• Title/Summary/Keyword: Web applications

Search Result 1,433, Processing Time 0.03 seconds

The Analysis Method based on the Business Model for Developing Web Application Systems (웹 응용 시스템 개발을 위한 업무모델 기반의 분석방법)

  • 조용선;정기원
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1193-1207
    • /
    • 2003
  • Various web applications are developed as the Internet is popularized in many fields. However, in most cases of web application development, systematic analysis is omitted and developers jump into the implementation. Therefore developers have difficulties with applying the development methods for a large scale project. The approach of creating an analysis models of a web application from a business model is proposed for the rapid and efficient development. The analysis process, tasks and techniques are proposed for this approach. The use case diagram and web page list are created from business modes that is depicted using the notation of UML activity diagram. The page diagram and logical / physical database models are created using the use case diagram and the web page list. These analysis models are refined during the detailed design phase. The efficiency of proposed method has been shown using a practical case study which reflects the development project of the web application for supporting the association of auto repair shops.

A QoS-aware Web Services Selection for Reliable Web Service Composition

  • Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.586-589
    • /
    • 2012
  • Web Services have been utilized in a wide variety of applications and have turned into a key technology in developing business operations on the Web. Originally, Web Services can be exploited in an isolated form, however when no single Web Service can satisfy the functionality required by a user, there should be a possibility to compose existing services together in order to fulfill the user requirement. However, since the same service may be offered by different providers with different non-functional Quality of Service (QoS), the task of service selection for Web Service composition is becoming complicated. Also, as Web Services are inherently unreliable, how to deliver reliable Web Services composition over unreliable Web Services should be considered while composing Web Services. In this paper, we propose an approach on a QoS-aware Web Service selection for reliable Web Service composition. In our approach, we select and classify Web Services using Decision Tree based on QoS attributes provided by the client. Service classifier will improve selection of relevant Web Services early in the composition process and also provide flexibility to replace a failed Web Services with a redundant alternative Web Services, resulting in high availability and reliability of Web Service composition. We will provide an implementation of our proposed approach along with efficiency measurements through performance evaluation.

An e-Business Operational Model Based on Web Services Quality (웹 서비스 품질에 기반한 e-비즈니스 운영 모델)

  • Cho, Kwang-Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2728-2732
    • /
    • 2009
  • Recently, the instances of communications between the applications and interaction applications using the Web services in the implementation of the business logics among the enterprises are spread widely. Therefore the efficient business operational models are more and more required. The usage of the services which guarantee the optimum level of service quality among the various Web services is also required. In this paper the Web services are analyzed. The required security and the service quality for the enterprises are analyzed. And then an e-Business operational model which is applicable to the enterprise business environment is proposed.

Customization Technique of Web Service Protocol based on Android (안드로이드 기반의 웹 서비스 프로토콜 커스터마이제이션 기법)

  • Kim, Chul-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.92-99
    • /
    • 2012
  • According to the scale of mobile applications has been expanded, the high coupled application combined mobile and web service are growing. The growth of mobile application's size means that predicting design for variability should be involved. If mobile application's change is occurred, application should be reinstalled totally. However this reinstallation can raise side-effects in case of high-coupling application. Therefore, this paper proposes a technique of customization for changing web service protocol as the mobile applications are connected with web service in android platform. Proposed protocol customization technique is consist of selection and plug-in technique.

Diffusion of Web 2.0 Applications in Academic Libraries in the U.S. (미국 대학 도서관에서의 웹 2.0 어플리케이션 확산에 관한 연구)

  • Kim, Soo-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.3
    • /
    • pp.19-33
    • /
    • 2012
  • This paper examines the extent and rate of adoption of five Web 2.0 applications (RSS, blog, tagging, podcast, and wiki) in 111 American Research Association (ARL) libraries and identifies institutional factors associated with Web 2.0 adoption. The popularity of Web 2.0 continues to grow, both in terms of the total number of adopting libraries and the adoption rate. Wiki adopter libraries are in larger universities, have larger professional staff, and are more acceptable to electronic resources than the non-adopters.

A Study On The Development Of a Home Networking System Using An Embedded Linux Board (임베디드 리눅스 보드를 이용한 홈 네트워킹 시스템 구현에 관한 연구)

  • Lee, Heon-Joo;Lee, Jong-Su;Choi, Kyung-Sam
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.592-595
    • /
    • 2003
  • In this paper, we have designed a Home Networking System using an embedded linux board. The system based on the World-Wide-Web is composed of three parts - a Server, a Client and a Simulator. The Home Networking Server is built in an embedded board using an embedded linux kernel. A web-server and Home Networking Server Seryice Demon programming with a Jaya-Language is included in the board. Clients can connect to the server board using a web-browser in the desktop computer, PDA or any other machines which include a web-browser. For this purpose, we made the client program using a Java-Applet. So, the clients who connect to the server for the control of the applications, download the class-file and execute the client-program in the web-browser. So, the clients don't need any other programs to control the applications from a remote place. The size of server board is very small (86.3$\times$74mm), which makes it very useful not only for the Home-Networking-System but also in many other fields, e.g., embedded robot control system, etc. Using an embedded board instead of a desktop computer is good for a simple network environment and it occupies only a small space to make the system.

