Internet - Technical Development and Applications (eBook)
XX, 284 Seiten
Springer Berlin (Verlag)
978-3-642-05019-0 (ISBN)
Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications.
The content of the book is divided into three parts:
- Internet - technical fundamentals and applications
- Information management systems
- Information security in distributed computer systems
This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among researchers, teachers and also students of computer science and related disciplines.
Preface 6
Contents 8
List of Contributors 17
Part I Internet – Technical Fundamentals and Applications 21
How to Improve Internet? 22
How Internet Works 22
Short Chronology 23
Social Aspects 24
Internet Infrastructure 25
Problems and Their Solutions 26
Spam Is Incredibly Annoying 26
There Are Necessary Better Search Engines 27
Conclusion and Future Plans 28
References 29
Performance Modeling of Selected AQM Mechanisms in TCP/IP Network 30
Introduction 30
Active Queue Management 31
Simulation Model of the RED Mechanism 32
Numerical Results 33
Conclusions 37
References 38
Simulation and Analytical Evaluation of a Slotted Ring Optical Packet Switching Network 40
Introduction 40
Network Architecture 41
Quality of Service Mechanism 42
Simulations 43
Markovian Analysis 44
Conclusions 47
References 47
A Multi-tier Path Query Evaluation Engine for Internet Information Systems 48
Introduction 48
Related Work 49
Deferred Evaluation of Structural Join 49
Tailored Location Steps 50
Employing FIFO Index 51
Additional Hint for the Cursor Shift 52
Composition of Operators 52
Experimental Evaluation 53
Conclusions 54
References 55
Modeling of Internet 3D Traffic Using Hidden Markov Models 56
Introduction 56
3D Object Representation – Progressive Meshes 57
Data Acquisition 59
Hidden Markov Model 60
Conclusions 62
References 63
Usability Testing of the Information Search Agent: Interface Design Issues 64
Introduction 64
Agents Working for Us 65
Information Search Agents 66
Research on Interaction of People with Intelligent Information Search Agent 66
Exploring Interaction 67
Research Outcomes 68
Conclusion 69
References 69
The Use of Natural Language as an Intuitive Semantic Integration System Interface 70
Introduction 70
Metalog 71
HILLS Semantic Integration System 72
HILLS Architecture 72
HILLS and Metalog 75
Polish Language and Metalog 76
Summary 77
References 77
Student’s Electronic Card: A Secure Internet Database System for University Management Support 78
Introduction 78
Project Background 80
Functionality and Architecture of the System 82
Cards and System Security 84
Data Synchronization with the University Database 87
System Expansion 87
Design, Development, Update and Maintenance 89
Summary and Conclusion 90
References 91
Video Shot Selection and Content-Based Scene Detection for Automatic Classification of TV Sports News 92
Introduction 92
Temporal Segmentation 93
Scene Detection and Classification 95
Classification of Shots from TV Sports News 95
Best Frame Position in a Scene 96
Final Conclusions and Further Studies 97
References 99
E-Learning Database Course with Usage of Interactive Database Querying 100
Introduction 100
General Structure of a Module 101
Description of SQL Learning Problem 102
Developed Solution 104
Conclusion 107
References 108
On Applications of Wireless Sensor Networks 109
Introduction 109
Sensor Networks from a Practical Point of View 110
Technological Aspects 112
Object, Habitat and Environmental Monitoring 113
Building Automation 114
Oil and Gas Installations 114
Medical Care 115
Military Applications 115
Conclusions 116
References 116
Gift Cards Authorization through GSM in a Distributed Trade Network – Case Study 118
The Business Environment of Gift Cards 118
Good Vouchers and Gift Cards Survey 119
Formal Regulations of Gift Cards 120
Gift Cards Authorization System Requirements 120
System Architecture 121
Gift Card Manager 122
Authentication Procedure 123
SMS Protocol 123
Conclusions 124
References 125
Remote Access to a Building Management System 126
Introduction 126
Configuration of the BMS 127
Buildings, Devices, States 127
Automation 128
Events Dictionary 129
Building Management Protocol 129
Initialization and Finishing 129
Information Commands 130
Controlling Devices 131
Monitoring 131
Transactions 132
Remote Access 133
Conclusions 133
References 134
Applying Rough Set Theory to the System of Type 1 Diabetes Prediction 135
Introduction 135
Medical Data 136
The Aim of the Study 136
Rough Set Preliminaries 137
Information System 137
Data Analysis 138
Classification Problem 139
Conclusions 141
References 142
Part II Information Management Systems 144
Outline of the Enterprise Resource Control Systems Architecture 145
Data Structure 145
Organizational Information-Transition Nets 148
Organizational Structure 150
Functional Structure 151
Conclusions 153
References 153
Implementation of Changes to the System in the Model of Multiple Suppliers vs. the Model of a Single Supplier 154
The Process of Implementing Changes to the System 154
The Lines Dividing the Process – The Responsibility of Suppliers and Points of Contact 155
