營銷
    綜合文檔 經(jīng)濟財稅 人力資源 運營管理 企業(yè)管理 內(nèi)控風控 地產(chǎn)策劃
  • 教學課件 >
    教學課件
    幼兒教育 小學教育 初中教育 高中教育 職業(yè)教育 成人教育 高等教育 考研資源 試題真題 作業(yè)習題 課后答案 綜合教學
  • 土木建筑 >
    土木建筑
    專項施工 應急預案 建筑規(guī)范 工藝方案 技術交底 施工表格 圖片圖集
  • 課程導學 >
    課程導學
    醫(yī)學綜合 中醫(yī)養(yǎng)生 醫(yī)學研究 身心發(fā)展 醫(yī)學試題 影像醫(yī)學 醫(yī)院辦公 外科醫(yī)學 老年醫(yī)學 內(nèi)科醫(yī)學 婦產(chǎn)科 神經(jīng)科 醫(yī)學課件 眼鼻喉科 皮膚病科 腫瘤科 兒科醫(yī)學 康復醫(yī)學 全科醫(yī)學 護理學科 針灸學科 重癥學科 病毒學科 獸醫(yī) 藥學
    • 簡介:2960英文單詞,18300英文字符,中文4800字出處KHAN,HA,SYED,A,MOHAMMAD,A,本研究還將幫助計算機用戶使用可能的步驟和技術來保護他們的系統(tǒng)和信息免受對其網(wǎng)絡系統(tǒng)的任何可能的攻擊。關鍵詞關鍵詞計算機病毒,計算機威脅,實驗室分析1介紹網(wǎng)絡安全是當今世界最關注的問題。隨著信息安全研究人員揭示廣泛使用的技術中的新威脅和安全漏洞,這種威脅每天都在增加,這使得安全性面臨更高的風險1。網(wǎng)絡攻擊的數(shù)量是過去幾年中的最高水平,對任何計算機系統(tǒng)的最大威脅是計算機病毒,這證明自己是破壞系統(tǒng)最具破壞性和最常見的技術。此外,調(diào)查各種安全功能24可能是未來探索保護大數(shù)據(jù)的有趣途徑5。本研究報告將解決這些威脅,我們將嘗試找出可以使用這些工具來破壞安全系統(tǒng)的攻擊者的操作和類型。最后,我們將討論可以防止我們被這些惡意和復雜的計算機病毒感染的技巧和技巧。11病毒計算機病毒基本上是一種計算機代碼,它能夠將自身復制到其他文件并執(zhí)行其代碼中提到的所需任務。由于其性質(zhì),病毒是討論中最常用的術語。我們可以使用的最合適的術語是自我復制程序,因為最初的意圖是創(chuàng)建一個人工智能程序,但是后來它為了不同的目的改變了。有許多病毒有其自身的目的和傳播技術1。通常用于計算機病毒的基本例程如下。計算機病毒的功能圖,具有搜索,復制和反檢測程序,以避免任何來自防病毒軟件的檢測,如圖1所示。圖2表示AVASTANTIVIRUSSOFTWARE為其用戶提供的更新數(shù)量,即每個月都在增加。圖2更好地理解了數(shù)據(jù)庫每月獲取新的和更多關于計算機病毒的數(shù)據(jù),這些數(shù)據(jù)應該與每個用戶共享,以防止他們受到任何新的威脅。圖4更多被病毒感染的域的類型圖5更多受病毒感染的國家全球地圖(圖5)代表其互聯(lián)網(wǎng)用戶受到計算機病毒高度攻擊的國家。圖6過去十二個月,反病毒軟件阻止的病毒攻擊次數(shù)上圖表示每個月反病毒軟件阻止的攻擊次數(shù)。盡管如此,每個月的值仍然比較4月份的最后2個月,因為攻擊次數(shù)多于3月份,這表明攻擊次數(shù)再次增加。這些結果表明,病毒攻擊和系統(tǒng)感染迅速增加,威脅數(shù)量最多。這些威脅肯定需要認真關注,因為這些受感染的計算機系統(tǒng)可以進一步用于其他攻擊。被感染的計算機被用作僵尸,攻擊者可以完全控制它。此外,我們需要向您展示哪些計算機系統(tǒng)和操作系統(tǒng)受到更多威脅,并且與其他系統(tǒng)和操作系統(tǒng)相比可能會受到感染。
      下載積分: 10 賞幣
      上傳時間:2024-03-12
      頁數(shù): 21
      7人已閱讀
      ( 4 星級)
    • 簡介:0中文中文3800字,字,2200單詞,單詞,14萬英文字符萬英文字符出處出處GUPTAP,GOVILMCSPRINGWEBMVCFRAMEWORKFORRAPIDOPENSOURCEJ2EEAPPLICATIONDEVELOPMENTACASESTUDYJINTERFACE,2010,2616841689畢業(yè)設計(論文)外文文獻翻譯畢業(yè)設計(論文)外文文獻翻譯院系系計算機與信息工程學院年級專年級專業(yè)業(yè)姓名名學號號附件件SPRINGWEBMVCFRAMEWORKFORRAPIDOPENSOURCEJ2EEAPPLICATIONDEVELOPMENT指導老師評語指導教師簽名年月日SPRINGWEBMVCFRAMEWORKFORRAPIDOPENSOURCEJ2EEAPPLICATIONDEVELOPMENTACASESTUDY2ARCHITECTUREOFTHEAPPLICATIONSPRINGFRAMEWORKSCOMESWITHRICHSETOFFEATURES,LETUSDISCUSSTHESEFEATURESINBRIEF1INVERSIONOFCONTROLINVERSIONOFCONTROLORIOCISONEOFTHETECHNIQUESUSEDTOWIRESERVICESORCOMPONENTSTOANAPPLICATIONPROGRAMTHEIOCIS“ASOFTWAREDESIGNPATTERNANDSETOFASSOCIATEDPROGRAMMINGTECHNIQUESINWHICHTHEFLOWOFCONTROLOFASYSTEMISINVERTEDINCOMPARISONTOTHETRADITIONALINTERACTIONMODE”INIOCINSTEADOFANAPPLICATIONCALLINGTHEFRAMEWORK,ITISTHEFRAMEWORKTHATCALLSTHECOMPONENTSSPECIFIEDBYTHEAPPLICATIONTHEIOCCANBEEXPLAINEDAS“INJECTIONOFREQUIREDRESOURCESORDEPENDENCYATRUNTIMEINTOTHEDEPENDENTRESOURCE“WHICHISALSOKNOWNASDEPENDENCYINJECTIONTHEORGSPRINGFRAMEWORKBEANSFACTORYBEANFACTORYISTHEACTUALREPRESENTATIONOFTHESPRINGIOCCONTAINERWHICHISRESPONSIBLEFORCONTAININGANDMANAGINGTHEBEANSTHEBEANFACTORYINTERFACEISTHECENTRALIOCCONTAINERINTERFACEINSPRINGABEANISSIMPLYANOBJECTTHATISINSTANTIATEDANDMANAGEDBYASPRINGIOCCONTAINERTHESEBEANSANDTHEDEPENDENCIESBETWEENTHEMAREREFLECTEDINTHECONFIGURATIONMETADATAUSEDBYACONTAINER2CONSTRUCTORDEPENDENCYINJECTIONWECANUSETHEJAVACLASSCONSTRUCTORTOLOADTHEBEANVALUESAJAVACLASSISDEFINEDWITHACONSTRUCTOROFSINGLEFIELDDETAILSXMLFILEPROVIDESTHEVALUETOBEPASSESTOTHECONSTRUCTORNOWANOTHERJAVALOADSTHEXMLFILEUSINGTHEBEANFACTORYMETHODTHISUSESTHEXMLFILETOLOADVALUESINTHECONSTRUCTOROFTHEJAVAFILETHISISUSEDTOPASSVALUESTOTHECONSTRUCTOR3SETTERDEPENDENCYINJECTIONWITHEVERYBEANWEDEFINEDTHEGETTERSANDSETTERSWECANALSOUSESETTERSMETHODTOSETTHEVALUESINTHEBEANSSETTERSMETHODOVERRIDESTHEVALUESLOADEDFROMTHEBEANS4INTERFACEWECANDEFINETHEINTERFACECLASSINSPRINGTOIMPLEMENTTHISWEWILLIMPORTINTERFACETOTHEJAVAPROGRAMNOWWECANUSEMETHODSDEFINEDININTERFACEUSINGSPRINGANDXML5INHERITANCEONEJAVACLASSCANACQUIREDTHEPROPERTIESOFANOTHERCLASSJUSTLIKEAJAVAPROGRAMTHEREARETHREESUBTYPESOFIT1ABSTRACTBEANSDECLAREDABSTRACTCANNOTBEINHERITEDINTHESPRINGS2PARENTCHILDWECANDEFINEHIERARCHYLIKEPARENTCHILD3PARENTCHILDSUBCHILDRELATIONSHIPINTHISWECANDEFINEHIERARCHYFOR3ORMORECLASSES6AUTOWIRINGAUTOWIRINGISUSEDTOMAPTHEPROPERTYNAME,VALUESINXMLFILEWITHJAVAFILETHEREAREFOURTYPESTOINTEGRATEITBYNAME,BYTYPE,CONSTRUCTOR,AUTODETECTIFNOTHINGISDEFINEDABOUTITTHENBYNAMEISTHEDEFAULT
      下載積分: 10 賞幣
      上傳時間:2024-03-15
      頁數(shù): 20
      6人已閱讀
      ( 4 星級)
    • 簡介:字數(shù)英文字數(shù)英文21992199單詞,單詞,1215712157字符;中文字符;中文38373837漢字漢字出處出處KARTHICKKARTHICKS,BINUBINUSANDROIDANDROIDSECURITYSECURITYISSUESISSUESANDANDSOLUTIONSJSOLUTIONSJINTERNATIONALINTERNATIONALCONFERENCECONFERENCEONONINNOVATIVEINNOVATIVEMECHANISMSMECHANISMSFORFORINDUSTRYINDUSTRYAPPLICATIONSAPPLICATIONSICIMIAICIMIA20176866892017686689外文文獻外文文獻ANDROIDSECURITYISSUESANDSOLUTIONSABSTRACTANDROIDOPERATINGSYSTEMUSESTHEPERMISSIONBASEDMODELWHICHALLOWSANDROIDAPPLICATIONSTOACCESSUSERINFORMATION,SYSTEMINFORMATION,DEVICEINFORMATIONANDEXTERNALRESOURCESOFSMARTPHONETHEDEVELOPERNEEDSTODECLARETHEPERMISSIONSFORTHEANDROIDAPPLICATIONTHEUSERNEEDSTOACCEPTTHESEPERMISSIONSFORSUCCESSFULINSTALLATIONOFANANDROIDAPPLICATIONTHESEPERMISSIONSAREDECLARATIONSATTHETIMEOFINSTALLATION,IFTHEPERMISSIONSAREALLOWEDBYTHEUSER,THEAPPCANACCESSRESOURCESANDINFORMATIONANYTIMEITNEEDNOTREREQUESTFORPERMISSIONSAGAINANDROIDOSISSUSCEPTIBLETOVARIOUSSECURITYATTACKSDUETOITSWEAKNESSINSECURITYTHISPAPERTELLSABOUTTHEMISUSEOFAPPPERMISSIONSUSINGSHAREDUSERID,HOWTWOFACTORAUTHENTICATIONSFAILDUETOINAPPROPRIATEANDIMPROPERUSAGEOFAPPPERMISSIONSUSINGSPYWARE,DATATHEFTINANDROIDAPPLICATIONS,SECURITYBREACHESORATTACKSINANDROIDANDANALYSISOFANDROID,IOSANDWINDOWSOPERATINGSYSTEMREGARDINGITSSECURITYKEYWORDSANDROIDPERMISSIONSSHAREDUSERIDSECURITYDATATHEFTSPYWAREIOSWINDOWSIINTRODUCTIONAVERSATILEWORKINGFRAMEWORKOSISPROGRAMMINGTHATPERMITSCELLPHONES,OFTHEPAPERIISECURITYATTACKSINANDROIDAPERMISSIONESCALATIONATTACKITALLOWSAMALICIOUSAPPLICATIONTOCOLLABORATEWITHOTHERAPPLICATIONSSOASTOACCESSCRITICALRESOURCESWITHOUTREQUESTINGFORCORRESPONDINGPERMISSIONSEXPLICITLYBCOLLISIONATTACKANDROIDSUPPORTSSHAREDUSERIDITISATECHNIQUEWHEREINTWOORMOREAPPLICATIONSHARETHESAMEUSERIDSOTHATTHEYCANACCESSTHEPERMISSIONSWHICHAREGRANTEDTOEACHOTHERFOREXAMPLE,IFAPPLICATIONAHASPERMISSIONSTOREAD_CONTACTS,READ_PHONE_STATUSANDBHASPERMISSIONSTOREAD_MESSAGES,LOCATION_ACCESS,IFBOTHTHEAPPLICATIONSUSETHESAMEUSERIDSHAREDUSERID,THENITISPOSSIBLEFORAPPLICATIONATOUSETHEPERMISSIONSGRANTEDTOITSELFANDTHEPERMISSIONSGRANTEDTOBSIMILARLY,ITISPOSSIBLEFORAPPLICATIONBTOUSETHEPERMISSIONSGRANTEDTOITSELFANDTHEPERMISSIONSGRANTEDTOAEVERYANDROIDAPPLICATIONHASUNIQUEIDTHATISITSPACKAGENAMEANDROIDSUPPORTSSHAREDUSERIDITISANATTRIBUTEINANDROIDMANIFESTXMLFILEIFTHISATTRIBUTEASSIGNEDWITHTHESAMEVALUEINTWOORMOREAPPLICATIONSANDIFTHESAMECERTIFICATESIGNSTHESEAPPLICATIONSTHEYCANACCESSPERMISSIONSGRANTEDTOEACHOTHERCOLLISIONATTACKHASBEENCLASSIFIEDASDIRECTCOLLISIONATTACKANDINDIRECTCOLLISIONATTACKADIRECTCOLLISIONATTACKISWHEREINAPPLICATIONCOMMUNICATESDIRECTLYININDIRECTCOLLISIONATTACKAPPLICATIONCOMMUNICATESVIATHIRDPARTYAPPLICATIONORCOMPONENTCTIMEOFCHECKANDTIMEOFUSEATTACKTHEMAINREASONFORTOCTOUATTACKISNAMINGCOLLISIONNONAMINGRULEORCONSTRAINTISAPPLIEDTOANEWPERMISSIONDECLARATIONMOREOVER,PERMISSIONSIN
      下載積分: 10 賞幣
      上傳時間:2024-03-12
      頁數(shù): 16
      14人已閱讀
      ( 4 星級)
