scholarly journals PROSPECTIVE METHODS OF PROTECTING THE FRAMEWORK WEB APPLICATION ON THE GRADLE AUTOMATIC ASSEMBLY SYSTEM

2021 ◽  
Vol 2 (14) ◽  
pp. 107-117
Author(s):  
Anna Ilyenko ◽  
Sergii Ilyenko ◽  
Tatiana Kulish

The article considers the problem of providing protection of the web framework application in the system of automatic build gradle and defines perspective methods of providing protection. This article defines that the basic and generally accepted approach to ensuring the security of a web application is a properly constructed test framework. During research the analysis of modern protection methods of web application of the framework based the automatic assembly gradle system is made. A comparative analysis of methods is also included.The basic approaches and methods concerning the organization of application protection are defined on the basis of the modern framework analysis. During planning a test framework, the automator is faced with the task of choosing methods that will solve the problem, will be flexible to change, easy to read and are fast for finding application vulnerabilities. At the stage of developing a test framework, it is planned to choose a suitable method for the specific category. Choose to check the client, web server or both at once; write api and ui tests to implement in individual or project or projects, choose the test data to use; define how to generate and transmit user tokens, which patterns to use; define whether they are needed. Implement parallelization for api tests or for ui as well; define how to check the models that come in the answers. This article outlines the methods that cover these issues and makes their brief analysis. The research of perspective methods and means of web application protection of the framework on the automatic assembly gradle system allows to state that correctly constructed test framework is one of effective and complex approaches to provide security information, which allows detection of vulnerabilities and correction of violations on the early stages of product development at the right time.

Author(s):  
Zulkarnaen Hatala

Abstract—Efficient and quick procedure to build a web application is presented. The steps are intended to build a database application system with hundreds of tables. The procedure can minimize tasks needed to write code and doing manual programming line by line. The intention also to build rapidly web-based database application. In this method security concerning authentification and authorization already built in ensuring the right and eligible access of the user to the system. The end result is ready to use the web-based 3-tier application. Moreover, the application is still flexible to be customized and to be enhanced to suit more specific requirement in part of each module of the software both the server-side and client-side programming codes. Abstrak—Pada penelitian kali ini diusulkan prosedur cepat dan efisien pengembangan aplikasi basis data menggunakan generator aplikasi. Bertujuan untuk meminimalisir penulisan bahasa pemograman. Keuntungan dari prosedur ini adalah bisa digunakan untuk mengembangkan aplikasi basis data secara cepat terutama dengan sistem basis data yang terdiri dari banyak tabel. Hak akses dan prosedur keamanan standar telah disediakan sehingga setiap user terjamin haknya terhadap entitas tertentu di basis data. Hasil generasi adalah aplikasi basis data berbasis web yang siap pakai. Sistem aplikasi yang terbentuk masih sangat lentur untuk untuk dilakukan penyesuaian setiap komponen aplikasi baik di sisi server maupun di sisi client.


2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Tatyana Vladimirova ◽  
Lyubov Aizenshtadt ◽  
Mikhail Davydkin-Gogel

Objective: justifying the possibility of using frequency-based hearing research via the web application ‘Automated System for Initial Hearing Assessment’. Materials and methods. The study was carried out at the Department of Otorhinolaryngology of the Samara State Medical University clinics in October 2019. It involved 91 patients 17 to 73 years old (average age 48±14.6 years). All study participants were divided into two age groups: Group I 17-59 years old), and Group II (over 60 years old). Patients were required to undergo two hearing assessment tests: using the Interacoustics AC-40 clinical audiometer and using our web application ‘Automated System for Initial Hearing Assessment’ (patent No. 2019664671). Results. The maximum difference in average hearing thresholds between pure-tone threshold audiometry and the web application in Group I was 3.3 dB at a frequency of 2 kHz on the right and 3.2 dB at frequencies of 2 and 4 kHz on the left; in Group II, it constituted 4.7 and 3.5 dB at 1 and 2 kHz, on the right, correspondingly, and 7.2 dB at 4 kHz on the left. The presented data were evaluated using the Cohen’s kappa coefficient, which confirmed high level of agreement between the results obtained using the clinical audiometer vs. our original web application. Conclusion. Based on the obtained results, a conclusion was made about the possibility of using the original web application for the initial hearing express assessment in general practice in conditions of limited availability of audiological care.


