Adaptability and Adaptivity in The Generation of Web Applications

Author(s):  
Raoudha Ben Djemaa ◽  
Ikram Amous ◽  
Abdelmajid Ben Hamadou

This article proposes a generator for adaptive Web applications called GIWA. GIWA‘s objective is to facilitate the automatic execution of the design and the generation of Adaptable Web Applications (AWA). Characteristically, the effort in this work has to be pursued with special attention to both issues applied to AWA: adaptability and adaptivity. The architecture of GIWA is based on three levels: the semantic level, the conceptual level and the generation one. Using GIWA, designers specifies, at the semantic level the features of Web application. The conceptual level focuses on the creation of diagrams in WA-UML language; the extended UML by our new concepts and new design elements for adaptation. At the generation level, GIWA acquires all information about users’ preferences and their access condition. Consequently, the generated pages are adaptable to all these information. An evaluation and a validation of GIWA are given in this article to prove our adaptation.

2011 ◽  
pp. 681-705
Author(s):  
Raoudha Ben Djemaa ◽  
Ikram Amous ◽  
Abdelmajid Ben Hamadou

This article proposes a generator for adaptive Web applications called GIWA. GIWA‘s objective is to facilitate the automatic execution of the design and the generation of Adaptable Web Applications (AWA). Characteristically, the effort in this work has to be pursued with special attention to both issues applied to AWA: adaptability and adaptivity. The architecture of GIWA is based on three levels: the semantic level, the conceptual level and the generation one. Using GIWA, designers specifies, at the semantic level the features of Web application. The conceptual level focuses on the creation of diagrams in WA-UML language; the extended UML by our new concepts and new design elements for adaptation. At the generation level, GIWA acquires all information about users’ preferences and their access condition. Consequently, the generated pages are adaptable to all these information. An evaluation and a validation of GIWA are given in this article to prove our adaptation.


2021 ◽  
Author(s):  
◽  
Thomas Creagh

<p>Stroke is a debilitating neurological condition caused by a dysfunction in the flow of blood to the brain (Stroke.org, 2016). The onset of stroke can result in complex disability that may require long term rehabilitation (Duncan, 1994). The deterioration of psychosocial well-being is one of the many issues that may result from the formation of disability in an individual (Aström, 1992). Dunn (2000) defines psychosocial as “how people think and feel about, influence, and relate to actual, imagined, or assumed others”. It is about how our concept of self in influences our relationships with others and vice versa.  The purpose of this research is to investigate what in influence digitally connected communities can have on psychosocial recovery from stroke. This will be achieved through the creation of a web application. This web application will expand on the idea of DIY and non-intentional design (Brandes, 2008) and apply it in a rehabilitative manner. Non-intentional design is defined by Brandes (2008, p) as, “the everyday, unprofessional redesign of professionally designed objects. NID results when an object is used in a manner different from the prescribed (and therefore restricted) functional intention or when the prescribed application is not honoured in the new uses”. The intention being that influencing assistive technology use in a positive way can help a person accept disability into their concept of self and help that person to regain confidence to engage with others socially.  This research initially canvasses literature reviews (Hanington et al, 2012) to analyze the psychosocial, elderly engagement with web applications, and to develop heuristics to guide the design of the web application. Subsequently, I have used precedent reviews (Hanington et al, 2012) to analyze DIY assistive technology documentation in an online environment. Finally, I utilised a Research through design (Frayling, 1993) approach to inform the creation of this DIY assistive technology and the web application. User testing of the web application was then performed. The testing took the participants through the process of using the web application via a set list of tasks and also asked them to recreate one of the three available DIY assistive technology examples.</p>


Author(s):  
Raoudha Ben Djemaa ◽  
Ikram Amous ◽  
Abdelmajid Ben Hamadou

The complexity of adaptive Web applications (AWA) is increasing almost every day. Besides impacting the implementation phase, this complexity must also be suitably managed while modeling the application. To this end, the paper proposes an approach for AWA called GIWA based on WA-UML (Web Adaptive Unified Modeling Language). This extension defines a set of stereotypes and constraints, which make possible the modeling of AWA. GIWA’s target is to facilitate the automatic execution of the design and the automatic generation of adaptable web interface. The GIWA methodology is based on different step: requirement analysis, conceptual design, adaptation design and generation. Using GIWA, designers can specify, at a requirement analysis, the features of web application to be generated. These features are represented, at the conceptual level using WA-UML. At the adaptation level, GIWA acquires all information about users’ preferences and their access condition to be used at the generation level. The last level is based on java swing interface to instantiate models which are translated in XML files. GIWA uses then XSL files (user preferences) and RDF files (devices’ capability) to generate the HTML page corresponding to the user.


