Article

Ajax: A New Approach to Web Applications

Authors:
To read the full-text of this research, you can request a copy directly from the author.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... • DC -AJAX [19], Comet [20], and WebSocket [21]. ...
... DC [18] in RiWAs works in pull and push communication modes. There are various TTs to implement DC in RiWAs, where some techniques like AJAX [19] are used for pull-communication, and TTs like Comet and Web-Socket [21] are used to implement PC in RiWAs. Some other protocol-level solutions have been recently introduced for implementing PC, namely, server push in HTTP/2 [33] and Webpush protocol [34]. ...
... In the context of DC, early attempts to implement PC in RiWAs only exploit pull-DC TTs to simulate PC based on the request-response model. For example, in polling and long-polling [20], XHR [35] requests (the technology used in AJAX [19]) are automatically sent by the client-component(s) to pull updates from the server-components and then show them on the GUI. The user gets the impression that the server has pushed the updates since the user has not explicitly sent a request by triggering any event on the GUI. ...
Article
Full-text available
The development aspects of rich web-based applications have evolved; however, abstract concepts, like styles and patterns, are still lacking. If an abstract style for rich web-based applications is available, it can support the whole engineering process in many ways, like assisting in designing aspects and the system’s evolution. We have produced an abstract architectural style named RiWAArch style for standard rich web-based applications, and we are working on extending the same to realize integrating push-communication. Push-communication has become a contemporary requirement in developing features like real-time notifications in rich web-based applications. However, the features to be expected from a style to realize the integration of the push-communication are not yet recognized. This concept paper proposes a set of features to be expected from a style for push-communication-integrated rich web-based applications. Our ongoing research will later utilize these features to form requirements and design a comprehensive style by extending the RiWAArch style to realize the abstract features of integrating true push-communication into rich web-based applications.
... AJAX isn't something new, it isn't a solitary new engineering however rather a gathering of advances that have been around for quite a while. The expression "AJAX" was instituted by [1] of Adaptive Path LLC as a catchphrase Asynchronous Javascript and XML. The fundamental advances utilized for AJAX incorporate 1) Javascript; 2) the Xmlhttp request protest first presented by Microsoft in Internet Explorer 5 and later fused into Mozilla based programs; 3) XML; 4) the Document Object Model (DOM) and 5) Falling Style Sheets for guidelines based presentation (1). ...
... The expression "AJAX" was instituted by [1] of Adaptive Path LLC as a catchphrase Asynchronous Javascript and XML. The fundamental advances utilized for AJAX incorporate 1) Javascript; 2) the Xmlhttp request protest first presented by Microsoft in Internet Explorer 5 and later fused into Mozilla based programs; 3) XML; 4) the Document Object Model (DOM) and 5) Falling Style Sheets for guidelines based presentation (1). ...
... The hidden innovations utilized for AJAX incorporate 1) Javascript; 2) the Xmlhttprequest question first presented by Microsoft in Internet Explorer 5 and later joined into Mozilla based programs; 3) XML; 4) the Document Object Model (DOM) and 5) Falling Style Sheets for gauges based presentation (1). While these advances aren't new, their utilization by organizations like (Google Recommend and Google Maps) and Amazon (A9.com) what's more Yahoo (Flickr) [1,2] brought them (or what can be finished with them) to people in general's consideration in late 2005 and 2006. Gartner's 2006 report on the "Rising Technologies Hype Cycle" evaluated AJAX as "high effect and fit for arriving at development in short of what two years" [3]. ...
Conference Paper
Full-text available
The new outburst of Web 2.0 applications has twisted user's hope with respect to the web understanding. Users now look forward the web pages to perform like desktop applications, reacting to mouse actions and human being key strokes and to update only small part of the page at a time. While a number of technologies exist to build these rich internet applications one the most fashionable and extensively used is AJAX. AJAX isn't an innovative technology but uses lots of other of existing technologies including JavaScript, XML and the XMLHttpRequest object to realize asynchronous browser-server request/response and small amount of page updates. This paper will explore a few of the uses of AJAX along with the ways for implementing it and why it should be built-in in our core curriculum. In the same way the OpenAjax association has used a set of papers as a channel to help Web developers and IT higher management people to realize Ajax and to define a successful Ajax approach, and turn into memorable important role. OpenAjax plays important role in the development of the Ajax market. Ajax is a mixture of technologies used to make highly interactive, browser-based user interfaces (UIs), and it significantly enhances the presentation, performance, and usability of Web applications. This paper will provide the core essentials of Ajax as well as openAjax, what we can do with Ajax today, and how it supports different browsers and give the required result in minimal time even with small Internet speed with minimum time duration.
... First of all, the technology that has had the most impact on the evolution of the Web 2.0 is AJAX (Asynchronous JavaScript And XML) [35]. As its name stands for, it enables Web browsers to send and receive data from a server asynchronously, i.e. without blocking the Web page. ...
