scholarly journals Serverless OpenHealth at data commons scale - traversing the 20 million patient records of New York's SPARCS dataset in real-time

Author(s):  
Jonas S Almeida ◽  
Janos Hajagos ◽  
Joel Saltz ◽  
Mary Saltz

In a previous report, we explored the serverless OpenHealth approach to the Web as a Global Compute space. That approach relies on the modern browser full stack, and, in particular, its configuration for application assembly by code injection. The opportunity, and need, to expand this approach has since increased markedly, reflecting a wider adoption of Open Data policies by Public Health Agencies. Here, we describe how the serverless scaling challenge can be achieved by the isomorphic mapping between the remote data layer API and a local (client-side, in-browser) operator. This solution is validated with an accompanying interactive web application (bit.ly/loadsparcs) capable of real-time traversal of New York’s 20 million patient records of the Statewide Planning and Research Cooperative System (SPARCS), and is compared with alternative approaches. The results obtained strengthen the argument that the FAIR reproducibility needed for Population Science applications in the age of P4 Medicine is particularly well served by the Web platform.

PeerJ ◽  
2019 ◽  
Vol 7 ◽  
pp. e6230 ◽  
Author(s):  
Jonas S. Almeida ◽  
Janos Hajagos ◽  
Joel Saltz ◽  
Mary Saltz

In a previous report, we explored the serverless OpenHealth approach to the Web as a Global Compute space. That approach relies on the modern browser full stack, and, in particular, its configuration for application assembly by code injection. The opportunity, and need, to expand this approach has since increased markedly, reflecting a wider adoption of Open Data policies by Public Health Agencies. Here, we describe how the serverless scaling challenge can be achieved by the isomorphic mapping between the remote data layer API and a local (client-side, in-browser) operator. This solution is validated with an accompanying interactive web application (bit.ly/loadsparcs) capable of real-time traversal of New York’s 20 million patient records of the Statewide Planning and Research Cooperative System (SPARCS), and is compared with alternative approaches. The results obtained strengthen the argument that the FAIR reproducibility needed for Population Science applications in the age of P4 Medicine is particularly well served by the Web platform.


2018 ◽  
Author(s):  
Jonas S Almeida ◽  
Janos Hajagos ◽  
Joel Saltz ◽  
Mary Saltz

In a previous report, we explored the serverless OpenHealth approach to the Web as a Global Compute space. That approach relies on the modern browser full stack, and, in particular, its configuration for application assembly by code injection. The opportunity, and need, to expand this approach has since increased markedly, reflecting a wider adoption of Open Data policies by Public Health Agencies. Here, we describe how the serverless scaling challenge can be achieved by the isomorphic mapping between the remote data layer API and a local (client-side, in-browser) operator. This solution is validated with an accompanying interactive web application (bit.ly/loadsparcs) capable of real-time traversal of New York’s 20 million patient records of the Statewide Planning and Research Cooperative System (SPARCS), and is compared with alternative approaches. The results obtained strengthen the argument that the FAIR reproducibility needed for Population Science applications in the age of P4 Medicine is particularly well served by the Web platform.


Author(s):  
O. Mendoza-Cano ◽  
R. Aquino-Santos ◽  
J. López-de la Cruz ◽  
R. M. Edwards ◽  
A. Khouakhi ◽  
...  

Abstract Urban flooding is one of the major issues in many parts of the world, and its management is often challenging. One of the challenges highlighted by the hydrology and related communities is the need for more open data and monitoring of floods in space and time. In this paper, we present the development phases and experiments of an Internet of Things (IoT)-based wireless sensor network for hydrometeorological data collection and flood monitoring for the urban area of Colima-Villa de Álvarez in Mexico. The network is designed to collect fluvial water level, soil moisture and weather parameters that are transferred to the server and to a web application in real-time using IoT Message Queuing Telemetry Transport protocol over 3G and Wi-Fi networks. The network is tested during three different events of tropical storms that occurred over the area of Colima during the 2019 tropical cyclones season. The results show the ability of the smart water network to collect real-time hydrometeorological information during extreme events associated with tropical storms. The technology used for data transmission and acquisition made it possible to collect information at critical times for the city. Additionally, the data collected provided essential information for implementing and calibrating hydrological models and hydraulic models to generate flood inundation maps and identify critical infrastructure.


2018 ◽  
Vol 7 (3.6) ◽  
pp. 106
Author(s):  
B J. Santhosh Kumar ◽  
Kankanala Pujitha

Application uses URL as contribution for Web Application Vulnerabilities recognition. if the length of URL is too long then it will consume more time to scan the URL (Ain Zubaidah et.al 2014).Existing system can notice the web pages but not overall web application. This application will test for URL of any length using String matching algorithm. To avoid XSS and CSRF and detect attacks that try to sidestep program upheld arrangements by white list and DOM sandboxing techniques (Elias Athanasopoulos et.al.2012). The web application incorporates a rundown of cryptographic hashes of legitimate (trusted) client side contents. In the event that there is a cryptographic hash for the content in the white list. On the off chance that the hash is discovered the content is viewed as trusted or not trusted. This application makes utilization of SHA-1 for making a message process. The web server stores reliable scripts inside div or span HTML components that are attribute as reliable. DOM sandboxing helps in identifying the script or code. Partitioning Program Symbols into Code and Non-code. This helps to identify any hidden code in trusted tag, which bypass web server. Scanning the website for detecting the injection locations and injecting the mischievous XSS assault vectors in such infusion focuses and check for these assaults in the helpless web application( Shashank Gupta et.al 2015).The proposed application improve the false negative rate.  


