A Hybrid Test Environment for Verification of Drilling Automation Systems

2021 ◽  
Author(s):  
Jan Einar Gravdal ◽  
Dan Sui ◽  
Attila Nagy ◽  
Nejm Saadallah ◽  
Robert Ewald

Abstract The transition towards drilling automation put high demands on new software for controlling or assisting during drilling. Along with the software development, adequate infrastructures for testing and verification of this software need to be in place. In other industries, such as aviation, the development of advanced simulators goes hand in hand with the technological developments and ensures a fit for purpose test environment at all time. Since 2017, a high-fidelity online drilling simulator has been available to the public. The purpose has been to facilitate and accelerate the development and testing of real-time drilling automation systems. The simulator can be accessed through a web Application Programming Interface (API) and run from a web client, or in a Hardware-in-the-loop (HIL) simulator from a control system environment with programmable logic controllers (PLCs) from leading industry vendors. To facilitate testing and verification of systems also on real data, recent developments have enabled a user-friendly access to openly available drilling data through the web API. Automatic functions have been developed to create model configurations from recorded data sets. This setup enables benchmarking of simulation models against recorded data and allows efficient verification of drilling automation systems. The web enablement makes the infrastructure suitable for development projects and software verification from anywhere in the world without any installation needed. Better availability of realistic and scalable test environments for automated drilling systems is expected to speed up the qualification of new drilling technologies. This will in turn reduce costs and minimize the carbon footprint from drilling operations. This paper describes the hybrid test environment and key learnings from the developers and user's perspective.

2019 ◽  
Vol 8 (4) ◽  
pp. 2827-2833

The SQL injection attack (SQLIA) occurred when the attacker integrating a code of a malicious SQL query into a valid query statement via a non-valid input. As a result the relational database management system will trigger these malicious query that cause to SQL injection attack. After successful execution, it may interrupts the CIA (confidentiality, integrity and availability) of web API. The vulnerability of Web Application Programming Interface (API) is the prior concern for any programming. The Web API is mainly based of Simple Object Access Protocol (SOAP) protocol which provide its own security and Representational State Transfer (REST) is provide the architectural style to security measures form transport layer. Most of the time developers or newly programmers does not follow the standards of safe programming and forget to validate their input fields in the form. This vulnerability in the web API opens the door for the threats and it’s become a cake walk for the attacker to exploit the database associated with the web API. The objective of paper is to automate the detection of SQL injection attack and secure the poorly coded web API access through large network traffic. The Snort and Moloch approaches are used to develop the hybrid model for auto detection as well as analyze the SQL injection attack for the prototype system


2015 ◽  
Vol 30 (2) ◽  
pp. 220-236 ◽  
Author(s):  
Frances Buchanan ◽  
Niccolo Capanni ◽  
Horacio González-Vélez

AbstractThe sources of information on the Web relating to Fine Art and in particular to Fine Artists are numerous, heterogeneous and distributed. Data relating to the biographies of an artist, images of their artworks, location of the artworks and exhibition reviews invariably reside in distinct and seemingly unrelated, or at least unlinked, sources. While communication and exchange exists, there is a great deal of independence between major repositories, such as museum, often owing to their ownership or heritage. This increases the individuality in the repository’s own processes and dissemination. It is currently necessary to browse through numerous different websites to obtain information about any one artist, and at this time there is little aggregation of Fine Art Information. This is in contrast to the domain of books and music, where the aggregation and re-grouping of information (usually by author or artist/band name) has become the norm. A Museum API (Application Programming Interface), however, is a tool that can facilitate a similar information service for the domain of Fine Art, by allowing the retrieval and aggregation of Web-based Fine Art Information, whilst at the same time increasing public access to the content of a museum’s collection. In this paper, we present the case for a pragmatic solution to the problems of heterogeneity and distribution of Fine Art Data and this is the first step towards the comprehensive re-presentation of Fine Art Information in a more ‘artist-centric’ way, via accessible Web applications. This paper examines the domain of Fine Art Information on the Web, putting forward the case for more Web services such as generic Museum APIs, highlighting this via a prototype Web application known as the ArtBridge. The generic Museum API is the standardisation mechanism to enable interfacing with specific Museum APIs.


2021 ◽  
Vol 22 (1) ◽  
Author(s):  
Silvia D’Angelo ◽  
Isobel Claire Gormley ◽  
Aoife E. McNamara ◽  
Lorraine Brennan

Abstract Background Metabolomic biomarkers offer potential for objective and reliable food intake assessment, and there is growing interest in using biomarkers in place of or with traditional self-reported approaches. Ongoing research suggests that multiple biomarkers are associated with single foods, offering great sensitivity and specificity. However, currently there is a dearth of methods to model the relationship between multiple biomarkers and single food intake measurements. Results Here, we introduce multiMarker, a web-based application based on the homonymous R package, that enables one to infer the relationship between food intake and two or more metabolomic biomarkers. Furthermore, multiMarker allows prediction of food intake from biomarker data alone. multiMarker differs from previous approaches by providing distributions of predicted intakes, directly accounting for uncertainty in food intake quantification. Usage of both the R package and the web application is demonstrated using real data concerning three biomarkers for orange intake. Further, example data is pre-loaded in the web application to enable users to examine multiMarker’s functionality. Conclusion The proposed software advance the field of Food Intake Biomarkers providing researchers with a novel tool to perform continuous food intake quantification, and to assess its associated uncertainty, from multiple biomarkers. To facilitate widespread use of the framework, multiMarker has been implemented as an R package and a Shiny web application.


