Web-Based Computing in C/C++

Author(s):  
Nathan Wong ◽  
Kevin Gucwa ◽  
Harry H. Cheng

An interactive, web-based C/C++ computing environment has been developed to facilitate programming education. An editor with syntax highlighting is provided for students to solve the educational lessons designed to introduce computer programming concepts. The system uses SafeCh, a secure C/C++ interpreter that sandboxes the user to protect against server access, to execute code written by the user. Node.js, a JavaScript framework, is used to interface with SafeCh to redirect user input and output data from client to server and vice versa, creating an interactive programming environment. Users are able to access the learning environment conveniently using any internet-enabled device, including mobile phones and tablets. Most other web-based interactive programming tutorials teach scripting languages such as Python or JavaScript. The few existing web tutorials for C/C++ use server-side compilation and thus lack the same interactivity as is available with this system. Given the increasing popularity of programming education events such as Hour of Code, this web-based computing system can be a simple, interactive method to introduce and teach C/C++.

Author(s):  
Takao Shibamoto ◽  
Kokulapalan Wimalanathan ◽  
Erica Unger-Wallace ◽  
Erik Vollbrecht

Polymerase Chain Reaction (PCR) is one of the most important inventions of the 20th century in molecular biology. PCR is a technique to amplify or make in a test tube many copies of a specific DNA region. Miniscule amounts of the genetic material from any organism can now be amplified to identify individuals, manipulate DNA, detect infectious organisms including the viruses that cause AIDS, hepatitis, and tuberculosis, detect genetic variations including mutations in genes, and numerous other tasks. PCR primers are short, single-stranded DNAs that define the section of DNA to be amplified. Two primers are used in each PCR reaction, designed so that they bind at flanking locations surrounding the target region. Critically, off-target binding may lead to experimental failure or worse, to misleading results. Thus, potential primers of approximately 20 DNA bases in length, must be examined for off-target binding among, for example, the 3.2 billion DNA bases from all human chromosomes, the human genome. The purpose of our study is to make a user-friendly tool (Primer Server) that can design PCR primers efficiently and accurately as well as visualize the designed primers. Our web-based bioinformatics tool selects optimal primer sequences within the starting material by using a C module called primer3 and then prioritizing and/or eliminating potential primers based on comparison of the primer bases against all bases in the genome using an algorithm  called BLAST. This tool has an easy-to-use interface which was designed using Angular2, and an efficient server-side code written in Python. While similar tools exist, our tool is more user-friendly, efficient and uses extensive form validation to minimize errors in the user input. Our tool can be used to design primers that will be used in laboratory experiments to amplify DNA from various organisms, including large, complex genomes such as humans, other animals and plants.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 1987 ◽  
Author(s):  
BoSun Park ◽  
Seog Chung Seo

In edge computing service, edge devices collect data from a number of embedded devices, like sensors, CCTVs (Closed-circuit Television), and so on, and communicate with application servers. Since a large portion of communication in edge computing services are conducted in wireless, the transmitted data needs to be properly encrypted. Furthermore, the application servers (resp. edge devices) are responsible for encrypting or decrypting a large amount of data from edge devices (resp. terminal devices), the cryptographic operation needs to be optimized on both server side and edge device side. Actually, the confidentiality and integrity of data are essential for secure communication. In this paper, we present two versions of security software which can be used on edge device side and server side for secure communication between them in edge computing environment. Our softwares are basically web-based application because of its universality where the softwares can be executed on any web browsers. Our softwares make use of ESTATE (Energy efficient and Single-state Tweakable block cipher based MAC-Then-Encrypt)algorithm, which is a promising candidate of NIST LWC (National Institute of Standards and Technology LightWeight Cryptography) competition and it provides not only data confidentiality but also data authentication. It also implements the ESTATE algorithm using Web Assembly for efficient use on edge devices, and optimizes the performance of the algorithm using the properties of the underlying block cipher. Several methods are applied to efficiently operate the ESTATE algorithm. We use conditional statements to XOR the extended tweak values during the operation of the ESTATE algorithm. To eliminate this unnecessary process, we use a method of expanding and storing the tweak value through pre-computation. The measured results of the ESTATE algorithm implemented with Web Assembly and the reference C/C++ ESTATE algorithm are compared. ESTATE implemented as Web Assembly is measured in web browsers Chrome, FireFox, and Microsoft Edge. For efficiency on server side, we make use of OpenCL which is parallel computing framework in order to process a number of data simultaneously. In addition, when implementing with OpenCL, using conditional statements causes performance degradation. We eliminated the conditional statement using the loop unrolling method to eliminate the performance degradation. In addition, OpenCL operates by moving the data to be encrypted to the local memory because the local memory has a high operation speed. TweAES-128 and TweAES-128-6, which have the same structure as AES algorithm, can apply the previously existing studied T-table method. In addition, the input value 16-byte is processed in parallel and calculated. In addition, since it may be vulnerable to cache-timing attack, it is safely operated by applying the previously existing studied T-table shuffling method. Our softwares cover the necessary security service from edge devices to servers in edge computing services and they can be easily used for various types of edge computing devices because they are all web-based applications.


