Explore chapters and articles related to this topic
Cloud computing for big data
Published in Jun Deng, Lei Xing, Big Data in Radiation Oncology, 2019
Different client architectures can be employed to implement a Cloud-based PACS. One approach is to develop a thin-client application that can run either on a mobile operating system (e.g., iOS) or in a PC desktop environment. It is also possible to build a remote PACS viewer within a web browser either using a rich-Internet framework such as JAVA, Flash, or Silverlight or directly using standard HTML5 (this latter approach is called a zero-footprint client). Finally, an even more radical approach is to run the radiologist workstation entirely in the Cloud and use a remote desktop tool to forward the workstation screen to the radiologist’s location. This approach moves nearly all of the computation to the Cloud and only requires the radiologist device to have the capability of remote desktop. It facilitates software upgrades because all the software is located remotely and minimizes cybersecurity risks because all the sensitive data is kept in one place.
Defending Web Applications Against JavaScript Worms on Core Network of Cloud Platforms
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
Shashank Tripathi, Pranav Saxena, Harsh D. Dwivedi, Shashank Gupta
XSS exploitations are practised in two forms—stored and reflected XSS, and malicious script code is usually introduced on the server-side. Innumerable defensive solutions exist for the two classes of XSS worms. Despite the many solutions available, very few are up to the mark against the latest type of XSS attacks; for instance, one factor is introduction of HTML5, though HTML5 is helping to achieve high caliber for the Web applications in terms of facilities, design and evolving user instructiveness at a whole new different level and is also viewed as a substitute for the Adobe’s Flash and Microsoft’s Silverlight. Also HTML5 hurled us with new security challenges and attack vulnerabilities which need to be taken care of while developing web applications. HTML5 offers Cross Origin Resource Sharing (CORS) which circumvent SOP and hence increases the vulnerabilities against attacks, like XSS, CSRF. HTML5 offers many APIs like web worker, history and properties including <video>, <source>, <autofocus> tags are used for creating new XSS attack vectors like, <video><source on error= “<script>alert(“XSS ATTACK”)</script>”></video>
Flash flood early warning research in China
Published in International Journal of Water Resources Development, 2018
Haichen Li, Xiaohui Lei, Yizi Shang, Tao Qin
The second part of automation involves systematic construction, including stand-alone systems and network systems. Based on distributed hydrological models and the dynamic critical precipitation method, Hu and Liu (2011) developed a prototype warning system for small-to-medium-sized rivers for a case study in the Suichuanjiang River Basin. The overall structure, software design, and functions of the prototype are reasonably easy to understand, and continue to be refined. To improve the operational capacity of county flood-control departments to monitor and issue flash flood warnings, Zhang (2013) proposed an event-driven, county-level monitoring and warning system, and applied it in Luanchuan County. Zhang (2009) designed a warning system based on GIS, spatial databases and computer networking. Jin (2012) and Wang (2014) summarized the implementation of WebGIS and Rich Internet Application technology and developed county-level warning systems using either Silverlight or Flex technology. Li (2015), Lin (2014), Lu (2014), and Xiu (2014) designed warning systems for Shandong Province, Xinjiang Province, Dinghu City, and Yueyang City, respectively.
Design pragmatic method to low-carbon economy visualisation in enterprise systems based on big data
Published in Enterprise Information Systems, 2021
Zhigui Guan, Yuanjun Zhao, Xingdong Wang
The visualisation platform construction mainly uses desktop personal computers. The main operating system is Microsoft Windows 10. To ensure the stability, compatibility, and versatility of the platform, the operating environment of this system is guaranteed as follows: 808x command system desktop personal computer based on Intel (hardware system), Chinese Window 10 operating system, SQL Server 2002, Microsoft Windows 2008 Server operating system, HTTP, TCP/IP, FTP, Framework 4.0 (running environment of Net), Visual C#4.0 and Silverlight (development language), and Visual Studio 2010 (development platform).