2021 ◽  
Vol 7 (2) ◽  
pp. 77-88
Author(s):  
Eko Didik Widianto ◽  
Azis Masruhan ◽  
Agung Budi Prasetijo

Makalah ini membahas pengembangan sistem otomatisasi ruangan pada kontrol pintu dan presensi kuliah untuk menambah keamanan ruangan. Sistem ini terintegrasi dengan aplikasi web dan menggunakan papan Arduino Mega 2560 sebagai pusat kontrol sistem. Sistem ini menggunakan RFID MFRC522 sebagai alat komunikasi dua arah dengan kartu RFID dan pembaca, modul ethernet shield sebagai penghubung ke jaringan internet, solenoid sebagai pengunci pintu, LCD untuk penampil notifikasi, serta RTC DS3231 sebagai pewaktu. Hasil pengujian menunjukkan, sistem mampu mencocokkan kartu tag dosen dengan data jadwal pada basis data dan mencocokkan kartu tag mahasiswa dengan data mahasiswa di mata kuliah yang terjadwal pada basis data. Jadwal akses ruang sesuai dengan jadwal kuliah yang dapat diatur melalui aplikasi web. Selain dari itu, pada aplikasi web yang dibangun dapat mengolah data presensi, jadwal, mata kuliah, mahasiswa, dosen dan kelas. Berdasarkan hasil pengujian, pembacaan kartu RFID dapat dilakukan sampai jarak 4 cm. Penelitian ini menghasilkan sebuah sistem otomasi pintu berbasis RFID dan Arduino yang terintegrasi dengan sistem database berbasis web. This paper presenst an automation systems for controling the  door’s room and lecture attendance which can enhance room security. This study build a college room control system integrated with a web application. This system uses the Arduino Mega 2560 board as the control center of the system. Furthermore,  we used RFID MFRC522 as a two-way communication device with an RFID tag card and reader, an ethernet shield module that providing internet access to the network, a solenoid as a door lock,  LCD for notification display, and  RTC DS3231 as a timer. This system can control door access and attendance automation, and send the data to  web application. The application can match the lecturer tag cards with his scheduled  in the database and match students' tag cards with their data in scheduled courses.  The room access schedule is in accordance to the class schedule, which can be arranged via the web application. The web application can process attendance data, schedules, courses, students, lecturers, and classes. The system can read the RFID tags up to a distance of 4 cm.


Author(s):  
Milena Vesić ◽  
◽  
Nenad Kojić ◽  

Web applications are the most common type of application in modern society since they can be accessed by a large number of users at any time from any device. The only condition for their use is an Internet connection. Most applications run using the HTTP protocol and client-server architecture. This architecture is based on the use of API (Application programming interface), most often REST architecture (Representational State Transfer). If there are several different functionalities on the website that fill their content with data from the web server, for most of them a special HTTP request must be generated with one of the existing methods (GET, POST, PUT, DELETE). This way of communication can be a big problem if the connection to the Internet is weak, there are a lot of HTTP requests because you have to wait for each request to be executed and for the web server to return the data. In this paper, one implementation of GraphQL is presented. GraphQL is an open-source data query and manipulation language for APIs. GraphQL enables faster application development and has less server code. The key advantage is the number of HTTP requests because all the desired data of the page is obtained with one request. This paper will show a comparative analysis on the example of a real website in the case of using the REST architecture and GraphQL in the case of different qualities of Internet connections, code complexity and the number of required requests.


Author(s):  
Uwe Zdun

This chapter examines the use of patterns for reengineering legacy systems to the Web. Today reengineering existing (legacy) systems to the Web is a typical software maintenance task. In such projects developers integrate a Web representation with the legacy system’s application programming interface (API) and its responses. Often, the same information is provided to other channels than HTTP and in other formats than HTML as well, and the old (legacy) interfaces are still supported. Add-on services such as security or logging are required. Performance and scalability of the Web application might be crucial. To resolve these issues, many different concepts and frameworks have to be well understood, especially legacy system wrapping, connection handling, remoting, service abstraction, adaptation techniques, dynamic content generation, and others. In this chapter, we present patterns from different sources that resolve these issues. We integrate them to a pattern language operating in the context of reengineering to the Web, and present pattern variants and examples in this context.


