41 |
Utformning och implementering av en webbapplikation med god navigerbarhet / Design and implementation of a web application with good navigabilityCerny, David, Andersson, Erik, Arve, Fredrik, Falk, Linus, Hergart, Johan, Lidquist, John Andrée, Serebrink, Rikard, Waldenbäck, Tim January 2017 (has links)
According to a study made at Linköping University, there are few options besides self-catered food and buying food at a restaurant. According to the same survey, a majority of the students seek further options in the market. A proposed solution, tested here, is to develop a platform for selling and buying homemade food through a web application. Development takes place in iterations where design and functionality are supported by scientific theory. Changes are based on qualitative opinions from user tests at the end of each iteration. The work is specifically aimed at creating a design with associated features that allow quick navigation to the desired transaction while the user experiences a good navigability. The balance between navigability and time aspects has been central to the report and influenced all aspects of the web application's design. The report shows that it is possible to develop a web application according to the above criteria and identify what is essential for the users. / Enligt en undersökning vid Linköpings universitet finns det få alternativ till egenlagad mat och att köpa mat på restaurang. Enligt samma undersökning eftersträvar en majoritet av studenterna ett ytterligare alternativ på marknaden. En föreslagen lösning, som testas här, är att genom utvecklingen av en webbapplikation skapa en plattform för försäljning och köp av hemlagad mat. Utveckling sker i iterationer där design och funktionalitet underbyggs med vetenskaplig teori. Förändringar baseras på kvalitativa åsikter från användartester i slutet av varje iteration. Arbetet är speciellt inriktat på att skapa en design med tillhörande funktioner som tillåter en snabb navigering till den önskade transaktionen samtidigt som användaren upplever en god navigerbarhet. Avvägningen mellan navigerbarhet och tidsaspekter har varit centralt i rapporten och påverkat samtliga delar av webbapplikationens utformning. Rapporten visar att det är möjligt att utveckla en webbapplikation efter ovan nämnda kriterier och identifierar vad som upplevs centralt för användarna.
|
42 |
Comparative Study of Web Application Development with SQL Server and Db4oDanturthi, Sreedhar January 2011 (has links)
This thesis work is a comparative study of technical features between three distinctivemethods for database access. A web store which offers software components to download,for registered users has been built with three different database access methods to drawcomparisons. 1. SQL Server 2005 with stored procedures 2. LINQ to SQL 3. Db4o Working in Visual Studio with three different methods for database access was not difficult.SQL Server with Stored procedures is efficient in performance and offers maintainability ofthe database access logic. LINQ to SQL makes queries to database as first-class languageconstruct providing type-safety and Intellisense. LINQ to SQL has relatively lowperformance compared to Stored procedures because of the translation of LINQ queries toSQL Queries to communicate with the database. Db4o solves the problem of impedancemismatch and making the development of Database model much simpler and similar to theapplication domain model. Although Db4o has its own drawbacks with database size andconcurrency. Db4o can be considered as an alternative to Relational Database ManagementSystems. Db4o works particularly well with applications which have a small data footprint.
|
43 |
Výuka vývoje webové aplikace ve frameworku Spring / Tutorial on web application development in the Spring frameworkViterna, David January 2017 (has links)
The thesis deals with the analysis of commonly available textbooks for the development of the Spring framework. Identifies weaknesses of these textbooks and uses them to de-sign their own way of writing textbooks. Individual stages of development are demon-strated on a sample application that is initially designed with respect to real requirements for web application and interconnection of different technologies. During the incremental development of the application, the implementation methods are described together with the solution of the problems that have occurred.
|
44 |
A Model-driven Penetration Test Framework for Web ApplicationsXiong, Pulei January 2012 (has links)
Penetration testing is widely used in industry as a test method for web application security assessment. However, penetration testing is often performed late in a software development life cycle as an isolated task and usually requires specialized security experts. There is no well-defined test framework providing guidance and support to general testers who usually do not have in-depth security expertise to perform a systematic and cost-efficient penetration test campaign throughout a security-oriented software development life cycle.
In this thesis, we propose a model-driven penetration test framework for web applications that consists of a penetration test methodology, a grey-box test architecture, a web security knowledge base, a test campaign model, and a knowledge-based PenTest workbench. The test framework enables general testers to perform a penetration test campaign in a model-driven approach that is fully integrated into a security-oriented software development life cycle. Security experts are still required to build up and maintain a web security knowledgebase for test campaigns, but the general testers are capable of developing and executing penetration test campaigns with reduced complexity and increased reusability in a systematic and cost-efficient approach.
