An Application Framework for Open Application Development and Distribution in Pervasive Display Networks

Author(s):  
Constantin Taivan ◽  
Rui José
Author(s):  
Aryo Pinandito

Information system is one of the most important business supports in organizations. Web-based applications become an appropriate solution to overcome the dynamically changing environment among different units in an organization. Model-View-Controller (MVC) is a well-known design pattern in web-based application development due to the separation of an application into several parts, hence it is easy to reuse and maintain. However, such design pattern requires improvements since the information system handles business process choreography and integration between application. Therefore, modifying the interaction of object of class in a design pattern become a challenging problem. In this paper, an application framework based on Model-CollectionService-Controller-Presenter (MCCP) design pattern, which is a modification of an MVC, was proposed. The proposed framework allows multiple different applications to run and provides inter-application data exchange mechanisms to improve the data communication process between applications. Several performance comparisons with another popular web application framework are also presented.


Author(s):  
Seiji Munetoh ◽  
Nobukazu Yoshioka

A framework based on a scripting language is commonly used in Web application development, and high development efficiency is often achieved by applying several Agile development techniques. However, the adaptation of security assurance techniques to support Agile development is still underway, particularly from the developer's perspective. The authors have addressed this problem by developing an iterative security testing method that splits the security test target application into two parts on the basis of the code lifecycle, application logic (“active development code”) and framework (“used code”). For the former, detailed security testing is conducted using static analysis since it contains code that is changed during the iterative development process. For the latter, an abstraction library at the command granularity level is created and maintained. The library identifies the behavior of an application from the security assurance standpoint. This separation reduces the amount of code to be statically inspected and provides a mechanism for sharing security issues among application developers using the same Web application framework. Evaluation demonstrated that this method can detect various types of Web application vulnerabilities.


2019 ◽  
Vol 25 (4) ◽  
pp. 131-137
Author(s):  
John Barrett ◽  
Barbara Turner ◽  
Susan Silva ◽  
Michael Zychowicz

Clinical pathways have been successfully implemented in the primary care setting in New Zealand, Australia and the UK. Despite wide adoption and decreased costs, these pathways have yet to translate evidence into clinical practice while also saving providers time—an important barrier for the translation of evidence at the point of care. The goal of this project was to determine if future development of a point-of-care mobile application should be undertaken with design principles using the theoretical framework of Hick’s law. Three new-to-practice providers participated in three plan-do-study-act cycles using these pathways installed on mobile devices to determine if they were a feasible, efficient and useful method to implement evidence. The project was a success with all three participants wishing to continue using the pathways after project completion. Participants felt the digital clinical pathways were the next evolution of the popular UpToDate software platform and helped them apply the latest evidence better than other available tools. While these results are promising, there were also limitations. Participants felt the lack of chart integration coupled with time constraints made full integration challenging and suggested launching the platform using a variety of delivery systems. The project’s findings suggest that future application development using the developed design principles would be worth further consideration. If this mobile application ultimately proved successful, the application framework could be implemented on a larger scale, thus improving patient outcomes and saving providers time.


Author(s):  
Marut Buranarach ◽  
Thepchai Supnithi ◽  
Ye Myat Thein ◽  
Taneth Ruangrajitpakorn ◽  
Thanyalak Rattanasawad ◽  
...  

Although the Semantic Web data standards are established, ontology-based applications built on the standards are relatively limited. This is partly due to high learning curve and efforts demanded in building ontology-based Semantic Web applications. In this paper, we describe an ontology application management (OAM) framework that aims to simplify creation and adoption of ontology-based application that is based on the Semantic Web technology. OAM introduces an intermediate layer between user application and programming and development environment in order to support ontology-based data publishing and access, abstraction and interoperability. The framework focuses on providing reusable and configurable data and application templates, which allow the users to create the applications without programming skill required. Three forms of templates are introduced: database to ontology mapping configuration, recommendation rule and application templates. We describe two case studies that adopted the framework: activity recognition in smart home domain and thalassemia clinical support system, and how the framework was used in simplifying development in both projects. In addition, we provide some performance evaluation results to show that, by limiting expressiveness of the rule language, a specialized form of recommendation processor can be developed for more efficient performance. Some advantages and limitations of the application framework in ontology-based applications are also discussed.


2014 ◽  
Vol 926-930 ◽  
pp. 4020-4023
Author(s):  
Hui Li

This paper mainly introduces the analysis, design and implementation of human resources management system. To the characteristics of Human Resources Management, we make a trade off aspects of architecture, system design analysis, databases design and data exchange with other systems. The purpose is to establish a system with soundly security, flexibility to expand, facilitate the maintenance. Firstly, we discuss the basis of the theory and knowledge of the corporate human resources management system; and then targeted human resources management system itself to the outside business system interface features, we specifically describe the human resources Web application framework of the functional requirements; and based on J2EE standard system architecture, we describe the design and implementation of the application development environment and core technology at all levels.


2012 ◽  
Vol 198-199 ◽  
pp. 455-461 ◽  
Author(s):  
Lu Gao ◽  
Li Yong Zhou ◽  
Jin Ling Yu

In recent years, the Flex technology has been widely used. Adobe Flex application framework designed to start introduction of the Cairngorm framework. The framework with the MVC design pattern to simplify the application development model, specification of the application development process, and pay more attention to the business logic, the author after careful study of the entire framework, the control layer of the Cairngorm framework is made some improvements to the improved version of the Cairngorm framework. The improved version of the Cairngorm framework is more suitable for Web application development and maintenance.


2007 ◽  
Vol 85 (2) ◽  
pp. 138-151 ◽  
Author(s):  
Marco Viceconti ◽  
Cinzia Zannoni ◽  
Debora Testi ◽  
Marco Petrone ◽  
Stefano Perticoni ◽  
...  

2015 ◽  
Vol 6 (3) ◽  
pp. 26-49
Author(s):  
Seiji Munetoh ◽  
Nobukazu Yoshioka

A framework based on a scripting language is commonly used in Web application development, and high development efficiency is often achieved by applying several Agile development techniques. However, the adaptation of security assurance techniques to support Agile development is still underway, particularly from the developer's perspective. The authors have addressed this problem by developing an iterative security testing method that splits the security test target application into two parts on the basis of the code lifecycle, application logic (“active development code”) and framework (“used code”). For the former, detailed security testing is conducted using static analysis since it contains code that is changed during the iterative development process. For the latter, an abstraction library at the command granularity level is created and maintained. The library identifies the behavior of an application from the security assurance standpoint. This separation reduces the amount of code to be statically inspected and provides a mechanism for sharing security issues among application developers using the same Web application framework. Evaluation demonstrated that this method can detect various types of Web application vulnerabilities.


Sign in / Sign up

Export Citation Format

Share Document