... They also offer different paradigms and thus the practices are diverging over time. For example, in recent years, there have even been communities emphasizing that the CSS should be written within the JavaScript code 35 . ...
... Developers now design architecture as depicted on the right part of Figure 1 In addition, since the introduction of Docker in March 2013, developers started to package their micro-services into lightweight containers. These containers are black-boxes from the in- 35. https://medium.com/dailyjs/what-is-actually-css-in-js-f2f529a2757 ...
Thesis
The World Wide Web is mainly composed of two types of application components: applications and services. Applications, whether they are mobile or Web applications, i.e. intended to be used from a browser, have in common that they are a kind of text to holes and communicate with the services to customize the application for each user. It is therefore the service that owns and manages the data. To make this communication possible, the services offer APIs following the REST architecture. The management of the life cycle of a REST API is then a central element of the development of systems on the Web. The first step in this life cycle is the definition of the requirements of an API (functionality and software properties). Then, the technologies that will allow it to be designed, implemented and documented are chosen. It is then implemented and documented and put online. From then on, applications can use it. Then follows a phase of maintenance and evolution of the API, in which bugs are fixed and functionalities evolve to adapt to the changes of its users' expectations. In this thesis, we review the methods and technologies that accompany the developer during this life cycle. We identify two open challenges. First, there are many technologies for creating and documenting an API. Choosing the most relevant technologies for a project is a difficult task. As a first contribution of this thesis, we establish criteria to compare these technologies. Then, we use these criteria to compare existing technologies and propose three comparison matrices. Finally, to simplify this selection, we have developed an open-source wizard available on the Web, which guides the developer in his choice. The second challenge we have identified is related to the maintenance and evolution of REST APIs. The existing literature does not allow a REST API to evolve freely, without the risk of breaking the applications that use it (their clients). The second contribution of this work is a new approach to the co-evolution of REST APIs and their clients. We have identified that by following 7 rules governing the documentation of the API and the data they return in response to its clients, it is possible to create Web user interfaces capable of adapting to the majority of evolutions of REST APIs without producing bugs, nor breaking them and without even requiring the modification of their source code.
... The name was coined by Jesse James Garret who was among the first to realize the significance of the new technology. Garrett (2005). decoupled changes in what the user sees from communication with the remote server. ...
... 47 The stand-alone platform cannot cut its price enough to 41 Calore (2014). 42 Garrett (2005).. 43 https://www.quora.com/Do-programmers-still-use-AJAX (viewed 1/16/20). ...
Preprint
Full-text available
The purpose of this chapter is to use value structure analysis to better understand how sponsors of digital exchange platforms capture value and maintain strategic bottlenecks. I begin by describing the three core technological processes that lie at the heart of all digital exchange platforms: (1) search and ad placement; (2) dynamic pricing; and (3) data analysis and prediction. These processes are carried out automatically and at high speed by computerized algorithms. The algorithms consist of steps, all of which are essential to the successful completion of a transaction or transmission of a message. However, bottlenecks are inevitable any synchronized multi-step flow process. The platform sponsor's first responsibility is thus to resolve bottlenecks in its core processes when and where they arise. One of an exchange platform's critical core processes is to generate predictions as to what the user would like to see and/or purchase. Better predictions speed up the flow and reduce the unproductive time users spend on the platform. Thus to be competitive today, platform sponsors must have the ability to gather data, generate predictions and test hypotheses within time intervals measured in milliseconds. Predictions can be improved by tracking individuals' behavior online, but only at the cost of reducing their privacy. The inevitable tension between performance and privacy has yet to be resolved. The chapter goes on to discuss how platform sponsors can "lock-in" members of an ecosystem through a combination of visible instructions, data storage, and specific inertia. It concludes by describing successful and unsuccessful attempts to disintermediate exchange platforms.
... With these goals on mind, a set of screen layouts and a storyboard [6] of all process were designed. For the design of these elements we considered guidelines for the design of the user interface [8] [9] and specifically the web user interface [4]. By example, we take some elements from the LMS and the IM system in order to implement them into Mensajero with the objective of reusing the user experience and knowledge in similar systems and facilities them to use it. ...
... A fundamental element for the search and notification module is AJAX [4]. AJAX (Asynchronous JavaScript and XML) is a combination of web technologies. ...
Conference Paper
Full-text available
The participation of the user is fundamental for the development of successful user interfaces. The end user's practice and knowledge can improve new or existing user interfaces of information systems. In this paper we present our experience and results of incorporating the end user into a developer team. The goal was to improve the user interface for an Instant Messaging (IM) component. This component was developed to improve the communication and collaboration between the users of an open source Learning Management System (LMS). The IM component integrates in a transparent way into the main LMS used by the Autonomous University of Yucatan. We show the process and results of the end user participation to improve the user interface of the IM component.
