scholarly journals Using a Blackboard Architecture in a Web Application

10.28945/2929 ◽  
2005 ◽  
Author(s):  
Christiane Metzner ◽  
Leonardo Cortez ◽  
Doritza Chacín

In this work we discuss the development of a web application in the domain of movie chains using a Blackboard architecture, which is a well-established style for solving the problem of control, communication and collaboration in a system; it has traditionally been accepted as adequate for heuristic problem solving though not generally used for web applications. We present and discuss how the Blackboard architecture is used as the style for a graduate course project in Software Engineering. Issues about the implementation of the architecture are described and an assessment using some software metrics is presented.

Author(s):  
Gaurav Arora and Anu Rathee

The complexity of Web sites are increasing and transforming into Web applications that contain business logic, interactivity, transaction handling and states. This phenomenon forces the Web developers to adapt more traditional software engineering techniques to keep the Web applications error free, maintainable, reusable, well documented etc. Many Web developers do not use any engineering techniques at all and design mainly to create as fashionable applications as possible with no regards on the application’s functionality. This results in applications that are hard to maintain and with poor functionality. The purpose with this thesis was to see if the use of a more traditional software engineering technique, namely the Unified Modeling Language with the newly added Web Application Extension, resulted in a Web application with good design regarding the maintainability of the application . To investigate the maintainability of an application, the maintainability was further divided into three sub criteria: extensibility, reusability and documentation. These three criteria were then applied on a case study were a Web application was designed. From the analysis of the final design, using the three criteria, the maintainability was derived. The result of the entire investigation showed that the UML WAE had a good support for extensibility, fair support for reusability and very good support for documentation. From these results the main conclusion was derived, that the use of UML WAE resulted in good design regarding the maintainability. However, the result is limited to our case study and the design created in that case. The result may have been different if the three criteria had been applied on a different case. Another aspect to consider is that the quality of a design is often dependent on the knowledge of the persons that carry out the design.


2020 ◽  
Vol 2 (2) ◽  
pp. 35-41
Author(s):  
Péter Négyesi ◽  
Ilona Oláhné Téglási ◽  
Réka Racsko

Although number theory is one of the oldest and most natural mathematical pursuits, some of its topics are not part of the Hungarian high schools’ mathematics curriculum. We examined whether our custom-made web application, including a closely-related task collection and a collaboration interface, may support the problem-solving strategy of students in these tasks, thus supporting their introduction to high school education. For this purpose, we contacted 4 high schools from Jász-Nagykun-Szolnok county (N=352) after developing the website, preparing the number theory task collection, and creating the cooperation interface. Subjects were randomly assigned to an experimental (EXP) or control (CON) group, where members of EXP but not CON and their teachers had access to our website when studying the new number theory topics. We hypothesized that members of EXP will show better test results as compared to CON, indicating the potential benefits of our website during the introduction of new topics. Mann-Whitney U test revealed better overall results in EXP as compared to CON (p < .001). Moreover, Kruskal-Wallis tests showed that subjects EXP vs. CON had higher points in each task (all p < .05), indicating the success of our website. We aim to increase the sample size and to develop additional web applications in our future studies.


Author(s):  
Seetharam .K ◽  
Sharana Basava Gowda ◽  
. Varadaraj

In Software engineering software metrics play wide and deeper scope. Many projects fail because of risks in software engineering development[1]t. Among various risk factors creeping is also one factor. The paper discusses approximate volume of creeping requirements that occur after the completion of the nominal requirements phase. This is using software size measured in function points at four different levels. The major risk factors are depending both directly and indirectly associated with software size of development. Hence It is possible to predict risk due to creeping cause using size.


2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


Author(s):  
Julian Brinkley ◽  
Earl W. Huff

The community of researchers supporting instruction on design thinking has a significant body of materials to help students understand and master the process of creative problem solving in design. Missing, we argue are materials and processes which directly support the design of inclusive technologies for persons with disabilities. We present ‘Inclusion by Design’, an interactive and participative crash course designed to introduce students to techniques that may be useful in an inclusive design process. In a single 75-minute session, students explore the inclusive design of a transportation technology for a visually impaired persona. We report on our findings from a single pilot of the crash course involving six diverse students within a graduate course on Inclusive Design. Our findings suggest that the course may be effective in introducing techniques like storyboarding, scenario creation, and low fidelity prototyping to students using an approach that may be effective for various learning styles.


2021 ◽  
Vol 13 (2) ◽  
pp. 50
Author(s):  
Hamed Z. Jahromi ◽  
Declan Delaney ◽  
Andrew Hines

Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the Above-the-fold (ATF) time. SpeedIndex (SI) has been widely used to estimate perceived web page loading speed of ATF content and a proxy metric for Web QoE estimation. Web application developers have been actively introducing innovative interactive features, such as animated and multimedia content, aiming to capture the users’ attention and improve the functionality and utility of the web applications. However, the literature shows that, for the websites with animated content, the estimated ATF time using the state-of-the-art metrics may not accurately match completed ATF time as perceived by users. This study introduces a new metric, Plausibly Complete Time (PCT), that estimates ATF time for a user’s perception of websites with and without animations. PCT can be integrated with SI and web QoE models. The accuracy of the proposed metric is evaluated based on two publicly available datasets. The proposed metric holds a high positive Spearman’s correlation (rs=0.89) with the Perceived ATF reported by the users for websites with and without animated content. This study demonstrates that using PCT as a KPI in QoE estimation models can improve the robustness of QoE estimation in comparison to using the state-of-the-art ATF time metric. Furthermore, experimental result showed that the estimation of SI using PCT improves the robustness of SI for websites with animated content. The PCT estimation allows web application designers to identify where poor design has significantly increased ATF time and refactor their implementation before it impacts end-user experience.


Author(s):  
Theresia Devi Indriasari ◽  
Kusworo Anindito ◽  
Eddy Julianto ◽  
Bertha Laroha Paraya Pangaribuan

<span>Indonesia is a country located on top of some tectonic plates that bring potential natural disasters. Disaster management system is considered essential in controlling the situation in the site both before and after the disaster takes place. In disaster situation, the government and society are involved in a volunteer team in order to help minimize victims and support survivors. However, the volunteering activities are often hindered since there are problems in the disaster site. One of the problems is late responses due to poor coordination among volunteers that drives the delay in disaster relief. Therefore, it is necessary to have an application that maps the positions of volunteers in a disaster site, so that the disaster management coordinator can disseminate volunteers to disaster areas based on needs. The purpose of the study is to propose an application called ‘MyMapVolunteers’ that effectively and efficiently detects the position of the volunteers in order to improve disaster management service. In this case, real time and location based service technology will able to detect the position of each volunteer. ‘MyMapVolunteers’ is composed of two platforms, which are mobile and web applications. Mobile platform is an application that uses GPS function provided by the smartphone to find the volunteers’ location coordinates and then send the data of the location automatically and manually. The web platform is used to receive volunteers’ location data and to present them in google map, therefore disaster management coordinator can monitor the positions of and search for volunteers faster.</span>


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


Sign in / Sign up

Export Citation Format

Share Document