    • 簡介:5304英文單詞,32432英文字符,中文9138字出處DARIECAJAXANDPHPBUILDINGRESPONSIVEWEBAPPLICATIONSMPACKTPUBLISHING,2006(如果感覺年份太老,可以改為近5年或者近2年,畢竟很多畢業(yè)生都這么做)此文檔包含中文翻譯英文原文,格式經(jīng)過整理,下載后直接可用。外文標題AJAXANDPHPBUILDINGRESPONSIVEWEBAPPLICATIONSCHAPTER1AJAXANDTHEFUTUREOFWEBAPPLICATIONS外文作者DARIECAJAXANDPHPBUILDINGRESPONSIVEWEBAPPLICATIONSCHAPTER1AJAXANDTHEFUTUREOFWEBAPPLICATIONS1INTRODUCTION“COMPUTER,DRAWAROBOT“SAIDMYYOUNGCOUSINTOTHEFIRSTCOMPUTERHEHADEVERSEENSINCEIHADINSTRUCTEDITNOTTOLISTENTOSTRANGERS,THECOMPUTERWASNTRECEPTIVETOTHISCOMMANDIFYOURELIKEME,YOURFIRSTTHOUGHTWOULDBE“HOWSILLY“OR“HOWFUNNY“BUTTHISISAMISTAKEOUREDUCATEDANDMODELEDBRAINSHAVELEARNEDHOWTOWORKWITHCOMPUTERSTOACERTAINDEGREEPEOPLEAREBEINGEDUCATEDTOACCOMMODATECOMPUTERS,TOCOMPENSATEFORTHELACKOFABILITYOFCOMPUTERSTOUNDERSTANDHUMANSONTHEOTHERHAND,HUMANSCANTACCOMMODATEVERYWELLTHEMSELVES,BUTTHATSANOTHERSTORYTHISLITTLESTORYISRELEVANTTOTHEWAYPEOPLEINSTINCTIVELYWORKWITHCOMPUTERSINANIDEALWORLD,THATSPOKENCOMMANDSHOULDHAVEBEENENOUGHTOHAVETHECOMPUTERPLEASEMYCOUSINTHEABILITYOFTECHNOLOGYTOBEUSERFRIENDLYHASEVOLVEDVERYMUCHINTHEPASTYEARS,BUTTHERESSTILLALONGWAYTILLWEHAVEREALINTELLIGENTCOMPUTERSUNTILTHEN,PEOPLENEEDTOLEARNHOWTOWORKWITHCOMPUTERSSOMETOTHEEXTENTTHATTHEYENDUPLOVINGABLACKSCREENWITHATINYCOMMANDPROMPTONITNOTINCIDENTALLY,THECOMPUTERWORKINGHABITSOFMANYAREDRIVENBYSOFTWAREWITHUSERINTERFACESTHATALLOWFORINTUITIVEANDENJOYABLEHUMANINTERACTIONTHISPROBABLYEXPLAINSTHEPOPULARITYOFTHERIGHTMOUSEBUTTON,THEWONDEROFFANCYFEATURESSUCHASDRAGANDDROP,ORTHATSIMPLETEXTBOXTHATSEARCHESCONTENTALLOVERTHEINTERNETFORYOUINJUST01SECONDSORSOITSAYSTHESOFTWAREINDUSTRYORTHEPROFITABLEPARTOFIT,ANYWAYHASSEEN,ANALYZED,ANDLEARNEDNOWTHEMARKETISFULLOFPROGRAMSWITHSHINYBUTTONS,ICONS,WINDOWS,ANDWIZARDS,ANDPEOPLEAREPAYINGALOTOFMONEYFORTHEMBUILDINGUSERFRIENDLYSOFTWAREHASALWAYSBEENEASIERWITHDESKTOPAPPLICATIONSTHANWITHWEBAPPLICATIONS,SIMPLYBECAUSETHEWEBWASDESIGNEDASAMEANSFORDELIVERINGTEXTANDIMAGES,ANDNOTCOMPLEXFUNCTIONALITYTHISPROBLEMHASGOTTENSIGNIFICANTLYMOREPAINFULINTHELASTFEWYEARS,WHENMOREANDMORESOFTWARESERVICESANDFUNCTIONALITYAREDELIVEREDVIATHEWEBCONSEQUENTLY,MANYTECHNOLOGIESHAVEBEENDEVELOPEDANDARESTILLBEINGDEVELOPEDTOADDFLASHYLIGHTS,ACCESSIBILITY,ANDPOWERTOWEBAPPLICATIONSNOTABLEEXAMPLESINCLUDEJAVAAPPLETSANDMACROMEDIAFLASH,WHICHREQUIRETHEUSERSTOINSTALLSEPARATELIBRARIESINTOTHEIRWEBBROWSERS2DELIVERINGFUNCTIONALITYVIATHEWEBWEBAPPLICATIONSAREAPPLICATIONSWHOSEFUNCTIONALITYISPROCESSEDONAWEBSERVER,ANDISDELIVEREDTOTHEENDUSERSOVERANETWORKSUCHASTHEINTERNETORANINTRANETTHEENDUSERSUSEATHINCLIENTWEBBROWSERTORUNWEBAPPLICATIONS,WHICHKNOWSHOWTODISPLAYANDEXECUTETHEDATARECEIVEDFROMTHESERVERINCONTRAST,DESKTOPAPPLICATIONSAREBASEDONATHICKCLIENTALSOCALLEDARICHCLIENTORAFATCLIENT,WHICHDOESMOSTOFTHEPROCESSINGWEBAPPLICATIONSEVOLVEDREAMINGTHATONEDAYTHEYLLLOOKANDBEHAVELIKETHEIRMATUREANDPOWERFULRELATIVES,THEDESKTOPAPPLICATIONSTHEBEHAVIOROFANYCOMPUTERSOFTWARETHATINTERACTSWITHHUMANSISNOWEVENMOREIMPORTANTTHANITUSEDTOBE,BECAUSENOWADAYSTHECOMPUTERUSERBASEVARIESMUCHMORETHANINTHEPAST,WHENTHEUSERSWERETECHNICALLYSOUNDASWELLNOWYOUNEEDTODISPLAYGOODLOOKINGREPORTSTOCINDY,THESALESDEPARTMENTMANAGER,ANDYOUNEEDTOPROVIDEEASYTOUSEDATAENTRYFORMSTODAVE,THESALESPERSONBECAUSEENDUSERSATISFACTIONISALLTHATMATTERS,THESOFTWAREAPPLICATIONYOUBUILDMUSTBESATISFACTORYTOALLTHEUSERSTHATINTERACTWITHITASFARASWEBAPPLICATIONSARECONCERNED,THEIREVOLUTIONTOMATURITYPROCESSWILLBECOMPLETEWHENTHEAPPLICATIONSINTERFACEANDBEHAVIORWILLNOTREVEALWHETHERTHEFUNCTIONALITYISDELIVEREDBYTHELOCALDESKTOPORCOMESTHROUGHFIBERORAIRDELIVERINGUSABLEINTERFACESVIATHEWEBUSEDTOBEPROBLEMATICSIMPLYBECAUSEFEATURESTHATPEOPLEUSEWITHTHEIRDESKTOPAPPLICATIONS,SUCHASDRAGANDDROP,ANDPERFORMINGMULTIPLETASKSONTHESAMEWINDOWATTHESAMETIME,WERENOTPOSSIBLEANOTHERPROBLEMWITHBUILDINGWEBAPPLICATIONSISSTANDARDIZATIONTODAY,
      下載積分: 10 賞幣
      上傳時間:2024-03-16
      頁數(shù): 31
      23人已閱讀
      ( 4 星級)
    • 簡介:3000英文單詞,17000英文字符,中文5100字出處INDI,TS,YALAGI,PS,NIRGUDE,MA2016USEOFJAVAEXCEPTIONSTACKTRACETOIMPROVEBUGFIXINGSKILLSOFINTERMEDIATEJAVALEARNERS2016INTERNATIONALCONFERENCEONLEARNINGANDTEACHINGINCOMPUTINGANDENGINEERINGLATICE使用JAVA異常堆棧跟蹤來改進中級JAVA學習者的漏洞修復技巧作者TRUPTISINDI,PRATIBHASYALAGI,MANISHAANIRGUDE譯文摘要今天的行業(yè)需要關注開發(fā)過程中的軟件質(zhì)量,而不僅僅是軟件交付??梢栽谲浖_發(fā)生命周期的不同階段測量,監(jiān)控和測試軟件質(zhì)量。軟件的重大失敗會影響金錢以及公司的聲譽。在這種情況下,在更短的時間內(nèi)修復漏洞是一個重要因素。今天對工科學生的挑戰(zhàn)是擁有程序編寫技能以及漏洞修復技能,并在規(guī)定的時間內(nèi)完成任務。在這里,我們介紹了如何改進漏洞修復技巧的實驗。我們在信息技術學科三年級學生的JAVA編程課程中進行了實驗。這個實驗是使用JAVA異常堆棧跟蹤來查找JAVA程序中的漏洞并在規(guī)定的時間內(nèi)修復它們。為了測試該實驗的效果,進行了預測試后實驗研究以及感知調(diào)查。我們發(fā)現(xiàn)超過65%的學生在規(guī)定的時間內(nèi)成功修復了漏洞,大約20%的學生能夠修復漏洞,但不是在規(guī)定的時間內(nèi)。大約8085%的學生在課程內(nèi)處于分析和修復程序中漏洞的狀態(tài)。關鍵字JAVA編程,調(diào)試,JAVA異常堆棧跟蹤,異常處理,漏洞修復技巧1介紹計算機編程是工程課程的基礎課程。此類中添加的各種計算機編程語言是C編程語言,C,C#,JAVA等。這些計算機編程語言是軟件開發(fā)過程所需的基本構建塊。學生應具備良好的計算機編程概念知識,包括程序編寫技巧,問題解決方案設計技巧,程序分析技巧和程序調(diào)試技巧。如今,行業(yè)需要關注開發(fā)過程中的軟件質(zhì)量,而不僅僅是軟件交付??梢栽谲浖_發(fā)生命周期的不同階段測量,監(jiān)控和測試軟件質(zhì)量。在教授編程課程時,需要向學生詳細闡述所有這些事實。在今天的教學過程中,只有程序寫作技能的知識是不夠的8。除了程序編寫技巧,漏洞修復技能還可以幫助學生編寫高質(zhì)量的程序。在許多實際系統(tǒng)中,例如服務器,基于安卓平臺的系統(tǒng)和設備以及嵌入式系統(tǒng),由于其面向對象的特性,穩(wěn)定性,可移植性和安全性,JAVA是高要求的編程語言7。因此,IT行業(yè)需要JAVA程序員有優(yōu)秀的程序寫作技巧和漏洞修復技巧。在本文中,我們介紹了在信息技術學科三年級學生的JAVA編程課程中進行的實驗。本實驗的主要目的是使用JAVA異常堆棧跟蹤來理解JAVA程序中的異常,并在規(guī)定的時間內(nèi)修復程序中的錯誤。在所提出的實驗中,進行了預測試后實驗研究以及感知調(diào)查。代碼非常悲慘,如果之后沒有刪除調(diào)試消息,則會引入運行時開銷。在所提出的實驗中遵循的方法不需要很長時間并且不需要經(jīng)常進行代碼修改,而是僅需要理解和分析異常堆棧跟蹤以修復程序中的漏洞/錯誤。在這里,學生需要了解JAVA異常堆棧跟蹤在程序捕獲或拋出異常時的作用。異常堆棧跟蹤的知識將幫助學生找到導致錯誤的正確代碼。因此JAVA異常堆棧跟蹤將比其他方法更快地幫助學生修復漏洞。實驗的目標是了解異常堆棧跟蹤并分析異常堆棧跟蹤,以提高對JAVA學習者的概念性理解并修復JAVA程序中的漏洞。本實驗的主要目的是使用JAVA異常堆棧跟蹤來理解JAVA程序中的異常,并在規(guī)定的時間內(nèi)修復程序中的錯誤。為了找到研究問題的答案,與信息技術學科的三年級工科學生一起進行了測試前測試實驗研究以及感知調(diào)查。首先進行了預編程測試。在這里,每個學生都有三個帶有漏洞的程序。提到持續(xù)時間來修復這些程序中的漏洞并成功執(zhí)行這些程序。每個學生的程序執(zhí)行狀態(tài)和持續(xù)時間記錄如圖2所示。然后,老師使用功率點演示和演示示例教授“JAVA異常堆棧跟蹤”概念。概念解釋后,在實驗室進行編程后測試。在這個測試中,三個程序給學生帶來了錯誤。在此,還提到了學生成功執(zhí)行各自課程的指定時間。我們確保在測試前和測試后給出的程序的認知水平相同。發(fā)布每個學生記下的程序執(zhí)行狀態(tài)和持續(xù)時間,如圖4所示。4方法研究問題是“如何改善JAVA學習者的漏洞/錯誤修復技巧”以下是為此實驗設定的目標成就(1)學生將能夠獲得JAVAEXCEPTIONSTACKTRACE的知識。(2)學生將能夠閱讀和理解JAVA異常堆棧跟蹤。(3)學生將在分析堆棧跟蹤后采取適當?shù)拇胧﹣硇迯统绦蛑械腻e誤。(4)學生在解決當前錯誤時不會產(chǎn)生新的錯誤。(5)最后,學生將在規(guī)定的時間內(nèi)使用STACKTRACE修復JAVA程序中的錯誤。41使用樣品在這個實驗中,我們考慮了中級JAVA學習者。隨機選擇了40名來自信息技術工程系的三年級學生。42實驗裝置該研究是為“JAVA編程”課程進行的。在本課程中,每周有兩個講座和兩個小時的實驗課。在本課程中,學生學習了基本的JAVA編程和對異常處理的理解。在學期結束時,在編程實驗室進行了第一次預測試,其中向每個學生提供了三個有錯誤的程序。提到持續(xù)時間來修復錯誤在那些程序中并成功執(zhí)行這些
      下載積分: 10 賞幣
      上傳時間:2024-03-16
      頁數(shù): 22
      2人已閱讀
      ( 4 星級)
    • 簡介:1800英文單詞,英文單詞,9500英文字符,中文英文字符,中文2900字文獻出處文獻出處ADVANCESINCOMPUTATIONALSCIENCESANDTECHNOLOGY2012,5511519WIRELESSORDERINGSYSTEMUSINGANDROIDANDWIFITECHNOLOGYDEEPAKTMANE,PRATIKREWANWAR,TEJASNAVANGUL,MAHESHJAISWALANDVINEETVIJAYABSTRACTTHETRADITIONALRESTAURANTSERVICEMODERELIESONALOTOFMANPOWERTOHANDLECUSTOMERRESERVATION,INQUIRY,ORDERINGFOOD,PLACINGORDER,REMINDINGDISHESTHISARTICLEDEVELOPSAWIRELESSORDERINGSYSTEMWITHTHEHELPOFWIFI,WHICHUSESWIFITHESYSTEMSTRUCTUREANDWORKINGMODEAREDESIGNEDTHESOFTWAREANDHARDWARESTRUCTUREOFTHESYSTEMISDESIGNEDINDETAILKEYWORDSWIRELESSORDERING,WIFI,ANDROID,BIOMETRIC,MYSQLINTRODUCTIONTHEEXISTINGORDERINGSYSTEMRELIESONMANPOWERTOMANAGETHECUSTOMERRESERVATION,THEORDERINGPROCESS,THEALLOTMENTOFDISHESATTHERIGHTTABLEWITHMINIMUMDELAYALSOTHEORDERMAYNOTBEWRITTENPROPERLYBYTHEATTENDANT,DUETOWHICHWRONGDISHESCANBEMADEHENCEWITHTHEHELPOFTHEWIRELESSTECHNOLOGYANDANDROIDSYSTEM,AWIRELESSORDERINGSYSTEMCANBEIMPLEMENTEDWHICHWILLINCLUDEALLTHEORDERINGPROCESSESTHISPROVIDESFREEDOMANDSUFFICIENTTIMETOTHECUSTOMERFORPLACINGTHEIRORDERWITHTHEDEVELOPMENTOFANDROIDTECHNOLOGYANDWIFITECHNOLOGY,WECANPUTTHESETECHNOLOGIESINTOTHEFOODSERVICEMANAGEMENTSYSTEMHENCEMANAGEMENTATTHEHOTEL’SENDWILLBEREDUCEDCONSIDERABLYWHICHINTURNWILLHELPTHEGROWTHOFTHEHOTELSOTHISWIRELESSORDERINGSYSTEMISDEVELOPEDTOACHIEVEANINTERPRETATIONOFWIRELESSORDERINGWHICHWASBASEDONTHISIDEATOPROVIDEANINTEGRATEDSOLUTIONFORTHERESTAURANT,HOTELORCAFé,WHICHHELPSINEFFICIENTMANAGEMENTOFTHEHOTEL,ENHANCECUSTOMERCARE,IMPROVEWORKEFFICIENCY,ENABLETHEGROWTHOFTHEHOTEL,REMINDINGDISHES,HELPSTOPROVIDECUSTOMERWITHFULLFACILITIESWITHOUTTAKINGANEXTRAEFFORTTOCUSTOMERSANDWORKERSALSOONEOFTHEMAINCAUSESOFPOORSERVICEATRESTAURANTSANDOTHEREATERIESSUCHASRESTAURANTS,CAFESANDISTHETRADITIONALORDERINGPROCESSISWAITERSWRITINGDOWNORDERSFROMCUSTOMERS,PASSINGTHEORDERSTOTHEKITCHENORMANAGERANDCASHIERSINADDITIONTOTHETIMETAKENTOGETTHEORDERSTOTHEDIFFERENTSTATIONS,TRADITIONALORDERTAKINGPROCESSCANALSOGETTHEORDERSMIXEDUP,MISSEDOREVENLOSTALTOGETHERTHESESEEMINGLYLITTLEPROBLEMSADDUPTOCUSTOMERSERVICEINEFFICIENCYTHATREQUIRESMOREWAITERSTHANACTUALLYREQUIREDATANYONETIMETHISNEEDHASCREATEDADEMANDFORMORECHEAPWAITERS,WHICHHASINDIRECTLYRESULTEDINILLEGALIMMIGRANTPROBLEMSTHECUSTOMERSERVICEINEFFICIENCYTHATISCAUSEDBYTRADITIONALORDERTAKINGPROCESSCANBEIMPROVEDBYREADILYAVAILABLETECHNOLOGYTHETIMETAKENBYEACHWAITERWALKINGTOTHEDIFFERENTSTATIONSTOMAKESURETHEORDERISPROCESSEDCANACTUALLYBECUTDOWNBYUTILIZINGANORDERINGSYSTEMTHATAUTOMATICALLYMANAGETHEORDERTHISSYSTEMISBASEDONATWOWAYWIRELESSCOMMUNICATIONSBETWEENTHEORDERINGSYSTEMSSOFTWAREINTHESERVERANDTHECLIENTSOFTWAREINSTALLEDINTHEMOBILEPROVIDEDTOWAITERSANDALSOORDERFROMCUSTOMERSWIRELESSENABLEDDEVICEPROPOSEDWORKTHECONTENTOFTHISDESIGNWASBASEDONTHETECHNOLOGYOFWIRELESSCOMMUNICATIONWITHTHEHELPOFWIRELESSLOCALAREANETWORKINISMBANDTOACHIEVEWIRELESSDATATRANSMISSION,THISMETHODWASCALLEDWIFITHEOVERALLFRAMEWORKOFTHESTRUCTUREOFTHESYSTEMISSHOWNASBELOWFIGURE2VEGMENUSCREENFIGURE3COMMUNICATIONOFHANDHELDDEVICEWITHSERVERTHROUGHWIFINETWORKFIGURE4ADDINGORDERSTHEHARDWAREDEVICEISAWIRELESSROUTER,WHICHWILLBECONNECTEDWIREDTOTHESERVERANDWIRELESSTOTHEHANDHELDDEVICESINTHERADIOCOVERAGEOFTHEROUTERTHENETWORKINGCANBEEFFECTIVEWITHWIFICONNECTIONTHEROUTEINTHEWIRELESSNETWORKPLAYSANETWORKBRIDGINGROLEITISRESPONSIBLEFORTHEDATAINTERACTIONWITHORDERINGTERMINALTHROUGHTHESERVICEMANAGEMENTSOFTWAREITCANCHECKTHEACCESSDEVICESINREALTIME,RECEIVETHECUSTOMERSORDERINGINFORMATIONANDSENDTEXTMESSAGESTOTHESPECIFIEDTERMINALINCLUDINGINFORMATIONCONFIRMANDNOTIFICATIONMESSAGECOMBINEDWITHMYSQLDATABASEMANAGEMENTSOFTWARE,ITCANSTOREALLOFTHECUSTOMERSORDERINGRECORDSBYDATEINTHEDATABASEQUERYMANAGEMENTMODULEYOUCANINQUIRYTHEORDERINGHISTORYRECORDSATANYTIME,STATISTICALANALYSISOFCUSTOMERSORDERING,ANDPRINTDATAREPORTSTOFACILITATEBUSINESSMANAGEMENTTOMAKETHERIGHTDECISIONS
      下載積分: 10 賞幣
      上傳時間:2024-03-16
      頁數(shù): 14
      15人已閱讀
      ( 4 星級)
    • 簡介:2960英文單詞,18300英文字符,中文4800字出處KHAN,HA,SYED,A,MOHAMMAD,A,本研究還將幫助計算機用戶使用可能的步驟和技術來保護他們的系統(tǒng)和信息免受對其網(wǎng)絡系統(tǒng)的任何可能的攻擊。關鍵詞關鍵詞計算機病毒,計算機威脅,實驗室分析1介紹網(wǎng)絡安全是當今世界最關注的問題。隨著信息安全研究人員揭示廣泛使用的技術中的新威脅和安全漏洞,這種威脅每天都在增加,這使得安全性面臨更高的風險1。網(wǎng)絡攻擊的數(shù)量是過去幾年中的最高水平,對任何計算機系統(tǒng)的最大威脅是計算機病毒,這證明自己是破壞系統(tǒng)最具破壞性和最常見的技術。此外,調(diào)查各種安全功能24可能是未來探索保護大數(shù)據(jù)的有趣途徑5。本研究報告將解決這些威脅,我們將嘗試找出可以使用這些工具來破壞安全系統(tǒng)的攻擊者的操作和類型。最后,我們將討論可以防止我們被這些惡意和復雜的計算機病毒感染的技巧和技巧。11病毒計算機病毒基本上是一種計算機代碼,它能夠將自身復制到其他文件并執(zhí)行其代碼中提到的所需任務。由于其性質(zhì),病毒是討論中最常用的術語。我們可以使用的最合適的術語是自我復制程序,因為最初的意圖是創(chuàng)建一個人工智能程序,但是后來它為了不同的目的改變了。有許多病毒有其自身的目的和傳播技術1。通常用于計算機病毒的基本例程如下。計算機病毒的功能圖,具有搜索,復制和反檢測程序,以避免任何來自防病毒軟件的檢測,如圖1所示。圖2表示AVASTANTIVIRUSSOFTWARE為其用戶提供的更新數(shù)量,即每個月都在增加。圖2更好地理解了數(shù)據(jù)庫每月獲取新的和更多關于計算機病毒的數(shù)據(jù),這些數(shù)據(jù)應該與每個用戶共享,以防止他們受到任何新的威脅。圖4更多被病毒感染的域的類型圖5更多受病毒感染的國家全球地圖(圖5)代表其互聯(lián)網(wǎng)用戶受到計算機病毒高度攻擊的國家。圖6過去十二個月,反病毒軟件阻止的病毒攻擊次數(shù)上圖表示每個月反病毒軟件阻止的攻擊次數(shù)。盡管如此,每個月的值仍然比較4月份的最后2個月,因為攻擊次數(shù)多于3月份,這表明攻擊次數(shù)再次增加。這些結果表明,病毒攻擊和系統(tǒng)感染迅速增加,威脅數(shù)量最多。這些威脅肯定需要認真關注,因為這些受感染的計算機系統(tǒng)可以進一步用于其他攻擊。被感染的計算機被用作僵尸,攻擊者可以完全控制它。此外,我們需要向您展示哪些計算機系統(tǒng)和操作系統(tǒng)受到更多威脅,并且與其他系統(tǒng)和操作系統(tǒng)相比可能會受到感染。
      下載積分: 10 賞幣
      上傳時間:2024-03-11
      頁數(shù): 21
      11人已閱讀
      ( 4 星級)
    • 簡介:3050英文單詞,英文單詞,16500英文字符,中文英文字符,中文5000字文獻出處文獻出處SOLAKD,TOPALOGLUMTHEPERCEPTIONANALYSISOFCYBERCRIMESINVIEWOFCOMPUTERSCIENCESTUDENTSJPROCEDIASOCIALANDBEHAVIORALSCIENCES,2015,182590595THEPERCEPTIONANALYSISOFCYBERCRIMESINVIEWOFCOMPUTERSCIENCESTUDENTSDUYGUSOLAK,MURATTOPALOGLUABSTRACTCOMPUTERTECHNOLOGIESGROWINGRAPIDLYHASBECOMEANINDISPENSABLEPARTOFMODERNLIFEWHILEMAKINGSOCIALLIFEEASIER,THECHANGESTHATTECHNOLOGYHASBROUGHTALSOBRINGFORTHSOMESECURITYISSUESTHUS,ITISEASIERTOCOMMITCRIMESANDWEAREFACEDWITHCYBERCRIMESTHISSTUDYEXAMINESTHEDIFFERENCESAMONGTHECYBERCRIMEPERCEPTIONSOFUNDERGRADUATESTUDENTSATTRAKYAUNIVERSITYINTERMSOFDEMOGRAPHICFACTORSTHEMETHODOFTHESTUDYWASAQUESTIONNAIRETHATWASGIVENTOLECTURERSANDSTUDENTSATTRAKYAUNIVERSITYSAMPLEANDITWASDESIGNEDTOMEASUREANDASSESSTHELEVELSOFINTERESTINTECHNOLOGY,THESEVERITYOFCYBERCRIMESANDTHEINDIVIDUALS’PERCEPTIONSOFCYBERCRIMESINTERMSOFETHICSANDLAWTHEFINDINGSOFTHESTUDYCANHELPUSDEFINETHELEVELOFCOMMONPERCEPTIONOFCYBERCRIMESANDTHEMEANINGFULDIFFERENCESBETWEENSEPARATEGROUPSKEYWORDSINFORMATIONTECHNOLOGIES,CYBERCRIMES,INFORMATIONTECHNOLOGYLAW,PERCEPTIONANALYSIS1INTRODUCTIONINFORMATICSHASBEENDEFINEDASTHESCIENCEOFPROCESSINGOFTHEINFORMATIONUSEDINTECHNICAL,ECONOMICANDSOCIALCOMMUNICATIONAREAS,ANDONWHICHSCIENCEHASITSOWNBASIS,PROPERLYANDLOGICALLYVIAELECTRONICMACHINESINPARTICULARKOKSAL,2006THEDEVELOPMENTSINCOMPUTERANDINFORMATIONTECHNOLOGIESHAVEPENETRATEDINTOANYTHINGINEVERYDAYLIFEGLOBALIZATIONHASGAINEDSPEEDWITHTHEINTERNETBECOMINGMOREPOPULARANDTHEPHYSICALBOUNDARIESHAVEDISAPPEAREDTHISPOPULARITYOFTHEINTERNETHASBROUGHTFORTHTHEISSUESLIKESTORINGANDPROCESSINGINFORMATIONTHEDEVELOPMENTSININFORMATICSHAVEBOTHPROSANDCONSFORHUMANITYSINCETHEECONOMIC,SOCIALANDPOLITICALVALUEOFTHEINFORMATIONHASINCREASED,THEPEOPLEWHOWANTTOCUTCORNERSTOGAINPOWERANDMONEYHAVEBEGUNTOTENDTOWARDSUSINGINFORMATIONTECHNOLOGIESTOCOMMITCRIMES,SOMETIMESTARGETINGTHETECHNOLOGYITSELFHEREIN,THETERM“CYBERCRIME”BECOMESEVIDENTCYBERCRIMEIS“ANYKINDOFILLEGAL,UNETHICALANDUNAUTHORIZEDBEHAVIORINASYSTEMWHICHPROCESSESINFORMATIONAUTOMATICALLYORTRANSFERSDATA”KESKIN,2009CYBERCRIMECANBEDIVIDEDINTOTWOMAINCATEGORIESWHERETHECOMPUTERISUSEDASATOOLORASATARGETHARASSINGANDTHREATENINGPEOPLEONTHEINTERNETORMOBILEPHONES,ANDPUBLISHINGMUSICORBOOKSWITHOUTHAVINGTHECOPYRIGHTSARETWOEXAMPLESOFCYBERCRIMETHEAUTHORITIESPREFERTOEXTENDTHESCOPEOFTHEPUNISHMENTSFORCLASSICCRIMESINSTEADOFADDINGCYBERCRIMECLAUSESTOTHEPRESENTCODESONTHEOTHERHAND,ACTSLIKEDISTORTING,REPLACINGDATAANDBLOCKINGACCESSTOASYSTEMARECRIMESWHERETHEINFORMATIONSYSTEMSARETARGETEDDIRECTLYANDTHEREAREINDEPENDENTCODESANDREGULATIONSINLAWDEFININGTHESCOPEOFTHESECRIMESTODAYCYBERCRIMEISANIMPORTANTPROBLEMGROWINGRAPIDLYTHEREFORE,THENEEDFORLEGALACTSCOMBININGBOTHLAWANDTECHNOLOGYHASRISENDRAMATICALLYHOWEVER,THEREISMUCHTOBEDONETOREDUCETHENUMBEROFCYBERCRIMESTHEFIRSTRECORDEDCYBERCRIMEWASRELEASEDTOTHEPUBLICINAMINNEAPOLISTRIBUNEARTICLE“COMPUTEREXPERTACCUSEDOFCOOKINGTHEACCOUNTBOOKS”O(jiān)NOCTOBER18TH,1966IN1973,ONEOFTHECLASSICEARLYDATADIDDLINGFRAUDSWAS“EQUITYFUNDING”3,NOTACRIME4,DEFINITELYNOTACRIME5”AREUSEDWHEREAS“CERTAINLYRIGHT1,RIGHT2,NEUTRAL3,WRONG4,DEFINITELYWRONG5”STATEMENTSAREUSEDTOEXAMINEMORALATTITUDESTOWARDSCYBERCRIMETHEQUESTIONNAIREFORMWASTAKENFROMTHEMASTERS’THESIS“THEPERCEPTIONANALYSISOFCOMPUTERCRIMESWITHRESPECTTOSOCIOCULTURALLEVELS”BY?LBAS,2009ANDAPPLIEDTOTHESTUDYGROUP25DATAANALYSISSPSS20STATISTICALPACKAGEFORSOCIALSCIENCESWASUSEDFORTHEANALYSISOFTHEDATAPERCENTAGEANDFREQUENCYANALYSISWEREUSEDTODETERMINETHEPERCEPTIONSANALYSISOFCYBERCRIMEINCOMPUTERSTUDENTSTHERELIABILITYCOEFFICIENTFORTHEWHOLESCALEWASFOUND0883FINDINGSINTHISSECTION,FREQUENCYANDPERCENTAGEDISTRIBUTIONSOFTHESTUDENTS’GENDERSANDYEARSOFSTUDYAREPRESENTED35264STUDENTSOFTHEPARTICIPANTSWEREFEMALESAND648118PEOPLEWEREMALES,827STUDENTSWEREFRESHMEN,337STUDENTSWERESOPHOMORES,938STUDENTSWEREJUNIORSANDD,080STUDENTSWERESENIORSACCORDINGTOTHEFREQUENCYANALYSISRESULTSFORTHEINTERESTINCOMPUTERSANDTECHNOLOGYANDFOLLOWINGTHELATESTDEVELOPMENTSINTHEFIELD611STUDENTSOFTHESTUDENTSREPORTEDTHEYARENOTINTERESTEDINTHESUBJECTANDDONOTFOLLOWTHELATESTDEVELOPMENTSWITH9,918STUDENTSWHOARENOTINTERESTEDBUTFOLLOWINGTHEUPDATESINWRITTENANDVISUALMEDIA,2OFTHEPARTICIPANTS44STUDENTSSAIDTHEYAREINTERESTEDINTHESUBJECTSWITHOUTFOLLOWINGTHEUPDATESWITHY,3108REPORTINGTHEIRINTERESTINBOTHTHESUBJECTANDLATESTDEVELOPMENTSTHERESULTSSHOWTHATMAJORITYOFTHESTUDENTSHAVEINTERESTINCOMPUTERS,TECHNOLOGYANDTHEINTERNETFOLLOWINGTHEUPDATESANDDEVELOPMENTSCLOSELYACCORDINGTOTHEFREQUENCYANALYSISFORHOWLONGTHESTUDENTSHAVEBEENUSINGTHEINTERNET0,51STUDENTSSAID“IDON’TUSE”0,51STUDENTSSAIDTHEYHAVEBEENUSINGINFORMATIONTECHNOLOGIESFOR“LESSTHANAYEAR”,419STUDENTS25YEARSY,3108STUDENTS69YEARS,1OFTHESTUDENTSREPORTEDTHATTHEYHAVEBEENUSINGTHEINTERNETMORETHAN10YEARSMOSTOFTHESTUDENTSHAVEBEENUSINGTHEINTERNETFOR69YEARSACCORDINGTOTHERESULTSTHEFREQUENCYANALYSISFORTHEPLACEWHERETHESTUDENTSGETCONNECTEDTOTHEINTERNETSHOWTHAT1,357STUDENTSCANACCESSTOTHEINTERNETATHOMEAND8,215STUDENTSUSETHEINTERNETATWORKORATSCHOOLWHILE0,51STUDENTGOESTOINTERNETCAFES1,63STUDENTSREPORTEDUSINGCOMMONACCESSAREASMOSTOFTHESTUDENTSHAVEBEENUSINGTHEINTERNETATHOMEACCORDINGTOTHERESULTSACCORDINGTOTHEFREQUENCYRESULTS,THEINTERNETISUSEDBYSTUDENTSFORDOINGRESEARCHFORWORKANDSCHOOLWITH1,357STUDENTSFORDOINGRESEARCHFORPERSONALINTERESTSWITH7,468STUDENTSFORREADINGNEWSANDCURRENTAFFAIRSWITH,326STUDENTS,FORCOMMUNICATIONPURPOSESWITH8,816STUDENTS,FORFORMINGSOCIALRELATIONSHIPS1,12STUDENTSANDFORENTERTAINMENTANDGAMES7,113STUDENTSMOSTOFTHESTUDENTSSEEMTOUSETHEINTERNETTODORESEARCHONTHEIRPERSONALINTERESTSACCORDINGTOTHEFREQUENCYANALYSISRESULTSFORTHEAVERAGEINTERNETUSE,4,9OFTHEPARTICIPANTS9STUDENTSREPORTEDNOTUSINGTHEINTERNETOUTOFWORKANDSCHOOLOURSWHILE2,24STUDENTSSAIDTHEYUSETHEINTERNETLESSTHANADAYINAWEEK1,63STUDENTSOFTHEPARTICIPANTSTOLDTHEYUSETHEINTERNETONEDAYAWEEKWHEREAS4,48STUDENTSUSETHEINTERNETSEVERALDAYSAWEEKOVERWHELMINGLY,?,8158STUDENTSOFTHEPARTICIPANTSREPORTEDTHATTHEYUSETHEINTERNET
      下載積分: 5 賞幣
      上傳時間:2024-05-21
      頁數(shù): 14
      3人已閱讀
      ( 4 星級)
    • 簡介:0中文中文3800字,字,2200單詞,單詞,14萬英文字符萬英文字符出處出處GUPTAP,GOVILMCSPRINGWEBMVCFRAMEWORKFORRAPIDOPENSOURCEJ2EEAPPLICATIONDEVELOPMENTACASESTUDYJINTERFACE,2010,2616841689畢業(yè)設計(論文)外文文獻翻譯畢業(yè)設計(論文)外文文獻翻譯院系系計算機與信息工程學院年級專年級專業(yè)業(yè)姓名名學號號附件件SPRINGWEBMVCFRAMEWORKFORRAPIDOPENSOURCEJ2EEAPPLICATIONDEVELOPMENT指導老師評語指導教師簽名年月日SPRINGWEBMVCFRAMEWORKFORRAPIDOPENSOURCEJ2EEAPPLICATIONDEVELOPMENTACASESTUDY2ARCHITECTUREOFTHEAPPLICATIONSPRINGFRAMEWORKSCOMESWITHRICHSETOFFEATURES,LETUSDISCUSSTHESEFEATURESINBRIEF1INVERSIONOFCONTROLINVERSIONOFCONTROLORIOCISONEOFTHETECHNIQUESUSEDTOWIRESERVICESORCOMPONENTSTOANAPPLICATIONPROGRAMTHEIOCIS“ASOFTWAREDESIGNPATTERNANDSETOFASSOCIATEDPROGRAMMINGTECHNIQUESINWHICHTHEFLOWOFCONTROLOFASYSTEMISINVERTEDINCOMPARISONTOTHETRADITIONALINTERACTIONMODE”INIOCINSTEADOFANAPPLICATIONCALLINGTHEFRAMEWORK,ITISTHEFRAMEWORKTHATCALLSTHECOMPONENTSSPECIFIEDBYTHEAPPLICATIONTHEIOCCANBEEXPLAINEDAS“INJECTIONOFREQUIREDRESOURCESORDEPENDENCYATRUNTIMEINTOTHEDEPENDENTRESOURCE“WHICHISALSOKNOWNASDEPENDENCYINJECTIONTHEORGSPRINGFRAMEWORKBEANSFACTORYBEANFACTORYISTHEACTUALREPRESENTATIONOFTHESPRINGIOCCONTAINERWHICHISRESPONSIBLEFORCONTAININGANDMANAGINGTHEBEANSTHEBEANFACTORYINTERFACEISTHECENTRALIOCCONTAINERINTERFACEINSPRINGABEANISSIMPLYANOBJECTTHATISINSTANTIATEDANDMANAGEDBYASPRINGIOCCONTAINERTHESEBEANSANDTHEDEPENDENCIESBETWEENTHEMAREREFLECTEDINTHECONFIGURATIONMETADATAUSEDBYACONTAINER2CONSTRUCTORDEPENDENCYINJECTIONWECANUSETHEJAVACLASSCONSTRUCTORTOLOADTHEBEANVALUESAJAVACLASSISDEFINEDWITHACONSTRUCTOROFSINGLEFIELDDETAILSXMLFILEPROVIDESTHEVALUETOBEPASSESTOTHECONSTRUCTORNOWANOTHERJAVALOADSTHEXMLFILEUSINGTHEBEANFACTORYMETHODTHISUSESTHEXMLFILETOLOADVALUESINTHECONSTRUCTOROFTHEJAVAFILETHISISUSEDTOPASSVALUESTOTHECONSTRUCTOR3SETTERDEPENDENCYINJECTIONWITHEVERYBEANWEDEFINEDTHEGETTERSANDSETTERSWECANALSOUSESETTERSMETHODTOSETTHEVALUESINTHEBEANSSETTERSMETHODOVERRIDESTHEVALUESLOADEDFROMTHEBEANS4INTERFACEWECANDEFINETHEINTERFACECLASSINSPRINGTOIMPLEMENTTHISWEWILLIMPORTINTERFACETOTHEJAVAPROGRAMNOWWECANUSEMETHODSDEFINEDININTERFACEUSINGSPRINGANDXML5INHERITANCEONEJAVACLASSCANACQUIREDTHEPROPERTIESOFANOTHERCLASSJUSTLIKEAJAVAPROGRAMTHEREARETHREESUBTYPESOFIT1ABSTRACTBEANSDECLAREDABSTRACTCANNOTBEINHERITEDINTHESPRINGS2PARENTCHILDWECANDEFINEHIERARCHYLIKEPARENTCHILD3PARENTCHILDSUBCHILDRELATIONSHIPINTHISWECANDEFINEHIERARCHYFOR3ORMORECLASSES6AUTOWIRINGAUTOWIRINGISUSEDTOMAPTHEPROPERTYNAME,VALUESINXMLFILEWITHJAVAFILETHEREAREFOURTYPESTOINTEGRATEITBYNAME,BYTYPE,CONSTRUCTOR,AUTODETECTIFNOTHINGISDEFINEDABOUTITTHENBYNAMEISTHEDEFAULT
      下載積分: 10 賞幣
      上傳時間:2024-03-16
      頁數(shù): 20
      9人已閱讀
      ( 4 星級)
    • 簡介:3600英文單詞,英文單詞,18500英文字符,中文英文字符,中文5800字文獻出處文獻出處TIHOMIROVSJ,GRABISJCOMPARISONOFSOAPANDRESTBASEDWEBSERVICESUSINGSOFTWAREEVALUATIONMETRICSJINFORMATIONTECHNOLOGYANDMANAGEMENTSCIENCE,2016,1919297COMPARISONOFSOAPANDRESTBASEDWEBSERVICESUSINGSOFTWAREEVALUATIONMETRICSJURISTIHOMIROVS,JāNISGRABISABSTRACT–THEUSAGEOFWEBSERVICESHASRECENTLYINCREASEDTHEREFORE,ITISIMPORTANTTOSELECTRIGHTTYPEOFWEBSERVICESATTHEPROJECTDESIGNSTAGETHEMOSTCOMMONIMPLEMENTATIONSAREBASEDONSOAPSIMPLEOBJECTACCESSPROTOCOLANDRESTREPRESENTATIONALSTATETRANSFERPROTOCOLSTYLESMAINTAINABILITYOFRESTANDSOAPWEBSERVICESHASBECOMEANIMPORTANTISSUEASPOPULARITYOFWEBSERVICESISINCREASINGCHOICEOFTHERIGHTAPPROACHISNOTANEASYDECISIONSINCEITISINFLUENCEDBYDEVELOPMENTREQUIREMENTSANDMAINTENANCECONSIDERATIONSINTHEPRESENTRESEARCH,WEPRESENTTHECOMPARISONOFSOAPANDRESTBASEDWEBSERVICESUSINGSOFTWAREEVALUATIONMETRICSTOACHIEVETHISAIM,ASYSTEMATICLITERATUREREVIEWWILLBEMADETOCOMPARERESTANDSOAPWEBSERVICESINTERMSOFTHESOFTWAREEVALUATIONMETRICSKEYWORDS–LITERATUREREVIEW,REST,SOAP,WEBSERVICESIINTRODUCTIONAPROBLEMFORMULATIONNOWADAYSTHEMOSTCOMMONWAYTOEXCHANGEDATAAMONGINFORMATIONSYSTEMSISTOUSEWEBSERVICESWEBSERVICESARESELFCONTAINED,MODULARANDDYNAMICAPPLICATIONSBYTHEIRNATURE1MOSTCOMMONIMPLEMENTATIONSAREBASEDONSOAPSIMPLEOBJECTACCESSPROTOCOLANDRESTREPRESENTATIONALSTATETRANSFERPROTOCOLSTYLESEACHOFTHESEAPPROACHESHASITSOWNADVANTAGESANDDISADVANTAGES,SOITISIMPORTANTTOCHOOSETHERIGHTTYPEOFWEBSERVICES,OTHERWISEITCANLEADTOCERTAINPROBLEMSINDATAEXCHANGEORIMPOSESOMERESTRICTIONSTHISPAPERCOMPARESSOAPANDRESTAPPROACHESTOGIVERECOMMENDATIONSONHOWTOOPTTHERIGHTWEBSERVICETYPEATAPROJECTDESIGNPHASETHEREAREANUMBEROFRELATEDSTUDIESONTHESEPROTOCOLS,PRIMARYBENEFITSANDFINALVALUE2,3,4OTHERARTICLESREVIEWREALIMPLEMENTATIONEXAMPLES5,6THISRESEARCHPAPERSUMMARISESTHESESTUDIESANDGIVESACOMPARISON,WHICHHELPSIDENTIFYTHEKEYDIFFERENCESANDBENEFITSOFSOAPANDRESTPROTOCOLSBAIMANDTASKSTHEAIMOFTHEPAPERISTOSUMMARISETHEMAINSOAPANDRESTPROTOCOLADVANTAGESANDDISADVANTAGESTOACHIEVETHISAIM,THEFOLLOWINGTASKSARESET1TODEFINETHEMETRICSBYWHICHITISPOSSIBLETOMUTUALLYCOMPARESOAPANDRESTPROTOCOLS2TOCOMPARESOAPANDRESTBYFOUNDMETRICS3TOEVALUATEWHICHPROTOCOLTYPEISBETTERONTHEBASISOFSOFTWAREEVALUATIONMETRICSIITHEORETICALBASISTHISSECTIONADDRESSESTHEKEYCONCEPTSTHATWILLBEUSEDINTHEPAPERAWEBSERVICESASINGLEWEBSERVICECONSISTSOFSERVICEANDSERVICEDESCRIPTIONWHERESERVICEISASOFTWARETHISSECTIONDESCRIBESTHERESEARCHMETHODTHATWILLBEUSEDFORASYSTEMATICLITERATUREREVIEWADATASOURCESFOROURRESEARCH,WEHAVEINCLUDEDTHEFOLLOWINGTHREEELECTRONICLIBRARYSOURCESASDATASOURCESSCOPUS,WEBOFSCIENCEANDIEEEXPLOREDIGITALLIBRARYWEHAVECONSTRUCTEDASEARCHSTRINGUSING“SOAP”AND“REST”ASTHEMAINKEYWORDSSEETABLEIIANDINCLUDEDSYNONYMSANDRELATEDTERMSTHESEARCHSTRINGISCONSTRUCTEDUSINGBOOLEANANDANDOROPERATORSTOCONNECTTHESEKEYWORDSINQUERYSTRING1SEARCHQUERYCANBEREPRESENTEDASFOLLOWSS1ORS2ORSNANDR1ORR2ORRN,1WHERESCOVERSSOAPKEYWORDSANDRCOVERSRESTKEYWORDSTABLEIISEARCHKEYWORDSANDSYNONYMSSOAPRESTSIMPLEOBJECTACCESSPROTOCOLREPRESENTATIONALSTATETRANSFERSOAPWEBSERVICESRESTFULSOAPWEBSERVICERESTFULWEBSERVICESRESTFULWEBSERVICETHERESULTINGSEARCHSTRINGISSHOWNIN2SOAPOR“SIMPLEOBJECTACCESSPROTOCOL”O(jiān)R“SOAPWEBSERVICES”O(jiān)R“SOAPWEBSERVICE”ANDRESTOR“REPRESENTATIONALSTATETRANSFER”O(jiān)R2RESTFULOR“RESTFULWEBSERVICES”O(jiān)R“RESTFULWEBSERVICE”THESEARCHSTRINGHASBEENEXECUTEDINTHEDIGITALLIBRARYSERVICESTOTITLES,ABSTRACTSANDMETADATAINORDERTOMINIMISETHEFOUNDDATASETS,WEHAVEDEFINEDTHECRITERIATHATTHEARTICLEMUSTBEINTHEFIELDOFCOMPUTERSCIENCEORIT,ASWELLASTHEARTICLEMUSTBEWRITTENAFTER2010,ASTHEEARLIERPUBLICATIONSMAYCONTAININFORMATIONTHATISNOLONGERUPTODATENUMBEROFTHEFOUNDINFORMATIONSOURCESISDISPLAYEDINTABLEIIITABLEIIIOVERVIEWOFINFORMATIONSOURCESNOSOURCEFORMATTHENUMBEROFINFORMATIONSOURCES1SCOPUSMENDELAY1902WEBOFSCIENCEMSEXCEL933IEEEXPLOREDIGITALLIBRARYMSEXCEL352BSTUDYSELECTIONSINCETHERESULT,WHICHISOBTAINEDUSINGTHESEARCHQUERY,CONTAINS635ENTRIESWHERENOTALLTHEENTRIESCORRESPONDTOTHETHEMEOFTHISSTUDY,ITISNECESSARYDEFINETHEINCLUSIONANDEXCLUSIONCRITERIAINORDERTOLIMITTHERESULTSETTHEINCLUSIONANDEXCLUSIONCRITERIAAREDEFINEDINTABLEIVTABLEIVINCLUSIONANDEXCLUSIONCRITERIAFORSTUDYSELECTION
      下載積分: 10 賞幣
      上傳時間:2024-03-12
      頁數(shù): 22
      15人已閱讀
      ( 4 星級)
    • 簡介:ARTICLESWINTER2015105ARTIFICIALINTELLIGENCEAIRESEARCHHASEXPLOREDAVARIETYOFPROBLEMSANDAPPROACHESSINCEITSINCEPTION,BUTFORTHELAST20YEARSORSOHASBEENFOCUSEDONTHEPROBLEMSSURROUNDINGTHECONSTRUCTIONOFINTELLIGENTAGENTSSYSTEMSTHATPERCEIVEANDACTINSOMEENVIRONMENTINTHISCONTEXT,THECRITERIONFORINTELLIGENCEISRELATEDTOSTATISTICALANDECONOMICNOTIONSOFRATIONALITYCOLLOQUIALLY,THEABILITYTOMAKEGOODDECISIONS,PLANS,ORINFERENCESTHEADOPTIONOFPROBABILISTICREPRESENTATIONSANDSTATISTICALLEARNINGMETHODSHASLEDTOALARGEDEGREEOFINTEGRATIONANDCROSSFERTILIZATIONBETWEENAI,MACHINELEARNING,STATISTICS,CONTROLTHEORY,NEUROSCIENCE,ANDOTHERFIELDSTHEESTABLISHMENTOFSHAREDTHEORETICALFRAMEWORKS,COMBINEDWITHTHEAVAILABILITYOFDATAANDPROCESSINGPOWER,HASYIELDEDREMARKABLESUCCESSESINVARIOUSCOMPONENTTASKSSUCHASSPEECHRECOGNITION,IMAGECLASSIFICATION,AUTONOMOUSVEHICLES,MACHINETRANSLATION,LEGGEDLOCOMOTION,ANDQUESTIONANSWERINGSYSTEMSCOPYRIGHT?2015,ASSOCIATIONFORTHEADVANCEMENTOFARTIFICIALINTELLIGENCEALLRIGHTSRESERVEDISSN07384602RESEARCHPRIORITIESFORROBUSTANDBENEFICIALARTIFICIALINTELLIGENCESTUARTRUSSELL,DANIELDEWEY,MAXTEGMARKNSUCCESSINTHEQUESTFORARTIFICIALINTELLIGENCEHASTHEPOTENTIALTOBRINGUNPRECEDENTEDBENEFITSTOHUMANITY,ANDITISTHEREFOREWORTHWHILETOINVESTIGATEHOWTOMAXIMIZETHESEBENEFITSWHILEAVOIDINGPOTENTIALPITFALLSTHISARTICLEGIVESNUMEROUSEXAMPLESWHICHSHOULDBYNOMEANSBECONSTRUEDASANEXHAUSTIVELISTOFSUCHWORTHWHILERESEARCHAIMEDATENSURINGTHATAIREMAINSROBUSTANDBENEFICIALARTICLESWINTER2015107ECONOMICMEASURESITISPOSSIBLETHATECONOMICMEASURESSUCHASREALGDPPERCAPITADONOTACCURATELYCAPTURETHEBENEFITSANDDETRIMENTSOFHEAVILYAIANDAUTOMATIONBASEDECONOMIES,MAKINGTHESEMETRICSUNSUITABLEFORPOLICYPURPOSESMOKYR2014RESEARCHONIMPROVEDMETRICSCOULDBEUSEFULFORDECISIONMAKINGLAWANDETHICSRESEARCHTHEDEVELOPMENTOFSYSTEMSTHATEMBODYSIGNIFICANTAMOUNTSOFINTELLIGENCEANDAUTONOMYLEADSTOIMPORTANTLEGALANDETHICALQUESTIONSWHOSEANSWERSAFFECTBOTHPRODUCERSANDCONSUMERSOFAITECHNOLOGYTHESEQUESTIONSSPANLAW,PUBLICPOLICY,PROFESSIONALETHICS,ANDPHILOSOPHICALETHICS,ANDWILLREQUIREEXPERTISEFROMCOMPUTERSCIENTISTS,LEGALEXPERTS,POLITICALSCIENTISTS,ANDETHICISTSFOREXAMPLELIABILITYANDLAWFORAUTONOMOUSVEHICLESIFSELFDRIVINGCARSCUTTHEROUGHLY40,000ANNUALUSTRAFFICFATALITIESINHALF,THECARMAKERSMIGHTGETNOT20,000THANKYOUNOTES,BUT20,000LAWSUITSINWHATLEGALFRAMEWORKCANTHESAFETYBENEFITSOFAUTONOMOUSVEHICLESSUCHASDRONEAIRCRAFTANDSELFDRIVINGCARSBESTBEREALIZEDVLADECK2014SHOULDLEGALQUESTIONSABOUTAIBEHANDLEDBYEXISTINGSOFTWAREANDINTERNETFOCUSEDCYBERLAW,ORSHOULDTHEYBETREATEDSEPARATELYCALO2014BINBOTHMILITARYANDCOMMERCIALAPPLICATIONS,GOVERNMENTSWILLNEEDTODECIDEHOWBESTTOBRINGTHERELEVANTEXPERTISETOBEARFOREXAMPLE,APANELORCOMMITTEEOFPROFESSIONALSANDACADEMICSCOULDBECREATED,ANDCALOHASPROPOSEDTHECREATIONOFAFEDERALROBOTICSCOMMISSIONCALO2014AMACHINEETHICSHOWSHOULDANAUTONOMOUSVEHICLETRADEOFF,SAY,ASMALLPROBABILITYOFINJURYTOAHUMANAGAINSTTHENEARCERTAINTYOFALARGEMATERIALCOSTHOWSHOULDLAWYERS,ETHICISTS,ANDPOLICYMAKERSENGAGETHEPUBLICONTHESEISSUESSHOULDSUCHTRADEOFFSBETHESUBJECTOFNATIONALSTANDARDSAUTONOMOUSWEAPONSCANLETHALAUTONOMOUSWEAPONSBEMADETOCOMPLYWITHHUMANITARIANLAWCHURCHILLANDULFSTEIN2000IF,ASSOMEORGANIZATIONSHAVESUGGESTED,AUTONOMOUSWEAPONSSHOULDBEBANNEDDOCHERTY2012,ISITPOSSIBLETODEVELOPAPRECISEDEFINITIONOFAUTONOMYFORTHISPURPOSE,ANDCANSUCHABANPRACTICALLYBEENFORCEDIFITISPERMISSIBLEORLEGALTOUSELETHALAUTONOMOUSWEAPONS,HOWSHOULDTHESEWEAPONSBEINTEGRATEDINTOTHEEXISTINGCOMMANDANDCONTROLSTRUCTURESOTHATRESPONSIBILITYANDLIABILITYREMAINASSOCIATEDWITHSPECIFICHUMANACTORSWHATTECHNICALREALITIESANDFORECASTSSHOULDINFORMTHESEQUESTIONS,ANDHOWSHOULDMEANINGFULHUMANCONTROLOVERWEAPONSBEDEFINEDROFF2013,2014ANDERSON,REISNER,ANDWAXMAN2014AREAUTONOMOUSWEAPONSLIKELYTOREDUCEPOLITICALAVERSIONTOCONFLICT,ORPERHAPSRESULTINACCIDENTALBATTLESORWARSASARO2008WOULDSUCHWEAPONSBECOMETHETOOLOFCHOICEFOROPPRESSORSORTERRORISTSFINALLY,HOWCANTRANSPARENCYANDPUBLICDISCOURSEBESTBEENCOURAGEDONTHESEISSUESPRIVACYHOWSHOULDTHEABILITYOFAISYSTEMSTOINTERPRETTHEDATAOBTAINEDFROMSURVEILLANCECAMERAS,PHONELINES,EMAILS,ANDSOON,INTERACTWITHTHERIGHTTOPRIVACYHOWWILLPRIVACYRISKSINTERACTWITHCYBERSECURITYANDCYBERWARFARESINGERANDFRIEDMAN2014OURABILITYTOTAKEFULLADVANTAGEOFTHESYNERGYBETWEENAIANDBIGDATAWILLDEPENDINPARTONOURABILITYTOMANAGEANDPRESERVEPRIVACYMANYIKAETAL2011AGRAWALANDSRIKANT2000PROFESSIONALETHICSWHATROLESHOULDCOMPUTERSCIENTISTSPLAYINTHELAWANDETHICSOFAIDEVELOPMENTANDUSEPASTANDCURRENTPROJECTSTOEXPLORETHESEQUESTIONSINCLUDETHEAAAI2008–09PRESIDENTIALPANELONLONGTERMAIFUTURESHORVITZANDSELMAN2009,THEEPSRCPRINCIPLESOFROBOTICSBODENETAL2011,ANDRECENTLYANNOUNCEDPROGRAMSSUCHASSTANFORD’SONEHUNDREDYEARSTUDYOFAIANDTHEAAAICOMMITTEEONAIIMPACTANDETHICALISSUESPOLICYQUESTIONSFROMAPUBLICPOLICYPERSPECTIVE,AILIKEANYPOWERFULNEWTECHNOLOGYENABLESBOTHGREATNEWBENEFITSANDNOVELPITFALLSTOBEAVOIDED,ANDAPPROPRIATEPOLICIESCANENSURETHATWECANENJOYTHEBENEFITSWHILERISKSAREMINIMIZEDTHISRAISESPOLICYQUESTIONSSUCHAS1WHATISTHESPACEOFPOLICIESWORTHSTUDYING,ANDHOWMIGHTTHEYBEENACTED2WHICHCRITERIASHOULDBEUSEDTODETERMINETHEMERITSOFAPOLICYCANDIDATESINCLUDEVERIFIABILITYOFCOMPLIANCE,ENFORCEABILITY,ABILITYTOREDUCERISK,ABILITYTOAVOIDSTIFLINGDESIRABLETECHNOLOGYDEVELOPMENT,LIKELIHOODOFBEINGADOPED,ANDABILITYTOADAPTOVERTIMETOCHANGINGCIRCUMSTANCESCOMPUTERSCIENCERESEARCHFORROBUSTAIASAUTONOMOUSSYSTEMSBECOMEMOREPREVALENTINSOCIETY,ITBECOMESINCREASINGLYIMPORTANTTHATTHEYROBUSTLYBEHAVEASINTENDEDTHEDEVELOPMENTOFAUTONOMOUSVEHICLES,AUTONOMOUSTRADINGSYSTEMS,AUTONOMOUSWEAPONS,ANDSOON,HASTHEREFORESTOKEDINTERESTINHIGHASSURANCESYSTEMSWHERESTRONGROBUSTNESSGUARANTEESCANBEMADEWELDANDETZIONI1994HAVEARGUEDTHAT“SOCIETYWILLREJECTAUTONOMOUSAGENTSUNLESSWEHAVESOMECREDIBLEMEANSOFMAKINGTHEMSAFE”DIFFERENTWAYSINWHICHANAISYSTEMMAYFAILTOPERFORMASDESIREDCORRESPONDTODIFFERENTAREASOFROBUSTNESSRESEARCHVERIFICATIONHOWTOPROVETHATASYSTEMSATISFIESCERTAINDESIREDFORMALPROPERTIESDIDIBUILDTHESYSTEMRIGHTVALIDITYHOWTOENSURETHATASYSTEMTHATMEETSITSFORMALREQUIREMENTSDOESNOTHAVEUNWANTEDBEHAVIORSANDCONSEQUENCESDIDIBUILDTHERIGHTSYSTEM
      下載積分: 10 賞幣
      上傳時間:2024-03-13
      頁數(shù): 10
      10人已閱讀
      ( 4 星級)
    • 簡介:PROCEDIASOCIALANDBEHAVIORALSCIENCES1822015590–595AVAILABLEONLINEATWWWSCIENCEDIRECTCOM18770428?2015THEAUTHORSPUBLISHEDBYELSEVIERLTDTHISISANOPENACCESSARTICLEUNDERTHECCBYNCNDLICENSEHTTP//CREATIVECOMMONSORG/LICENSES/BYNCND/40/PEERREVIEWUNDERRESPONSIBILITYOFACADEMICWORLDRESEARCHANDEDUCATIONCENTERDOI101016/JSBSPRO201504787SCIENCEDIRECT4THWORLDCONFERENCEONEDUCATIONALTECHNOLOGYRESEARCHES,WCETR2014THEPERCEPTIONANALYSISOFCYBERCRIMESINVIEWOFCOMPUTERSCIENCESTUDENTSDUYGUSOLAKA,MURATTOPALOGLUAATRAKYAUIVERSITY,KESANYUSUFCAPRAZSCHOOLOFAPPLIEDSCIENCES,EDIRNEABSTRACTCOMPUTERTECHNOLOGIESGROWINGRAPIDLYHASBECOMEANINDISPENSABLEPARTOFMODERNLIFEWHILEMAKINGSOCIALLIFEEASIER,THECHANGESTHATTECHNOLOGYHASBROUGHTALSOBRINGFORTHSOMESECURITYISSUESTHUS,ITISEASIERTOCOMMITCRIMESANDWEAREFACEDWITHCYBERCRIMESTHISSTUDYEXAMINESTHEDIFFERENCESAMONGTHECYBERCRIMEPERCEPTIONSOFUNDERGRADUATESTUDENTSATTRAKYAUNIVERSITYINTERMSOFDEMOGRAPHICFACTORSTHEMETHODOFTHESTUDYWASAQUESTIONNAIRETHATWASGIVENTOLECTURERSANDSTUDENTSATTRAKYAUNIVERSITYSAMPLEANDITWASDESIGNEDTOMEASUREANDASSESSTHELEVELSOFINTERESTINTECHNOLOGY,THESEVERITYOFCYBERCRIMESANDTHEINDIVIDUALS’PERCEPTIONSOFCYBERCRIMESINTERMSOFETHICSANDLAWTHEFINDINGSOFTHESTUDYCANHELPUSDEFINETHELEVELOFCOMMONPERCEPTIONOFCYBERCRIMESANDTHEMEANINGFULDIFFERENCESBETWEENSEPARATEGROUPS?2015THEAUTHORSPUBLISHEDBYELSEVIERLTDPEERREVIEWUNDERRESPONSIBILITYOFACADEMICWORLDRESEARCHANDEDUCATIONCENTERKEYWORDSINFORMATIONTECHNOLOGIES,CYBERCRIMES,INFORMATIONTECHNOLOGYLAW,PERCEPTIONANALYSIS1INTRODUCTIONINFORMATICSHASBEENDEFINEDASTHESCIENCEOFPROCESSINGOFTHEINFORMATIONUSEDINTECHNICAL,ECONOMICANDSOCIALCOMMUNICATIONAREAS,ANDONWHICHSCIENCEHASITSOWNBASIS,PROPERLYANDLOGICALLYVIAELECTRONICMACHINESINPARTICULARKOKSAL,2006THEDEVELOPMENTSINCOMPUTERANDINFORMATIONTECHNOLOGIESHAVEPENETRATEDINTOANYTHINGINEVERYDAYLIFEGLOBALIZATIONHASGAINEDSPEEDWITHTHEINTERNETBECOMINGMOREPOPULARANDTHEPHYSICALDUYGUSOLAKTEL905418713106EMAILADDRESSNDUYGUSOLAKTRAKYAEDUTR?2015THEAUTHORSPUBLISHEDBYELSEVIERLTDTHISISANOPENACCESSARTICLEUNDERTHECCBYNCNDLICENSEHTTP//CREATIVECOMMONSORG/LICENSES/BYNCND/40/PEERREVIEWUNDERRESPONSIBILITYOFACADEMICWORLDRESEARCHANDEDUCATIONCENTER592DUYGUSOLAKANDMURATTOPALOGLU/PROCEDIASOCIALANDBEHAVIORALSCIENCES1822015590–59523STUDYGROUP182STUDENTSSTUDYINGATTRAKYAUNIVERSITY,KESANYUSUFCAPRAZSCHOOLOFAPPLIEDDISCIPLINES,DEPARTMENTOFCOMPUTERTECHNOLOGIESANDINFORMATIONSYSTEMSDURINGTHEACADEMICYEARIN20142015MAKEUPTHESTUDYGROUPOFTHISRESEARCH24DATACOLLECTIONTHESURVEYUSEDINTHISSTUDYHASTHREESUBDIMENSIONSTOOBTAINDEMOGRAPHICINFORMATION,TOASSESSTHEINTERNETUSEANDTHEEXAMPLESOFCYBERCRIMESTHEFIRSTPARTINCLUDESPERSONALINFORMATION,SUCHASGENDERANDYEAROFSTUDYINTHESECONDPARTAIMSTODESCRIBETHEINTERNETUSEHABITSOFTHESTUDENTSTHELASTPARTINCLUDESCYBERCRIMEEXAMPLESSCALEWITHFIVEPOINTLIKERTSCALEWITH“STRONGLYAGREE1,AGREE2,NOTSURE3,DISAGREE4,STRONGLYDISAGREE5“TOEXAMINETHEATTITUDESONLEGALGROUNDS,THESTATEMENTS“DEFINITELYACRIME1,CRIME2,NOTSURE3,NOTACRIME4,DEFINITELYNOTACRIME5”AREUSEDWHEREAS“CERTAINLYRIGHT1,RIGHT2,NEUTRAL3,WRONG4,DEFINITELYWRONG5”STATEMENTSAREUSEDTOEXAMINEMORALATTITUDESTOWARDSCYBERCRIMETHEQUESTIONNAIREFORMWASTAKENFROMTHEMASTERS’THESIS“THEPERCEPTIONANALYSISOFCOMPUTERCRIMESWITHRESPECTTOSOCIOCULTURALLEVELS”BY?LBAS,2009ANDAPPLIEDTOTHESTUDYGROUP25DATAANALYSISSPSS20STATISTICALPACKAGEFORSOCIALSCIENCESWASUSEDFORTHEANALYSISOFTHEDATAPERCENTAGEANDFREQUENCYANALYSISWEREUSEDTODETERMINETHEPERCEPTIONSANALYSISOFCYBERCRIMEINCOMPUTERSTUDENTSTHERELIABILITYCOEFFICIENTFORTHEWHOLESCALEWASFOUND883FINDINGSINTHISSECTION,FREQUENCYANDPERCENTAGEDISTRIBUTIONSOFTHESTUDENTS’GENDERSANDYEARSOFSTUDYAREPRESENTED5,264STUDENTSOFTHEPARTICIPANTSWEREFEMALESAND64,8118PEOPLEWEREMALES,827STUDENTSWEREFRESHMEN,337STUDENTSWERESOPHOMORES,938STUDENTSWEREJUNIORSANDD,080STUDENTSWERESENIORSACCORDINGTOTHEFREQUENCYANALYSISRESULTSFORTHEINTERESTINCOMPUTERSANDTECHNOLOGYANDFOLLOWINGTHELATESTDEVELOPMENTSINTHEFIELD611STUDENTSOFTHESTUDENTSREPORTEDTHEYARENOTINTERESTEDINTHESUBJECTANDDONOTFOLLOWTHELATESTDEVELOPMENTSWITH9,918STUDENTSWHOARENOTINTERESTEDBUTFOLLOWINGTHEUPDATESINWRITTENANDVISUALMEDIA,2OFTHEPARTICIPANTS44STUDENTSSAIDTHEYAREINTERESTEDINTHESUBJECTSWITHOUTFOLLOWINGTHEUPDATESWITHY,3108REPORTINGTHEIRINTERESTINBOTHTHESUBJECTANDLATESTDEVELOPMENTSTHERESULTSSHOWTHATMAJORITYOFTHESTUDENTSHAVEINTERESTINCOMPUTERS,TECHNOLOGYANDTHEINTERNETFOLLOWINGTHEUPDATESANDDEVELOPMENTSCLOSELYACCORDINGTOTHEFREQUENCYANALYSISFORHOWLONGTHESTUDENTSHAVEBEENUSINGTHEINTERNET0,51STUDENTSSAID“IDON’TUSE”0,51STUDENTSSAIDTHEYHAVEBEENUSINGINFORMATIONTECHNOLOGIESFOR“LESSTHANAYEAR”,419STUDENTS25YEARSY,3108STUDENTS69YEARS,1OFTHESTUDENTSREPORTEDTHATTHEYHAVEBEENUSINGTHEINTERNETMORETHAN10YEARSMOSTOFTHESTUDENTSHAVEBEENUSINGTHEINTERNETFOR69YEARSACCORDINGTOTHERESULTSTHEFREQUENCYANALYSISFORTHEPLACEWHERETHESTUDENTSGETCONNECTEDTOTHEINTERNETSHOWTHAT1,357STUDENTSCANACCESSTOTHEINTERNETATHOMEAND8,215STUDENTSUSETHEINTERNETATWORKORATSCHOOLWHILE0,51STUDENTGOESTOINTERNETCAFES1,63STUDENTSREPORTEDUSINGCOMMONACCESSAREASMOSTOFTHESTUDENTSHAVEBEENUSINGTHEINTERNETATHOMEACCORDINGTOTHERESULTSACCORDINGTOTHEFREQUENCYRESULTS,THEINTERNETISUSEDBYSTUDENTSFORDOINGRESEARCHFORWORKANDSCHOOLWITH1,357STUDENTSFORDOINGRESEARCHFORPERSONALINTERESTSWITH7,468STUDENTSFORREADINGNEWSANDCURRENTAFFAIRSWITH,326STUDENTS,FORCOMMUNICATIONPURPOSESWITH8,816STUDENTS,FORFORMINGSOCIALRELATIONSHIPS1,12STUDENTSANDFORENTERTAINMENTANDGAMES7,113STUDENTSMOSTOFTHESTUDENTSSEEMTOUSETHEINTERNETTODORESEARCHONTHEIRPERSONALINTERESTS
