web application
Recently Published Documents


TOTAL DOCUMENTS

6020
(FIVE YEARS 3611)

H-INDEX

55
(FIVE YEARS 22)

Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing issues. Web 3.0 is the version of Semantic Web caters to the information needs of half of the population on earth. This paper links two important current concerns, the security of information and enforced online education due to COVID-19 with Semantic Web. The Steganography requirement for the Semantic web is discussed elaborately, even though encryption is applied which is inadequate in providing protection. Web 2.0 issues concerning online education and semantic Web solutions have been discussed. An extensive literature survey has been conducted related to the architecture of Web 3.0, detailed history of online education, and Security architecture. Finally, Semantic Web is here to stay and data hiding along with encryption makes it robust.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-35
Author(s):  
Bing Zhang ◽  
Jingyue Li ◽  
Jiadong Ren ◽  
Guoyan Huang

Most existing surveys and reviews on web application vulnerability detection (WAVD) approaches focus on comparing and summarizing the approaches’ technical details. Although some studies have analyzed the efficiency and effectiveness of specific methods, there is a lack of a comprehensive and systematic analysis of the efficiency and effectiveness of various WAVD approaches. We conducted a systematic literature review (SLR) of WAVD approaches and analyzed their efficiency and effectiveness. We identified 105 primary studies out of 775 WAVD articles published between January 2008 and June 2019. Our study identified 10 categories of artifacts analyzed by the WAVD approaches and 8 categories of WAVD meta-approaches for analyzing the artifacts. Our study’s results also summarized and compared the effectiveness and efficiency of different WAVD approaches on detecting specific categories of web application vulnerabilities and which web applications and test suites are used to evaluate the WAVD approaches. To our knowledge, this is the first SLR that focuses on summarizing the effectiveness and efficiencies of WAVD approaches. Our study results can help security engineers choose and compare WAVD tools and help researchers identify research gaps.


Author(s):  
S. V. Phulari

Abstract: This paper illustrates how we can improve the existing manual system with the help of E-learning management system. The method aims to build an E-learning web application having better and safer user experience and provides an interactive teaching-learning platform for students and teachers. E-learning Management System is way of solving the educational problems using the modern technologies. It gives an error free, secure, reliable and fast management system. It can assist the user to concentrate on learning rather to concentrate on the record keeping and other stuff. It will help organization in better utilization of resources. Keywords: Web application, Database, backend, frontend, platform, E-learning, Frameworks


Author(s):  
Prof. Hemant B. Shinde

The Online Examination Portal is a web application for taking an online test productively along with face recognition capabilities to perform live proctoring, and there is no time wasted for checking the paper. This report will incorporate all highlights and procedures which are required to develop this portal. This document incorporates details about the objective of the system, approximately targets of the system, system scope confinement, essential system requirements, group advancement, likely venture risks, schedule of the deployment, and finally observing and reporting mechanisms for the whole system. Online Examination Conducting Portal is exceptionally useful for Instructive Institute's to prepare a complete exam, conduct proctoring to prevent misconduct, secure the time that will take to check the paper, and plan check sheets. Online Examination Portal will help the Institutes to test understudies and develop their abilities. But the impediments for the Online Exam systems, it takes more time when the user prepares the exam at the primary time for utilization. To conduct the exam we require the number of computers with the same number of students. With the successful use of the Examination Portal, the facilitator can utilize this system to create the tests as their requirements and we can get accurate results and save time once deployed.


2022 ◽  
Vol 2 (14) ◽  
pp. 26-34
Author(s):  
Nguyen Manh Thang ◽  
Tran Thi Luong

