Fig 6 - uploaded by Dunlu Peng
Content may be subject to copyright.
Comparison of Serilization  

Comparison of Serilization  

Source publication
Article
Full-text available
XML is the de facto standard format for data exchanging in the context of web service applications. While as has been semi-structured, XML data has to be parsed before being processed at both the client and the server sides. Applications show that the parsing process of XML is quilt time and memory consuming, such as DOM needs to load the whole XML...

Citations

... JSON data format presents various merits, such as: (i) generating compact data models; (ii) ensuring high scalability; (iii) easy to parse for computers; (iv) incorporating a text-based format that is independent of the language used; which make it the most suitable human-as well as machine-readable format (Gerhart et al., 2015;Nurseitov et al., 2009). Research has shown that JSON is a more relevant choice over existing data formats, such as eXtensible Markup Language (XML), for web-based data exchange (Peng et al., 2011). With BIM data is being gradually unlocked through Construction Digital Twin (CDT), AI, and web technologies, JSON format can be used to improve interoperability of web-based BIM applications, since building data and related processes can be modelled as JSON specification using ifcJSON schema (Afsari et al., 2017). ...
Article
Full-text available
To meet European energy-saving and decarbonisation goals, the annual renovation rate of buildings requires to be at least twice its current level; an aspiration to which the use of innovative and automated solutions can contribute. This paper presents such a solution, the RINNO Retrofitting Manager (RRM) which is part of a large, ambitious research and development project (RINNO) that aims to provide an augmented intelligence-enabled framework for deep, energy-focused retrofitting of buildings. The RRM uses web-service technologies to rationalise the retrofitting process and optimise the delivery of renovation works, while making data readily accessible through an integrated set of role-based user interfaces. The RRM is designed and developed as an open distributed system, that is extensible and portable, by implementing a collaborative research and development approach. The RRM platform implements a multi-level, multi-stakeholder planning approach. It addresses the dearth, insufficiency, and isolation of existing renovation tools by enhancing collaboration, interoperability, and data security, and avoiding information loss and misunderstanding. Employing the Unified Theory of Acceptance and Use of Technology (UTAUT) model, tests conducted with users from independent construction organisations confirmed the RRM's satisfactory performance, ease of deployment, and overall suitability for the management of renovation projects. While this research provides a free collaborative platform for managing renovation projects that can be used by all building retrofit stakeholders in Europe, it also introduces a set of web-services that can be easily reused by third-party developers and integrated into their software tools. REFERENCE: Omar Doukari, Mohamad Kassem, David Greenwood (2024). A distributed collaborative platform for multi-stakeholder multi-level management of renovation projects.
... However, they generally all receive an HTTP request, then query the database or process the data accordingly based on the content of the request, and finally return the results to the user. When returning data, JSON (JavaScript Object Notation) is a lightweight data interchange format that is easy to read and write, and easy to parse and generate by machine 47,48 . ...
Article
Full-text available
Urban park management assessment is critical to park operation and service quality. Traditional assessment methods cannot comprehensively assess park use and environmental conditions. Besides, although social media and big data have shown significant advantages in understanding public behavior or preference and park features or values, there has been little relevant research on park management assessment. This study proposes a deep learning-based framework for assessing urban park intelligent management from macro to micro levels with comment data from social media. By taking seven parks in Wuhan City as the objects, this study quantitatively assesses their overall state and performance in facilities, safety, environment, activities, and services, and reveals their main problems in management. The results demonstrate the impacts of various factors, including park type, season, and specific events such as remodeling and refurbishment, on visitor satisfaction and the characteristics of individual parks and their management. Compared with traditional methods, this framework enables real-time intelligent assessment of park management, which can accurately reflect park use and visitor feedback, and improve park service quality and management efficiency. Overall, this study provides important reference for intelligent park management assessment based on big data and artificial intelligence, which can facilitate the future development of smart cities.
... "JSON is a native data form for JavaScript, which means no special Application Programming Interfaces (APIs) or jars are needed to process JSON data. These features make JSON an ideal format for data exchanging in web service applications (12)." Each state is represented as a direct map in the user interface such that the transition from any baseline value is mapped to an individual grade (i.e., grade 1-3, or 4). ...
