This document describes a tool called GAP that aims to address problems with viewing web content on pocket PCs and other mobile devices. GAP integrates two key mechanisms: 1) hoarding, which allows content to be viewed offline by caching resources on the device, and 2) transcoding, which adapts web content to better fit the device's display capabilities. The tool uses a client-server architecture, with an intermediary tier on both the client and server sides. On the client side, GAP handles caching and displaying resources, while on the server side GAT manages hoarding and transcoding through separate mechanisms. Together, these aim to improve the mobile web viewing experience for users.
This document describes a tool called GAP that aims to address problems with viewing web content on pocket PCs and other mobile devices. It discusses two main issues - controlling disconnections from the network and adapting web content to specific mobile device capabilities. GAP integrates mechanisms for hoarding (caching) web resources locally and transcoding resources to be compatible with mobile devices. It uses a client-server architecture with intermediary processes to hoard and transcode resources without requiring changes to clients or servers. The tool was tested successfully on various pocket PCs and emulators, demonstrating it can allow viewing of web resources even when disconnected from the network.
The document discusses several MCA projects including:
1. A medical information integration model using cloud computing to provide data storage and analysis for medical departments and workers.
2. A customer relationship and warehouse management system to optimize revenue, customer satisfaction and understanding.
3. An issue tracking, managing, monitoring and reporting system for IT departments to access shared data and history.
This document lists several Java/J2EE/J2ME projects related to utility computing environments, schema matching, fuzzy ontology generation, wireless sensor networks, wireless MAC protocols, distributed cache updating, selfish routing, collaborative key agreement, TCP congestion control, global roaming in mobile networks, GPS-based emergency response systems, network intrusion detection, honey pots, voice over IP, vehicle tracking, SIP-based teleconferencing, online security systems, and location-aided routing in ad hoc networks. The projects cover a wide range of topics related to distributed systems, wireless networks, and Internet applications.
Sending the data already gathered from the client to the Serverhussam242
as I believe that spending a lot of time at work is becoming a social problem , and people do not have time for family ,sport and other activities , I created “LOGGER” , it is a monitoring application for employees at work, it controls the time they spent on social media while they are at work , it is also an application that interfere with the user by sending alarm massages when it thinks it’s the need to and alarm the users to get back to work so they finish work early and go back to family/sports , social activities so there will be time for everything !
in this essay i will be talking about how to send the collected data from the monitored computer to the server .
My 2012 Groundhog Day - needed much bandwidth over the past weeks to discuss the same topic with various folks: how do identity and access management and RESTful Web services relate? This slide deck aims at taking this question from its root.
Service usage classification with encryptedKamal Spring
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers.. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification.
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...IJwest
Service-oriented computing (SOC) is an interdisciplinary paradigm that revolutionizes the very fabric of
distributed software development applications that adopt service-oriented architectures (SOA) can evolve
during their lifespan and adapt to changing or unpredictable environments more easily. SOA is built
around the concept of Web Services. Although the Web services constitute a revolution in Word Wide Web,
they are always regarded as non-autonomous entities and can be exploited only after their discovery. With
the help of software agents, Web services are becoming more efficient and more dynamic.
The topic of this paper is the development of an agent based approach for Web services discovery and
selection in witch, OWL-S is used to describe Web services, QoS and service customer request. We develop
an efficient semantic service matching which takes into account concepts properties to match concepts in
Web service and service customer request descriptions. Our approach is based on an architecture
composed of four layers: Web service and Request description layer, Functional match layer, QoS
computing layer and Reputation computing layer.
NEW APPROACH TO DEVELOP THE MESSENGER APPLICATION: FROM CLIENTSERVER DESIGN T...cscpconf
This document proposes a new approach to developing messenger applications by combining client-server and P2P architectures. It introduces a local proxy model where each client has a local proxy that interacts with the client like a server but shares information with other proxies via a P2P system. This allows keeping the client-server protocol design while implementing it with P2P communication. As a case study, the document develops a P2P messenger application using this approach where local proxies store and share messages and user information as files in a shared folder using the P2P subsystem. The approach was implemented and tested with a simple text-based messenger application, demonstrating it can provide the same functionality as a client-server version with improved performance and scal
This document describes a tool called GAP that aims to address problems with viewing web content on pocket PCs and other mobile devices. It discusses two main issues - controlling disconnections from the network and adapting web content to specific mobile device capabilities. GAP integrates mechanisms for hoarding (caching) web resources locally and transcoding resources to be compatible with mobile devices. It uses a client-server architecture with intermediary processes to hoard and transcode resources without requiring changes to clients or servers. The tool was tested successfully on various pocket PCs and emulators, demonstrating it can allow viewing of web resources even when disconnected from the network.
The document discusses several MCA projects including:
1. A medical information integration model using cloud computing to provide data storage and analysis for medical departments and workers.
2. A customer relationship and warehouse management system to optimize revenue, customer satisfaction and understanding.
3. An issue tracking, managing, monitoring and reporting system for IT departments to access shared data and history.
This document lists several Java/J2EE/J2ME projects related to utility computing environments, schema matching, fuzzy ontology generation, wireless sensor networks, wireless MAC protocols, distributed cache updating, selfish routing, collaborative key agreement, TCP congestion control, global roaming in mobile networks, GPS-based emergency response systems, network intrusion detection, honey pots, voice over IP, vehicle tracking, SIP-based teleconferencing, online security systems, and location-aided routing in ad hoc networks. The projects cover a wide range of topics related to distributed systems, wireless networks, and Internet applications.
Sending the data already gathered from the client to the Serverhussam242
as I believe that spending a lot of time at work is becoming a social problem , and people do not have time for family ,sport and other activities , I created “LOGGER” , it is a monitoring application for employees at work, it controls the time they spent on social media while they are at work , it is also an application that interfere with the user by sending alarm massages when it thinks it’s the need to and alarm the users to get back to work so they finish work early and go back to family/sports , social activities so there will be time for everything !
in this essay i will be talking about how to send the collected data from the monitored computer to the server .
My 2012 Groundhog Day - needed much bandwidth over the past weeks to discuss the same topic with various folks: how do identity and access management and RESTful Web services relate? This slide deck aims at taking this question from its root.