Abstract—Almost developed applications tend to become as accessible as possible to the user on the Internet. Different applications often store their data in cyberspace for more effective work and entertainment, such as Google Docs, emails, cloud storage, maps, weather, news,... Attacks on Web resources most often occur at the application level, in the form of HTTP/HTTPS-requests to the site, where traditional firewalls have limited capabilities for analysis and detection attacks. To protect Web resources from attacks at the application level, there are special tools - Web Application Firewall (WAF). This article presents an anomaly detection algorithm, and how it works in the open-source web application firewall ModSecurity, which uses machine learning methods with 8 suggested features to detect attacks on web applications. Tóm tắt—Hầu hết các ứng dụng được phát triển có xu hướng trở nên dễ tiếp cận nhất có thể đối với người dùng qua Internet. Các ứng dụng khác nhau thường lưu trữ dữ liệu trên không gian mạng để làm việc và giải trí hiệu quả hơn, chẳng hạn như Google Docs, email, lưu trữ đám mây, bản đồ, thời tiết, tin tức,... Các cuộc tấn công vào tài nguyên Web thường xảy ra nhất ở tầng ứng dụng, dưới dạng các yêu cầu HTTP/HTTPS đến trang web, nơi tường lửa truyền thống có khả năng hạn chế trong việc phân tích và phát hiện các cuộc tấn công. Để bảo vệ tài nguyên Web khỏi các cuộc tấn công ở tầng ứng dụng, xuất hiện các công cụ đặc biệt - Tường lửa Ứng dụng Web (WAF). Bài viết này trình bày thuật toán phát hiện bất thường và cách thức hoạt động của tường lửa ứng dụng web mã nguồn mở ModSecurity khi sử dụng phương pháp học máy với 8 đặc trưng được đề xuất để phát hiện các cuộc tấn công vào các ứng dụng web.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 625
Author(s):  
Jerry Zhou ◽  
Vincent Ho ◽  
Bahman Javadi

Home-based healthcare provides a viable and cost-effective method of delivery for resource- and labour-intensive therapies, such as rehabilitation therapies, including anorectal biofeedback. However, existing systems for home anorectal biofeedback are not able to monitor patient compliance or assess the quality of exercises performed, and as a result have yet to see wide spread clinical adoption. In this paper, we propose a new Internet of Medical Things (IoMT) system to provide home-based biofeedback therapy, facilitating remote monitoring by the physician. We discuss our user-centric design process and the proposed architecture, including a new sensing probe, mobile app, and cloud-based web application. A case study involving biofeedback training exercises was performed. Data from the IoMT was compared against the clinical standard, high-definition anorectal manometry. We demonstrated the feasibility of our proposed IoMT in providing anorectal pressure profiles equivalent to clinical manometry and its application for home-based anorectal biofeedback therapy.


2022 ◽  
Author(s):  
Christopher J Playfoot ◽  
Shaoline Sheppard ◽  
Evarist Planet ◽  
Didier Trono

Transposable elements (TEs) contribute to the evolution of gene regulatory networks and are dynamically expressed throughout human brain development and disease. One gene regulatory mechanism influenced by TEs is the miRNA system of post-transcriptional control. miRNA sequences frequently overlap TE loci and this miRNA expression landscape is crucial for control of gene expression in adult brain and different cellular contexts. Despite this, a thorough investigation of the spatiotemporal expression of TE-embedded miRNAs in human brain development is lacking. Here, we identify a spatiotemporally dynamic TE-embedded miRNA expression landscape between childhood and adolescent stages of human brain development. These miRNAs sometimes arise from two apposed TEs of the same subfamily, such as for L2 or MIR elements, but in the majority of cases stem from solo TEs. They give rise to in silico predicted high-confidence pre-miRNA hairpin structures, likely represent functional miRNAs and have predicted genic targets associated with neurogenesis. TE-embedded miRNA expression is distinct in the cerebellum when compared to other brain regions, as has previously been described for gene and TE expression. Furthermore, we detect expression of previously non-annotated TE-embedded miRNAs throughout human brain development, suggestive of a previously undetected miRNA control network. Together, as with non-TE-embedded miRNAs, TE-embedded sequences give rise to spatiotemporally dynamic miRNA expression networks, the implications of which for human brain development constitute extensive avenues of future experimental research. To facilitate interactive exploration of these spatiotemporal miRNA expression dynamics, we provide the 'Brain miRTExplorer' web application freely accessible for the community.