Author(s):  
D. R. BAIGEREYEV ◽  
◽  
E. S. ORYNGOZHIN ◽  
L. N. TEMIRBEKOVA ◽  
N. M. TEMIRBEKOV ◽  
...  

The paper presents the results of creating a web application for the management of geological, geochemical and geotechniki data fields. The functionality of the web application includes the ability to enter, change and process the specified data, create three-dimensional geological models based on them, and perform visualization. To create a web application, we used the Django web framework with the GeoDjango extension, the GemPy and GemGIS libraries. The description of the initial data of four deposits of the Republic of Kazakhstan, as well as the results of their systematization, is given.


One of the maximum critical levels of serving your visitors is to take their orders correctly. It is taken into consideration to be the start line of the patron’ s evaluation of your services. It is likewise the maximum fundamental step within the system of serving the right food to the proper patron. It is incredible how era can revolutionize the best yet crucial practices of hoteliers, and the Kitchen Order Token / Ticket app is a tremendous example of the same. In the traditional method, the order is taken by the waiter manually by using a pen and paper that is referred to as the Kitchen Order Token / Ticket. Usually had to be printed as duplicates(or triplicates in a few cases), traditional Kitchen Order Token / Ticket techniques serve to create miscommunication, consume greater time, and are extra vulnerable to manual mistakes. In this paper mainly concentrate on the Android application is used in the android platform Tablets for taking orders from the customer near their tables only. The app is used by the waiters to take down the orders. The particular device will be given to the waiters in the organization with their username and password logged in respectively. This app will act as the user end application and the server will be the web application (server) that is managed by the Administrator.


2020 ◽  
Vol 634 ◽  
pp. A32 ◽  
Author(s):  
L. Salmon ◽  
L. Hanlon ◽  
R. M. Jeffrey ◽  
A. Martin-Carrillo

The Laser Interferometer Gravitational Wave Observatory (LIGO) and Virgo Collaboration’s Observing Run 3 has demanded the development of widely-applicable tools for gravitational wave follow-up. These tools must address the main challenges of the multi-messenger era, namely covering large localisation regions and quickly identifying decaying transients. To address these challenges, we present a public web interface to assist astronomers in conducting galaxy-targeted follow-up of gravitational wave events by offering a fast and public list of targets post-gravitational wave trigger. After a gravitational wave trigger, the back-end galaxy retrieval algorithm identifies and scores galaxies based on the LIGO and Virgo computed probabilities and properties of the galaxies taken from the Galaxy List for the Advanced Detector Era V2 galaxy catalogue. Within minutes, the user can retrieve, download, and limit ranked galaxy lists from the web application. The algorithm and website have been tested on past gravitational wave events, and execution times have been analysed. The algorithm is being triggered automatically during Observing Run 3 and its features will be extended if needed. The web application was developed using the Python based Flask web framework.


2021 ◽  
Vol 1 (2) ◽  
pp. 47-60
Author(s):  
R B Fajriya Hakim ◽  
Sugiyarto Sugiyarto

As the web and computational technology carry on growing and huge data are yielded on the web, these technologies are turn into important for a statisticians' work. It is worthy that statistician always gain knowledge of new aspects of computation. A lack of computational reasoning skills gets it hard for statisticians to work in a team. If statistician do not take up this computations challenge more coherently, statistics will be marginalized and take away related at a time when its data science reputation grow up significantly. In addition, people rely on the information on web, for whatever their reason.Since web growth, several major transforms have evolved, from the most rudimentary concept until a new model of interaction between humans and machines. Simple interactivity denotes that users can enter data to the application on a web page, then click on button, and then appears a new web page with the results of the computations. This application has been known as web application with most are built with the utility of web frameworks which is a package of programming tasks that offering services through the Internet. Therefore, this paper gives short overview the importance of Flask web frameworks to assist the lack of computational skill of statistician over web application in the simplest possible way and how web framework is used to create a web page with application form, run the application to compute statistical calculation which has been deployed in local server, and produce a web page with the solutions


