scholarly journals SELECTING THE STRATEGY FOR DESIGNING THE SOFTWARE ARCHITECTURE

2019 ◽  
Vol 6 (125) ◽  
pp. 121-126
Author(s):  
Liliia Bozhukha ◽  
Oksana Beloborodko

The article presents the results of the analysis of the existing web application architecture design methodologies and the corresponding software development tools and resources.The shortcomings of the existing approaches to application development were identified and conducted the analysis can be used to design the web systems architecture. The practical value of the work is the development of algorithms for creating, deploying and scaling applications using different software. A test system based on several classic approaches has been developed.

Author(s):  
Liliia Bozhukha ◽  
Oksana Biloborodko

The article presents the results of the analysis of the existing web application architecture design methodologies and the corresponding software development tools and resources.The shortcomings of the existing approaches to application development were identified and conducted the analysis can be used to design the web systems architecture. The practical value of the work is the development of algorithms for creating, deploying and scaling applications using different software. A test system based on several classic approaches has been developed.


Author(s):  
Hsiang-Jui Kung ◽  
Hui-Lien Tung

Many companies use the Web to communicate with the external world as well as within their organizations and to carry out their business processes more effectively. A survey on Web application development shows that 84% of development projects do not meet business needs, 56% do not have the required functionality, 79% are behind schedule, and 63% are over budget (Standish Group, 2002). García-Cabrera, Rodríguez-Fórtiz, and Parets-Llorca (2002) report that the development of a Web application is never finished, and the nature of Web applications is evolutionary. The architecture of Web applications has three layers: conceptual, presentation, and navigation. It also has two perspectives: designer and viewer. Software evolution is “the dynamic behavior of programming systems as they are maintained and enhanced over their life times” (Belady & Lehman, 1976). Web application evolution is of increasing importance as more Web systems are in production.


2020 ◽  
Author(s):  
Darshak Mota ◽  
Neel Zadafiya ◽  
Jinan Fiaidhi

Java Spring is an application development framework for enterprise Java. It is an open source platform which is used to develop robust Java application easily. Spring can also be performed using MVC structure. The MVC architecture is based on Model View and Controller techniques, where the project structure or code is divided into three parts or sections which helps to categorize the code files and other files in an organized form. Model, View and Controller code are interrelated and often passes and fetches information from each other without having to put all code in a single file which can make testing the program easy. Testing the application while and after development is an integral part of the Software Development Life Cycle (SDLC). Different techniques have been used to test the web application which is developed using Java Spring MVC architecture. And compares the results among all the three different techniques used to test the web application.


2021 ◽  
Author(s):  
Sumit Bala ◽  
Ambarnil Ghosh ◽  
Subhra Pradhan

AbstractHigh rate of mutation and structural flexibilities in viral proteins quickly make them resistant to the host immune system and existing antiviral strategies. For most of the pathogenic viruses, the key survival strategies lie in their ability to evolve rapidly through mutations that affects the protein structure and function. Along with the experimental research related to antiviral development, computational data mining also plays an important role in deciphering the molecular and genomic signatures of the viral adaptability. Uncovering conserved regions in viral proteins with diverse chemical and biological properties is an important area of research for developing antiviral therapeutics, though assigning those regions is not a trivial work. Advancement in protein structural information databases and repositories, made by experimental research accelerated the in-silico mining of the data to generate more integrative information. Despite of the huge effort on correlating the protein structural information with its sequence, it is still a challenge to defeat the high mutability and adaptability of the viral genomics structure. In this current study, the authors have developed a user-friendly web application interface that will allow users to study and visualize protein segment variabilities in viral proteins and may help to find antiviral strategies. The present work of web application development allows thorough mining of the surface properties and variabilities of viral proteins which in combination with immunogenicity and evolutionary properties make the visualization robust. In combination with previous research on 20-Dimensional Euclidian Geometry based sequence variability characterization algorithm, four other parameters has been considered for this platform: [1] predicted solvent accessibility information, [2] B-Cell epitopic potential, [3] T-Cell epitopic potential and [4] coevolving region of the viral protein. Uniqueness of this study lies in the fact that a protein sequence stretch is being characterized rather than single residue-based information, which helps to compare properties of protein segments with variability. In current work, as an example, beside presenting the web application platform, five proteins of SARS-CoV2 was presented with keeping focus on protein-S. Current web-application database contains 29 proteins from 7 viruses including a GitHub repository of the raw data used in this study. The web application is up and running in the following address: http://www.protsegvar.com.