Service usage classification with encryptedKamal Spring
The rapid adoption of mobile messaging Apps has enabled us to collect massive amount of encrypted Internet traffic of mobile messaging. The classification of this traffic into different types of in-App service usages can help for intelligent network management, such as managing network bandwidth budget and providing quality of services. Traditional approaches for classification of Internet traffic rely on packet inspection, such as parsing HTTP headers. However, messaging Apps are increasingly using secure protocols, such as HTTPS and SSL, to transmit data. This imposes significant challenges on the performances of service usage classification by packet inspection. To this end, in this paper, we investigate how to exploit encrypted Internet traffic for classifying in-App usages. Specifically, we develop a system, named CUMMA, for classifying service usages of mobile messaging Apps by jointly modeling user behavioral patterns, network traffic characteristics and temporal dependencies. Along this line, we first segment Internet traffic from traffic-flows into sessions with a number of dialogs in a hierarchical way. Also, we extract the discriminative features of traffic data from two perspectives: (i) packet length and (ii) time delay. Next, we learn a service usage predictor to classify these segmented dialogs into single-type usages or outliers.. Indeed, CUMMA enables mobile analysts to identify service usages and analyze end-user in-App behaviors even for encrypted Internet traffic. Finally, the extensive experiments on real-world messaging data demonstrate the effectiveness and efficiency of the proposed method for service usage classification.
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...IJwest
Service-oriented computing (SOC) is an interdisciplinary paradigm that revolutionizes the very fabric of
distributed software development applications that adopt service-oriented architectures (SOA) can evolve
during their lifespan and adapt to changing or unpredictable environments more easily. SOA is built
around the concept of Web Services. Although the Web services constitute a revolution in Word Wide Web,
they are always regarded as non-autonomous entities and can be exploited only after their discovery. With
the help of software agents, Web services are becoming more efficient and more dynamic.
The topic of this paper is the development of an agent based approach for Web services discovery and
selection in witch, OWL-S is used to describe Web services, QoS and service customer request. We develop
an efficient semantic service matching which takes into account concepts properties to match concepts in
Web service and service customer request descriptions. Our approach is based on an architecture
composed of four layers: Web service and Request description layer, Functional match layer, QoS
computing layer and Reputation computing layer.
NEW APPROACH TO DEVELOP THE MESSENGER APPLICATION: FROM CLIENTSERVER DESIGN T...cscpconf
This document proposes a new approach to developing messenger applications by combining client-server and P2P architectures. It introduces a local proxy model where each client has a local proxy that interacts with the client like a server but shares information with other proxies via a P2P system. This allows keeping the client-server protocol design while implementing it with P2P communication. As a case study, the document develops a P2P messenger application using this approach where local proxies store and share messages and user information as files in a shared folder using the P2P subsystem. The approach was implemented and tested with a simple text-based messenger application, demonstrating it can provide the same functionality as a client-server version with improved performance and scal
Este documento presenta el proyecto "DOCENTES 2.0" diseñado para capacitar a profesores de primaria y secundaria en el uso de herramientas TIC a través de una plataforma de e-learning. El proyecto incluye el análisis de necesidades, diseño de cursos y contenidos, creación de la plataforma, y evaluación del proceso de enseñanza-aprendizaje. Se basa en un modelo constructivista que promueve el aprendizaje colaborativo entre los participantes.
ARGI+ is a daily supplement containing L-Arginine, an amino acid that is converted into nitric oxide to support cardiovascular health by relaxing blood vessels and improving blood flow. It also contains antioxidants from pomegranate and red wine extract to support cholesterol levels, and vitamins to support immune, bone, brain, and nervous system health. One scoop mixed with water daily provides 5 grams of L-Arginine along with vitamins that boost overall health and performance throughout the body. ARGI+ supports functions like maintaining healthy blood pressure, bone and tissue growth, and the immune system.
Este documento presenta una introducción a la conferencia anual del Banco Central de Chile sobre "Cuenta Corriente y Financiamiento Externo". En 3 oraciones:
1) Explora las tendencias recientes en los mercados financieros internacionales y economías emergentes, así como preguntas sobre la administración macroeconómica para países pequeños y abiertos como Chile.
2) También analiza los desequilibrios globales como los grandes déficits de cuenta corriente de Estados Unidos y otros países desarrollados, y los superávits de much
El documento describe la organización de los módulos de matemática. Cada módulo contiene lecciones organizadas por temas principales. Cada lección incluye secciones como problemas, soluciones propias, soluciones propuestas, actividades y claves de corrección. Al final del módulo hay un trabajo práctico integrador y bibliografía.
This document discusses the problem of visualizing web content on heterogeneous mobile devices. It proposes a platform called MoviWeb that aims to improve the user experience of navigating websites on mobile devices. MoviWeb handles different resource formats and a more efficient communication scheme to reduce access costs and information size. It uses hoarding to replicate selected web resources locally for offline viewing, and transcoding to adapt web content to the constraints of mobile devices. The document reviews related work on transcoding and replication but notes that existing solutions do not combine hoarding and transcoding in an integrated way as MoviWeb aims to do.
The document discusses web browsers and their core functions and processing flow. It describes how browsers generate and send HTTP requests, accept and process responses, render content, and maintain state. The key modules of a browser are the user interface, request generation, response processing, networking, content interpretation, caching, state maintenance, authentication, and configuration. It outlines how these modules work together to resolve and fetch URLs, handle authorization and cookies, interpret and cache content, and display the final page to the user. Finally, it lists some of the most popular web browsers today like Chrome, Firefox, Opera, and Safari.
This document describes an Emergency Ambulance Hiring Portal application developed in PHP and MySQL. The application allows users to quickly request ambulance services and provides their location and details to nearby emergency response teams. This streamlines the ambulance dispatch process and aims to improve healthcare outcomes. The application has administrative and user modules, and was developed with objectives like easy record management, faster response times, and a user-friendly interface.
Scalability Enhancement of Push/Pull Server functions by converting Stateless...IOSR Journals
This document proposes using AJAX to improve the scalability of push/pull server functions. It discusses how push and pull architectures are commonly used for client-server data transmission but have limitations like lack of acknowledgment and inability to handle large data volumes. This can cause server lag that increases with data size. The paper suggests that using AJAX can help identify data on the client-side without server involvement, reducing response times compared to traditional HTTP. It presents a prototype to calculate request/response times and scalability between clients and server. The proposed architecture uses AJAX concepts to address issues with the stateless HTTP protocol and improve server efficiency, time measurement, and overall scalability for push and pull mechanisms.