Article
Full-text available
Background Belantamab mafodotin (belamaf) has demonstrated clinically meaningful antimyeloma activity in patients with heavily pretreated multiple myeloma. However, it is highly active against dividing cells, contributing to off-target adverse events, particularly ocular toxicity. Changes in best corrected visual acuity (BCVA) and corneal examination findings are routinely monitored to determine Keratopathy Visual Acuity (KVA) grade to inform belamaf dose modification. Objective We aimed to develop a semiautomated mobile app to facilitate the grading of ocular events in clinical trials involving belamaf. Methods The paper process was semiautomated by creating a library of finite-state automaton (FSA) models to represent all permutations of KVA grade changes from baseline BCVA readings. The transition states in the FSA models operated independently of eye measurement units (e.g., Snellen, logMAR, decimal) and provided a uniform approach to determining KVA grade changes. Together with the FSA, the complex decision tree for determining the grade change based on corneal examination findings was converted into logical statements for accurate and efficient overall KVA grade computation. First, a web-based user interface, conforming to clinical practice settings, was developed to simplify the input of key KVA grading criteria. Subsequently, a mobile app was developed that included additional guided steps to assist in clinical decision-making. Results The app underwent a robust Good Clinical Practice validation process. Outcomes were reviewed by key stakeholders, our belamaf medical lead, and the systems integration team. The time to compute a patient's overall KVA grade using the Belamaf Eye Exam (BEE) app was reduced from a 20- to 30-min process to <1–2 min. The BEE app was well received, with most investigators surveyed selecting “satisfied” or “highly satisfied” for its accuracy and time efficiency. Conclusions Our semiautomated approach provides for an accurate, simplified method of assessment of patients’ corneal status that reduces errors and quickly delivers information critical for potential belamaf dose modifications. The app is currently available on the Apple iOS and Android platforms for use by investigators of the DREAMM clinical trials, and its use could easily be extended to the clinic to support healthcare providers who need to make informed belamaf treatment decisions.
... Nowadays, JSON [6] is a very common format. It is used as data exchange structure in many web technologies [7]. The JSON format itself allows nested structures and is a lightweight format. ...
... This plugin provides multiple authentication and authorization mechanisms, supporting methods such as Session, Token, JWT [10] , etc., which can effectively restrict user access and protect sensitive data. The database is encrypted using MD5 encryption method [11] , the data interaction between the front-end and back-end adopts JSON data structure [12] , and the caching technology adopts Redis technology [13] . Through the application of these technologies and tools, the performance, security, and scalability of the system can be improved during system design and development, providing better user experience and business value. ...
Article
Full-text available
Entering the era of big data, while the amount of resource information is increasing exponentially, it has greatly increased the difficulty of people's resource sharing and searching. The design goal of this resource sharing platform is to gather the power of a large number of netizens to collect and integrate a large amount of resources, so that users can enrich the resource library as resource sharers while searching for resources. This system is an online multi-person resource sharing platform designed based on the Springboot and Vue2.0 framework, which implements functions such as user registration and login, data sharing, search, and comments. It also implements resource and user information management functions in the administrator module, as well as AI image audit image function based on Yolo. This system adopts cloud computing cloud database technology and cloud computing host technology to reduce system operating costs, and uses Sa Token plugin to ensure system security. While providing a resource sharing platform for netizens, it also adds corresponding resource audit functions such as image auditing.
... Caplan (2010) menyebutkan bahwa penggunaan internet bermasalah adalah sebuah konstelasi pikir dan perilaku yang melibatkan penggunaan internet secara berlebih menyangkut pada permasalahan psikososial yang bukan patologis dan bersifat non-klinis dengan lebih memilih interaksi sosial online daripada percakapan tatap muka biasa namun melibatkan kognitif-perilaku. Penggunaan internet bermasalah dapat menyebabkan peningkatan waktu yang dihabiskan untuk aktivitas online dan berdampak pada pada penarikan sosial, pengabaian diri, pola makan tidak teratur, dan masalah keluarga (Cao et al., 2011). Penggunaan internet bermasalah berarti penggunaan internet secara terus menerus dalam aktivitas online yang tidak bermanfaat dan tidak produktif seperti game online, perjudian, pornografi, dan sebagainya. ...