Author(s):  
Gregorio Rodríguez-Miranda ◽  
Rene Santos-Osorio ◽  
Carmen Sarahí Ordaz-Banda ◽  
José Armando Lopez-Rivera

In this work it present the development of a prototype for the control of spaces in a parking lot, which through a web page monitors and displays in real time the available places, for this project it is used: an Arduino Uno card, proximity sensors Lm393, male / female, male / male cables, ESP8266 WIFI module and two LEDs; all these connected to each other by a communication link developed with Arduino code, allowing to transmit and send data in the Arduino serial. An Arduino serial communication link is made with java language code, acting as an intermediary for the insertion of information in the database. The web application was developed with the programming language PHP and HTML and was connected to the database hosted on the MySQL server, using as a Sublime Text code editor. Thus achieving on the web page the monitoring in real time of the available parking places. The results shown by the prototype indicate that it is probably feasible to implement this technology to make the parking lots smart.


Author(s):  
Khalid Saleh Aloufi

<span>Open data are available from various private and public institutions in different resource formats. There are already great number of open data that are published using open data portals, where datasets and resources are mainly presented in tabular or sheet formats. However, such formats have some barriers with application developments and web standards. One of the web recommenced standards for semantic web application is RDF. There are various research efforts have been focused on presenting open data in RDF formats. However, no framework has transformed tabular open data into RDFs considering the HTML tags and properties of the resources and datasets. Therefore, a methodology is required to generate RDF resources from this type of open data resources. This methodology applies data transformations of open data from a tabular format to RDF files for the Saudi Open Data Portal. The methodology successfully transforms open data resources in sheet format into RDF resources. Recommendations and future work are given to enhance the development of building open data.</span>


Author(s):  
Zulkarnaen Hatala

Abstract—Efficient and quick procedure to build a web application is presented. The steps are intended to build a database application system with hundreds of tables. The procedure can minimize tasks needed to write code and doing manual programming line by line. The intention also to build rapidly web-based database application. In this method security concerning authentification and authorization already built in ensuring the right and eligible access of the user to the system. The end result is ready to use the web-based 3-tier application. Moreover, the application is still flexible to be customized and to be enhanced to suit more specific requirement in part of each module of the software both the server-side and client-side programming codes. Abstrak—Pada penelitian kali ini diusulkan prosedur cepat dan efisien pengembangan aplikasi basis data menggunakan generator aplikasi. Bertujuan untuk meminimalisir penulisan bahasa pemograman. Keuntungan dari prosedur ini adalah bisa digunakan untuk mengembangkan aplikasi basis data secara cepat terutama dengan sistem basis data yang terdiri dari banyak tabel. Hak akses dan prosedur keamanan standar telah disediakan sehingga setiap user terjamin haknya terhadap entitas tertentu di basis data. Hasil generasi adalah aplikasi basis data berbasis web yang siap pakai. Sistem aplikasi yang terbentuk masih sangat lentur untuk untuk dilakukan penyesuaian setiap komponen aplikasi baik di sisi server maupun di sisi client.


Author(s):  
S. A. Lesko

To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attacks in order to be able to develop various protection mechanisms. This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. In XSS attacks, malicious content is delivered to users by means of a client-side programming language such as JavaScript, while using SQL injection, the SQL database query language is used. At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. Developers should develop security for both server components and the client part of the web application.


Author(s):  
Kimihito Ito ◽  
Yuzuru Tanaka

Web applications, which are computer programs ported to the Web, allow end-users to use various remote services and tools through their Web browsers. There are an enormous number of Web applications on the Web, and they are becoming the basic infrastructure of everyday life. In spite of the remarkable development of Web-based infrastructure, it is still difficult for end-users to compose new integrated tools of both existing Web applications and legacy local applications, such as spreadsheets, chart tools, and database. In this chapter, the authors propose a new framework where end-users can wrap remote Web applications into visual components, called pads, and functionally combine them together through drag-and-drop operations. The authors use, as the basis, a meme media architecture IntelligentPad that was proposed by the second author. In the IntelligentPad architecture, each visual component, called a pad, has slots as data I/O ports. By pasting a pad onto another pad, users can integrate their functionalities. The framework presented in this chapter allows users to visually create a wrapper pad for any Web application by defining HTML nodes within the Web application to work as slots. Examples of such a node include input-forms and text strings on Web pages. Users can directly manipulate both wrapped Web applications and wrapped local legacy tools on their desktop screen to define application linkages among them. Since no programming expertise is required to wrap Web applications or to functionally combine them together, end-users can build new integrated tools of both wrapped Web applications and local legacy applications.


Author(s):  
Norah Jean-Charles ◽  
Leonard Hayes ◽  
Paola Spoletini

Gathering requirements is an extremely difficult ask to do during requirements elicitation interviews which are used to collect requirements. The emotion of the interviewee during the elicitation interview is important because it helps to determine the interviewees engagement in the interviewing process, which in turn, assists with collecting quality requirements. Emotions are not easily observed by the eye, but can be detected through biofeedback and voice parameters. With this web application, the biofeedback data that is collected from the Empatica E4 wristband can be displayed to show the likely emotions that the interviewee is experiencing in real-time. Knowing this information could allow the requirements analyst to save the interview by making any necessary adjustments. Using the provided server-to-console method written in C# that the wristband sends the biofeedback information to, the web application will integrate this in order to display the data and likely emotions. In conclusion, the web application will support the interviewer during the elicitation requirements interview by displaying the interviewee’s analyzed biofeedback data.


Sign in / Sign up

Export Citation Format

Share Document