Offline and Online Bank Data Synchronization Systemijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document discusses a web-based content management system called Palama that uses crowdsourcing technology. The system allows users to request information not readily available online. Crowd workers known as content providers can then supply this information. An administrator manages the system and payment process. Future work involves expanding language support and introducing a funding plan for content providers.
The document describes a restaurant table booking system developed using PHP and MySQL. The system allows restaurant administrators to manage bookings and view booking reports. It provides customers an online platform to book tables without waiting. The system automates the traditional paper-based booking process and generates reports. It aims to improve efficiency by reducing waiting times for customers and making all booking information readily available for administrators.
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
This paper proposes a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up
and boot the required resources and they have to pay only for the required resources. Thus, in the future providing a mechanism for efficient resource management and assignment will be an important objective of Cloud computing. In this project we propose a method, dynamic scheduling and consolidation mechanism that allocate resources based on the load of Virtual Machines (VMs) on Infrastructure as a service (IaaS). This method enables users to dynamically add and/or delete one or more instances on the basis of the load and the conditions specified by the user. Our objective is to develop an effective load balancing algorithm using Virtual Machine Monitoring to
maximize or minimize different performance parameters(throughput for example) for the Clouds of
different sizes (virtual topology de-pending on the application requirement).
Conceptual models of enterprise applications as instrument of performance ana...Leonid Grinshpan, Ph.D.
The article introduces enterprise applications conceptual models that uncover performance related fundamentals distilled of innumerable application particulars concealing the roots of performance issues. The value of conceptual models for performance analysis is demonstrated on two examples of virtualized and non-virtualized applications conceptual models.
A distributed system in its most simplest definition is a group of computers working together as to
appear as a single computer to the end-user. These machines have a shared state, operate
concurrently and can fail independently without affecting the whole system’s uptime.
This is in line with ever-growing technological expansion of the world, distributed systems are
becoming more and more widespread. Take a look at the increasing number of available
computer technologies/innovation around, this is sporadically increasing, and this result in
intense computational requirement.
Yeah, Moore’s law proposed more computing power by fitting more transistors (which
approximately doubles every two years) into a simple chip using cost-efficient approach - cool,
but over the past 5 years, there has been little deviation from this - ability to scale horizontally
and not just vertically alone.
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
This document discusses using mobile agents in distributed multimedia database systems. It proposes a model that uses mobile agents to facilitate the storage and retrieval of multimedia data from distributed databases. The key points are:
1) Mobile agents can travel to the host where data is physically stored, which is useful for distributed multimedia databases that contain large binary objects.
2) The proposed model integrates mobile agent technology with database services like transaction handling and security.
3) It uses different agents (client, server, query, and database agents) to dispatch requests and queries to retrieve multimedia data from across distributed databases more efficiently than traditional client-server models.
Components of a Generic Web Application ArchitectureMadonnaLamin1
The web application is composed of a complex architecture of varied components and layers. The request generated by the user passes through all these layers. When a user makes a request on a website, various components of the applications, user interfaces, middleware systems, database, servers and the browser interact with each other
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...idescitation
Web hotspot is a serious problem often experienced in case popular websites. It
provides dramatic load spike in a website, which occurs when a huge number of users
accessing the same website. A prominent solution to this problem is server load balancing.
Dynamic load balancing involves allocation of requests to the server or processor
dynamically when they arrive. For effective load balancing, a near-optimal schedule of
incoming requests or processes must be determined “on-the-fly”, so that execution of
requests can be completed in shortest possible time. So we have proposed a Genetic
Algorithm based load balancing scheme which relies on a process scheduling policy. Genetic
Algorithm provides to search for the optimal solution out a search of candidate solutions. It
follows the survival-of-the-fittest principle, to achieve the optimal solution, through a
number of generations. The proposed algorithm is evaluated for various population size and
number of generations, to maximize the processor utilization of nodes/ processors in the
system.
This document discusses socket programming using a client-server model. It defines key terms like socket, client, and server. The client makes requests to the server, which has large amounts of data and resources. Communication occurs via sockets, which are endpoints for two-way communication between programs. The document explains the principles of socket communication, including how clients and servers create and connect sockets to transfer data over protocols like TCP and UDP. TCP provides reliable data streams while UDP sends independent data packets with no guarantees. Ports are used to map incoming data to processes.
- In a 2-tier architecture, the application logic is contained either in the client user interface or the database server. This architecture does not scale well for large numbers of users.
- A 3-tier architecture introduces a middle tier that contains the application logic, separating it from the user interface and data storage tiers. This provides improved scalability, flexibility, and ability to integrate multiple data sources compared to a 2-tier architecture.
- A 4-tier architecture further separates the data storage and retrieval processes into their own tier, allowing for more powerful and flexible applications that can support many concurrent programs and clients.
Este documento presenta el proyecto "DOCENTES 2.0" diseñado para capacitar a profesores de primaria y secundaria en el uso de herramientas TIC a través de una plataforma de e-learning. El proyecto incluye el análisis de necesidades, diseño de cursos y contenidos, creación de la plataforma, y evaluación del proceso de enseñanza-aprendizaje. Se basa en un modelo constructivista que promueve el aprendizaje colaborativo entre los participantes.
ARGI+ is a daily supplement containing L-Arginine, an amino acid that is converted into nitric oxide to support cardiovascular health by relaxing blood vessels and improving blood flow. It also contains antioxidants from pomegranate and red wine extract to support cholesterol levels, and vitamins to support immune, bone, brain, and nervous system health. One scoop mixed with water daily provides 5 grams of L-Arginine along with vitamins that boost overall health and performance throughout the body. ARGI+ supports functions like maintaining healthy blood pressure, bone and tissue growth, and the immune system.
Este documento presenta una introducción a la conferencia anual del Banco Central de Chile sobre "Cuenta Corriente y Financiamiento Externo". En 3 oraciones:
1) Explora las tendencias recientes en los mercados financieros internacionales y economías emergentes, así como preguntas sobre la administración macroeconómica para países pequeños y abiertos como Chile.