      下載積分: 10 賞幣
      上傳時間:2024-03-14
      頁數(shù): 6
      11人已閱讀
      ( 4 星級)
    • 簡介:INFORMATIONTECHNOLOGYANDMANAGEMENTSCIENCE92ISSN22559094ONLINEISSN22559086PRINTDECEMBER2016,VOL19,PP92–97DOI101515/ITMS20160017HTTPS//WWWDEGRUYTERCOM/VIEW/J/ITMS?2016JURISTIHOMIROVS,JāNISGRABISTHISISANOPENACCESSARTICLELICENSEDUNDERTHECREATIVECOMMONSATTRIBUTIONLICENSEHTTP//CREATIVECOMMONSORG/LICENSES/BY/40,INTHEMANNERAGREEDWITHDEGRUYTEROPENCOMPARISONOFSOAPANDRESTBASEDWEBSERVICESUSINGSOFTWAREEVALUATIONMETRICSJURISTIHOMIROVS1,JāNISGRABIS21,2RIGATECHNICALUNIVERSITYABSTRACT–THEUSAGEOFWEBSERVICESHASRECENTLYINCREASEDTHEREFORE,ITISIMPORTANTTOSELECTRIGHTTYPEOFWEBSERVICESATTHEPROJECTDESIGNSTAGETHEMOSTCOMMONIMPLEMENTATIONSAREBASEDONSOAPSIMPLEOBJECTACCESSPROTOCOLANDRESTREPRESENTATIONALSTATETRANSFERPROTOCOLSTYLESMAINTAINABILITYOFRESTANDSOAPWEBSERVICESHASBECOMEANIMPORTANTISSUEASPOPULARITYOFWEBSERVICESISINCREASINGCHOICEOFTHERIGHTAPPROACHISNOTANEASYDECISIONSINCEITISINFLUENCEDBYDEVELOPMENTREQUIREMENTSANDMAINTENANCECONSIDERATIONSINTHEPRESENTRESEARCH,WEPRESENTTHECOMPARISONOFSOAPANDRESTBASEDWEBSERVICESUSINGSOFTWAREEVALUATIONMETRICSTOACHIEVETHISAIM,ASYSTEMATICLITERATUREREVIEWWILLBEMADETOCOMPARERESTANDSOAPWEBSERVICESINTERMSOFTHESOFTWAREEVALUATIONMETRICSKEYWORDS–LITERATUREREVIEW,REST,SOAP,WEBSERVICESIINTRODUCTIONAPROBLEMFORMULATIONNOWADAYSTHEMOSTCOMMONWAYTOEXCHANGEDATAAMONGINFORMATIONSYSTEMSISTOUSEWEBSERVICESWEBSERVICESARESELFCONTAINED,MODULARANDDYNAMICAPPLICATIONSBYTHEIRNATURE1MOSTCOMMONIMPLEMENTATIONSAREBASEDONSOAPSIMPLEOBJECTACCESSPROTOCOLANDRESTREPRESENTATIONALSTATETRANSFERPROTOCOLSTYLESEACHOFTHESEAPPROACHESHASITSOWNADVANTAGESANDDISADVANTAGES,SOITISIMPORTANTTOCHOOSETHERIGHTTYPEOFWEBSERVICES,OTHERWISEITCANLEADTOCERTAINPROBLEMSINDATAEXCHANGEORIMPOSESOMERESTRICTIONSTHISPAPERCOMPARESSOAPANDRESTAPPROACHESTOGIVERECOMMENDATIONSONHOWTOOPTTHERIGHTWEBSERVICETYPEATAPROJECTDESIGNPHASETHEREAREANUMBEROFRELATEDSTUDIESONTHESEPROTOCOLS,PRIMARYBENEFITSANDFINALVALUE2,3,4OTHERARTICLESREVIEWREALIMPLEMENTATIONEXAMPLES5,6THISRESEARCHPAPERSUMMARISESTHESESTUDIESANDGIVESACOMPARISON,WHICHHELPSIDENTIFYTHEKEYDIFFERENCESANDBENEFITSOFSOAPANDRESTPROTOCOLSBAIMANDTASKSTHEAIMOFTHEPAPERISTOSUMMARISETHEMAINSOAPANDRESTPROTOCOLADVANTAGESANDDISADVANTAGESTOACHIEVETHISAIM,THEFOLLOWINGTASKSARESET1TODEFINETHEMETRICSBYWHICHITISPOSSIBLETOMUTUALLYCOMPARESOAPANDRESTPROTOCOLS2TOCOMPARESOAPANDRESTBYFOUNDMETRICS3TOEVALUATEWHICHPROTOCOLTYPEISBETTERONTHEBASISOFSOFTWAREEVALUATIONMETRICSIITHEORETICALBASISTHISSECTIONADDRESSESTHEKEYCONCEPTSTHATWILLBEUSEDINTHEPAPERAWEBSERVICESASINGLEWEBSERVICECONSISTSOFSERVICEANDSERVICEDESCRIPTIONWHERESERVICEISASOFTWAREMODULEOFFEREDBYASERVICEPROVIDER,WHICHISAVAILABLETHROUGHTHEWEBASERVICEDESCRIPTIONCONTAINSTHEDETAILSOFTHESERVICEINTERFACEANDIMPLEMENTATIONS,INCLUDINGDATATYPES,METADATA,CATEGORISATIONINFORMATIONANDTHELOCATIONWHERETHESERVICEISEXPOSED3,1SERVICEDESCRIPTIONISPUBLISHEDINTHESERVICEREGISTRY,WHERESERVICESAREDISPLAYEDANDGROUPEDBYTHEIRPURPOSEAWEBSERVICEISTHEKEYELEMENTINTHEINTEGRATIONOFDIFFERENTINFORMATIONSYSTEMS,ASINFORMATIONSYSTEMSCANBEBASEDONDIFFERENTPLATFORMS,PROGRAMMINGLANGUAGESANDTECHNOLOGIESBSOAPSOAPCOMPAREDTORESTISANOLDERPROTOCOL,WHICHWASDEVELOPEDASANALTERNATIVETOCORBACOMMONOBJECTREQUESTBROKERARCHITECTURESTANDARDTOENSUREDATATRANSPORTINSOAP,PROTOCOLSSUCHASHTTP,SMTP,ETC,AREUSED,WHILETHEDATAARESENTINXMLFORMAT3THEMAINPRINCIPLEOFTHISAPPROACHISASFOLLOWSASERVICEPROVIDERPUBLISHESASERVICEDESCRIPTIONORINTERFACETOTHESERVICEREGISTRY,SOTHESERVICEREQUESTERCANFINDARIGHTSERVICEINSTANCEANDUSEIT7THEAMOUNTOFDATASENTBYSOAPCANCAUSESOMEPERFORMANCEPROBLEMSBECAUSEWHENFORMINGTHEMESSAGESOAPADDSANADDITIONALHEADERANDBODYPARTSTOTHEMESSAGESOAPBASEDWEBSERVICESINCLUDEAVARIETYOFSTANDARDS,SUCHASWSDL,WSBPEL,WSSECURITY,WSADDRESSINGRESPONSIBLEFORTHEWEBSERVICEANDMESSAGEADDRESSING8THESESTANDARDSWEREDEVELOPEDBYSTANDARDISATIONORGANISATIONS,SUCHASW3CANDOASISCRESTRESTISANEWERAPPROACH,WHICHUSESTHEHTTPPROTOCOLTOTRANSMITDATA,WHILETHEDATAAREFORMEDBYXML,JSON,ETCFORMATS3ITSIMPLIFIESACCESSTOWEBSERVICESBYUSINGTHEEXISTINGANDWELLKNOWNSTANDARDSINSTEADOFADDINGANEWDATAPROCESSINGLAYERSONTHETRANSMISSIONANDCOMMUNICATIONSTACK9THUS,RESTTENDSTOBEALIGHTERALTERNATIVETOTHEHEAVYSOAPPROTOCOLRESTWEBSERVICESAREBASEDONSELFDEFININGRESOURCESWHERETHEHTTPPROTOCOLISUSEDTOREACHTHEMASERVICEISPROVIDEDASARESOURCETHATCANBEIDENTIFIEDBYURIUNIFORMRESOURCEIDENTIFIER8FOREXAMPLE,IFURIHTTP//WWWEXAMPLECOM/REST/USER/1ISOPENEDINTHEWEBINFORMATIONTECHNOLOGYANDMANAGEMENTSCIENCE_______________________________________________________________________________________________2016/1994CDATASYNTHESISTHESEARCHSTRINGWASEXECUTEDINTHEDIGITALLIBRARIESANDAFTERTHATTHESTUDYSELECTIONWASEXTRACTEDINANEXCELSPREADSHEETTHEFOLLOWINGDETAILSWEREINCLUDEDABOUTTHESTUDYTITLE,AUTHORS,PUBLICATIONYEAR,PUBLICATIONFORMJOURNAL/CONFERENCE/ETCANDABSTRACTFIRSTSELECTIONROUNDWASBASEDONTHE“TITLEANDABSTRACT”O(jiān)FTHESTUDY,WHERETHESTUDYWASCATEGORISEDASFOLLOWSIRELEVANT,IIIRRELEVANTANDIIIMODERATEARTICLESINTHEMODERATECATEGORYWEREREVIEWEDINFULLWITHTHERESULTTHATTHEYWEREEITHERINCLUDEDORNOTINCLUDEDINTHERELEVANTSTUDIESGROUPTHISSTEPRESULTEDIN122STUDIESINTHENEXTSTEP,ARTICLESWEREEVALUATEDBASEDONINCLUSIONANDEXCLUSIONCRITERIA,WHICHRESULTEDIN14PRIMARYSTUDIESTHEREVIEWPROCESSCANBESUMMARISEDBYFOURMAINSTEPSSTEP1CREATINGASEARCHSTRING,EXECUTINGSEARCHSTRINGINTHEDIGITALLIBRARIESANDSAVINGTHERESULTSINTOTHEEXCELSPREADSHEETSTEP2THERESULTRELEVANCEISRATEDBASEDONTHETITLESANDABSTRACTSTHISSTEPALSOINCLUDESTHEDUPLICATECHECKINGSTEP3THEINCLUSIONANDEXCLUSIONCRITERIAAREAPPLIEDSTEP4THISSTEPCOVERSTHEARTICLEANALYSISANDAFTERTHATTHECONCLUSIONSAREMADEFIGURE1SHOWSTHEREVIEWPROCESSWITHANUMBEROFARTICLESFIG1THEREVIEWPROCESSWITHANUMBEROFSTUDIESIVCOMPARISONMETHODINTHECONTEXTOFSOFTWAREDEVELOPMENT,THEREAREDIRECTANDINDIRECTMETRICS2THESEMETRICSWILLBETAKENASTHEBASISFORTHECOMPARISONMETHODTHESEDIRECTANDINDIRECTMETRICSWILLBEUSEDTOPOINTOUTTHEKEYPRINCIPLESTHATSHOULDBETAKENINTOTHEACCOUNTWHENSELECTINGBETWEENSOAPORRESTAPPROACHESACOSTRESTISBASEDONASIMPLETECHNOLOGICALINFRASTRUCTURE,WHERETHESERVICECANBEDEVELOPEDWITHMINIMALDEVELOPMENTTOOLUSAGEITAUTOMATICALLYREDUCESTHECOSTTHATWOULDBENEEDEDTOACHIEVETHESAMERESULTWITHTHESOAPAPPROACH4INADDITION,ITISPOSSIBLETOWORKWITHOUTRESTCLIENTATTHEBEGINNINGOFTHEDEVELOPMENTORTESTINGPHASES,ASACCESSTOTHERESTSERVICECANBEENSUREDDIRECTLYFROMTHEWEBBROWSERBYACCESSINGTHERESOURCEADDRESSBEFFORTINORDERTOREDUCEMAINTENANCECOSTSWHENDEVELOPINGANDPUBLISHINGWEBSERVICESONTHEWEB,ITISADVISEDTOUSETHERESTAPPROACHINTURN,IFTHEREISANEEDTOUSEANYOTHERWEBSERVICESTOREDUCEMAINTENANCECOSTS,THERECOMMENDATIONWOULDBETOUSEASOAPWSDLAPPROACH2CLINESOFCODEARECENTSTUDY2COMPAREDSOAPWITHRESTTOFINDOUTHOWMANYLINESOFCODEARENEEDEDTOENSURETHESAMEFUNCTIONALITYINORDERTODEVELOPARESTSERVICE,THEREWERE4016LINESOFCODEWRITTENINTURN,TODEVELOPASOAPSERVICE,THEREWERE3844LINESOFCODEWRITTENACCORDINGLY,INORDERTOIMPLEMENTTHERESTCLIENT,THEREWERE1117LINESOFCODEWRITTEN,ANDTOREALISESOAPCLIENTTHEREWERE509LINESOFCODEWRITTENDEXECUTIONSPEEDWEBSERVICEEXECUTIONSPEEDCANBEOBJECTIVELYMEASUREDBYRESPONSETIMEWHENAWEBSERVICERETURNSARESPONSETOTHECLIENTRESPONSETIMECOMPARISONBETWEENSOAPANDRESTAPPROACHESWASMADEBYTHEUNIVERSITYOFNORTHFLORIDA8ASOAPCLIENTMAKESAREQUESTTOTHESOAPSERVICE,WHEREITSELECTSORADDSDATATOTHEDATABASE,DEPENDINGONTHETYPEOFREQUESTASARESULT,THERESPONSETIMEFROMSERVICEWASMEASUREDINTHESAMEWAY,REQUESTSTHROUGHTHERESTSERVICEWEREMADETHEEXPERIMENTRESULTEDINACONCLUSIONTHATRESTSHOWEDSHORTERRESPONSETIMESANDBETTERDATATHROUGHPUTTHANTHESOAPPROTOCOLIN11ITISMARKEDOUTTHATSOAPISNOTSUITABLEINCASESOFSLOWDATATRANSFERSPEEDORTHENETWORKHASALARGELOADIN10ARESPONSETIMEMEASUREMENTEXPERIMENTWASMADEBYSIMULATINGASIMPLECLIENTSERVERSCENARIO1CREATEAUSER,2USERSAVESAMESSAGE,3AREQUESTISMADETOQUERYUSER’SMESSAGESAND4DELETEAUSERTHEEXPERIMENTALRESULTSSHOWTHATTHESOAPXMLSERVICEPROCESSINGTIMEIS4–5TIMESHIGHERCOMPAREDTOTHERESTAPPROACHFIG2FIG2RESTANDSOAPRESPONSETIMEMEASUREMENTS10INITIALSELECTIONOFSTUDIESIDENTIFYRELEVANTSTUDIESSELECTIONBASEDONTITLESANDABSTRACTSSELECTIONBASEDONINCLUSIONANDEXCLUSIONCRITERIAARTICLEANALYSISANDCONCLUSIONSN635N122N14RESULT