2019 ◽  
Vol 1 ◽  
pp. 1-2
Author(s):  
Hisatoshi Ai ◽  
Hideki Kaji

<p><strong>Abstract.</strong> A smartphone can be a useful device to deliver tourism information to users. Many earlier studies have discussed a method to determine whether the user is away from the area of their daily life, which would imply that the user is a potential tourist, or to select appropriate contents to be delivered to the user based on the user’s preference and circumstances. However, few studies actually attempt to find the right timing for these tourism recommendations. The ultimate goal for this study is to develop a method to extract tourism strolling behaviour through real-time analysis of GPS log data collected from smartphones. We assume that the user will be inclined to visit a recommended spot if the information about the spot is received while strolling. This method will be useful to develop tourism spot recommendation applications or to equip current maps or navigation systems with the recommendation system.</p><p>We have developed a web application (Ai and Kaji, 2017; 2019) that watches location information collected from a smartphone GPS and analyses walking speed to provide a notification about nearby tourism spots only if the user is considered to be inclined to visit this spot. Figure 1 shows the interface of the web application. In an initial step, the user is asked to input a unique ID for data collection and to choose a target region. The web application starts to collect location information and analyse walking speed after the “Start logging” button is tapped. The data is collected once per second and is saved on the local storage of the browser. If the user’s walking speed shows a certain pattern, the web application determines that the user is now strolling and shows tourism information on a screen. The user will evaluate the timing of the notification by tapping either a “Good” button or a “Bad” button. For this research, we added a “Request” button to express an interest in receiving a tourism recommendation when the web application does not show anything and neither the “Good” nor the “Bad” button is activated. These evaluations are also saved on local storage. If the user taps the “Send to server” button, data on the local storage will be sent to our server. By tapping the “End logging” button, the web application stops monitoring location information.</p><p>A proof-of-concept experiment is conducted in the field to collect training data, namely the evaluation taps, to improve the extracting algorithm of tourism strolling behaviour. We picked two target areas, Kawagoe and Yokohama; both cities are located in the Tokyo metropolitan area and have several tourism spots downtown. Participants are asked to walk from a railway station to a designated meeting place for two hours. During the walk, they were also requested to go through a shopping mall from the station and visit well-known tourism destination zones located between the shopping mall and the meeting place. Table 1 shows the date and participants’ ID. The ID starts with a single letter, K or Y, meaning the participant only joined the experiment in Kawagoe or Yokohama respectively. The ID may include two letters, which means that the participant joined the experiment in both areas, and the order in the letters corresponds to that of participation, e.g. KY means first in Kawagoe and then in Yokohama.</p><p>In this experiment, we collected two sets of training data. One comprises evaluation taps from participants, while the other contains hand-written marks on a paper map that show where participants thought they were strolling. Evaluation taps can be input in real time and on-site, however, “Good” or “Bad” evaluations can only be obtained while the web application identifies the participant as strolling. Although a participant can also tap the “Request” button, there is a limitation in collecting training data during the entire span of the experiment. On the other hand, marks on a paper map can cover the entire span of the experiment as it relies on a participant’s memory. However, there are potential limitations on the accuracy front. 1) Do participants perfectly remember where they were strolling for a whole two-hour walk? 2) Can participants correctly match the location they recalled strolling at to a location on the map? These two limitations can be overcome by using smartphone devices, since we can collect training data in real time and on-site. However, the use of a smartphone still introduces a limitation in data collection intervals as mentioned before.</p><p>In this presentation, we will discuss potential differences between the two training data sets – namely evaluation taps on a smartphone and marks on a paper map.</p><p>Table 2 shows the summary for training data. Rows marked G, B, and R show how many taps are made on “Good,” “Bad,” and “Request” buttons respectively. “Match” rows to the right of G, B, and R show how many taps do not conflict with marks on a paper map, e.g. number of “Good,” or “Request” taps within the marks, and number of “Bad” outside the marks. The row labelled “Rate” shows the overall rate of taps that matched marks on a paper map, e.g. total match counts divided by total number of taps. Data is missing on K05 following an error transferring data to our server. Only few participants achieved a high rate even when they made many taps, e.g. Y07 and KY19. We also found that for some participants, such as KY03 and KY10, the rate varies in the two areas even when they originated from the same person. This suggests that the evaluations are vague and that the methodology used to efficiently collect reliable training data is key as we try to improve the timing of recommendations.</p>