2) También analiza los desequilibrios globales como los grandes déficits de cuenta corriente de Estados Unidos y otros países desarrollados, y los superávits de much
El documento describe la organización de los módulos de matemática. Cada módulo contiene lecciones organizadas por temas principales. Cada lección incluye secciones como problemas, soluciones propias, soluciones propuestas, actividades y claves de corrección. Al final del módulo hay un trabajo práctico integrador y bibliografía.
This document discusses the problem of visualizing web content on heterogeneous mobile devices. It proposes a platform called MoviWeb that aims to improve the user experience of navigating websites on mobile devices. MoviWeb handles different resource formats and a more efficient communication scheme to reduce access costs and information size. It uses hoarding to replicate selected web resources locally for offline viewing, and transcoding to adapt web content to the constraints of mobile devices. The document reviews related work on transcoding and replication but notes that existing solutions do not combine hoarding and transcoding in an integrated way as MoviWeb aims to do.
The document discusses web browsers and their core functions and processing flow. It describes how browsers generate and send HTTP requests, accept and process responses, render content, and maintain state. The key modules of a browser are the user interface, request generation, response processing, networking, content interpretation, caching, state maintenance, authentication, and configuration. It outlines how these modules work together to resolve and fetch URLs, handle authorization and cookies, interpret and cache content, and display the final page to the user. Finally, it lists some of the most popular web browsers today like Chrome, Firefox, Opera, and Safari.
This document describes an Emergency Ambulance Hiring Portal application developed in PHP and MySQL. The application allows users to quickly request ambulance services and provides their location and details to nearby emergency response teams. This streamlines the ambulance dispatch process and aims to improve healthcare outcomes. The application has administrative and user modules, and was developed with objectives like easy record management, faster response times, and a user-friendly interface.
Scalability Enhancement of Push/Pull Server functions by converting Stateless...IOSR Journals
This document proposes using AJAX to improve the scalability of push/pull server functions. It discusses how push and pull architectures are commonly used for client-server data transmission but have limitations like lack of acknowledgment and inability to handle large data volumes. This can cause server lag that increases with data size. The paper suggests that using AJAX can help identify data on the client-side without server involvement, reducing response times compared to traditional HTTP. It presents a prototype to calculate request/response times and scalability between clients and server. The proposed architecture uses AJAX concepts to address issues with the stateless HTTP protocol and improve server efficiency, time measurement, and overall scalability for push and pull mechanisms.
Offline and Online Bank Data Synchronization Systemijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document discusses a web-based content management system called Palama that uses crowdsourcing technology. The system allows users to request information not readily available online. Crowd workers known as content providers can then supply this information. An administrator manages the system and payment process. Future work involves expanding language support and introducing a funding plan for content providers.
The document describes a restaurant table booking system developed using PHP and MySQL. The system allows restaurant administrators to manage bookings and view booking reports. It provides customers an online platform to book tables without waiting. The system automates the traditional paper-based booking process and generates reports. It aims to improve efficiency by reducing waiting times for customers and making all booking information readily available for administrators.
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
This paper proposes a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up
and boot the required resources and they have to pay only for the required resources. Thus, in the future providing a mechanism for efficient resource management and assignment will be an important objective of Cloud computing. In this project we propose a method, dynamic scheduling and consolidation mechanism that allocate resources based on the load of Virtual Machines (VMs) on Infrastructure as a service (IaaS). This method enables users to dynamically add and/or delete one or more instances on the basis of the load and the conditions specified by the user. Our objective is to develop an effective load balancing algorithm using Virtual Machine Monitoring to
maximize or minimize different performance parameters(throughput for example) for the Clouds of
different sizes (virtual topology de-pending on the application requirement).
Conceptual models of enterprise applications as instrument of performance ana...Leonid Grinshpan, Ph.D.
The article introduces enterprise applications conceptual models that uncover performance related fundamentals distilled of innumerable application particulars concealing the roots of performance issues. The value of conceptual models for performance analysis is demonstrated on two examples of virtualized and non-virtualized applications conceptual models.
A distributed system in its most simplest definition is a group of computers working together as to
appear as a single computer to the end-user. These machines have a shared state, operate
concurrently and can fail independently without affecting the whole system’s uptime.
This is in line with ever-growing technological expansion of the world, distributed systems are
becoming more and more widespread. Take a look at the increasing number of available
computer technologies/innovation around, this is sporadically increasing, and this result in
intense computational requirement.
Yeah, Moore’s law proposed more computing power by fitting more transistors (which
approximately doubles every two years) into a simple chip using cost-efficient approach - cool,
but over the past 5 years, there has been little deviation from this - ability to scale horizontally
and not just vertically alone.
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
This document discusses using mobile agents in distributed multimedia database systems. It proposes a model that uses mobile agents to facilitate the storage and retrieval of multimedia data from distributed databases. The key points are:
1) Mobile agents can travel to the host where data is physically stored, which is useful for distributed multimedia databases that contain large binary objects.
2) The proposed model integrates mobile agent technology with database services like transaction handling and security.
3) It uses different agents (client, server, query, and database agents) to dispatch requests and queries to retrieve multimedia data from across distributed databases more efficiently than traditional client-server models.
Components of a Generic Web Application ArchitectureMadonnaLamin1
The web application is composed of a complex architecture of varied components and layers. The request generated by the user passes through all these layers. When a user makes a request on a website, various components of the applications, user interfaces, middleware systems, database, servers and the browser interact with each other
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...idescitation
Web hotspot is a serious problem often experienced in case popular websites. It
provides dramatic load spike in a website, which occurs when a huge number of users
accessing the same website. A prominent solution to this problem is server load balancing.
Dynamic load balancing involves allocation of requests to the server or processor
dynamically when they arrive. For effective load balancing, a near-optimal schedule of
incoming requests or processes must be determined “on-the-fly”, so that execution of
requests can be completed in shortest possible time. So we have proposed a Genetic
Algorithm based load balancing scheme which relies on a process scheduling policy. Genetic
Algorithm provides to search for the optimal solution out a search of candidate solutions. It
follows the survival-of-the-fittest principle, to achieve the optimal solution, through a
number of generations. The proposed algorithm is evaluated for various population size and
number of generations, to maximize the processor utilization of nodes/ processors in the
system.
