• Title/Summary/Keyword: Web-based database application

Search Result 212, Processing Time 0.026 seconds

An Implementation of Web-based Client/Server Architecture using Distributed Objects (분산 객체를 이용한 웹기반 클라이언트 / 서버 구조의 구현)

  • 박희창;이태공
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.2
    • /
    • pp.25-44
    • /
    • 1997
  • Internet users been rapidly increased due to the convenient GUI environment. Current Web-based HTTP/CGI client/server architecture has several problems such as the CGI bottleneck, no maintaince of state, and no load balancing. However, with Java and CORBA technologies called“Object Web technology”, we can solve them because Java is not only a mobile code but also a platform-independent code, and CORBA has ability to build distributed object and language-independent object model. The goal of “Object Web technology”is to create multivendor, multiOS, multilanguage“legoware”using objects. This paper implement“Book Search System”which is Web-based client/server architecture using distributed objects. Environments of this implementation are Hangul Windows NT(included IIS) server, Hangul Windows 95 client, Visigenic's VisiBroker for Java 1.2 which is a product of CORBA 2.0, HTTP protocol on TCP-IP-based, Sybase SQL Anywhere 5.0 database server, and the interface between application server and database is JDBC-ODBC bridge middleware.

  • PDF

Individual Roles for Small-sized Web Application Development (소규모의 웹 응용 개발을 위한 역할 분담)

  • 이우진;조용선;정기원
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.209-225
    • /
    • 2001
  • This paper Proposes the individual roles for developing small web application systems based on the Client/Server architecture with the activities and artifacts of each role and cooperation. The roles of Web Server part (i.e. User Interface Designer, Web Designer, HTML Writer), the roles of Application Server part (i.e. Domain Expert, Application Developer, Tester) and the roles of DB Server part (i.e. Database Administrator, Data Designer) are described. Furthermore, the role of the Development Leader that participates in development and manages all works in project and finds the solutions of problems in project, is also discussed. The Domain Expert analyzes the domain of the application in order to send the artifacts to the Application Developer. Then the Application Developer analyzes, designs and implements the application based on the artifacts of the Domain Expert and integrates the implemented program modules. Roles are related each other in this way, and cooperate until the application development is completed. Finally, we analyzed and compared these roles with the roles of RUP(Rational Unified process) and web wave. Suggested roles in this paper turned out to be efficient compared to the roles of the existing large-scale methodology.

  • PDF

Optimal dwelling time prediction for package tour using K-nearest neighbor classification algorithm

  • Aria Bisma Wahyutama;Mintae Hwang
    • ETRI Journal
    • /
    • v.46 no.3
    • /
    • pp.473-484
    • /
    • 2024
  • We introduce a machine learning-based web application to help travel agents plan a package tour schedule. K-nearest neighbor (KNN) classification predicts the optimal tourists' dwelling time based on a variety of information to automatically generate a convenient tour schedule. A database collected in collaboration with an established travel agency is fed into the KNN algorithm implemented in the Python language, and the predicted dwelling times are sent to the web application via a RESTful application programming interface provided by the Flask framework. The web application displays a page in which the agents can configure the initial data and predict the optimal dwelling time and automatically update the tour schedule. After conducting a performance evaluation by simulating a scenario on a computer running the Windows operating system, the average response time was 1.762 s, and the prediction consistency was 100% over 100 iterations.

Vulnerability Analysis and Threat Mitigation for Secure Web Application Development (안전한 웹 애플리케이션 개발을 위한 취약점 분석 및 위협 완화)

  • Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.127-137
    • /
    • 2012
  • Recently, as modern Internet uses mashups, Web 3.0, JavaScript/AJAX widely, the rate at which new vulnerabilities are being discovered is increasing rapidly. It can subsequently introduce big security threats. In order to efficiently mitigate these web application vulnerabilities and security threats, it is needed to rank vulnerabilities based on severity and consider the severe vulnerabilities during a specific phase of software development lifecycle (SDLC) for web applications. In this paper, we have first verified whether the risk rating methodology of OWASP Top 10 vulnerabilities is a reasonable one or not by analyzing the vulnerability data of web applications in the US National Vulnerability Database (NVD). Then, by inspecting the vulnerability information of web applications based on OWASP Top-10 2010 list and CWE (Common Weakness Enumeration) directory, we have mapped the web-related entries of CWE onto the entries of OWASP Top-10 2010 and prioritized them. We have also presented which phase of SDLC is associated with each vulnerability entry. Using this approach, we can prevent or mitigate web application vulnerabilities and security threats efficiently.

Design and Implementation of Light Loaded Web Application Based on .NET (.NET 기반의 저부하형 웹 애플리케이션 설계 및 구현)

  • 최동우;안현식
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.272-282
    • /
    • 2004
  • As Web services need to manage lots of information, it is indispensable to reduce server's load and speed up processing time. In this paper, we analyze the loading problems of server and suggest designing methods for light loaded Web applications based on .NET. The proposed methods include using a relative database to produce minimized modules and Stored Procedures to simplify SQL statements for reducing sever's load. Web pages are organized with scripts replacing server language, which improve server's capability by reducing loads. The execution time is also speeded up by organizing Web pages with User Controls. And XML/EDI is used for managing the effective exchange of documents. The proposed methods are implemented as an education management system and shows its effectiveness.

  • PDF

An Automatic Schema Generation System based on the Contents for Integrating Web Information Sources (웹 정보원 통합을 위한 내용 기반의 스키마 자동생성시스템)

  • Kwak, Jun-Young;Bae, Jong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.77-86
    • /
    • 2008
  • The Web information sources can be regarded as the largest distributed database to the users. By virtually integrating the distributed information sources and regarding them as a single huge database, we can query the database to extract information. This capability is important to develop Web application programs. We have to infer a database schema from browsing-oriented Web documents in order to integrate databases. This paper presents a heuristic algorithm to infer the XML Schema fully automatically from semi-structured Web documents. The algorithm first extracts candidate pattern regions based on predefined structure-making tags, and determines a target pattern region using a few heuristic factors, and then derives XML Schema extraction rules from the target pattern region. The schema extraction rule is represented in XQuery, which makes development of various application systems possible using open standard XML tools. We also present the experimental results for several public web sources to show the effectiveness of the algorithm.

  • PDF

Design and Implementation of the RDF Web Ontology Access Control Model based on Oracle VPD (오라클 VPD 기반의 RDF 웹 온톨로지 접근 제어 모델의 설계 및 구현)

  • Jeong, Hye-Jin;Jeong, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.53-62
    • /
    • 2008
  • This paper proposes a new implementational model based on the security model of Oracle for Web ontology. Recently, several access control models using relational database security model for access control to Web ontology have been developing, and one of the most representative access control model is the RAC model. However, the RAC model is based on the standard security model, and thus it does not provide a implementational model for practical relational database management systems. In this paper, we propose an implementational model based on Oracle which is widely used and providing various security policies. This paper shows the implementation and experimental evaluation. Especially, the proposed model uses the VPD security model of Oracle and support high application and usability.

  • PDF

Design and Implementation of A Cyber-school System Based on Web Groupware (웹 그룹웨어 기반의 가상학교 시스템의 설계 및 구현)

  • 고일석;나윤지
    • The Journal of Information Technology and Database
    • /
    • v.8 no.1
    • /
    • pp.13-24
    • /
    • 2001
  • This paper presents a design and implementation of cyber-school system using object modeling technique and web groupware. The system design method based on object modeling techniques reduce cyber-school construction effort and cost with reusing of modules. The system is a kind of web group application based on WWW that allow members who located on remote computer to do cooperative learning and to communicate with other students and teachers independent of time and location. In this system we use Linux operating system for efficient development on real education field. and we can reduce cyber-school development effort arid cost With this system.

  • PDF

Construction of Truss Bridge Database for 3-D Shape and Structural Analysis Information by using ISO10303 Application Protocols (ISO10303 응용프로토콜을 이용한 트러스교의 3차원 형상 및 해석정보 데이터베이스 구축)

  • Lim, Seung-Wan;Kim, Bong-Geun;Kim, Hyo-Jin;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.1
    • /
    • pp.81-89
    • /
    • 2009
  • A web-based information management system to share engineering data of truss bridge is developed through construction of standardized database of truss bridge. 3D shape information is stored in database according to AP 203 of STEP, and 3D visualization on the web is implemented by using the web 3D technology that helps users to understand geometrical shape of structures, directly. AP209 is used to store structural analysis information such as finite elements, material properties, and analysis result into relational database. Based on the developed database, a prototype of integrated information management system for truss bridge is developed, and it provides additional information such as specifications and inspection information related with shape object to end users.

  • PDF

A Non-Agent based Identification Scheme for Identifying Database Users in 3-tier System Environments (3-tier 시스템 환경에서 비 에이전트 방식의 데이터베이스 사용자 식별 방안)

  • Han, Jung Sang;Shin, Dong Cheon
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.147-159
    • /
    • 2018
  • The changes of internet environment have made services through web application server (WAS) popular. Accordingly, technical difficulties in identifying users who access databases through WAS were incurred. In order to solve these problems, many companies adopt an agent-based approach for identifying users by installing additional software on WAS. However, this approach must submit to some disadvantages in terms of cost, maintenance, and development process. In this paper, we devise an non-agent based approach for identifying database users in 3-tier environments.