2020 ◽  
Vol 11 (1) ◽  
pp. 99-106
Author(s):  
Marián Hudák ◽  
Štefan Korečko ◽  
Branislav Sobota

AbstractRecent advances in the field of web technologies, including the increasing support of virtual reality hardware, have allowed for shared virtual environments, reachable by just entering a URL in a browser. One contemporary solution that provides such a shared virtual reality is LIRKIS Global Collaborative Virtual Environments (LIRKIS G-CVE). It is a web-based software system, built on top of the A-Frame and Networked-Aframe frameworks. This paper describes LIRKIS G-CVE and introduces its two original components. The first one is the Smart-Client Interface, which turns smart devices, such as smartphones and tablets, into input devices. The advantage of this component over the standard way of user input is demonstrated by a series of experiments. The second component is the Enhanced Client Access layer, which provides access to positions and orientations of clients that share a virtual environment. The layer also stores a history of connected clients and provides limited control over the clients. The paper also outlines an ongoing experiment aimed at an evaluation of LIRKIS G-CVE in the area of virtual prototype testing.


2007 ◽  
Vol 42 (4) ◽  
pp. 14-22 ◽  
Author(s):  
Minkyoung Oh ◽  
Jiyeon Lee ◽  
Byeong-Mo Chang ◽  
Joonseon Ahn ◽  
Kyung-Goo Doh

2021 ◽  
Vol 13 (13) ◽  
pp. 7354
Author(s):  
Jiekun Song ◽  
Xiaoping Ma ◽  
Rui Chen

Reverse logistics is an important way to realize sustainable production and consumption. With the emergence of professional third-party reverse logistics service providers, the outsourcing model has become the main mode of reverse logistics. Whether the distribution of cooperative profit among multiple participants is fair or not determines the quality of the implementation of the outsourcing mode. The traditional Shapley value model is often used to distribute cooperative profit. Since its distribution basis is the marginal profit contribution of each member enterprise to different alliances, it is necessary to estimate the profit of each alliance. However, it is difficult to ensure the accuracy of this estimation, which makes the distribution lack of objectivity. Once the actual profit share deviates from the expectation of member enterprise, the sustainability of the reverse logistics alliance will be affected. This study considers the marginal efficiency contribution of each member enterprise to the alliance and applies it to replace the marginal profit contribution. As the input and output data of reverse logistics cannot be accurately separated from those of the whole enterprise, they are often uncertain. In this paper, we assume that each member enterprise’s input and output data are fuzzy numbers and construct an efficiency measurement model based on fuzzy DEA. Then, we define the characteristic function of alliance and propose a modified Shapley value model to fairly distribute cooperative profit. Finally, an example comprising of two manufacturing enterprises, one sales enterprise, and one third-party reverse logistics service provider is put forward to verify the model’s feasibility and effectiveness. This paper provides a reference for the profit distribution of the reverse logistics.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Author(s):  
Keith T. Shubeck ◽  
Scotty D. Craig ◽  
Xiangen Hu

Live-action training simulations with expert facilitators are considered by many to be the gold-standard in training environments. However, these training environments are expensive, provide many logistical challenges, and may not address the individual’s learning needs. Fortunately, advances in distance-based learning technologies have provided the foundation for inexpensive and effective learning environments that can simultaneously train and educate students on a much broader scale than live-action training environments. Specifically, intelligent tutoring systems (ITSs) have been proven to be very effective in improving learning outcomes. The Virtual Civilian Aeromedical Evacuation Sustainment Training (VCAEST) interface takes advantage of both of these technologies by enhancing a virtual world with a web-based ITS, AutoTutor LITE (Learning in Interactive Training Environments). AutoTutor LITE acts as a facilitator in the virtual world by providing just-in-time feedback, presenting essential domain knowledge, and by utilizing tutoring dialogues that automatically assess user input. This paper will discuss the results of an experimental evaluation of the VCAEST environment compared to an expert-led live-action training simulation.


2018 ◽  
Vol 26 (1) ◽  
pp. 3-8 ◽  
Author(s):  
Lauren M Denneson ◽  
Maura Pisciotta ◽  
Elizabeth R Hooker ◽  
Amira Trevino ◽  
Steven K Dobscha

Abstract Objective This study evaluates whether a web-based educational program for patients who read their mental health notes online improves patient-clinician communication and increases patient activation. Methods The web-based educational program, developed with end-user input, was designed to educate patients on the content of mental health notes, provide guidance on communicating with clinicians about notes, and facilitate patients’ safe and purposeful use of their health information. Eligible patients were engaged in mental health treatment (≥1 visit in the prior 6 months) and had logged into the Veterans Health Administration (VHA) patient portal at least twice. Participants completed measures of patient activation, perceived efficacy in healthcare interactions, patient trust in their clinicians, and patient assessment of the therapeutic relationship before and after participating in the program. A total of 247 participants had complete data and engaged with the program for 5 minutes or more, comprising the analytic sample. Multivariate analysis using mixed effects models were used to examine pre-post changes in outcomes. Results In bivariate analyses, patient activation, perceived efficacy in healthcare interactions, and trust in clinicians increased significantly between pre- and post-training assessments. In fully adjusted models, changes in patient activation [b = 2.71 (1.41, 4.00), P < 0.01] and perceived efficacy in healthcare interactions [b = 1.27 (0.54, 2.01), P < 0.01)] remained significant. Conclusions Findings suggest that this educational program may help empower mental health patients who read their notes online to be active participants in their care, while also providing information and tools that may facilitate better relationships with their clinicians.


Sign in / Sign up

Export Citation Format

Share Document