This document discusses socket programming using a client-server model. It defines key terms like socket, client, and server. The client makes requests to the server, which has large amounts of data and resources. Communication occurs via sockets, which are endpoints for two-way communication between programs. The document explains the principles of socket communication, including how clients and servers create and connect sockets to transfer data over protocols like TCP and UDP. TCP provides reliable data streams while UDP sends independent data packets with no guarantees. Ports are used to map incoming data to processes.
- In a 2-tier architecture, the application logic is contained either in the client user interface or the database server. This architecture does not scale well for large numbers of users.
- A 3-tier architecture introduces a middle tier that contains the application logic, separating it from the user interface and data storage tiers. This provides improved scalability, flexibility, and ability to integrate multiple data sources compared to a 2-tier architecture.
- A 4-tier architecture further separates the data storage and retrieval processes into their own tier, allowing for more powerful and flexible applications that can support many concurrent programs and clients.
The document discusses distributed system models and issues in designing distributed systems. It describes three distributed system models: architectural models which describe how system components are distributed and placed, interaction models which handle timing aspects, and fault models which define how failures are handled. For architectural models, it explains the client-server and peer-to-peer models. For interaction models, it discusses synchronous and asynchronous systems. It then lists 10 issues to consider in distributed system design, such as heterogeneity, openness, security, scalability, failure handling, concurrency, transparency, quality of service, reliability, and performance.
This document provides an overview of application servers, including their history, role in web applications, and common features. Application servers act as a middle tier between database servers and end users, providing business logic, security, and other services. They first emerged to help share capabilities between applications and make applications easier to write and maintain. Common application server types include web information servers, component servers, and active application servers. Selection of an application server depends on factors like performance, cost, development needs, and support requirements.
Subscription based control system to automate management of events for robotsdbpublications
This document proposes a subscription-based control system using websockets to automate event management for robots. The current polling method used in human-machine interfaces restricts automation capabilities. The proposed system allows clients to subscribe to events and receive asynchronous updates from the server, making responses more reliable. It also explores using semantic web technologies to enable coordinated multi-robot activities through ontologies and web services.
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for the year 2015
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for the year 2015
Similar to GAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices (20)
This document discusses the application of artificial intelligence techniques in cybersecurity. It begins by outlining the motivations for applying AI to cybersecurity, such as the growing amounts of data and connections between devices. It then provides an overview of cybersecurity challenges and common AI techniques like machine learning. The document concludes by presenting several examples of how AI is already being used to enhance cybersecurity, such as through anomaly detection, natural language processing for unstructured threat analysis, and AI-powered security analytics tools.
This document discusses improving forecasting and classification in smart metering systems using neural compute sticks. It presents two models: a consumption and production prediction model using a recurrent neural network, and an energy fraud classification model using decision trees. Both models were tested on a smart metering system with and without neural compute sticks. Using the sticks reduced training times by an average of 30% for the prediction model and 7.5% for the classification model. It concluded that edge computing applications like these are necessary for smart grid systems due to increasing data, and neural compute sticks can significantly improve training times for models based on artificial neural networks.
Este documento habla sobre el análisis de datos usando computadoras de placa única. Explora oportunidades y retos de la memoria, procesamiento y almacenamiento en estas computadoras. También discute conceptos como cómputo en la niebla, latencia de datos en medidores inteligentes, muestreo de señal eléctrica, sistemas operativos embebidos y bases de datos embebidas. El documento concluye proporcionando los contactos del autor.
El documento habla sobre el análisis de datos en dispositivos de Internet de las Cosas. Explica conceptos clave como la industria 4.0, dispositivos conectados e IoT, y los desafíos del análisis de datos IoT como diferentes tipos de datos. También cubre temas como flujos de datos, procesamiento de datos, aprendizaje automático, almacenamiento de datos, y nuevas tendencias como streaming de datos. El autor concluye preguntando si hay alguna pregunta sobre el tema.
A Comparative Assessment of Cryptography Algorithms for Data Analytic Applica...Juan Carlos Olivares Rojas
Este documento evalúa algoritmos criptográficos para aplicaciones de análisis de datos en sistemas inteligentes de medición. Compara el rendimiento de algoritmos como AES-256, RSA-4096, Blowfish y Twofish midiendo el tiempo de ejecución y uso de memoria. Concluye que algoritmos como Blowfish y Twofish son buenas opciones para aplicaciones de análisis de datos en movimiento o almacenados, mientras que opciones como RSA-4096 no son adecuadas para aplicaciones que requieren tiempo real estricto.
Este documento propone flexibilidad curricular en el Tecnológico Nacional de México para adaptarse a los rápidos cambios tecnológicos. Se analizan los planes de estudio existentes y se proponen nuevas especialidades como Ciencia de Datos y Redes Eléctricas Inteligentes. También se sugiere validar cursos en línea y permitir la movilidad de estudiantes. Finalmente, se recomienda diseñar módulos de especialidad de forma nacional y mejorar el proceso de tutorías.
Analítica de Datos en Simulador de Redes para Sistemas de Medición InteligenteJuan Carlos Olivares Rojas
Este documento presenta un simulador de redes para sistemas de medición inteligente que utiliza analítica de datos. Describe cómo el simulador genera datos de medición que luego se pueden analizar estadísticamente. Concluye que se necesita más desarrollo del simulador y que la gran cantidad de datos generados es difícil de procesar, por lo que se debe completar la infraestructura de simulación.
Este documento propone un mercado eléctrico minorista transactivo en México utilizando blockchain y contratos inteligentes. Presenta un modelo con generadores, clientes residenciales e industriales, almacenamiento, fuentes renovables y un operador de red. La plataforma permitiría la comercialización de energía a través de cadenas de bloques, con medidores e interfaz inteligentes y el uso de criptomonedas. Los contratos inteligentes automatizarían transacciones basadas en precios y demanda.
This document summarizes a student's master's thesis on using blockchain technology to improve cyber security for smart metering systems transactions. The thesis addresses motivation for securing smart metering systems, describing smart cities/grids and AMI architecture. It reviews related works applying blockchain for grid monitoring security and databases. The student proposes a private/public permissioned blockchain architecture called AMI-BC using a hybrid proof-of-efficiency consensus algorithm across cloud, fog and IoT tiers. It would secure smart meter readings and detect energy fraud/anomalies using machine learning models to predict consumption and power quality.
