The Page Flow Implements Business Logic in Web Applications

2013 ◽  
Vol 347-350 ◽  
pp. 2536-2540
Author(s):  
Hai Jun Li

This paper discusses the application of the technology of NetUI flow page in the business logic of Web applications. The page flow uses declarative programming method, and has session state and modular design, which can be nested to use and effectively separate the logical code in the Web applications, to make the application structure clear, easy to be read and modified. The paper references a business logic of the users login authentication to illustrate the implementation process of the entire page flow.

2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


2021 ◽  
Vol 13 (2) ◽  
pp. 50
Author(s):  
Hamed Z. Jahromi ◽  
Declan Delaney ◽  
Andrew Hines

Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the Above-the-fold (ATF) time. SpeedIndex (SI) has been widely used to estimate perceived web page loading speed of ATF content and a proxy metric for Web QoE estimation. Web application developers have been actively introducing innovative interactive features, such as animated and multimedia content, aiming to capture the users’ attention and improve the functionality and utility of the web applications. However, the literature shows that, for the websites with animated content, the estimated ATF time using the state-of-the-art metrics may not accurately match completed ATF time as perceived by users. This study introduces a new metric, Plausibly Complete Time (PCT), that estimates ATF time for a user’s perception of websites with and without animations. PCT can be integrated with SI and web QoE models. The accuracy of the proposed metric is evaluated based on two publicly available datasets. The proposed metric holds a high positive Spearman’s correlation (rs=0.89) with the Perceived ATF reported by the users for websites with and without animated content. This study demonstrates that using PCT as a KPI in QoE estimation models can improve the robustness of QoE estimation in comparison to using the state-of-the-art ATF time metric. Furthermore, experimental result showed that the estimation of SI using PCT improves the robustness of SI for websites with animated content. The PCT estimation allows web application designers to identify where poor design has significantly increased ATF time and refactor their implementation before it impacts end-user experience.


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


i-com ◽  
2008 ◽  
Vol 6 (3/2007) ◽  
pp. 23-29 ◽  
Author(s):  
Birgit Bomsdorf

SummaryTask modelling has entered the development process of web applications, strengthening the usage-centred view within the early steps in Web-Engineering (WE). In current approaches, however, this view is not kept up during subsequent activities to the same degree as this is the case in the field of Human-Computer-Interaction (HCI). The modelling approach presented in this contribution combines models as known from WE with models used in HCI to change this situation. Basically the WE-HCI-integration is supported by combining task and object models as known from HCI with conceptual modelling known from WE. In this paper, the main focus is on the WebTaskModel, a task model adapted to web application concerns, and its contribution towards a task-related web user interface. The main difference to existing task models is the build-time and run-time usage of a generic task lifecycle. Hereby the description of exceptions and erroneous situations during task performance (caused by, e.g., the stateless protocol or Browser interaction) is enabled and at the same time clearly separated from the flow of correct action.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 1
Author(s):  
Subhranshu Mohanty ◽  
Amar Kumar Mohapatra ◽  
Srikanta Patnaik

Web applications have become important but there are different types of security problems which could lead to tampering with details. The most common are cookies poisoning, structured query language, cross-site scripting and parameter tempering. This is the reason why most of the web companies today are verifying the type of content they receive and most importantly, from where the contents are originated. It has been thus noted from the above deduction that the major security threat has nothing to do with the Secure Socket Layer rather other layers in the web development program. In order to avoid such threats and other vulnerabilities, initial stages of the web development cycle need to be taken care of.Thus, the main focus of this research paper is to come up with a framework that would help to strengthen the security of the various stages in the web development cycle. For the same, various modules and life cycles have been used.


Author(s):  
DHANASHREE TAWARE ◽  
NAMRATA ATTKARE ◽  
DIVYA SINGH

As we know internet has become a very important factor in our day today life. It is a wide media for communication and exchange of ideas for people staying in any nook and corner of the world. We have proposed a system in which we are developing a speech interactive web application services. Our main aim is to provide these services to the special ones who are unable to make use of the current system so efficiently. In our proposed work we are mainly focusing on the WEB APPLICATIONS. Many a times the disabled people are unable to access internet, for them this system will help to download news, or even access their mails through speech. Our proposed system mainly deals with the ability to handle web applications along with the O.S, mouse and keyboard control through speech, so that they can be used by persons without the use of the hands to develop an interface between the computer and the user. In our proposal we have used SAPI .It provides commands to the main central application which is handled by the GUI. Thus we look forward to develop web application through speech interaction.


