scholarly journals Aplicación Web para Niños con Problemas de Dicción

Author(s):  
María De Jesús Rodríguez-Vargas ◽  
Guadalupe Villanueva-García ◽  
Arnulfo Gómez-García ◽  
Marisol Arroyo-Almaguer

The web application for children with diction problems, seeks to contribute to the reduction of a pronunciation problem known as dyslalia. The application can be used on any device connected to the internet, its main purpose is through exercises and dynamics integrated in it, improve the diction that children present in the range of 4 to 6 years of age. The methodology used is the development of iterations that allows reducing the risk that arises between the needs of the user and the final product due to misunderstandings during the requirements collection stage; having the advantage of carrying out the development in small cycles, allowing to better manage risks and deliveries. The web application for children with diction problems, in its first version, has had good results, highlighting its functionality and application, which has shown great acceptance by children, educators, experts and even parents, but about all because in the period of use of a month have begun to have improvements in the pronunciation of users (boys and girls).

In the present era, the internet and new technologies are changing the information behavior of news reader .Instead of reading a copy of the local newspaper or watching the scheduledevening news, people increasingly turn to the internet for daily news updates. A Multi-Lingual news feed application is aimed at developing a web based application named multilingual news feed app. This Application deals with the user who wants to read news from the web application. User can select different countries in which a user is interested, the latest news will be fetched from the selected country. The news will be fetched and displayed based on the country selected in its own national language & the news is categorized into 7 different categories. A user can select any category which they are looking for. When you are done selecting the country & category, then the page will automatically refresh and the news will be displayed on MultiLingual news feed application. This application also supports translation and the news can be translated into any language. This application is fully responsive and has a good-looking user interface. The users will find this application much interesting for reading the news articles.


2010 ◽  
pp. 2298-2309
Author(s):  
Justin Meza ◽  
Qin Zhu

Knowledge is the fact or knowing something from experience or via association. Knowledge organization is the systematic management and organization of knowledge (Hodge, 2000). With the advent of Web 2.0, Mashups have become a hot new thing on the Web. A mashup is a Web site or a Web application that combines content from more than one source and delivers it in an integrated way (Fichter, 2006). In this article, we will first explore the concept of mashups and look at the components of a mashup. We will provide an overview of various mashups on the Internet. We will look at literature about knowledge and the knowledge organization. Then, we will elaborate on our experiment of a mashup in an enterprise environment. We will describe how we mixed the content from two sets of sources and created a new source: a novel way of organizing and displaying HP Labs Technical Reports. The findings from our project will be included and some best practices for creating enterprise mashups will be given. The future of enterprise mashups will be discussed as well.


Author(s):  
J. Vijaya Sagar Reddy ◽  
G. Ramesh

Web applications are the most widely used software in the internet. When a web application is developed and deployed in the real environment, It is very severe if any bug found by the attacker or the customer or the owner of the web application. It is the very important to do the proper pre-analysis testing before the release. It is very costly thing if the proper testing of web application is not done at the development location and any bug found at the customer location. For web application testing the existing systems such as DART, Cute and EXE are available. These tools generate test cases by executing the web application on concrete user inputs. These tools are best suitable for testing static web sites and are not suitable for dynamic web applications. The existing systems needs user inputs for generating the test cases. It is most difficult thing for the human being to provide dynamic inputs for all the possible cases. This paper presents algorithms and implementation, and an experimental evaluation that revealed HTML Failures, Execution Failures, Includes in PHP Web applications.


Author(s):  
Pankaj Kamthan

The Internet, particularly the Web, has opened new vistas for businesses. The ability that anyone, using (virtually) any device could be reached anytime and anywhere presents a tremendous commercial prospective. In retrospect, the fact that almost anyone can set up a Web Application claiming to offer products and services raises the question of credibility from a consumers’ viewpoint. If not addressed, there is a potential for lost consumer confidence, thus significantly reducing the advantages and opportunities the Web as a medium offers. Establishing credibility is essential for an organization’s reputation (Gibson, 2002) and for building consumers’ trust (Kamthan, 1999). The rest of the article is organized as follows. We first provide the motivational background necessary for later discussion. This is followed by the introduction of a framework within which different types of credibility in the context of Web Applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


2021 ◽  
Vol 5 (5) ◽  
pp. 977-983
Author(s):  
Muhammad Johari ◽  
Arif Laksito

Today, consumers are faced with an abundance of information on the internet; accordingly, it is hard for them to reach the vital information they need. One of the reasonable solutions in modern society is implementing information filtering. Some researchers implemented a recommender system as filtering to increase customers’ experience in social media and e-commerce. This research focuses on the combination of two methods in the recommender system, that is, demographic and content-based filtering, commonly it is called hybrid filtering. In this research, item products are collected using the data crawling method from the big three e-commerce in Indonesia (Shopee, Tokopedia, and Bukalapak). This experiment has been implemented in the web application using the Flask framework to generate products’ recommended items. This research employs the IMDb weight rating formula to get the best score lists and TF-IDF with Cosine similarity to create the similarity between products to produce related items.  


Author(s):  
Jens Borgbjerg ◽  
Arne Hørlyck

Abstract Purpose In ultrasound education there is a need for interactive web-based learning resources. The purpose of this project was to develop a web-based application that enables the generation and exploration of volumetric datasets from cine loops obtained with conventional 2D ultrasound. Materials and Methods JavaScript code for ultrasound video loading and the generation of volumetric datasets was created and merged with an existing web-based imaging viewer based on JavaScript and HTML5. The Web Graphics Library was utilized to enable hardware-accelerated image rendering. Results The result is a web application that works in most major browsers without any plug-ins. It allows users to load a conventional 2D ultrasound cine loop which can subsequently be manipulated with on-the-fly multiplanar reconstructions as in a Digital Imaging and Communications in Medicine (DICOM) viewer. The application is freely accessible at (http://www.castlemountain.dk/atlas/index.php?page = mulrecon&mulreconPage = sonoviewer) where a demonstration of web-based sharing of generated cases can also be found. Conclusion The developed web-based application is unique in its ability to easily perform loading of one’s own ultrasound clips and conduct multiplanar reconstructions where interactive cases can be shared on the Internet.


Two factor authentications had two entry levels for authentication’s mechanism. This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. It can minimize the problems that occur regarding to the illegal access over the user privacy information on the Internet. The system that uses two factor authentications is capable to give the priority and safety in aspect of user’s privacy information from the web based applications


2016 ◽  
Vol 1 (2) ◽  
pp. 46-62
Author(s):  
Taufik Ramadan Firdaus

Currently the Internet became one of the media that can not be separated, as well as a wide variety of applications supplied her. As the development of technologies, reliance on Web applications also increased. However, web applications have a wide range of threats, one of it is a CSRF (Cross-Site Request Forgery). This study uses CSRF (Cross-Site Request Forgery) Protection. CSRF (Cross-Site Request Forgery) Protection is a treatment method that has a variety of ways, one of which uses a token in the session when the user login. Token generated at login will be used as a user id that the system of web applications to identify where the request originated.  The results of this study are expected in order to increase web application defenses against CSRF (Cross-Site Request Forgery), so that web application users will be able to feel safe in using the Internet and its various feature. Reduced level of attacks on web applications. So that visitor traffic on the web application can be increased.


Author(s):  
Priyanka Dixit

This chapter describes how security is an important aspect in today's digital world. Every day technology grows with new advancements in various areas, especially in the development of web-based applications. All most all of the web applications are on the internet, hence there is a large probability of attacks on those applications and threads. This makes security necessary while developing any web application. Lots of techniques have been developed for mitigating and defending against threats to the web based applications over the internet. This chapter overviews the important region of web application security, by sequencing the current strategies into a major picture to further the future research and advancement. Firstly, this chapter explains the major problem and obstacles that makes efforts unsuccessful for developing secure web applications. Next, this chapter distinguishes three basic security properties that a web application should possess: validation, integrity, accuracy and portray the comparing vulnerabilities that damage these properties alongside the assault vectors that contain these vulnerabilities.


Author(s):  
Ganeshkumar S ◽  
Elango Govindaraju

The end to end encryption of connections over the internet have evolved from SSL to TLS 1.3 over the years. Attacks have exposed vulnerabilities on each upgraded version of the cryptographic protocols used to secure connections over the internet. Organisations have to keep updating their web based applications to use the latest cryptographic protocol to ensure users are protected and feel comfortable using their web applications. But, the problem is that, web applications are not always standalone systems, there is usually a maze of systems that are integrated to provide services to the end user. The interactions between these systems happens within the controlled internal private network environment of the organisation. While only the front ending web application is visible to the end user. It is not often feasible to upgrade all internal systems to use the latest cryptographic protocol for internal interfaces/integration due to prohibitive cost of redevelopment and upgrades to infra and systems. Here we define an algorithm to setup internal & external firewalls to downgrade to a lower version of the cryptographic protocol (SSL) within the internal network for the integration/interfacing connections of internal systems while mandating the latest cryptographic protocol (TLS 1.x) for end user connections to the web application.


Sign in / Sign up

Export Citation Format

Share Document