  • PDF

지역 거점 대학과 중소 SI 업체와의 산학 협동 : Web CMS 개선 사례

  • Kim, Jong-Cheol;Kim, Yeong-Il;Lee, Hyeon-U;Jang, Rae-Hyeon;Go, Seok-Ha
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.208-231
    • /
    • 2006
  • JSP 모델 1로 개발된 웹 어플리케이션의 문제점은 HTML과 자바 코드가 같은 파일로 결합되어 유지관리에 어려움을 준다. HTML과 자바가 같은 파일로 결합될 때, HTML과 애플리케이션의 논리적인 측면 모두가 복잡해지기 때문에 여러 사람이 이들 파일에 대해 책임을 갖게 되는 것이 불가피해지는 문제점이 발생한다. 반면, JSP 모델 2(MVC 모델)는 객체지향 방법론의 구현으로 구현과 모델, 뷰를 분리함으로써 위의 문제점을 해소한다. 우리가 개선할 Web CMS도 JSP 모델 1로 개발된 웹 어플리케이션으로 JSP가 가지고 있는 문제점을 가지고 있었다. 이런 문제점을 개선하기 위해 기업에서 대학측에 Web CMS 개선 프로젝트를 제안하였다. 프로젝트에 적용한 기술들은 객체지향 모델링 언어인 UML을 기반으로 설계를 하고, 일정관리 도구인 MS-Project에 의해 일정관리를 하였다. 개발 프로그래밍 언어는 웹 어플리케이션 아키텍처인 자바 스트러츠로 개발하였다. 이에 본 논문은 새로운 기술인 객체지향 방법론을 적용하기 원하는 중소 SI 기업과 지역 거점 대학과의 산학협동 사례를 제시한다. 지방 중소 SI 기업과 그 기업에서 개발한 Web CMS를 지역 거점 대학과의 산학 협동을 통해 신기술로 개선한 과정과 방법, 결과에 대해 말하고자 한다. 또한, 기업과의 산학협동을 통해 얻은 교훈을 통해 대학과 기업이 서로 상생할 수 있는 방법에 대해 고찰해 보고한다.

  • PDF

Clustering Social Media Services and Messengers by Functionality

  • Fischer, Julia;Knapp, Daniel;Nguyen, Bich Chau;Richter, Daniel;Shutsko, Aliaksandra;Stoppe, Melanie;Williams, Kelly;Ilhan, Aylin;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.4
    • /
    • pp.6-19
    • /
    • 2020
  • The objective of this research is to analyze which functions make up web-based as well as mobile social media services and messengers. Services are clustered by their functionality. A total of 640 individual functions were identified, while investigating altogether 44 selected services in their web and mobile versions. Applying content analysis, functions were assigned to the services. The services were ranked by the number of implemented functions, and the functions were ranked by their occurrence in the services. Cluster analysis was applied to classify the services according to their functionality. Facebook and VKontakte were found to be the ones with the most functions; the most frequently implemented functions are support, profile, and account-related. Cluster analysis revealed six classes for mobile and seven classes for web applications. There is a noteworthy difference regarding the functionality scope between web and mobile applications of the same services. An example for this is Mendeley with 38 functions in the mobile and 91 functions in the web version. This is the first empirical attempt at clustering social media services based on their functionality.

Office-Based Mitomycin-C Application to Prevent Postoperative Laryngeal Stenosis (술 후 후두협착을 예방하기 위한 외래에서의 Mitomycin-C의 반복 국소적용)

  • Jang, Jeon-Yeob;Lee, Gil-Joon;Son, Young-Ik
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.20 no.1
    • /
    • pp.36-41
    • /
    • 2009
  • Background and Objectives: Topical administration of mitomycin-C (MMC) has been reported to reduce or delay scar formation in airway surgery. However, it is not infrequent to experience recurrent stenosis or adhesion of operative wound even after a meticulous MMC application during the laryngeal surgery. Therefore we aimed to evaluate the effectiveness of repeated postoperative MMC applications and the technical feasibility of MMC applications to the laryngeal wound at an outpatient clinic. Methods: We reviewed medical records of 13 consecutive patients who received office-based MMC applications after laryngeal airway surgery at Samsung Medical Center, Seoul, Korea. The patients were grouped into 3 categories according to the site of surgical wound and the purpose of MMC application; group I : supraglottic stenosis (n=5), group II : cordectomy and arytenoidectomy site granulation prevention (n=3), Group III : laryngeal web prevention (n=5). Outcomes in each group and adverse effects of repeated MMC applications were evaluated. Results: Office-based MMC application was successfully performed one to four times with a week interval for each patient. No significant complications were observed except slightly decreased mucosal wave in one female patient who received 4 times of MMC application at the anterior commissure of vocal fold. Repeated MMC applications at the outpatient clinic resulted in wide or acceptable supraglottic airway in group I, clean wound healing without granulation formation in group II, and negligible or no web formation at the anterior commissure in group III. Conclusion : Office-based topical administration of MMC to the larynx was technically feasible. Postoperative repeated MMC applications were effective to reduce recurrent stenosis or adhesion of supraglottic structures, to prevent granuloma formation after laser arytenoidectomy and glottic web formation after anterior commissure resection.

  • PDF

Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection

  • Md. Mijanur Rahman;Md. Asibul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.199-202
    • /
    • 2023
  • Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.