This document summarizes a survey on using blockchain technology for smart metering systems in electric mobility applications. It discusses the motivation and challenges around e-mobility and smart grids, including cybersecurity issues. It then provides an overview of how blockchain could be applied to smart metering systems, including prototypes that have been tested. Finally, it compares different works in this area based on whether they incorporate load signatures, market functions, or other relevant aspects. The document concludes by discussing potential future work around analyzing appliance consumption and distributed energy resource production costs.
Este documento describe un algoritmo para la detección de movimiento usando medidores inteligentes. El algoritmo divide la imagen de video en una cuadrícula de 3x3, descompone la secuencia de video en imágenes individuales, detecta puntos característicos en cada cuadrante, compara los puntos entre cuadros para detectar movimiento, y determina si hubo movimiento real basado en el número de cuadros que se movieron. El documento también discute la implementación y pruebas del algoritmo, y concluye que este sistema podría usarse como una soluc
El documento presenta un estudio sobre sistemas inteligentes de reuniones utilizando la interacción humano-computadora. Explica las limitaciones técnicas actuales y las necesidades de los usuarios, como monitorear estadísticas de consumo eléctrico y recibir alertas sobre fallas de energía. Concluye que se necesita más trabajo en interfaz humano-computadora para mejorar estos sistemas, e involucrar a los usuarios desde el inicio para satisfacer mejor sus necesidades.
Machine Learnign Model for the Detection of Electricity Energy Fraud Using an...Juan Carlos Olivares Rojas
This document proposes a machine learning model using an edge-fog computing architecture to detect electric energy fraud from smart meter data. It tests various machine learning algorithms on smart meter data from Mexico and finds that a multi-layer perceptron regression model achieves the lowest error rates. The results indicate the model can adequately detect anomalies in energy consumption and production. While human intervention is still needed, the proposed model is designed to operate on embedded devices with limited computing capabilities. The use of fog computing through data centers also improves forecasting performance.
Forecasting Electricity Consumption Using Weather Data in Edge-Fog-Cloud Data...Juan Carlos Olivares Rojas
This document proposes an edge-fog-cloud computing architecture to forecast electricity consumption using weather data and machine learning models. The architecture implements linear regression models at the edge, fog, and cloud layers to improve forecasting accuracy. Results show forecast accuracy was improved with 91-94% of devices having better forecasts when models were executed across multiple layers. The architecture provides a feasible approach for electricity forecasting considering periodic offline execution of models across layers.
Aplicacion de Tecnicas de UX en el Desarrollo de un Portal de un Sistema de M...Juan Carlos Olivares Rojas
Este documento describe la aplicación de técnicas de experiencia de usuario (UX) en el desarrollo de un portal para un sistema de medición eléctrica inteligente. Presenta información sobre UX vs UI, procesos de UX, diseño centrado en el usuario y encuestas realizadas a usuarios. El objetivo es diseñar e implementar un prototipo del portal que brinde una mejor experiencia al usuario basada en sus necesidades y preferencias reveladas en las encuestas.
Este documento describe las redes eléctricas inteligentes (smart grids) y el papel de los medidores inteligentes (smart meters) en ellas. Las smart grids permiten un flujo bidireccional de electricidad e información mediante el uso de tecnologías de la información y comunicaciones. Los smart meters son dispositivos de Internet de las Cosas que permiten la medición y gestión remota del consumo de electricidad de los hogares y empresas. El documento también discute los retos y oportunidades que presentan las smart grids y los smart meters, como la seguridad, ef
Este documento presenta diferentes estrategias de aprendizaje para el desarrollo de competencias, incluyendo aprendizaje basado en problemas, aprendizaje basado en proyectos, proyectos integradores, aula invertida y gamificación. Explica elementos como estilos de aprendizaje, casos de estudio y el diseño de proyectos. El objetivo general es ayudar a los docentes a diseñar estrategias didácticas efectivas considerando factores como las competencias, inteligencias múltiples y entornos de aprendizaje de los estudiant
Optimización de la Eficiencia Energética en los Hogares utilizando una Arquit...Juan Carlos Olivares Rojas
Este documento presenta una propuesta para optimizar la eficiencia energética en los hogares utilizando una arquitectura de medición inteligente. Actualmente, muchos electrodomésticos no tienen controles eficientes para el consumo de energía, lo que aumenta los costos. La propuesta involucra el uso de medidores inteligentes y un sistema de gestión de energía para monitorear y optimizar automáticamente el uso de energía en el hogar. El objetivo es desarrollar una arquitectura que permita mejorar la eficiencia energética y redu
El documento presenta una introducción a la ciberseguridad en redes eléctricas inteligentes. Se describe la arquitectura de las redes eléctricas inteligentes y los componentes como medidores inteligentes. También se discuten las amenazas a la seguridad como ataques a medidores e infraestructura de transmisión, y posibles soluciones como protocolos de seguridad, sistemas de detección de intrusos e implementación de blockchain. Finalmente, se mencionan trabajos de investigación en ciberseguridad de redes elé
Estudio de Vulnerabilidad de Protocolos y Redes de Comunicación para Medidore...Juan Carlos Olivares Rojas
Este documento presenta una propuesta de investigación para estudiar las vulnerabilidades de los protocolos de comunicación y redes de medidores inteligentes. La metodología incluye investigar vulnerabilidades en redes PLC, comunicaciones inalámbricas, y hardware/software. Se desarrollará un framework de seguridad y una metodología, con productos entregables como artículos y un capítulo de libro. El objetivo es mejorar la seguridad y desempeño de las redes eléctricas inteligentes.
Estudio de Vulnerabilidad de Protocolos y Redes de Comunicación para Medidore...
GAP A Tool for Visualize Web Site in Heterogeneus Mobile Devices
1. 17
GAP: A Tool to Solve the Problem of the Web Contents Visualization in
Pocket PC Devices.
J. Carlos Olivares R., J. Gabriel González S., Azucena Montes R., Víctor J. Sosa S. e I. Rafael
Ponce M.