A prototype of the framework has been implemented and applied to three web applications: the benchmark WebGoat web application, a hospital adverse event management system (AEMS), and a palliative pain and symptom management system (PAL-IS). An evaluation of the test framework prototype based on the case studies indicates the potential of the proposed test framework to improve how penetration test campaigns are performed and integrated into a security-oriented software development life cycle.
|
45 |
M-crawler: Crawling Rich Internet Applications Using Menu Meta-modelChoudhary, Suryakant January 2012 (has links)
Web applications have come a long way both in terms of adoption to provide information and services and in terms of the technologies to develop them. With the emergence of richer and more advanced technologies such as Ajax, web applications have become more interactive, responsive and user friendly. These applications, often called Rich Internet Applications (RIAs) changed the traditional web applications in two primary ways: Dynamic manipulation of client side state and Asynchronous communication with the server. At the same time, such techniques also introduce new challenges. Among these challenges, an important one is the difficulty of automatically crawling these new applications. Crawling is not only important for indexing the contents but also critical to web application assessment such as testing for security vulnerabilities or accessibility. Traditional crawlers are no longer sufficient for these newer technologies and crawling in RIAs is either inexistent or far from perfect. There is a need for an efficient crawler for web applications developed using these new technologies. Further, as more and more enterprises use these new technologies to provide their services, the requirement for a better crawler becomes inevitable. This thesis studies the problems associated with crawling RIAs. Crawling RIAs is fundamentally more difficult than crawling traditional multi-page web applications. The thesis also presents an efficient RIA crawling strategy and compares it with existing methods.
|
46 |
Deployment aplikací v PHP / Deployment of applications in PHPZikmund, Štěpán January 2010 (has links)
This work deals with automated deployment of web appliactions in PHP. There is not any wide used standard tool for deploying of web application wrote in PHP. That is way the main objective of work is to create automated and universal solution which can be used for application with various database systems or frameworks. For purpose of design this tool I describe at the beginning of this work individual components of web application. It is source code of application, HTML templates and CSS, grafic files, data and database schema. Next I write about posibilities of uploading application to server. This chapter is based on Sharar Evron's talk at conference ZendCon 2010 named Best Practices in PHP deployment. For individual components of application I try to find specific steps which are necessary or usefull to do during application deployment. It is e.g. JavaScript and CSS files minification, database schema modification or secure data injecting in application's configuration files. In fourth and fifth chapter I write about implementation of these steps and connection them in process of application deployment and rollback. For this implementation I use tool Phing.
|
47 |
Porovnanie efektivity technológií WebSocket a AJAX pri implementácii kolaboratívneho editoru / WebSocket and AJAX effectiveness comparison through collaborative editor implementationAugustín, Jakub January 2012 (has links)
This thesis introduces modern web technology WebSocket that was designed to improve real-time communication. Websocket usage is described from both, server and client sides. This thesis should point out benefits of using WebSocket through the collaborative editor implementation. Application ICE, that is practical part of this thesis, shows real-world WebSocket implementation. Also, this thesis lists some of the most widely used techniques for real-time communication. AJAX is currently the most common of these techniques. This thesis should compare WebSocket to AJAX as the competitive technology. Apart from theoretical comparison, this thesis should also provide a real-world testing and comparison.
|
48 |
Automation of State Climate Office Processes & Products: Developing Efficient Approaches for Data DisseminationShoop, Michael 01 August 2019 (has links)
State Climate Offices (SCO’s) in the United States are critical conduits for improving weather and climate data in local communities. Two states do not have a state-recognized SCO: Tennessee and Massachusetts. Efforts are underway at East Tennessee State University to develop the Tennessee Climate Office (TCO). Currently, climate services and products are severely lacking across Tennessee. This thesis provides an improved methodology for an existing TCO product and outlines the development of a new product using Python scripting. Daily storm reports within the monthly climate report are automated and a Weather Forecasts Hazard Index (WFHI) web application is developed. Both products utilize data from the National Oceanic and Atmospheric Administration (NOAA), with the automated daily storm reports providing substantial time savings and the WFHI providing a high resolution web application for emergency managers and others to interpret potentially hazardous forecasts for extreme temperatures, high winds, snowfall/ice accumulation, and tornado/hail events.
|
49 |
Inovace bezplatného registru jízdních kol / Innovation of the Free Bike RegistryPetričko, Michal January 2020 (has links)
This diploma thesis deals with the creating of a web apllication using the Nette framework for the KradenaKola.cz project. Theoretical background is utilized to describe the technologies used in development. Based on analysis of the request, the entire web application is created both functionally and visually.
|
50 |
Návrh, tvorba a implementace softwarové aplikace ve firemním prostředí / Design, Creation and Implementation of Software Application in the Corporate EnvironmentZavadilová, Patrícia January 2021 (has links)
The master’s thesis is focused on the design and creation of a solution for converting company’s software application into the mobile and web form. The main goal is make business processes more efficient and maintain information and cyber security. The result should be a system that brings an innovative and convenient solution, time and financial savings.
|
Page generated in 0.0708 seconds