scholarly journals Data Binding in Front End for Web Applications

2021 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Egnar Özdikililer

In this study, Data Binding is discussed. However, in Web technologies, data binding on the front end comes to the fore. That is, it should not be affected by the development of interventions to be made in a department, and it should be aimed to be freed from software. This is a requirement of the rules for a minimal plugin that will not burden the correct code, and it has to maintain itself as renewing itself. The application part is written in JavaScript. The work done is also available to be added to other applications as a library. "Real software applications" as Data Binding are written with this object for the purpose of interconnecting.


2019 ◽  
Vol 8 (4) ◽  
pp. 1401-1405

In today’s world everything is becoming web dependent, and due to the advances made in web technologies, web developers have to face various challenges. Every web application before being deployed goes through various phases which may look different on different browsers. It becomes difficult to identify correct web page when it gives differences across different browsers. The web pages may give significant differences and it is known as cross-browser inconsistency. A technology that has gained a prominent position known as AJAX (Asynchronous JavaScript and XML), in which the combination of JavaScript and Document Object Model (DOM) manipulation, along with asynchronous server communication is used to achieve a high level of user interactivity. With this change in developing web applications comes a whole set of new challenges, One way to address these challenges is through the use of a crawler that can automatically walk through different states of a highly dynamic AJAX site and create a model of the navigational paths and states. Identifying these conflicts manually is a laborious task. Mutual browser conflict disclosure presents a mechanism to identify conflicts.


Petir ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 111-121
Author(s):  
Nurul Dyah Budiana ◽  
Riki Ruli A. Siregar ◽  
Meilia Nur Indah Susanti

Instructor is the main aspect that exists in the implementation of the training. The increasing number of instructors and the need for training is also increasing every year there is no system that can help the process of determining quickly and precisely. In need of a method that can classify the instructor data in accordance with the title of training materials and can be assigned instructor each of the training materials and do not ignore aspects of assessment of the instructor. In this study data mining techniques are used to help recommend instructors for each subject matter of the training based on the cluster data group approach. So it can be used in determining the instructor's assignment per training materials in the future. K-Means clustering method is used to group data into clusters by looking at the centroid  value that has been determined. And the Topsis method is used to assign one instructor's name through the rankings of preference values. In this research CRISP-DM method is used as software engineering method system work done in sequence or linearly. In the testing process has been generated if the manual data and data processing if the application system is the same. This application to facilitate the Supervisor and Learning Development staff in setting instructors per training materials.


2018 ◽  
Vol 13 (1) ◽  
pp. 221
Author(s):  
Festim Halili ◽  
Lirie Koraqi

This paper addresses the security aspects of the software applications in the framework of several entrepreneurship. It has a certain goal and structure, through which it modestly aims to present the security aspect of web applications in Kosovo companies. At first we tried to give some theoretical concepts about security in general and security testing in particular. The key research elaboration of the research problem addresses the security aspect in the sector of companies that develop applications and do their testing, here we will dwell on a case-study case of different companies in Kosovo. The purpose of this section is to argue the importance of security and its application to various companies.


Author(s):  
Sanjeevi Chitikeshi ◽  
Ajay Mahajan ◽  
Pavan Bandhil ◽  
Lucas Utterbach ◽  
Fernanado Figueroa

This paper proposes the development of intelligent sensors as an integrated systems approach, i.e. one treats the sensors as a complete system with its own sensing hardware (the traditional sensor), A/D converters, processing and storage capabilities, software drivers, self-assessment algorithms, communication protocols and evolutionary methodologies that allow them to get better with time. Under a project being undertaken at the Stennis Space Center, an integrated framework is being developed for the intelligent monitoring of smart elements. These smart elements can be sensors, actuators or other devices. The immediate application is the monitoring of the rocket test stands, but the technology should be generally applicable to the Intelligent Systems Health Monitoring (ISHM) vision. This paper outlines progress made in the development of intelligent sensors by describing the work done till date on Physical Intelligent Sensors (PIS) and Virtual Intelligent Sensors (VIS).