      下載積分: 10 賞幣
      上傳時間:2024-03-13
      頁數(shù): 6
      21人已閱讀
      ( 4 星級)
    • 簡介:COMMUNICATIONSANDNETWORK,2010,2,200206DOI104236/CN201023029PUBLISHEDONLINEMAY2010HTTP//WWWSCIRPORG/JOURNAL/CNCOPYRIGHT?2010SCIRESCNPERFORMANCEEVALUATIONOFJAVAWEBSERVICESADEVELOPER’SPERSPECTIVESANJAYAHUJA,JELOONYANGSCHOOLOFCOMPUTING,UNIVERSITYOFNORTHFLORIDA,JACKSONVILLE,FLORIDA,USAEMAIL{SAHUJA,N00168553}UNFEDURECEIVEDMARCH7,2010REVISEDJULY2,2010ACCEPTEDJULY3,2010ABSTRACTASTHEPOPULATIONOFTHEINTERNETGROWSRAPIDLYTHEDEVELOPMENTOFWEBTECHNOLOGIESBECOMESEXTREMELYIMPORTANTFORTHEEVOLVEMENTOFWEB20,WEBSERVICESAREESSENTIALWEBSERVICESAREPROGRAMSTHATALLOWCOMPUTERSOFDIFFERENTPLATFORMSONTHEWEBTOINTERACTIVELYCOMMUNICATEWITHOUTTHENEEDOFEXTRADATAFORHUMANREADINGINTERFACESANDFORMATSSUCHASWEBPAGESTRUCTURESSINCEWEBSERVICEISAFUTURETRENDFORTHEGROWTHOFINTERNET,THETOOLSTHATAREUSEDFORDEVELOPMENTISALSOIMPORTANTALTHOUGHTHEREAREMANYCHOICESOFWEBSERVICEFRAMEWORKSTOCHOOSEFROM,DEVELOPERSSHOULDCHOOSETHEFRAMEWORKTHATFITSBESTTOTHEIRAPPLICATIONBASEDONPERFORMANCE,TIMEANDEFFORTFORTHEFRAMEWORKINTHISPROJECT,WECHOSEFOURCOMMONFRAMEWORKSTOCOMPARETHEMINBOTHQUALITATIVEANDQUANTITATIVEMETRICSAFTERRUNNINGTHETESTS,THERESULTSARESTATISTICALLYANALYZEDBYSASKEYWORDSWEBSERVICE,FRAMEWORK,PERFORMANCE,JAVA,DEVELOPER1INTRODUCTIONFORGOINGONTRIPSTOOTHERSTATESORCOUNTRIES,THEPERSONUSUALLYREQUIRESTOBUYAIRPLANETICKETS,RENTACAR,ANDMAKERESERVATIONSFORHOTELSTOSTAYATWHENDEALINGWITHAIRPLANETICKETS,MOSTOFTHETIMETHEPERSONEVENHASTOBUYSEVERALTICKETSFORSOMESTOPSINSTEADOFATICKETTHATTAKESTHEPERSONDIRECTLYTOTHEFINALDESTINATIONLOOKINGUPTHEAIRPLANEARRIVALANDDEPARTURETIMESTOCONNECTEACHFLIGHTMIGHTTAKEHOURSOFSEARCHINGANDPLANNINGWHATIFTHEREWASAVIRTUALAGENTTHATCOULDDOTHISALLINJUSTAFEWSECONDSSOUSUALLYPEOPLEWOULDLOOKFORAGENTSTODOTHISFORTHEMBUTWHATIFTHISAGENTWASACTUALLYISACTUALLYAVIRTUALAGENTONLINEIFTHEPERSONJUSTENTERSTHELOCATIONHEWANTSTOSTARTFROM,THEDESTINATION,THEDESIREDTIMEFORDEPARTUREORARRIVAL,ANDALLTHEINFORMATIONREQUIREDINTOTHECOMPUTER,INASNAP,THECOMPUTERSHOWSALLTHERESULTSFORTHEPERSONTOCHOOSEFROMANDPURCHASETHETICKETSEVENBETTER,SUCHVIRTUALAGENTSCOULDHAVEPOSSIBILITIESTOALSOSHOWINFORMATIONOFTHECARRENTALSANDHOTELSATTHEDESTINATIONANDRESERVETHEMFORYOUBYUSINGTHISTYPEOFVIRTUALAGENT,COULDSAVEMUCHEFFORTANDTIMEANDCANALSOBEMOREACCURATETHANHUMANAGENTSSUCHTECHNOLOGYRELIESONTHEDEVELOPMENTANDWIDESPREADOFWEBSERVICESINSTEADOFDEVELOPINGAWEBSERVICEAPPLICATIONFROMSCRATCH,THEREAREMANYOPENSOURCEFRAMEWORKSTHATMAKEDEVELOPMENTMUCHEASIERWHICHOFTHESEFRAMEWORKSWOULDBEABETTERCHOICEFORWEBSERVICEAPPLICATIONDEVELOPMENTTHISSTUDYCOMPARESFOURPOPULAROPENSOURCEFRAMEWORKSBOTHQUALITATIVELYANDQUANTITATIVELYBYDOINGSEVERALTESTSANDANALYSISTHEFOURFRAMEWORKSAREAPACHEAXIS,JBOSSWS,XFIRE,ANDHESSIANMOREINTRODUCTIONSOFWEBSERVICESAREDONEINSECTION2SECTION3DESCRIBESTHEFOURFRAMEWORKSTHATAREUSEDINTHISSTUDYINSECTION4,THEMETRICSTHATAREUSEDTOMEASURETHEFRAMEWORKSAREEXPLAINEDINMOREDETAILSECTION5INTRODUCESTHESTATISTICALANALYSISMETHODSTHATAREUSETOANALYZETHEMEASUREDRESULTSINSECTION6,THETESTRESULTSARESHOWNANDANALYZEDTHECONCLUSIONSAREINSECTION72WEBSERVICEFRAMEWORKSSINCEWEBSERVICESAREDESIGNEDTOTRANSFERDATAINCOMMONWAYS,SEVERALCOMPANIESANDGROUPSDEVELOPEDWEBSERVICEFRAMEWORKSFORTHECONVENIENCEOFWEBSERVICEDEVELOPERSSOTHATTHEYDONOTNEEDTOWRITEACOMPLETEWEBSERVICEFROMSCRATCHSOMEOFTHEPOPULARFRAMEWORKSAREAPACHEAXIS,JBOSSWS,CODEHAUSXFIRE,ANDCAUCHOHESSIANINTHISSECTION,THESEFRAMEWORKSAREGOINGTOBEINTRODUCEDSAHUJAETAL202WIDEVARIETYOFMEMORY,SUCHASCACHEMEMORY,FLASHMEMORY,RANDOMACCESSMEMORYRAM,VIRTUALMEMORY,ETCEITHERMEMORY,THEYAREALLLIMITEDINSERVERDUETOTHECOSTANDSPACEAFRAMEWORKTHATUSESLESSMEMORYWOULDHAVEANADVANTAGEOFALLOWINGHIGHERCAPACITYFORTHESERVER34CPUUSAGECENTRALPROCESSINGUNITCPU,ALSOKNOWNASPROCESSOR,ISACOMPONENTINACOMPUTERUSEDTOINTERPRETPROGRAMINSTRUCTIONSANDPROCESSDATAALTHOUGHITISONLYABLETOPROCESSONETASKATATIME,WHENTHEREAREMULTIPLETASKSTOBEDONE,INSTEADOFFINISHINGATASKTHENGOINGTOANOTHER,THECPUISDESIGNEDTOSWITCHTOOTHERTASKSBEFOREFINISHINGONEIFNECESSARY,SOTHATITWOULDACTLIKEIFITISEXECUTINGMULTIPLETASKSATTHESAMETIMEHOWEVER,LARGETASKSMIGHTOCCUPYALOTOFCPUTIME,WHICHDECREASESTHETIMESCHEDULEDFOROTHERTASKSAFRAMEWORKTHATUSESLESSCPUWOULDALLOWTHESERVERTOHAVEMORETIMETOEXECUTEOTHERTASKS35SOURCELINESOFCODETHESOURCELINESOFCODESLOCUSEDINAFRAMEWORKCANINDICATETHETRANSPARENCYANDABSTRACTIONOFTHEFRAMEWORKTHEMAINGOALOFAFRAMEWORKISTOSAVETHEDEVELOPER’STIMEANDEFFORTBYNOTHAVINGTOWRITETHEENTIRECODEFROMSCRATCHTHUSTHELESSLINESOFCODETHATISREQUIREDFORAFRAMEWORK,THEMORETIMEANDEFFORTISSAVEDBYTHISFRAMEWORKHOWEVER,LINESOFCODECANNOTBEEXACTLYACCURATESINCESOMELINESMIGHTBELONGWHILESOMELINESARESHORTSOTHENUMBEROFFILESANDSIZEOFFILESALSOISACONSIDERATION4STATISTICALANALYSISMETHODSAFTERRETRIEVINGTHETESTDATATOCOMPARETHEPERFORMANCES,WENEEDAMETHODTOANALYZETHERESULTSBYSIMPLYCALCULATINGTHEAVERAGERESPONSETIMESANDMAKINGTHEMINTOAGRAPHSISNOTSUFFICIENTFORTHEANALYSISLOOKINGATTHEAVERAGERESPONSETIMES15SECONDSAND16SECONDS,WECANNOTBESUREIFTHATISAGREATDIFFERENCEORNOTTHEREFORE,STATISTICALANALYSISMETHODSAREREQUIREDTOTELLIFTHEDIFFERENCEISSIGNIFICANTORNOTINTHISPROJECT,THEGENERALLINEARMODELGLM9ANDTWOWAYANALYSISOFVARIANCETWOWAYANOVAISUSEDFORSTATISTICALANALYSISFURTHERMORE,THESTATISTICALANALYSISSYSTEMSAS10ISUSEDASATOOLFORAIDINGTHECALCULATIONSOFTHESTATISTICALANALYSESREQUIRED41THESASSYSTEMTHESASSYSTEMISSTATISTICALANALYSISSOFTWARETHATHASAWIDEVARIETYOFSTATISTICALMODULESANDPROCEDURESTHEYUSEAFOURTHGENERATIONPROGRAMMINGLANGUAGE4GLFORTHEIRCODEANDTHEPROGRAMSARECOMPOSEDBYTHREEMAINCOMPONENTS–THEDATASTEP,THEPROCEDURESTEP,ANDTHEMACROLANGUAGETHEDATASTEPISFORENTERINGDATA,LIKEINSERTINGTHEDATAINTHECODEORREADFROMDATAFILESTHEPROCEDURESTEPISTHEUSEOFTHESTATISTICALMETHODSANDMODELSTOANALYSISTHEDATATHATWASREADINTHEDATASTEPTHEMACROLANGUAGEISFORDECREASINGTHEREDUNDANCYOFFUNCTIONSTHATAREUSEDAGAINANDAGAINTHROUGHOUTTHEPROGRAM42THEGLMMODELTHEGLMMODELISASTATISTICALLINEARMODELTHATISUSEDINGENERALCASESITISTHEFOUNDATIONOFMANYSTATISTICALANALYSES,SUCHASTTEST,ANOVA,ANALYSISOFCOVARIANCEANCOVA,ETCTHEEASIESTCASETOUNDERSTANDHOWTHEGLMMODELWORKSISTHETWOVARIABLECASETHEGOALOFTHISANALYSISISTOUSEAWAYTOACCURATELYDESCRIBETHEINFORMATIONINTHISPLOTUSINGTHEGLMMODEL,WETRYTOFINDASTRAIGHTLINETHATISCLOSESTTOALLTHEDOTSINTHEPLOTTHISLINEWOULDBEWRITTENASYB0B1XE,WHEREYISTHEYAXISVARIABLE,XISTHEXAXISVARIABLE,B0ISTHEINTERCEPTTHEVALUEOFYWHENXEQUALS0,B1ISTHESLOPEOFTHESTRAIGHTLINE,ANDEISTHEERRORBYSOLVINGB0ANDB1,WECANGETINFORMATIONABOUTTHISLINEARLINETHATDESCRIBESTHEDOTSINTHEPLOTINOTHERCASESWITHMORETHANTWOVARIABLES,THEFORMULACANBEEXTENDEDASYB0B1X1B2X2B3X3BNXNE,WHERENISTHENUMBEROFVARIABLESOFTHESITUATIONBUTTHEMECHANISMFORSOLVINGSUCHPROBLEMSISTHESAME5RESULTSANDANALYSESINORDERTOGETBESTRESULTSFROMSASANALYSIS,EACHCASEISTESTEDTWENTYTIMESSINCEFOURFRAMEWORKSWITHFIVEDIFFERENTAMOUNTSOFCLIENTSARETESTED,THEREARETWENTYDIFFERENTCASESADDINGTHETWENTYTESTTIMESFORTHETWENTYDIFFERENTCASESWOULDRESULT400DATASETSTOBECALCULATEDBYSASBESIDESTHEAMOUNTOFCLIENTS,THESIZEOFDATAISALSOCONSIDEREDWITHALSOFIVEDIFFERENTSIZESOFDATASENT,THEREWOULDBETWENTYCASESWITHATOTALOF400DATASETSTHERESPONSETIMEISMEASUREDBYRECORDINGTHETIMERIGHTBEFOREINVOKINGTHEWEBSERVICEANDRECORDINGTHETIMERIGHTAFTERTHEDATAREQUESTEDISRECEIVEDTHENSUBTRACTINGTHETIMEDIFFERENCE51RESULTS511CLIENTSCENARIOSFORTESTINGTHEFOURDIFFERENTFRAMEWORKSINDIFFERENTSCENARIOS,WEBSERVICEAPPLICATIONSTOSENDOUTDATAARECREATEDTHEFIVESCENARIOSBASEDONAMOUNTOFCLIENTSFORTESTINGPERFORMANCEOFTHEFOURFRAMEWORKSARE1CLIENT,5CLIENTS,10CLIENTS,15CLIENTS,AND20CLIENTSEACHRETRIEVING1MBOFDATATHEAVERAGERESPONSETIMEFORCOPYRIGHT?2010SCIRESCN
      下載積分: 10 賞幣
      上傳時間:2024-03-13