... Penelitian ini menunjukkan bahwa penggunaan internet bermasalah pada remaja Sekolah Menengah Atas (SMA) berada dalam kategori rendah. Hal ini sesuai dengan penelitian Cao et al. (2011) yang menemukan bahwa hanya sekitar 8,1 persen siswa SMP dan SMA di China mengalami masalah dalam menggunakan internet. Penelitian lain juga menyebutkan bahwa penggunaan internet bermasalah dalam Facebook pada remaja SMA di Jakarta Barat masih tergolong rendah (Andangsari & Fitri, 2014). ...
Article
Full-text available
Perkembangan teknologi, termasuk internet mengalami kemajuan yang pesat. Namun, keberadaan internet dapat berdampak positif dan negatif ketika penggunaannya tidak tepat, atau disebut penggunaan internet bermasalah. Penelitian ini bertujuan untuk menganalisis pengaruh langsung dan tidak langsung kelekatan remaja-orang tua, harga diri, dan kontrol diri terhadap penggunaan internet bermasalah. Penelitian ini melibatkan sebanyak 250 remaja di Kabupaten Bogor. Kuesioner yang digunakan dalam penelitian ini adalah Adolescent Attachment Questionnaire (AAQ), Rosenberg Self-Esteem Scale (RSES), kontrol diri singkat versi Indonesia (operasionalisasi De Ridder), dan Generalized Problematic Internet Use Scale 2 (GPIUS 2). Analisis data menggunakan uji deskriptif dan Structural equation modeling (SEM) menggunakan smartPLS. Penelitian ini hanya menemukan satu variabel yang berpengaruh langsung terhadap penggunaan internet bermasalah yaitu kontrol diri dengan pengaruh negatif signifikan. Penelitian ini menemukan kelekatan remaja-orang tua berpengaruh langsung positif signifikan terhadap harga diri dan kontrol diri, sedangkan harga diri berpengaruh langsung positif signifikan terhadap kontrol diri. Hasil penelitian juga menunjukkan terdapat pengaruh tidak langsung positif signifikan dari kelekatan remaja-orang tua terhadap kontrol diri. Kelekatan remaja-orang tua dan harga diri berpengaruh tidak langsung negatif secara signifikan terhadap penggunaan internet bermasalah.
... Notation (JSON) [227] for the elements of a SRUP message, this would require one byte per character, and therefore be very inefficient [228]. As such the format adopted by SRUP is to use a raw binary byte-stream, utilizing the position within the byte-stream to indicate the field-boundaries. ...
Thesis
This thesis explores ideas connected with the cybersecurity of, and secure communications for, Internet of Things (IoT) devices; and introduces a number of original elements of research — including the Secure Remote Update Protocol (SRUP), a protocol developed to provide a mechanism for secure Command and Control messages. The work introduces cybersecurity concepts and background, IoT networking protocols and Command and Control messaging, before moving on to describe the original research. The design and concept of SRUP is described in detail, along with a scheme to support the use of dynamic identity in the context of the IoT. Techniques to establish device identity are then described, followed by an examination of the security features of SRUP. An open-source implementation of SRUP is then introduced, alongside a discussion on the way this has been optimized for ease of use by non-specialist developers. A concept to enable the controlled sharing of information and requests between Command and Control networks using SRUP is then described, along with a discussion on how this approach could be adopted to help to address the problem of short-term provision of access to IoT systems by guest users. Finally an experimental assessment of the protocol in simulated real-world conditions is described and measurements of the performance overhead associated with using SRUP, with inexpensive low-power hardware, are discussed and analysed. These results show that the use of the SRUP protocol, in comparison to an insecure implementation, added an additional processing delay of between 42.92ms and 51.60ms to the end-to-end message propagation — depending on the specific hardware in use. The thesis concludes with a summary of the research, and some recommendations for follow-on work.