2021 ◽  
Author(s):  
◽  
Thomas Creagh

<p>Stroke is a debilitating neurological condition caused by a dysfunction in the flow of blood to the brain (Stroke.org, 2016). The onset of stroke can result in complex disability that may require long term rehabilitation (Duncan, 1994). The deterioration of psychosocial well-being is one of the many issues that may result from the formation of disability in an individual (Aström, 1992). Dunn (2000) defines psychosocial as “how people think and feel about, influence, and relate to actual, imagined, or assumed others”. It is about how our concept of self in influences our relationships with others and vice versa.  The purpose of this research is to investigate what in influence digitally connected communities can have on psychosocial recovery from stroke. This will be achieved through the creation of a web application. This web application will expand on the idea of DIY and non-intentional design (Brandes, 2008) and apply it in a rehabilitative manner. Non-intentional design is defined by Brandes (2008, p) as, “the everyday, unprofessional redesign of professionally designed objects. NID results when an object is used in a manner different from the prescribed (and therefore restricted) functional intention or when the prescribed application is not honoured in the new uses”. The intention being that influencing assistive technology use in a positive way can help a person accept disability into their concept of self and help that person to regain confidence to engage with others socially.  This research initially canvasses literature reviews (Hanington et al, 2012) to analyze the psychosocial, elderly engagement with web applications, and to develop heuristics to guide the design of the web application. Subsequently, I have used precedent reviews (Hanington et al, 2012) to analyze DIY assistive technology documentation in an online environment. Finally, I utilised a Research through design (Frayling, 1993) approach to inform the creation of this DIY assistive technology and the web application. User testing of the web application was then performed. The testing took the participants through the process of using the web application via a set list of tasks and also asked them to recreate one of the three available DIY assistive technology examples.</p>


2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


2021 ◽  
Vol 13 (2) ◽  
pp. 50
Author(s):  
Hamed Z. Jahromi ◽  
Declan Delaney ◽  
Andrew Hines

Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the Above-the-fold (ATF) time. SpeedIndex (SI) has been widely used to estimate perceived web page loading speed of ATF content and a proxy metric for Web QoE estimation. Web application developers have been actively introducing innovative interactive features, such as animated and multimedia content, aiming to capture the users’ attention and improve the functionality and utility of the web applications. However, the literature shows that, for the websites with animated content, the estimated ATF time using the state-of-the-art metrics may not accurately match completed ATF time as perceived by users. This study introduces a new metric, Plausibly Complete Time (PCT), that estimates ATF time for a user’s perception of websites with and without animations. PCT can be integrated with SI and web QoE models. The accuracy of the proposed metric is evaluated based on two publicly available datasets. The proposed metric holds a high positive Spearman’s correlation (rs=0.89) with the Perceived ATF reported by the users for websites with and without animated content. This study demonstrates that using PCT as a KPI in QoE estimation models can improve the robustness of QoE estimation in comparison to using the state-of-the-art ATF time metric. Furthermore, experimental result showed that the estimation of SI using PCT improves the robustness of SI for websites with animated content. The PCT estimation allows web application designers to identify where poor design has significantly increased ATF time and refactor their implementation before it impacts end-user experience.


Author(s):  
Theresia Devi Indriasari ◽  
Kusworo Anindito ◽  
Eddy Julianto ◽  
Bertha Laroha Paraya Pangaribuan

<span>Indonesia is a country located on top of some tectonic plates that bring potential natural disasters. Disaster management system is considered essential in controlling the situation in the site both before and after the disaster takes place. In disaster situation, the government and society are involved in a volunteer team in order to help minimize victims and support survivors. However, the volunteering activities are often hindered since there are problems in the disaster site. One of the problems is late responses due to poor coordination among volunteers that drives the delay in disaster relief. Therefore, it is necessary to have an application that maps the positions of volunteers in a disaster site, so that the disaster management coordinator can disseminate volunteers to disaster areas based on needs. The purpose of the study is to propose an application called ‘MyMapVolunteers’ that effectively and efficiently detects the position of the volunteers in order to improve disaster management service. In this case, real time and location based service technology will able to detect the position of each volunteer. ‘MyMapVolunteers’ is composed of two platforms, which are mobile and web applications. Mobile platform is an application that uses GPS function provided by the smartphone to find the volunteers’ location coordinates and then send the data of the location automatically and manually. The web platform is used to receive volunteers’ location data and to present them in google map, therefore disaster management coordinator can monitor the positions of and search for volunteers faster.</span>


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


Sign in / Sign up

Export Citation Format

Share Document