Author(s):  
Ala M. Abu-Samaha ◽  
Lana S. Al-Salem

The requirements phase of the system/application development process typically involves the activities of requirements elicitation, analysis, validation, and specification. The main goal of such a process is “to develop a requirements speci- fication document which defines the system to be procured and which can act as a basis for the system design” (Sawyer, Sommerville, & Viller, 1996). Hence the underpinning assumption of the requirements engineering (RE) process is to transform the operational needs of an organisation into complete, consistent, and unambiguous system/application specifications through an iterative process of definition and validation (Pohl ,1994). The Web engineering (WE) literature provides a limited number of methods and techniques that can be used to manage the RE process in a Web development context [e3-value framework (Gordijn, Akkermans, & van Vliet, 2000), SOARE approach (Bleistein, Aurum, Cox, & Ray, 2004), e-prototyping (Bleek, Jeenicke, & Klischewski, 2002), AWARE (Bolchini & Paolini, 2004), and SSM/ICDT (Meldrum & Rose, 2004)]. Despite the availability of such a limited number of Web requirements engineering (WRE) methods, many researchers criticised such methods for their failure to address the necessity to align the Web application’ requirements to the organisation’s business strategy. Hence, the recommendation of many researchers (Al-Salem & Abu- Samaha, 2005a; Bleistein 2005; Bleistein, Cox, & Verner, 2004; Vidgen, Avison, Wood, & Wood-Harper, 2002) is to utilise a general WRE framework for the development of Web applications that can align the application’s requirements to the organisation’s business needs and its future vision. The objective of such a WRE framework is to incorporate the elicitation/analysis of business strategy as part of the application’s RE process. This chapter presents a WRE method that extends Sommerville and Kotonya’s viewpoint-oriented requirements definition (VORD) and Kaplan and Norton’s balanced scorecard (BSC) to elicit the Web application’ requirements and to plan/analyze the business strategy, respectively. In addition, eWARE (extended Web application requirements engineering) deploys the concept of “requirements alignment” to attain business objectives during the requirements discovery, elicitation, and formalisation process to identify the services of the Web application that will achieve the business objectives in order to improve the organisation’s profitability and competitiveness. The chapter is organised into a number of sections. The second section of this chapter provides a background to Web applications in terms of defi- nition and differentiating characteristics. The third section provides a discussion of eWARE method in terms of phases and activities. This section is divided into two subsections to cover the activities of the two prominent phases of the eWARE process in more detail. The fourth and fifth sections provide a discussion of possible future trends in WRE and a number of concluding remarks.


2016 ◽  
pp. 709-732
Author(s):  
Rostyslav Zabolotnyi ◽  
Philipp Leitner ◽  
Schahram Dustdar

Cloud computing is gaining increasing attention from the industry and research; however, there is a lack of advanced Cloud software development tools. While Platform as a Service (PaaS) brings convenient software development platform for application development, it often comes with limitations in terms of application architecture functionality and requires provider lock-in. The Infrastructure as a Service (IaaS) model may sound like a solution to these problems by enabling application development freedom; however, it necessitates operation at the lower level of virtual machines and snapshots. In this chapter, the authors present CloudScale: a low-overhead middleware framework that migrates Java applications seamlessly to the Cloud with minimal changes in the application code. They focus on the main ideas behind CloudScale and its influence on solving Cloud software development and deployment problems with minimal overhead and Cloud-awareness required from developers.


Author(s):  
Sun Zhiyong ◽  
Liu Ye ◽  
Chen JiaHui

With the continuous development of science and technology and progress of society, the rise of Internet plus era, the cinema began to build their own website in order to expand the film to improve the efficiency, to provide a common discussion for film enthusiasts. This paper uses ThinkPHP framework to complete the needs of the site, it is to simplify the enterprise application development and agile WEB application development and the existence of a fast, compatible and simple lightweight domestic PHP development framework. The analysis in detail on the film critic website in addition, the ThinkPHP framework were analysis explain, on the basis of that tool use is Webstorm development tools with Wamp integrated development tools and environment related structures, database using mysql, ThinkPHP film critic website based on is not only convenient for the users to understand the new release of the news and information, more convenient is that one can allow managers to facilitate the management of a good movie dynamic information and view the user to give the evaluation and so on.


Author(s):  
Rizwan Ur Rahman ◽  
Deepak Singh Tomar

Research into web application security is still in its initial phase. In spite of enhancements in web application development, large numbers of security issues remain unresolved. Login attacks are the most malevolent threats to the web application. Authentication is the method of confirming the stated identity of a user. Conventional authentication systems suffer from a weakness that can compromise the defense of the system. An example of such vulnerabilities is login attack. An attacker may exploit a pre-saved password or an authentication credential to log into web applications. An added problem with current authentication systems is that the authentication process is done only at the start of a session. Once the user is authenticated in the web application, the user's identity is assumed to remain the same during the lifetime of the session. This chapter examines the level login attacks that could be a threat to websites. The chapter provides a review of vulnerabilities, threats of login attacks associated with websites, and effective measures to counter them.


Author(s):  
Anna Nikolajeva

The aim of the research was to develop a marketing strategy of the Zorge marketing tool and describe its usage in e-commerce. Zorge web application will be an automatic marketing tool that will use cloud computing technology. The main benefits of the tool will be its multiuse and ability to display adverts to users who use ad blockers and create an interaction of all ads, allowing users to show relevant advertising to their website visitors. Zorge web application will be used for advert construction - pop-ups, push notifications and inner website banners, that can be placed on a clients website. It can be done by pasting short JavaScript code in their website HTML file after users will be able to manage their adverts inside their Zorge web application. The author examined several topics to develop the web application architecture - digital marketing technology current developments, competitor home pages, competitor web applications and an economic embodiment were explored. Within the research was developed a marketing strategy for the Zorge web application.


Sign in / Sign up

Export Citation Format

Share Document