2019 ◽  
Author(s):  
Tanja Gustafsson ◽  
Annelie J Sundler ◽  
Elisabeth Lindberg ◽  
Pernilla Karlsson ◽  
Hanna Maurin Söderholm

Abstract Background A rapidly ageing population challenges the health care system in general and home care services in particular. Communication is a cornerstone of person-centred care. However, little research has been conducted on how to improve communication between health care professionals and older persons in home care contexts, despite research showing the importance of such interactions. The increasing demands on how to best and efficiently improve competence in health professionals is the reason why the ACTION intervention was conducted. This paper aims to describe the development and process evaluation of an educational intervention for nurse assistants (NAs) in home care and highlights the potential of self-directed web-based learning as well as the pitfalls of conducting complex interventions in home care. Methods A web-based educational intervention focusing on person-centred communication was developed that targeted NAs in home care for older persons. Twenty-seven NAs from two units in Sweden were recruited, and 23 NAs were offered the educational intervention. Data were collected from multiple sources before, during and after the intervention and were analysed using quantitative and qualitative methods. Data were extracted from the web platform and analysed to determine the NAs´ engagement in the intervention. Additionally, interviews, evaluation forms and field notes were used to evaluate the feasibility of the intervention. Results The main findings suggest that web-based education seems to be an appropriate strategy in the home care context. The majority of the NAs (91%) participated in full or in part in the intervention. During the implementation process, some adaptions were required to fit the local circumstances regarding technical support, scheduling, and the design of the lectures. The NAs perceived the format to be easy to use and flexible and appreciated the stepwise modules. The content was perceived as valuable. Conclusions Our findings show that the benefits of the web-based educational intervention included the short and focused lectures as well as its accessibility. Challenges with the implementation process included gaining access to the NAs and motivating and involving the NAs. This study emphasizes the environmental support needed to successfully conduct complex interventions, including physical, organizational and cultural aspects.


Author(s):  
Sangeeta Srivastava

A number of modeling approaches are being used to design web applications.However, they mostly focus on design aspects and many a times they are unable to meet the real goal and expectations of the users. Goal Oriented Requirement Engineering is a popular approach for Information system development but has not been explored much for Web applications. Goal driven requirements analysis helps in capturing stakeholders’ goals very finely, they enhance the requirements analysis in many ways, as the requirement clarification and the conflicts between requirements can be detected at an early stage and design alternatives can be evaluated and selected to suit the require ments. In this paper, we take a step from the requirements phase to the design phase. While adheringto the web based goal oriented requirements engineering in the first phase we move to the A-OOH design models using a model transformation strategy to derive web specific design models supported by a UML profile. This helps in seamlessly generating the web specific design models namely the content, navigation, presentation, business process and adaptivity models. In this paper the focus is on transformation of WebGRL Presentation model to its Presentation design model. The model transformation approach aims at automatic transformation of the repeatedly refined and resolved alternatives presented by us in the WEBGRE framework as an input to the design models supported by a UML profile. This would lead to a better design and high quality of product development which captures the stakeholders’ goals very closely.


2017 ◽  
Vol 10 (2) ◽  
pp. 359-363
Author(s):  
Rupal Sharma ◽  
Ravi Sheth

Today, web application security is most significant battlefield between victim, attacker and resource of web service. The owner of web applications can’t see security vulnerability in web application which develops in ASP.NET. This paper explain one algorithm which aim to identify broken authentication and session management vulnerability. The given method of this paper scan the web application files. The created scanner generator relies on studying the source character of the application limited ASP.NET files and the code be beholden files. A program develop for this motive is to bring about a report which describes vulnerabilities types by mentioning the indict name, disclose description and its location. The aim of the paper is to discover the broken authentication and session management vulnerabilities. The indicated algorithm will uphold organization and developer to repair the vulnerabilities and recover from one end to the other security.


Sign in / Sign up

Export Citation Format

Share Document