Author(s):  
Riska Riska ◽  
Hendri Alamsyah

The application of a security system on the web needs to be done considering that the web itself can be accessed through a public network. In this study, a Web Application Firewall (WAF)-based security system will be implemented using modsecurity, in which the purpose of implementing this web security system is to understand the concept of a security system on the web and pay attention to the results before the application of the firewall and after the application of the firewall on the web. This research uses experimental research methods, in this study the implementation of a web application firewall (WAF) using modsecurity as a web security system is carried out, then an analysis is carried out to get the right recommendations for a firewall as a web security system. The results of this study indicate that a firewall using the modSecurity module and rule based on the Web Application Firewall (WAF) on a web security system can block SQL Injection, Cross Site Scripting (XSS), and Command Execution by displaying an error message to the user who performs the command.


2022 ◽  
pp. 44-50
Author(s):  
N. A. Daikhes ◽  
T. Yu. Vladimirova ◽  
S. V. Bulgakova ◽  
A. B. Martynova

Introduction. The article discusses methods of screening for hearing impairments in patients of the older age group in the frame-work of primary health care.Aim of the study. Conduct a comparative analysis of the effectiveness of different hearing assessment protocols in primary health care.Materials and methods. Сlinical and demographic data were collected in 585 elderly and senile patients (mean age 76.43 ± 9.83), tonal threshold audiometry was performed in the frequency range from 250 Hz to 12000 Hz, hearing was studied using the web application “Automated primary hearing assessment” (patent No. 2019664671) and analyzed the self-assessment of hearing with the HHIE questionnaire.Results. Most of the patients were elderly people (57.44%) with a high percentage of concomitant diseases (up to 89.23%). When interviewing a geriatrician about a complaint of hearing loss, a sensitivity of 91.5% and a specificity of 82.2% for detecting mild hearing loss, a sensitivity of 95.5% and a specificity of 71.8% for screening for moderate to severe hearing loss were obtained. When assessing the total score of the HHIE questionnaire (>17 points) and moderate hearing loss, the sensitivity was 84.7% and the specificity was 88.7%. The sensitivity index of the web application «Automated primary hearing assessment» for detecting moderate hearing impairment was 90.6% for the left ear and 88.5% for the right ear, and specificity – 88.5% for the left ear and 97.5% for the right ear.Discussion. Raising awareness of hearing problems through the introduction of feasible methods of assessing hearing function should lead to an increase in the number of older adults receiving adequate hearing rehabilitation.Conclusions. The authors conclude that it is important to take preliminary account of data on the sensitivity and specificity of assessment protocols for detecting hearing impairments of varying severity at the stage of examination of an older patient by a geriatrician and an otorhinolaryngologist.


Sensi Journal ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 236-246
Author(s):  
Ilamsyah Ilamsyah ◽  
Yulianto Yulianto ◽  
Tri Vita Febriani

The right and appropriate system of receiving and transferring goods is needed by the company. In the process of receiving and transferring goods from the central warehouse to the branch warehouse at PDAM Tirta Kerta Raharja, Tangerang Regency, which is currently done manually is still ineffective and inaccurate because the Head of Subdivision uses receipt documents, namely PPBP and mutation of goods, namely MPPW in the form of paper as a submission media. The Head of Subdivision enters the data of receipt and mutation of goods manually and requires a relatively long time because at the time of demand for the transfer of goods the Head of Subdivision must check the inventory of goods in the central warehouse first. Therefore, it is necessary to hold a design of information systems for the receipt and transfer of goods from the central warehouse to a web-based branch warehouse that is already database so that it is more effective, efficient and accurate. With the web-based system of receiving and transferring goods that are already datatabed, it can facilitate the Head of Subdivision in inputing data on the receipt and transfer of goods and control of stock inventory so that the Sub Head of Subdivision can do it periodically to make it more effective, efficient and accurate. The method of data collection is done by observing, interviewing and studying literature from various previous studies, while the system analysis method uses the Waterfall method which aims to solve a problem and uses design methods with visual modeling that is object oriented with UML while programming using PHP and MySQL as a database.


Sign in / Sign up

Export Citation Format

Share Document