Centro Nacional de Investigación y Desarrollo Tecnológico(cenidet)
Cuernavaca, Morelos, México
{jcolivares04c, gabriel, amr, vjsosa, rafaxzero4c}@cenidet.edu.mx
Abstract
This tool intends to fill the existing ‘GAP’ in the
Web sites visualization in mobile devices, such as
Pocket PC. In order to guarantee that the users can
correctly visualize the Web resources, two things are
needed: a mechanism for controlling disconnections,
and allowing visualization of Web content despite of
the device connection state (hoarding), and a
mechanism that can adapt the Web content to the
specific mobile device features (transcoding). GAP is a
tool that integrates these two mechanisms and allows
improving of the user’s navigation experience in the
Mobile Web.
Keywords: Pocket PC, Visualization, Web Resources,
Hoarding, Transcoding.
1. Introduction
Mobile devices are each time closer in time,
according with [1]: "By 2009, more than a half of the
microprocessors made in the world will be intended for
mobile devices." "The software that will really make
mobile devices useful isn’t developed yet." These
statistics reflect that the use of mobile devices is
increasing due to their tiny size and that its power of
processing and versatility is growing day by day.
The problem of Web resources visualization in
mobile devices is the fact that the great majority of
Web sites in Internet have not been designed for this
type of devices. The mobile devices have limited
resources like small screens, little memory, low
processing speeds, etc; in comparison with traditional
computers equipment.
On other hand, the Web and the protocol that
manages it: HTTP are connection oriented (they are
based on TCP) what causes the transaction to fail if
the user, by any reason, becomes disconnected from
the network . In this case, it might not be possible to
visualize the Web resources in the mobile client.
Disconnections are frequent in this type of devices,
mainly because of their main advantage: mobility.
In this work a system which development is in
progress is described. It focuses in attacking the
problem of Web resources visualization on mobile
devices. The main characteristic of this work is that
great part of the system is executed in this kind of
devices, in comparison to the great majority of the
existing solutions that are executed in traditional
platforms.
2. Alternatives of solution
In order to solve this problem several alternatives
are presented: to design a new protocol, to modify and
existed protocol or to implement intermediary services
that solve the problem.
2.1 New protocols
In this scheme is possible to mention the WAP
protocol and the WML language, they work in an
analogous way as HTTP-HTML in the traditional Web.
The problem strives in that WAP only works with
mobile equipment and this would bring the same
fragmentation that today has the Web (special pages
for all class of devices). In addition, WAP was
originally designed for devices with limited resources
capacities (monochrome screens, lower bandwidth, etc)
which is actually solving day by bay through
bandwidth wireless connection (WCDMA, UTMS,
802.11g, WiMax, etc) and with more and more
powerful equipment.
The best solution would be to create a new protocol.
The problem is that this one must be totally compatible
with the existing ones, because if not, it would let
unusable thousands of existing resources (it would be
necessary to modify as much Web servers as Web
clients).
2.2 Modification of protocols
Within this alternative exits the case of having a
new request scheme of Web resources. This new
2. 18
scheme receives the name of Push, whereas traditional
scheme receives the name of Pull [2].
The Pull scheme receives the name of “over
demand’. Under this scheme, the client (user) is who
visualizes a resource in an explicit way. In our case, if
a user wants to see the page of cenidet, must write in
the Web browser the next URL:
http://www.cenidet.edu.mx/.
The Push scheme also receives the name of
'subscription-notification'. In this scheme, the user
subscribes itself to a service and when some event of
interest happens a notification is sent for alerting the
user about the event.
Generally these two schemes do not live on isolated
way. Hybrid schemes (Pull&Push) have been applied
in diverse existing services, so is the case of the
reception of SMS/MMS messages, where the send of
messages is Pull and the reception is Push, since it
notifies to users about the existence of new messages.
Another service that has made famous devices like
the Blackberry to become successful is the Push-mail
[3]. This service comes to solve the problem of email
visualization in mobile environments. Under the
traditional scheme of the electronic mail, for consulting
the email, a user must be connected all the time to
receive it. This originates great costs if the network
connection generates costs per time. With this new
scheme, the user is not connected to the mail server.
When a new mail in the server is received, it notifies
the client of the existence of the new mail and sends it
to the mobile client.
For this type of schemes, protocols like HTTPU
(HTTP over UDP) or HTTPMU (HTTP over multicast
UDP) have been proposed, and basically works similar
to the HTTP but using datagrams, which are not in an
oriented connection way. With these protocols are
possible to offer a better quality in the mobile Web [4].
2.3 Intermediary services
This is the more extended solution to solve the
problem of Web resources visualization and many
other problems present on Web, like the case of
firewalls that solve some of the Web security problems
like the access control, or proxies’ caches that tries to
reduce the access latency to the information.
The scheme of intermediaries is widely used
because it doesn’t need to modify neither the clients
nor the servers; in fact, the client and server processes
do not notice the existence of these intermediary
services. These services are in charge of the hard work
and are transparent to the users.
The tool that is described in this article, works
under the scheme of intermediary services.
3. Proposal of solution
The hoarding process solves the problem of Web
resources visualization without concerning the state of
the connection of the mobile device. For this, it
becomes necessary that the user has already stored, in
local way, in his device the resources that he o she will
use.
As can be observed, the amount of resources to
occupy can be immense, whereas the capacity of
storage of the devices is limited. In order to give
solution against this new problem is necessary to have
an effective way to know the resources that a user
could use. With hoarding is possible to reduce this,
through algorithms of association rules applied on Web
logs, is determined the optimal set of resources that
will be replicated to the mobile clients [5].
A mechanism which tries to solve the adaptation
problem of Web resources to the displaying capacities
on mobile devices is transcoding. It consists of
transformation of resources, distilling and processing
of all those characteristics that are not available in the
device is needed. The used mechanism of transcoding
uses HTML to a subgroup of HTML transformer,
using XML.
The system is based on client-server architecture
with an intermediate tier on the server side as on the
client side. The system is shown in Figure 1.
Figure 1. General architecture proposed.
The general system has been denominated GASWT
(Gestor de Acaparamiento de Sitios Web
Transcodificados: Hoarding Manager of Transcoding
Web Sites). The intermediary in the client side is
denominated GAP (Gestor de Acaparamiento para
Pocket PC: Hoarding Manager for Pocket PC),
whereas the server side is denominated GAT (Gestor
de Acaparamiento y Transcodificación, Hoarding
Manager and Transcoding). The GAT is composed by
MA (Mecanismo Acaparador: Hoarding Mechanism)
and by MT (Mecanismo Transformador: Transcoding
3. 19
Mechanism). The communication between the
processes is made through a HTTP request-response
scheme.