... Python programming language was used for web scraping, where an API 8 was developed from scratch, specially designed for extracting datasets of posts from an Instagram location page. JSON 9 , a line-weighted semi-structured data format, has been employed for this task due to its simplicity for humans to read and write and its clarity for machines to parse and generate (Peng et al. 2011). Therefore, Instagram posts datasets were prepared by scraping data from 11 locations listed in table 1 in the period between March 14th and April 10th, 2020, when the Holy Shrine and surrounding stores and shopping centers were closed, and the same period in 2019 resulted in 3469 posts in 2019 and 8508 posts in 2020. ...
Article
Full-text available
The widespread deployment of social media has helped researchers access an enormous amount of data in various domains, including the pandemic caused by the COVID-19 spread. This study presents a heuristic approach to classify Commercial Instagram Posts (CIPs) and explores how the businesses around the Holy Shrine were impacted by the pandemic. Two datasets of Instagram posts (one gathered data from March 14th to April 10th, 2020, when Holy Shrine and nearby shops were closed, and one extracted data from the same period in 2019), two-word embedding models – aimed at vectorizing associated caption of each post, and two neural networks – multi-layer perceptron and convolutional neural network – were employed to classify CIPs in 2019. Among the scenarios defined for the 2019 CIPs classification, the results revealed that the combination of MLP and CBoW achieved the best performance, which was then used for the 2020 CIPs classification. It is found out that the fraction of CIPs to total Instagram posts has increased from 5.58% in 2019 to 8.08% in 2020, meaning that business owners were using Instagram to increase their sales and continue their commercial activities to compensate for the closure of their stores during the pandemic. Moreover, the portion of non-commercial Instagram posts (NCIPs) in total posts has decreased from 94.42% in 2019 to 91.92% in 2020, implying the fact that since the Holy Shrine was closed, Mashhad residents and tourists could not visit it and take photos to post on their Instagram accounts.
... Python programming language was used for web scraping, where an API 5 was developed from scratch, specially designed for extracting datasets of posts from an Instagram location page. JSON 6 , a line-weighted semistructured data format, has been employed for this task due to its simplicity for humans to read and write and its clarity for machines to parse and generate (Peng et al. 2011). Therefore, Instagram posts datasets were prepared by scraping data from 11 locations listed in table 1 in the period between March 14th and April 10th Before employing neural networks to classify CIPs, datasets needed to be purified and clean since there is much useless information. ...
Preprint
Full-text available
The widespread deployment of social media has helped researchers access an enormous amount of data in various domains, including the pandemic caused by the COVID-19 spread. This study presents a heuristic approach to classify Commercial Instagram Posts (CIPs) and explores how the businesses around the Holy Shrine – a sacred complex in Mashhad, Iran, surrounded by numerous shopping centers – were impacted by the pandemic. Two datasets of Instagram posts (one gathered data from March 14th to April 10th, 2020, when Holy Shrine and nearby shops were closed, and one extracted data from the same period in 2019), two word embedding models – aimed at vectorizing associated caption of each post, and two neural networks – multi-layer perceptron and convolutional neural network – were employed to classify CIPs in 2019. Among the scenarios defined for the 2019 CIPs classification, the results revealed that the combination of MLP and CBoW achieved the best performance, which was then used for the 2020 CIPs classification. It is found out that the fraction of CIPs to total Instagram posts has increased from 5.58% in 2019 to 8.08% in 2020, meaning that business owners were using Instagram to increase their sales and continue their commercial activities to compensate for the closure of their stores during the pandemic. Moreover, the portion of non-commercial Instagram posts (NCIPs) in total posts has decreased from 94.42% in 2019 to 91.92% in 2020, implying the fact that since the Holy Shrine was closed, Mashhad citizens and tourists could not visit it and take photos to post on their Instagram accounts.
... • Visualization -cloud service ensures constant real time data transfer from our intelligent environment, which we will then be able to visualize. The goal of the paper was to create an intelligent environment that will be able to send data in the format JSON to selected cloud service using a script [10]. Intelligent environment will continuously communicate with the cloud service and thus ensuring real time data transfer. ...