2014 ◽  
Vol 518 ◽  
pp. 305-309
Author(s):  
Wen Tao Liu

Offline storage technology has many uses in the Web application and it can store the user status, cache data, temporary data, and persistent data and so on. In this paper several typical web client storage technologies are discussed and it includes the IE browser's unique storage technology UserData, localStorage and sessionStorage of HTML5, Web SQL Databases, Indexed Database, as well as classic storage technology Cookie and so on. Their concrete using methods are explained and their individual strengths and differences are compared. Their respective applications occasions and some issues that need attention are discussed. The general cross-browser offline storage method is presented and it can use the same application programming interface to complete different browser offline storage technologies.


2016 ◽  
Vol 13 (1) ◽  
pp. 133-144 ◽  
Author(s):  
Mihajlo Tatovic ◽  
Alenka Milovanovic ◽  
Ivan Karapandzic

The aim of this paper is to present a realization of a device for displaying, monitoring, and recording non-electrical quantities relevant to the determination and examination of weather conditions. The main unit of this device is the Arduino platform, which controls digital sensors and the GSM module used for communication with user. To accomplish that, the GSM module responds to SMS with the current values of parameters that are being monitored. Also, it uses the GPS service, which allows an Internet connection and sends data back to the Web application. When the Web application receives these data, it processes them and saves them in a MySQL database. The device has the ability to record data on an SD card. A user application is created in C# programming language and allows reading of the recorded data from the SD card and handling of such data. All of results obtained by this device is compared with the results gathered by the Republic Hydrometeorogical Service of Serbia.


2019 ◽  
Vol 4 (1) ◽  
pp. 16-36
Author(s):  
Esraa A. Afify ◽  
◽  
Mona A. Kadry ◽  

Customer Complaints are considered as valuable and significant information that can be utilized to attain customer satisfaction. Accordingly, a complaint handling system can address customer dissatisfaction and prevent similar problems from reoccurring. The aim of this paper is to investigate the level of relationship between the complaints and complaint behaviors of the customers who benefit from the services offered. In this paper, a generic approach for the Customer Complaint Management System is proposed to have the ability to minimize customers’ dissatisfaction and on the other hand to motivate customers to take part of controlling the quality of the services provided. The "Service" was used to connect different databases from different platforms to retrieve certain data. The system starts by discussing the service implementation with the web-application interface development. Afterwards, the three main Services that were used in the proposed e-complaint web service were explored to get the Citizen and Staff data and how it's working. Then, these services were implemented in the web application each according to the operation that calls the service to retrieve certain data. Moreover, the most important reports extracted from the evaluation result were explored. For implementing the model, a web application was developed to exhibit the ability of the model as well as efficiency in e-Gov since it could be developed thoroughly. It was supposed that to complete the e-complaint system cycle, there is a need for five modules to implement this cycle; first module related to the "Citizen" who wants to fill his/her complaint; second module the "Admin" who manages the system users; third module the "Agent" who will deal with the Citizen complaints; fourth module the "Staff" who will analyze the causes and actions of each complaint; and fifth module the "Supervisor" who views the overviews reports and takes decisions for improvements. For evaluation purposes, a random generator has been created, which was able to generate random complaint scenarios that serve as input to the proposed model for creating Citizen Complaints. By applying these several test scenarios to the proposed model, it proved that it’s applicable to be applied to real data if it is available and would provide the same performance. The experimental results clearly indicate that using the Service-Oriented Architecture (SOA) is suitable to aid in creating e-complaint systems. The system was implemented using random generator by entering samples of data for 3 years. Also, the system has been tested with 12,015 complaint cases; 11,162 cases are solved and 848 cases still unsolved. The number of governors covered by the system is 29 areas. According to the results, the system counted the cases of gender as 5640 cases of male and 6375 cases of female. Also, counted Married/Single cases as 4674 married citizens and 7341 single citizens. The system also has received 6999 feedbacks.


Author(s):  
Xiang-Jun Lu

Abstract Sophisticated analysis and simplified visualization are crucial for understanding complicated structures of biomacromolecules. DSSR (Dissecting the Spatial Structure of RNA) is an integrated computational tool that has streamlined the analysis and annotation of 3D nucleic acid structures. The program creates schematic block representations in diverse styles that can be seamlessly integrated into PyMOL and complement its other popular visualization options. In addition to portraying individual base blocks, DSSR can draw Watson-Crick pairs as long blocks and highlight the minor-groove edges. Notably, DSSR can dramatically simplify the depiction of G-quadruplexes by automatically detecting G-tetrads and treating them as large square blocks. The DSSR-enabled innovative schematics with PyMOL are aesthetically pleasing and highly informative: the base identity, pairing geometry, stacking interactions, double-helical stems, and G-quadruplexes are immediately obvious. These features can be accessed via four interfaces: the command-line interface, the DSSR plugin for PyMOL, the web application, and the web application programming interface. The supplemental PDF serves as a practical guide, with complete and reproducible examples. Thus, even beginners or occasional users can get started quickly, especially via the web application at http://skmatic.x3dna.org.


Sign in / Sign up

Export Citation Format

Share Document