One solution of interaction web application for users interconnection

Author(s):  
Nenad Kojić ◽  
◽  
Mustafa Levent ◽  
Natalija Vugdelija ◽  
◽  
...  
2015 ◽  
Vol 6 (3) ◽  
pp. 50-64 ◽  
Author(s):  
Bouchaib Falah ◽  
Mohammed Akour ◽  
Samia Oukemeni

In modern interaction, web applications has gained more and more popularity, which leads to a significate growth of exposure to malicious users and vulnerability attacks. This causes organizations and companies to lose valuable information and suffer from bad reputation. One of the effective mitigation practices is to perform security testing against the application before release it to the market. This solution won't protect web application 100% but it will test the application against malicious codes and reduce the high number of potential attacks on web application. One of known security testing approach is threat modeling, which provides an efficient technique to identify threats that can compromise system security. The authors proposed method, in this paper, focuses on improving the effectiveness of the categorization of threats by using Open 10 Web Application Security Project's (OWASP) that are the most critical web application security risks in generating threat trees in order to cover widely known security attacks.


Author(s):  
Pavel Turčínek ◽  
Arnošt Motyčka

Accession of the Internet undoubtedly has contributed to the shift of marketing activities. With the increasing availability and wealth of online information customers become more knowledgeable and sophisticated. If a company wants to keep its customers in long term, it must offer something more than an “ordinary” product, which has comparable substitutes in tens of other companies.At first it is necessary to identify customers behavior and thinking. Observation of his/her preferences of a demanded product line discovers products playing the key role from his/her point of view. We use methodical tools for this purpose e.g. CRM systems, Business Intelligence etc. Over gained metrics from data in data warehouses (observation subsystem) we make evaluations according to various criteria (subsystem of evaluation). In this report we methodically open up not just e.g. data mining technologies, but also based on aggregated data we infer e.g. consumer’s trends.The goal of the article is to point out suitable instruments which enable to create interaction with customers, where they’ll be able to participate in creation products of their own. The Internet seems as a perfect communication channel for this interaction. Web application will consist of solution of an observation subsystem as a database application and of evaluation subsystem as the application of a row of methods e.g. multicriteria evaluation. Web applications feedback effect leads into knowledge of selected customer’s characteristics, which enables to offer him/her among others a special line of standard products.By creating a disposable web application it’s possible e.g. to offer customers absolutely common products with different visual angle. Thanks to gained information and knowledge we divide customers into groups and then target on them specifically.


Author(s):  
Bouchaib Falah ◽  
Mohammed Akour ◽  
Samia Oukemeni

In modern interaction, web applications has gained more and more popularity, which leads to a significate growth of exposure to malicious users and vulnerability attacks. This causes organizations and companies to lose valuable information and suffer from bad reputation. One of the effective mitigation practices is to perform security testing against the application before release it to the market. This solution won't protect web application 100% but it will test the application against malicious codes and reduce the high number of potential attacks on web application. One of known security testing approach is threat modeling, which provides an efficient technique to identify threats that can compromise system security. The authors proposed method, in this paper, focuses on improving the effectiveness of the categorization of threats by using Open 10 Web Application Security Project's (OWASP) that are the most critical web application security risks in generating threat trees in order to cover widely known security attacks.


2017 ◽  
Author(s):  
Saurabh Mahajan ◽  
Pranati Paidipat ◽  
Rasika Khangarle ◽  
Mona Mulchandani

2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


2019 ◽  
Author(s):  
Ruslan N. Tazhigulov ◽  
James R. Gayvert ◽  
Melissa Wei ◽  
Ksenia B. Bravaya

<p>eMap is a web-based platform for identifying and visualizing electron or hole transfer pathways in proteins based on their crystal structures. The underlying model can be viewed as a coarse-grained version of the Pathways model, where each tunneling step between hopping sites represented by electron transfer active (ETA) moieties is described with one effective decay parameter that describes protein-mediated tunneling. ETA moieties include aromatic amino acid residue side chains and aromatic fragments of cofactors that are automatically detected, and, in addition, electron/hole residing sites that can be specified by the users. The software searches for the shortest paths connecting the user-specified electron/hole source to either all surface-exposed ETA residues or to the user-specified target. The identified pathways are ranked based on their length. The pathways are visualized in 2D as a graph, in which each node represents an ETA site, and in 3D using available protein visualization tools. Here, we present the capability and user interface of eMap 1.0, which is available at https://emap.bu.edu.</p>


Sign in / Sign up

Export Citation Format

Share Document