Author(s):  
К.Г. Резников ◽  
С.Н. Медведев

Представлена реализация программного обеспечения для построения трехмерных поверхностей с использованием трассировки лучей, выполняемого в веб-браузере персонального компьютера или смартфона. Подход веб-приложений стал широко применим в последние годы из-за развития сети Интернет. Современные веб-браузеры имеют достаточную вычислительную мощность для реализации сложных веб-приложений, а не ограничиваются только веб-сайтами. В процессе разработки были изучены различные методы построения поверхностей и методы визуализации, чтобы подобрать наиболее оптимальные для реализации веб-приложения. Были проанализированы и представлены базовые способы создания трехмерных поверхностей. Выделены ключевые различия каркасного и полигонального способа задания поверхности. Рассмотрен ряд моделей с процедурно вычисляемыми поверхностями. Подробно описан кинематический способ образования поверхностей, а также описан разработанный алгоритм для преобразования кинематических моделей в поверхность с использованием полигональной сетки. Подробно описан процесс визуализации и метод трассировки лучей. Продемонстрирован способ работы с видеочипом и распараллеливанию вычислений для оптимизации веб-приложения с помощью библиотеки GPU.js. Представлена структура веб-приложения с описанием главных каталогов проекта. Структура проекта основана на фреймворке Vue.js, благодаря чему функционал веб-приложения позволяет безгранично расширять. Для демонстрации работы веб-приложения представлен пример пошагового задания кинематической поверхности и визуализации на сцене с применением графических эффектов, таких как закраска и освещение, а также представлен пример с визуализацией множества объектов на сцене The article presents the implementation of software for rendering 3D-surfaces using ray tracing, running in a web browser of computers or smartphones. The web application approach has become widespread in recent years due to the development of the Internet. Modern web browsers have enough processing power to run complex web applications and are not limited to just websites. During the development process, various methods for constructing surfaces and visualization methods were analyzed to choose the most optimal solution for web applications. We analyzed and presented basic methods of creating 3D surfaces. We highlighted the key differences between wireframe and polygonal methods of surface definition. We considered several models with dynamic surface computation. We described the kinematic method of surface formation in detail and the developed algorithm for transforming kinematic models into a surface using a polygonal mesh. We described in detail the rendering process and ray tracing method. We demonstrated a way of working with a video chip and parallelizing computations to optimize a web application using the GPU.js library. We presented the structure of a web application with a description of the main project directories. The project structure is based on the Vue.js framework. The framework allows one to endlessly expand the functionality of a web application. The article presents how the web application works and example of step-by-step creation of a kinematic surface and rendering on a scene using graphic effects such as shading and lighting. Also it contains an example of rendering many objects on a scene


2022 ◽  
Author(s):  
Xinhao Shao ◽  
Christopher Grams ◽  
Yu Gao

Protein structure is connected with its function and interaction and plays an extremely important role in protein characterization. As one of the most important analytical methods for protein characterization, Proteomics is widely used to determine protein composition, quantitation, interaction, and even structures. However, due to the gap between identified proteins by proteomics and available 3D structures, it was very challenging, if not impossible, to visualize proteomics results in 3D and further explore the structural aspects of proteomics experiments. Recently, two groups of researchers from DeepMind and Baker lab have independently published protein structure prediction tools that can help us obtain predicted protein structures for the whole human proteome. Although there is still debate on the validity of some of the predicted structures, it is no doubt that these represent the most accurate predictions to date. More importantly, this enabled us to visualize the majority of human proteins for the first time. To help other researchers best utilize these protein structure predictions, we present the Sequence Coverage Visualizer (SCV), http://scv.lab.gy, a web application for protein sequence coverage 3D visualization. Here we showed a few possible usages of the SCV, including the labeling of post-translational modifications and isotope labeling experiments. These results highlight the usefulness of such 3D visualization for proteomics experiments and how SCV can turn a regular result list into structural insights. Furthermore, when used together with limited proteolysis, we demonstrated that SCV can help validate and compare different protein structures, including predicted ones and existing PDB entries. By performing limited proteolysis on native proteins at various time points, SCV can visualize the progress of the digestion. This time-series data further allowed us to compare the predicted structure and existing PDB entries. Although not deterministic, these comparisons could be used to refine current predictions further and represent an important step towards a complete and correct protein structure database. Overall, SCV is a convenient and powerful tool for visualizing proteomics results.


Sign in / Sign up

Export Citation Format

Share Document