      頁數(shù): 7
      22人已閱讀
      ( 4 星級)
    • 簡介:INTERNATIONALJOURNALOFCOMPUTERAPPLICATIONS0975–8887VOLUME75–NO15,AUGUST201331JAVAWEBDEPLOYMENTINCLOUDCOMPUTINGANKITKUMARSAHUDEPARTMENTOFCOMPUTERSCIENCEENGINEERINGGYANVIHARSCHOOLOFENGINEERINGANDTECHNOLOGY,JAIPUR,RAJASTHAN,INDIAABSTRACTCLOUDCOMPUTINGISAREVOLUTIONARYITFIELDINTODAY’SWORLDSEVERALTECHNOLOGIESLIKEJAVA,PYTHONPROVIDESDEPLOYMENTONCLOUDSUSINGRESPECTIVETOOLSINTHISPAPER,THEWEBDEPLOYMENTINCLOUDCOMPUTINGWITHJAVAANDTHEPERFORMANCEISSUESOFTHEJAVADEPLOYMENTONACLOUDISDISCUSSEDTHEREARESEVERALTOOLSAVAILABLETODEPLOYAJAVAWEBAPPLICATIONONCLOUDS,SOMEOFTHESEAREGOOGLEAPPENGINEBYGOOGLE,WINDOWSAZUREBYMICROSOFT,AMAZONEC2BYAMAZONETCCLOUDCOMPUTINGISPROVIDINGMANYFACILITIESFORDEPLOYMENTBUTISALSOHAVINGPERFORMANCEISSUESWHICHISAMAJORFACTORFORTHEWEBAPPLICATIONSISSUESWITHJAVADEPLOYMENTONCLOUDWOULDTRYTORESOLVETHROUGHTHEFRAMEWORKCUSTOMIZATIONAJAVAWEBAPPLICATIONISDEPLOYEDONGOOGLECLOUDANDEXAMINEDOFITSPERFORMANCE,FURTHERINTHISPAPERGENERALTERMSCLOUDCOMPUTING,GOOGLEAPPENGINE,JAVAWEBDEPLOYMENT1INTRODUCTIONCLOUDCOMPUTINGISASERVICEUSEDOVERANETWORKFORMULTIPURPOSESLIKESOFTWARE,PLATFORM,INFRASTRUCTURESERVICEANDPROVIDESABETTERAWAYFORVIRTUALIZATIONINTHEITFIELD1THEREARESEVERALFIELDSTHATAREAFFECTEDBYTHECLOUDCOMPUTINGLIKEDEPLOYMENTCLOUDCOMPUTINGMAKESTHEITFIELDSENABLEFORBETTERPERFORMANCEUSINGLESSERRESOURCESITINCLUDESDELIVERYOFTHEAPPLICATIONASSERVICESTHROUGHOUTTHEINTERNETANDTHESOFTWARETHATPROVIDESERVICESINTHEDATACENTREANDHARDWAREANDTHEPROTOTYPESHIFTTHEDATACENTRESOFTWAREANDHARDWAREISKNOWNASACLOUD2MANYOFTHECOMPANIESARESHIFTINGTOTHECLOUDSERVICESLIKEGOOGLEAPPENGINEHASBEENSTARTEDBYGOOGLEMICROSOFTSTARTEDWINDOWSAZURE,AMAZONSTARTEDEC2AWEBAPPLICATIONISDEPLOYEDONGOOGLEAPPENGINEASASAMPLEAPPLICATIONTHEREARESEVERALTERMSWHICHAREDISCUSSEDASFOLLOWSWHATACLOUDISACLOUDISAPOOLOFVIRTUALIZEDCOMPUTERRESOURCES3ACLOUDCANMULTITUDEARANGEOFDIFFERENTLOADS,INCLUDINGWEDGESTYLEBACKENDWORKSANDCOLLABORATING,USERFACINGAPPLICATIONSITALLOWSLOADSTOBELOCATEDANDSCALEDOUTRAPIDLYTHROUGHTHEQUICKPROVISIONINGOFVIRTUALMACHINESORSOMATICMACHINESITSUPPORTSCOMPLETED,SELFRECOVERING,EXTREMELYACCESSIBLEPROGRAMMINGPROTOTYPESTHOSEALLOWLOADSTOIMPROVEFROMMANYOBVIOUSHARDWARE/SOFTWAREDISASTERSITOBSERVERSRESOURCEUSEINREALTIMETOENABLEREBALANCINGOFPROVISIONSWHENDESIREDACLOUDISANIMPLICITWORLDAVAILABLEFORAPPLICATIONSDEPLOYMENTWITHOPTIMIZEDCOST,WHEREASCLOUDCOMPUTINGISAREGULARWORDFORANYTHINGTHATINVOLVESDISTRIBUTINGSERVICESOVERTHEINTERNETATITSHUMBLEST,ITISPROVIDINGTHEASSETSANDPROFICIENCIESOFINFORMATIONTECHNOLOGYENTHUSIASTICALLYASASERVICECLOUDCOMPUTINGISASTYLEOFCOMPUTINGINWHICHENTHUSIASTICALLYACCESSIBLEANDOFTENVIRTUALIZEDASSETSAREDELIVEREDASASERVICEOVERTHEINTERNET4ADVANTAGESOFCLOUDCOMPUTING?ITISSWIFT,WITHEASEANDSPEEDOFDEPLOYMENT?ITSCOSTISUSEBASED,ANDWILLLIKELYBEABRIDGED?INHOUSEITCOSTSARECONDENSED?CAPITALINVESTMENTISCHEAP?THELATESTTECHNOLOGYISOFFEREDALWAYS?THEUSEOFSTANDARDTECHNOLOGYISOPTIMISTICANDFACILITATECLOUDSERVICESACLOUDISAPOOLOFSYSTEMS,RESOURCESANDTHEIRCLASSESTHATPROVIDESALLFACILITIESASPERTHEUSEREND’SREQUIREMENTSALLTHERESOURCES,APPLICATIONSAREPARTOFACLOUD5CLOUDCOMPUTINGPROVIDESFOLLOWINGCLASSIFICATIONOFITSSERVICESIAASINFRASTRUCTUREASASERVICEPAASPLATFORMASASERVICESAASSOFTWAREASASERVICE1INFRASTRUCTUREASASERVICETHEIAASISFURTHERCLASSIFIEDINTOICOMPUTATIONASASERVICECAASINTHISKINDOFSERVICE,THEVIRTUALMACHINESERVERSARELENTTHECOSTOFTHEVIRTUALMACHINESERVERSAREBASEDONTHECAPACITYOFTHEMACHINELIKEMEMORYATTRIBUTESOFTHESERVER,ITSOPERATINGSYSTEMANDALLDEPLOYMENTFEATURES6IIDATAASASERVICEDAASINTHISKINDOFSERVICE,STORAGEISPROVIDEDFORALLENDUSERSFORSTORINGDATATHECOSTESTIMATIONOFTHESERVICEISBASEDONTHESCALEOFGIGABYTEGBANDDECIDEDBYTHEPROVIDER7INTERNATIONALJOURNALOFCOMPUTERAPPLICATIONS0975–8887VOLUME75–NO15,AUGUST201333LIKEINGOOGLEAPPENGINE,THEBIGGESTPROBLEMFORDEVELOPERSWILLBEADJUSTINGTOGOOGLE’SNONRELATIONALDATASTORESWHENGOOGLEAPPENGINEWASINTRODUCED,THEREWERENOTSOMANYDATABASEPROJECTSINTHEMARKETFORCLOUDS4OBJECTIVEASPERTHEGIVENPROBLEMFORMULATIONS,THEBASICOBJECTIVEWILLBETODETERMINETHELESSPERFORMANCECAUSESINJAVAWEBAPPLICATIONONCLOUDSFOLLOWINGPHASESWOULDBEUSEFULINPERFORMANCEISSUESCHOOSINGASUITABLEPLATFORMFORJAVAAPPLICATIONLIKEGOOGLEAPPENGINEETCTHECLOUDFRAMEWORKIETHEAPPENGINEWEBAPPFRAMEWORKFORGOOGLEAPPENGINESHOULDBECONFIGUREDASPERTHEREQUIREMENTOFTHEJ2EEAPPLICATION19THEINFRASTRUCTUREOFTHECLOUDSERVICESSHOULDBEMORESPECIFICTOTHEJAVAAPPLICATIONSFOLLOWINGMETHODSCANBEUSEDFORTHEABOVEPROPOSEDOBJECTIVE?THESTRUCTUREOFTHECLOUDCOMPUTINGINTHERESPECTOFDEPLOYMENTSHOULDBEINAGOODMANNERTHEFRAMEWORKUSEDINTHEVIRTUALMACHINESERVERSHOULDBEINDEPENDENTANDOPTIMIZEDSOTHATCOULDBEGOODATPERFORMANCE20?THERESOURCESWHICHISUSEDINTHECLOUDCOMPUTINGSHOULDBESINGLEINDEPENDENTRESOURCEANDSHOULDMENTIONTHEREQUIREDCONFIGURATIONHARDWAREANDSOFTWARE21ANDSHOULDBEPLATFORMINDEPENDENTARELIABLETOUSEATLARGESCALETHESEISSUESWOULDBERESOLVEDBYSEVERALPOSSIBLESOLUTIONSINTHECLOUDSERVICES,TOPERFORMSOMESPECIFICTASK,THEREARESEVERALRESOURCESARRANGEDINAPARTICULARORDER22THECLOUDCOMPUTINGPROVIDESUSCUSTOMIZINGITSRESOURCESACCORDINGTOTHEINDIVIDUALAPPLICATIONANDITSUSE5METHODOLOGYTHEMETHODOLOGYWILLUSEDTOOVERCOMETHISISSUEWOULDBE?OPTIMIZATIONINFRAMEWORKASPERTHEGOOGLEAPPENGINE,THECLOUDCOMPUTINGHASITSDEPENDENCYONTHEFRAMEWORKOFTHEWEBAPPLICATIONSOTHEVERYFIRSTAPPROACHWOULDBEFOLLOWEDTHEOPTIMIZATIONOFTHEFRAMEWORKOFTHEAPPLICATIONINACLOUDTHEONLYFRAMEWORK,WHICHHASBEENCUSTOMIZEDFORTHECLOUDCOMPUTINGISSPRINGFRAMEWORKYETNOW23WHILEUSINGSPRINGFRAMEWORKINCLOUDDEPLOYMENT,IFTHEAPPLICATIONTAKESALONGERTIMETOLOAD,WOULDBETHROWNASDEADLINEEXCEEDEDEXCEPTIONANDTHECONTROLWILLBESHIFTEDTOTHEFRAMEWORKANDNOWFRAMEWORKWOULDTAKETHERESPECTIVEDECISIONS24FORABETTERCLOUDDEPLOYMENT,THEENTIREFRAMEWORKSHOULDBEOPTIMIZED?REDUCINGORAVOIDINGTHEUSEOFMODULESCANNINGINGOOGLEAPPENGINE,THESPRINGFRAMEWORKPROCESSASETOFOBSERVATIONASASIGNALFLAGTOANYOTHEROBJECTINITSEXECUTIONSOMETIMESTHEREQUESTEDRESOURCECANNOTBEAVAILEDDUETOTHERESOURCESHARING,THISALSORESTRICTSTHEAPPLICATIONSPEEDINITSPERFORMANCETHECOMPONENTSCANNINGISALSORESPONSIBLEFORMAKINGTHEAPPLICATIONWITHLESSERPERFORMANCEANDLESSEREFFICIENTDUETOITSTIMETAKINGPROCESSTOAVOIDTHISPROBLEM,THECOMPONENTSCANNINGWOULDBEAVOIDEDINTHEMANDATORYCASEOFUSINGCOMPONENTSCANNING,ITWOULDBEREDUCED25THISMETHODOLOGYWOULDWORKWITHJAVAWEBAPPLICATIONSTHATAREIMPLEMENTEDINSPRINGFRAMEWORK6CONCLUSIONACCORDINGTOTHERESULTS,THEPERFORMANCEISSUECANBEEASILYHANDLEDBYFILTERINGTHEWEBAPPLICATIONINDIVIDUALLYANDTHEFRAMEWORKCUSTOMIZATIONTHISISSUEHASBEENAMAJORISSUEFORTHECLOUDUSERSWHICHWOULDBEHANDLEDBYTHESUGGESTEDIDEATHISWOULDDECREASETHEHIGHLATENCYDELAYFORTHEAPPLICATIONPERFORMANCEANDTHEAPPLICATIONWOULDNOTTAKELONGERTIMETORUNONTHECLOUDSERVER7ACKNOWLEDGMENTSOURTHANKSTOTHEPARENTSWHOMOTIVATEDUSANDMRSANDEEPBHARGAVDEPARTMENTOFCOMPUTERSCIENCE,GYANVIHARSCHOOLOFENGGANDTECHWHOHAVECONTRIBUTEDTOWARDSDEVELOPMENTOFTHISISSUE8REFERENCES1THEBASICSOFCLOUDCOMPUTINGBYALEXAHUTHANDJAMESCEBULA2INTRODUCTIONTOTHECLOUDCOMPUTINGBYDIALOGICCOM3GJUVE,EDEELMAN,KVAHI,ANDGMEHTA,“SCIENTIFICWORKFLOWAPPLICATIONSONAMAZONEC2,”WORKSHOPONCLOUDBASEDSERVICESANDAPPLICATIONSINCONJUNCTIONWITH5THIEEEINTERNATIONALCONFERENCEONESCIENCEESCIENCE2009,20094USINGGOOGLEAPPENGINEO’REILLYGOOGLEPRESSBYCHARLESSEVERANCE5XASASERVICECLOUDCOMPUTINGWITHGOOGLEAPPENGINE,AMAZONWEBSERVICES,MICROSOFTAZUREANDFORCECOMBYRABIPRASADPADHY,MANASRANJANPATRAANDSURESHCHANDRASATAPATHY6IDENTIFYINGKEYCHALLENGESINPERFORMANCEISSUESINCLOUDCOMPUTINGBYASHRAFZIA7CLOUDCOMPUTINGSECURITYISSUESBYRANDYMARCHANY8THECOSTOFACLOUDRESEARCHPROBLEMSINDATACENTERNETWORKSBYALBERTGREENBERG,JAMESHAMILTON,DAVIDAMALTZ,PARVEENPATEL9CLOUDCOMPUTINGSECURITYANDRELIABILITYISSUESBYFARHADAHAMED,SEYEDSHAHRESTANIANDATHULAGINIGE10ANOVELAPPROACHFORHANDLINGSECURITYINCLOUDCOMPUTINGSERVICESBYSAHARMOHAMMADABDULJALIL,OSMANHEGAZYANDEHABEHASSANEIN11SAPCLOUDCOMPUTINGBYJOSEPHYERUVA,MPHASIS12CLOUDCOMPUTINGINTHEPUBLICSECTORBYRUSSELLCRAIG,JEFFFRAZIER,NORMJACKNIS,SEANANMURPHY,CAROLYNPURCELL,PATRICKSPENCER,JDSTANLEY13MOVINGFROMLEGACYSYSTEMSTOCLOUDCOMPUTINGATATACOMMUNICATIONWHITEPAPER14GTSIGROUP,“CLOUDCOMPUTINGBUILDINGAFRAMEWORKFORSUCCESSFULTRANSITION,”WHITEPAPER,GTSICORPORATION,200915RAJNISHCHOUBEY,RAJSHREEDUBEYANDJOYBHATTACHARJEE,“ASURVEYONCLOUDCOMPUTINGSECURITY,CHALLENGESANDTHREATS”,INTERNATIONALJOURNALON
      下載積分: 10 賞幣
      上傳時間:2024-03-13
      頁數(shù): 4
      20人已閱讀
      ( 4 星級)
    關于我們 - 網(wǎng)站聲明 - 網(wǎng)站地圖 - 資源地圖 - 友情鏈接 - 網(wǎng)站客服客服 - 聯(lián)系我們

    機械圖紙源碼,實習報告等文檔下載

    備案號:浙ICP備20018660號