As much the MA as TM are taken from other
projects that together with this one, comprise the
Moviware project [6], whose main function is to offer
a set of services to mobile clients that have frequent
disconnections.
The general operation of the system is described in
the next lines. The user introduces an URL from the
Web browser (which has been previously configured to
redirect his exit towards the GAP). The GAP receives
the request and determines if it is in the local cache of
the device, if found, the hoarded resource is sends to
the Web browser.
When the resource is not hoarded, the system
validates the connection existence in order to obtain
the resource on line. If for some reason the resource
cannot be shown, (because it doesn’t exist or has
detected an error in the connection) the system notifies
the user by sending an error message.
On the other hand, if the Web resource is not
hoarded and a pattern of the site in the local device
doesn’t exist, the MA sends the Web resources if a
pattern for this site exists. If the pattern exists but the
hoarded resources in the MA aren’t present, it obtains
them by requesting them to MT and soon compresses
the resources in zip format to optimize the process.
Once the MA has sent the hoarded Web site, the
mobile device must decompress the Web site and
update its list of patterns. This process happens in
transparent way, in a way that the user never notices.
MT is responsible of collecting documents and if
they are HTML, it transforms them if the configuration
parameters indicate that. The transcoding is made on
line, because the process is slowed down if the
document is too large.
The actions that the user can make on the system
consist in visualizing Web sites on line, visualizing
Web sites on disconnection mode, visualizing error
messages, visualization of the requests states and
finally, set up the system.
The GAP is basically conformed of three main
modules which are: Observer, GAL (Gestor de
Acaparamiento Local: Local Hoarding Manager) and
GDL (Gestor de Desconexión Local: Manager of Local
Disconnection).
The Observer is responsible of processing each
request and to give back the result to the navigator.
The GAL is responsible of the manipulation and
control of the cache in the device. The users decide
which resources are susceptible of hoarding, as well as
limiting the storage space.
The GDL is responsible of determining the state of
the connection. The control of the disconnections has
been used drilling the network during three seconds.
Observing the quality of the results, a threshold of 30%
of accepted connections determines if the client is
connected (if the threshold is surpassed or equaled) or
is on disconnection mode (if it is below the threshold)
[7].
For the implementation of this tool, we used .NET
Compact Framework 1.0 with C # language, because it
is the best option to program in Pocket PC platform
[8].
The modifications of the MA and MT are being
made in Java so that it is language in which these
modules are programmed.
4. Results
The tool described in the present document has been
proven in diverse equipment like Pocket PC 2000
(Compaq iPAQ H3630), Pocket PC 2002 (HP Jornada
5500), Pocket PC 2003 (HP rx3115), emulators of
Windows CE, desktop PC (Compaq Presario with
Pentium 4 1.4 Ghz. processor, 512 Mb of RAM
memory).
The first test scenario consisted of acceding to the
Web resources in on line mode. We obtained
satisfactory results (see Figure 2).
In the number two test scenario, the GAP was
executed without being connected to the network.
Additionally we had a pattern of a hoarded Web site
(http://www.cenidet.edu.mx/) and resources. In this
case not existing images in the original site were used,
because it was possible to verify that the hoarded
resources are correctly displayed.
The number three test scenario (see Figure 3),
demonstrates that it is possible to transcoding the
resources in the device as well as showing them in a
local way if they are hoarded and without transcoding.
It is Also possible to execute the GAP in other
platforms like Smartphones (SmartGAP) and a desktop
PC (WinGAP). GAP, WinGAP and SmartGAP are the
same program but with different name, to differentiate
the platforms in which they’re running.
5 Conclusions
With the presented tool is being demonstrated that it
is possible to execute complex services in Pocket PC
devices, so is the case of an intermediary service that it
allows to visualize Web resources when it exists or not
a network connection.
At this time we have verified in an isolated way
most of the functions of the system (it lacks the
methods of decompression of the hoarded site), it
4. 20
would be necessary the respective integration of
components and testing to the system in its totality.
Figure 2. Case of test 1: Visualization of Web
resources with network connection.
Figure 3. Visualization of Web sites in
disconnection mode with hoarded Web resources
and without transcoding.
Figure 4. Case of test 3: Visualization of Web sites
in connection mode, with hoarded and transcoding
resources.
The expected benefits at the conclusion of this
investigation work are: 1) Visualization of Web sites
without mattering if the devices are connected or not.
2) Reduction of latency in the access to the
information, if the resource is hoarded locally. 3)
Energy Saving by the fact to work in disconnection
mode. 4) Saving money if the user decides not to
connect to a network that receives the service and
generates expenses by the access time. 5) Facility of
administration of Web sites when not having different
versions to each device.
6. Acknowledgments
We want to give thanks to Rocío Vargas Arroyo for
her contribution in correct this paper.
7. References
[1] SG magazine, http://www.softwareguru.com.mx [visited
march 2006]
[2] Purushottam Kuikarni, et al., “Handling Client Mobility
and Intermittent Connectivity in Mobile Web Accesses”,
Department of Computer Science, University of
Massachussets.
[3] Blackberry’s push technology,
http://www.blackberry.com/products/software/integrations/p
ush_email.shtml [visited march 2006].
[4] UPnP Forum, http://www.upnp.org/, [visited march
2006]
[5] David Valenzuela, “Mecanismos para predicción de
acaparamiento de datos en sistemas clientes/servidor
móviles”, masther thesis, cenidet, august 2002.
[6] Gabriel González. “Plataforma middleware reflexiva para
aplicaciones de cómputo móvil en Internet (Movirware)”,
cenidet.
[7] J. Carlos Olivares, et al, “Control de desconexiones en la
visualización de páginas Web en dispositivos móviles
Windows CE”, for appear in XVI CIECE’06, april 5,6 and 7
2006, Cd. Obregón, Sonora, México.
[8] Gabriel González, Azucena Montes, J. Carlos Olivares,
“Comparativa y evaluación de las herramientas de
programación para desarrollar aplicaciones en plataforma
Pocket PC”. VI CICC’05, Colima, Colima, México,
september 2005.