The Specificity of the Single Supplier Model 157
The Specificity of the Multi-supplier Model 158
Summary and Conclusions 159
References 161
Standardization of Software Size Measurement 162
Introduction 162
Software Size Measures 163
Standardization of Software Functional Size Measurement Concept 165
Standardization of Software Functional Size Measurement Process 166
Concluding Remarks 168
References 169
The Role of Automation Tools Supporting the Maintenance of the System Environments 170
System Environments 170
Selected Aspects of System Environment Maintenance 171
Tools to Support System Environment Maintenance 172
Summary and Conclusions 175
References 177
Why IT Strategy Does Not Suffice? 178
Introduction 178
Attempt to Evaluate the Selected Results of Poll Studies 179
Enterprise Architecture as a Basis for IT Strategy Realization 183
Summary 187
References 187
The Process Approach to the Projects of the Information Systems 188
The Processes in the Projects of the Information Systems 188
The Classification of Processes 190
General Principles and Characteristics of the Process Approach to the Management of Projects of Information Systems 191
The Principle of the Process Strategy 192
The Principle of the Consequent Separation of Production and Non-production Processes in the IS Projects 193
The Principle of Delegation, Monitoring and Control 193
The Principle of the Repeated Procedure in the Management of the IS Project 195
The Principle of Team Work, the Principle of Evaluation and Motivation of Workers in the Project 195
The Principle of the Maximization of the Application of Knowledge Processes 196
Conclusions 196
References 197
The Importance of Virtual Community for Enterprise Functioning – The Case Study of P.P.H.U. Jedroch Partnership Company 198
Introduction 198
The Role of Virtual Community in Marketing 199
Organizational and Managing P.P.H.U. Jedroch Reactions upon Opinions Expressed by Internauts 201
Conclusions 204
References 205
Part III Information Security in Distributed Computer Systems 206
Quantum Cryptography: Opportunities and Challenges 207
Introduction 207
Quantum Key Distribution 210
Quantum Cryptography Protocols 213
The BB84 Quantum Cryptographic Protocol 213
The B92 Quantum Cryptographic Protocol 216
EPR Quantum Cryptographic Protocols 216
Quantum Teleportation 218
Quantum Cryptography in Practice 218
The DARPA Quantum Network 219
The Vienna Network 220
Commercial Quantum Products 220
Security of Quantum Cryptography 221
Overall Security of a Communication System 221
Attacks on Quantum Cryptosystems 222
Exploiting Physical Imperfections 223
Other Challenges 224
Conclusions 225
References 226
Cerberis: High-Speed Encryption with Quantum Cryptography 228
Cryptography 228
Organizational Information-Transition Nets 229
Quantum Cryptography 230
Advantage of Layer 2 Encryption 230
Description of the Cerberis Solution 231
Quantum Key Distribution Server (QKD Server) 231
High Speed Encryption Engine (AES-256) 232
Conclusions 232
References 232
A Numerical Simulation of Quantum Factorization Success Probability 233
Introduction 233
Quantum Factorization 234
Phase Estimation 235
Quantum Order Finding 236
The Shor’s Algorithm 237
Analysis 238
Conclusion 240
References 240
Software Flaws as the Problem of Network Security 242
The Vulnerability of Systems to Hacking 242
The Attacks on the Operating Systems 243
The Vulnerability of Utility Applications to Attacks 245
Hacking theWeb Applications 246
Application Vulnerabilities – The Frequency of Occurrence 247
Summary 249
References 250
Security of Internet Transactions 251
Introduction 251
Threats to Internet Users 253
Drive-by Download Attack 256
Attack through SSLStrip 257
Eavesdropping in Computer Networks and Scanning of Ports 257
Summary 258
References 258
Security of Internet Transactions – Results of a Survey 260
Introduction 260
Electronic Bank Accounts 262
A Survey 2008 on the Security of Internet Transactions 263
Summary 266
References 267
Ontological Approach to the IT Security Development 268
Common Criteria Primer 268
Introduction 269
The Ontological Approach to the Common Criteria 270
Conclusions 274
References 274
Enhancement of Model of Electronic Voting System 277
Introduction 277
Electronic Voting 278
E-Voting Protocols 279
Model of e-Voting via Internet 280
Enhancement of e-Voting Model 281
Conclusions 282
References 282
Author Index 284
| Erscheint lt. Verlag | 13.10.2009 |
|---|---|
| Reihe/Serie | Advances in Intelligent and Soft Computing | Advances in Intelligent and Soft Computing |
| Zusatzinfo | XX, 284 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
| Mathematik / Informatik ► Informatik ► Web / Internet | |
| Technik ► Nachrichtentechnik | |
| Schlagworte | automatic classification • Automation • Computational Intelligence • Control • Hidden Markov Model • Information • information system • Intelligence • intelligent computing • Markov • Model • Modeling • natural language • Simulation • Systems Architecture • wireless sensor networks |
| ISBN-10 | 3-642-05019-0 / 3642050190 |
| ISBN-13 | 978-3-642-05019-0 / 9783642050190 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich