ITFG

Author(s):  
Georg Peters ◽  
Tobias Lang ◽  
Mike Lie

In this chapter we present results of a project in the field of groupware systems. Munich University of Applied Sciences has set up an initiative called IT-Forum to coordinate IT activities across its 14 different departments. As part of this initiative a groupware system was developed on the basis of the Web application server ZOPE and the database mySQL. The objective of this project was to use the groupware systems operatively as communication platform within the IT-Forum and in project-orientated student courses. Furthermore the development and use of the application has been accompanied by some research work in the field of groupware systems. The main focus of this chapter is to describe this groupware system and report some experience of the use of it.

Geosciences ◽  
2018 ◽  
Vol 8 (12) ◽  
pp. 482 ◽  
Author(s):  
Christopher Massolle ◽  
Lena Lankenau ◽  
Bärbel Koppe

In operational flood defense, it is common practice to use sandbag systems. However, their installation is time-consuming as well as material- and labor-intensive. Sandbag replacement systems (SBRSs) can be installed in significantly shorter time and with less effort. However, owing to the lack of confidence in their functionality, they are only used to a limited extent. Testing and certifying such innovative systems according to defined criteria is supportive in promoting their use in flood defense. In order to test SBRSs and as a first step toward systematic tests, the Institute for Hydraulic and Coastal Engineering of the Bremen University of Applied Sciences, Germany (IWA) has set up a test facility in which defined test series can be carried out with different SBRSs on an underlying surface of turf. The focus of the test series is on installation time, possible water head, system stability, and seepage rates when in use. A conventional sandbag dam was used as reference in order to compare the test results with the different SBRSs. Test series show that damming with SBRSs has a clear advantage over the use of sandbags in terms of the time it takes to put them in place and comparable values of seepage rates and water heads. In order to professionally promote the spread of SBRSs in operational flood protection, it is recommended to introduce the certification of SBRSs, since they are technical systems whose functional capability must be proven before their use in an emergency. Together with existing international certification schemes, the test series that were carried out deliver a basis for developing a specific testing scheme for SBRSs.


Author(s):  
Pankaj Kamthan

The Internet, particularly the Web, has opened new vistas for businesses. The ability that anyone, using (virtually) any device could be reached anytime and anywhere presents a tremendous commercial prospective. In retrospect, the fact that almost anyone can set up a Web Application claiming to offer products and services raises the question of credibility from a consumers’ viewpoint. If not addressed, there is a potential for lost consumer confidence, thus significantly reducing the advantages and opportunities the Web as a medium offers. Establishing credibility is essential for an organization’s reputation (Gibson, 2002) and for building consumers’ trust (Kamthan, 1999). The rest of the article is organized as follows. We first provide the motivational background necessary for later discussion. This is followed by the introduction of a framework within which different types of credibility in the context of Web Applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Author(s):  
Dirk Baldwin ◽  
Suresh Chalasani

Many businesses obtain feedback by surveying customers and business partners. Increasingly, these surveys are conducted via the Web. This chapter reviews briefly literature regarding Web-based surveys and describes a software architecture for a Web-based survey system. The architecture for the survey system is based on three-tiers comprised of a Web server, Web application server, and database server. The Web application server hosts the application modules that display and process the surveys. The application software consists of packages for establishing connections to the database and for reading static and dynamic data from the database. The processed surveys are written to the database with the survey responses. This system allows for anonymous survey responses and maintains user confidentiality. At the University of Wisconsin-Parkside, we have implemented this Web-based survey system, and used it to conduct three different surveys. This survey system is easily extensible to new surveys, and is used for instructional purposes to teach server-side programming. In this chapter, we discuss the key ideas behind the design and implementation of the extensible survey system, and provide results on its application.


2006 ◽  
Vol 15 (05) ◽  
pp. 849-854 ◽  
Author(s):  
JUAN JOSÉ GARCÍA ADEVA ◽  
JUAN MANUEL PIKATZA ATXA

Security in web-based systems that handle confidential information can be considered a particularly sensitive subject that requires assuming some responsibilities about security. Achieving a secure web application involves tackling several issues such encryption of traffic and certain database information, strictly restricted access control, etc. In this work we focus on detecting misuse of the web application in order to gain unauthorised access. We introduce an Intrusion Detection component that by applying Text Categorisation is capable of learning the characteristics of both normal and malicious user behaviour from the regular, high-level log entries generated by web application through its application server. Therefore, the detection of misuse in the web application is achieved without the need of explicit programming or modification of the existing web application. We applied our Intrusion Detection component to a real web-based telemedicine system in order to offer some evaluation measurements. This articles offers an overview of the model, our experiences, and observations.


One of the maximum critical levels of serving your visitors is to take their orders correctly. It is taken into consideration to be the start line of the patron’ s evaluation of your services. It is likewise the maximum fundamental step within the system of serving the right food to the proper patron. It is incredible how era can revolutionize the best yet crucial practices of hoteliers, and the Kitchen Order Token / Ticket app is a tremendous example of the same. In the traditional method, the order is taken by the waiter manually by using a pen and paper that is referred to as the Kitchen Order Token / Ticket. Usually had to be printed as duplicates(or triplicates in a few cases), traditional Kitchen Order Token / Ticket techniques serve to create miscommunication, consume greater time, and are extra vulnerable to manual mistakes. In this paper mainly concentrate on the Android application is used in the android platform Tablets for taking orders from the customer near their tables only. The app is used by the waiters to take down the orders. The particular device will be given to the waiters in the organization with their username and password logged in respectively. This app will act as the user end application and the server will be the web application (server) that is managed by the Administrator.


2007 ◽  
Vol 15 (2) ◽  
Author(s):  
Gijs De Bakker ◽  
Peter Sloep ◽  
Wim Jochems

Instant messaging (IM) is the term used to describe the technology through which ‘users can set up a list of partners who will be able to receive notes that pop up on their screens the moment one of them writes and hits the send button’. While early use could be described as mainly for fun, IM today is a serious communication medium. Remarkably, it seems that educational institutions have been doing very little with it, while several studies indicate that it could indeed be a valuable tool in education. As a first step towards a better understanding of the educational use of IM, we want to gain insights in how students currently use IM and what opportunities they themselves see for the medium. To that end we conducted a survey among students of the Fontys University of Applied Sciences in The Netherlands. A large majority of the participating students indicated using IM for their studies. Also, when asked about their demands for a possible educational implementation, the majority were positiveDOI: 10.1080/09687760701470973


Author(s):  
Javier Parra-Fuente ◽  
Salvador Sánchez-Alonso ◽  
Marta Fernández-Alarcón

Reflection is a powerful technology that allows us to produce auto-adaptable software. RAWS is a reflective, multilevel Web service architecture aimed at allowing a Web service to transform its structure and behaviour without the need of human intervention to change the source code, compile it or deploy it again on the application server. Using RAWS, the Web service can change itself automatically. Current application servers have a very important limitation: The deployment platform (J2EE, .NET, etc.). Using current servers, a Web service or application can only be deployed on a server which runs with the same technology. To solve this drawback, we have developed universal Web application server (UWAS), platform capable of deploying Web services or applications written in any object-oriented language or for any platform. This is possible thanks to the fact that UWAS internally uses a language-independent object-oriented Web server markup language (OOWSML) representation based on XML. Altogether, RAWS & UWAS make it possible to deploy a Web service on the server regardless of its implementation technology, providing the flexibility to automatically adapt or transform the Web service structure and/or behaviour.


Author(s):  
Tarun Garg Ms. Meenu Garg and Dr. Bhoomi Gupta

The online food ordering system provides conveniencefor the customers. It overcomes the disadvantages of the traditional queuing system. This system increases the takeaway of foods than visitors. Therefore, this system enhances the speed and standardization of taking the order from the customer. It provides a better communication platform. the user’s details are noted electronically. The online food ordering system set up menu online and the customers easily places the order with a simple mouse click. also with a food menu online you can easily track the orders, maintain customer's database and improve your food delivery service. This system allows the user to select the desired food items from the displayed menu. The user orders the food items. The payment can be made online or pay-ondelivery system. The user’s details are maintainedconfidential because it maintains a separate account for each user. An id and password is provided for each user. Therefore it provides a more secured ordering.


2018 ◽  
Vol 8 (3) ◽  
pp. 28 ◽  
Author(s):  
Patrick Holzmann ◽  
Erich Hartlieb ◽  
Michael Roth

Entrepreneurship education is quite a novel phenomenon that is gaining increasing importance in academia and practice alike. Entrepreneurship education aims to provide the necessary skills and knowledge that enable students to successfully found a new venture. Hitherto entrepreneurship education has not received much attention in engineering pedagogy. This finding is quite surprising because through proper entrepreneurship education engineers can be enabled to exploit entrepreneurial opportunities that result from technological innovation. Thus, we argue that entrepreneurship education should be a cornerstone in engineering education. The paper introduces the ‘Entrepreneurial Campus Villach’ located at the Carinthia University of Applied Sciences (CUAS). The campus is among the first in Austria that provide an extensive and scientifically sound entrepreneurship program. The campus focusses on the four core areas 1) research, 2) teaching, 3) coaching and support, and 4) infrastructure. The paper provides insights for other university and institutions that aim to set up similar concepts.


Sign in / Sign up

Export Citation Format

Share Document