2020 ◽  
Vol 9 (1) ◽  
pp. 247-255
Author(s):  
Amine Moutaouakkil ◽  
Samir Mbarki

With the rise of new web technologies such as web 2.0, Jquery, Bootstrap. Modernizing legacy  web systems to  benefit from the advantages of the new technologies is more and more relevant. The migration of a system from an environment to another is a time and effort consuming process, it involves a complete rewrite of the application adapted to the target platform. To realize this migration in an automated and standardized way, many approaches have tried to define standardized engineering processes. Architecture Driven Modernization (ADM) defines an approach to standardize and automate the reengineering process.  We defined an ADM approach to represent PHP web applications in the highest level of abstraction models. To do this, we have used software artifacts as a entry point . This paper describes the extraction process, which permits discovering and understanding of the legacy system. And generate models to represent the system in an abstract way.


Author(s):  
Firmansyah Adiputra ◽  
Khabib Mustofa

AbstrakAplikasi desktop adalah aplikasi yang berjalan lokal dalam lingkungan desktop dan hanya dapat diakses oleh pengguna desktop. Ini berbeda dengan aplikasi web yang dapat diakses dari manapun melalui jaringan. Namun tidak seperti halnya aplikasi desktop, aplikasi web yang berjalan di atas web browser tidak dapat berintegrasi dengan aplikasi desktop yang berjalan pada sisi klien.Dalam penelitian ini dibangun purwarupa framework yang diberi nama HAF (Hybrid Application Framework). HAF digunakan untuk mengembangkan dan mengeksekusi jenis aplikasi desktop baru yang diberi nama HyApp (Hybrid Application). Melalui HAF, HyApp dibangun menggunakan teknologi web dan dapat diakses secara lokal maupun melalui jaringan. Saat diakses secara lokal, walaupun dikembangkan dengan teknologi web, HyApp dapat berkomunikasi dengan aplikasi desktop lainnya. Selain itu, melalui API yang disediakan oleh HAF, HyApp akan dapat menerapkan perilaku yang berbeda berdasarkan modus pengaksesan yang dilakukannya. Kata kunci—framework, aplikasi desktop, aplikasi web    AbstractDesktop application is an application that runs locally in a desktop environment and can be accessed only by desktop users. It differs from web application which can be accessed from anywhere through networks. But unlike desktop applications, web applications cannot integrate nicely with desktop applications from where it is accessed.This research developes a prototype of framework which is named HAF (Hybrid Application Framework). HAF is used for developing and executing a new type of desktop application, named HyApp (Hybrid Application). Through HAF, HyApp is built using web technologies and can be accessed either locally or from networks. When accessed locally, even though it is built using web technologies, it still can communicate with other desktop applications. Also by using APIs provided by HAF, HyApp is capable to behave differently based on whether it is accessed locally or remotely. Keywords—framework, desktop applications, web applications


Author(s):  
Doru Anastasiu Popescu ◽  
Dragos Nicolae

In this chapter, the authors present a way of measuring the similarity between two Web applications. For this, they define the degree of similarity between two Web applications, taking into account only the Webpages composed of HTML tags. The authors also introduce an algorithm used to calculate this value, its implementation being made in the Java programming language.


Author(s):  
Spyros Panagiotakis ◽  
Ioannis Vakintis ◽  
Haroula Andrioti ◽  
Andreas Stamoulias ◽  
Kostas Kapetanakis ◽  
...  

This chapter at first surveys the Web technologies that can enable ubiquitous and pervasive multimedia communications over the Web and then reviews the challenges that are raised by their combination. In this context, the relevant HTML5 APIs and technologies provided for service adaptation are introduced and the MPEG-DASH, X3Dom, and WebRTC frameworks are discussed. What is envisaged for the future of mobile multimedia is that with the integration of these technologies one can shape a diversity of future pervasive and personalized cloud-based Web applications, where the client-server operations are obsolete. In particular, it is believed that in the future Web cloud-based Web applications will be able to communicate, stream, and transfer adaptive events and content to their clients, creating a fully collaborative and pervasive Web 3D environment.


Sign in / Sign up

Export Citation Format

Share Document