163 research outputs found
Conference Web Site Redesign
Sustainable Resources was a non-profit organization based out of Boulder, CO that, at the time of this project hosted yearly conferences to help find solutions to world poverty. Although, the previous web site had a professional appearance, it was not meeting their needs with regards to usability, extensibility, and maintainability, as they had been forced to rely heavily on a transient volunteer IT labor base. The aim of this project was to address their functional and maintenance problems. The application\u27s front-end was built in adherence to the Model -view-Controller (MVC) design pattern and implemented using the Jakarta Struts framework and consisted of, a JSP interface. Hibernate was used as the database persistence layer and the entire data model was completely replaced, as certain data fields were being duplicated in the former system. While giving Sustainable Resources the same functionality they had previously enjoyed, the new application enabled the site\u27s administrators to effectively maintain parts of the application without IT support and supplied them with the necessary documentation to assist future developers with upgrades
ProgFest 2005 Platform Project Report
Abstract For the past three years, California State University, Los Angeles has sponsored a Programming Challenge called ProgFest to local community college and high school students. The competition was organized in part by a collection of online tools that managed registration information and the real-time communication between judges and teams. The system we propose in this report integrates these various services into a single, consistent web application built on J2EE technology. This new system reduces the possibility for human error in the judging process, normalizes the relational model, simplifies user navigation, and adds much-needed features
An intrusion detection system on network security for web application
For the last 15 years, significant amount of resources are invested to enhance the security at system and network level, such as firewalls, IDS, anti-virus, etc. IT infrastructure tends to be more and more secure than ever before. As an ever-increasing number of businesses move to take advantage of the Internet, web applications are becoming more prevalent and increasingly more sophisticated, and as such they are critical to almost all major online businesses. The very nature of web applications, their abilities to collect, process and disseminate information over the Internet, exposes thern to rnalicious hackers. However, the traditional security solutions such as firewall, network and host IDS, do not provide comprehensive protection against the attacks common in the web applications. The thesis concentrates on the research of an advanced intrusion detection framework. An intrusion detection framework was designed which works along with any custom web application to collect and analyze HTTP traffic with various advanced algorithms. Two intrusion detection algorithms are tested and adopted in the framework. Pattern Matching is the most popular intrusion detection technology adopted by most of the commercial intrusion detection system. Behavior Modeling is a new technology that can dynamically adapt the detection algorithms in accordance with the application behavior. The combination of the two intrusion technologies has dramatically reduced false positive and false negative alarms. Moreover, a Servlet filter-based Web Agent is used to capture HTTP request. An isolated Response Module is developed to execute pre-defined action according to the analysis result. A database is involved to provide persistence support for the framework. Also, several simulation experiments are developed for evaluating the efficiency of detecting capability.\ud
_____________________________________________________________________________
Use of Hibernate in modern technology : Project Management 1
Abstract-This article describes object oriented applications with relational databases. Currently there exist many technologies supporting objectrelational mapping (ORM) for J2EE technology. There is a comparison of Hibernate over JDBC in case of their performance. One of the major factor Project execution and control of project management has been considered as a case study. Performance in case of project execution and control improves with the help of ORM tool Hibernate
An object-oriented framework for virtual diagnosis.
This paper presents an object-oriented approach to support, on the web, an integrated framework for diagnosis, investigation and treatment of disorders (diseases, computer faults, etc). In this framework, called Fuzzy Covering Theory (FCT), the knowledge is basically modeled through causal associations between objects and inference is abductive. In this new approach, it was necessary to specify the classes model using object - oriented methodology and the knowledge base model that was a flat file in Prolog. These models are discussed in this paper as well as the advantages and limitations of this new approach.EFITA/WCCA 2007
The design and implement of enterprise logistics management system based on Java EE
随着信息技术和网络技术的不断发展,计算机网络已在人类社会各个领域中成为不可或缺的一部分。企业管理也由曾经单一的纸笔记录、印刷复制的办公模式向数字办公、多媒体会议等数字信息一体化模式转变。大量企业针对自身状况制定对应的管理策略、实施方案等都依赖计算机得以实现,这大大降低了企业负担,提高了员工工作效率。后勤劳保物资管理作为企业的新兴部门,也应该与时俱进。 本课题以企业后勤劳保物资发放管理为研究背景,了解实际的业务流程,制定了详细的需求分析来论证本系统的实现是确实可行的。 本论文实现了基于轻量级JavaEE的企业后勤劳保物资管理系统。该系统可以分为角色管理、仓库管理、配发标准管理、员工信息维护和...With the continuous development of information technology and network technology, computer network has become an indispensable part of human society. Enterprise management has also been a single pen and paper records, printing copy of the office model to the digital office, multimedia conferencing and other digital information integration model change. Many enterprises for their own situation to d...学位:工学硕士院系专业:航空航天学院_工程硕士(控制工程)学号:2322014115334
Recommended from our members
EPICCONFIGURATOR COMPUTER CONFIGURATOR AND CMS PLATFORM
Very often when we are looking to buy new IT equipment in an online store, we face the problem that certain parts of our order are not compatible with others or sometimes one part needs additional components. From another point of view in this process, when an online store owner wants to manage the products available in stock, assign prices, set conditions to make an order, or manage customer information, he or she must often rely on information from different systems, physical files, or other sources.
EpicConfigurator simplifies and solves the issues mentioned above. EpicConfigurator makes it easy for User Customers to configure computer products by making the process of product selection more straightforward. It can actively gather customer requirements and map them to a set of products and service options. These capabilities will guide users towards an optimal solution for their needs.
EpicConfigurator also allows User Customers to keep track and edit saved product configurations. This system also includes a user administrator perspective that allows Store Owners to act as User Admins helping them to manage and load new products, set configuration rules for products and manage all users.
Following open source technologies, EpicConfigurator is an application easy to enhance, expand and integrate with newer technologies.
This is a configurator tool and does not provide any purchasing feature. To purchase, the configuration results should be provided to the local reseller or sales representative to get an official quote
- …