... IGV supports a wide range, i.e. all genome resolutions, all dataset sizes, real-time pan and zoom and the loading and viewing and group sorting of different data types. CBrowse is an AJAX-based [158] web browser for transcriptome assembly and contig visualization, contig analysis of transcriptome assemblies and variant calling. ...
Article
Full-text available
The Sequence Alignment/Map (SAM) format file is the text file used to record alignment information. Alignment is the core of sequencing analysis, and downstream tasks accept mapping results for further processing. Given the rapid development of the sequencing industry today, a comprehensive understanding of the SAM format and related tools is necessary to meet the challenges of data processing and analysis. This paper is devoted to retrieving knowledge in the broad field of SAM. First, the format of SAM is introduced to understand the overall process of the sequencing analysis. Then, existing work is systematically classified in accordance with generation, compression and application, and the involved SAM tools are specifically mined. Lastly, a summary and some thoughts on future directions are provided.
... A comparison of the classic web application model and the AJAX web application model14 . ...
Conference Paper
Full-text available
The World Wide Web has evolved from being a static environment to become a highly dynamic platform where a multitude of interactive web applications are created every day. A plethora of new technologies have been developed to enhance the user experience and developer productivity in recent years. These recent advances in web application development have brought into existence new concepts and technologies that are important for Computer Science and Software Engineering students to know about. There are various challenges instructors face teaching technology-oriented courses in Computer Science and Software Engineering areas. One of these challenges is to choose the right set of technologies to deliver the course content that would prepare students for industry jobs. In this paper, we present a framework for teaching web application development using a technology stack that meets the industry standards and provides the opportunity to teach the crucial concepts within one semester.
... For the frontend ( Figure 1A) we use the Django CMS (George, 2015) to implement the different views, HTML, CSS with Bootstrap (Spurlock, 2013) and JavaScript with Jquery (Bibeault et al., 2015). On the client-side, the application creates asynchronous web applications using Ajax (Garrett, 2005) to send and retrieve data from a server asynchronously in the backend. To transmit the requests and responses from the frontend to the backend, we employ the uWSGI software which acts as a web server gateway interface to communicate with the backend. ...
Article
Full-text available
Nowadays, an enormous amount of high dimensional data is available in the field of neuroscience. Handling these data is complex and requires the use of efficient tools to transform them into useful knowledge. In this work we present NeuroSuites, an easy-access web platform with its own architecture. We compare our platform with other software currently available, highlighting its main strengths. Thanks to its defined architecture, it is able to handle large-scale problems common in some neuroscience fields. NeuroSuites has different neuroscience-oriented applications and tools to integrate statistical data analysis and machine learning algorithms commonly used in this field. As future work, we want to further expand the list of available software tools as well as improve the platform interface according to user demands.
... For the visualization of results, we also rely on several third-party JavaScript libraries: DataTables [316] to create interactive tables and Highcharts [24], D3 [67], and Plotly [413] for interactive plots. The individual web sites use JQuery [161] or AJAX [172] bindings to communicate and interact with the API layer of our web server. A screenshot of the web interface is depicted in Figure 44. ...
... [32] JavaScript is a client-side browser programming language. With Asynchronous JavaScript And XML (AJAX), the web application model changed from synchronous to asynchronous, making websites more responsive to user interaction [45]. The scripting language's adoption on the internet reaches more than 95% according to [95]. ...
Preprint
Throughout recent years, the importance of internet-privacy has continuously risen. [...] Browser fingerprinting is a technique that does not require cookies or persistent identifiers. It derives a sufficiently unique identifier from the various browser or device properties. Academic work has covered offensive and defensive fingerprinting methods for almost a decade, observing a rise in popularity. This thesis explores the current state of browser fingerprinting on the internet. For that, we implement FPNET - a scalable & reliable tool based on FPMON, to identify fingerprinting scripts on large sets of websites by observing their behavior. By scanning the Alexa Top 10,000 websites, we spot several hundred networks of equally behaving scripts. For each network, we determine the actor behind it. We track down companies like Google, Yandex, Maxmind, Sift, or FingerprintJS, to name a few. In three complementary studies, we further investigate the uncovered networks with regards to I) randomization of filenames or domains, II) behavior changes, III) security. Two consecutive scans reveal that only less than 12.5% of the pages do not change script files. With our behavior-based approach, we successfully re-identify almost 9,000 scripts whose filename or domain changed, and over 86% of the scripts without URL changes. The security analysis shows an adoption of TLS/SSL to over 98% and specific web security headers set for over 30% of the scripts. Finally, we voice concerns about the unavoidability of modern fingerprinting and its implications for internet users' privacy since we believe that many users are unaware of being fingerprinted or have insufficient possibilities to protect against it.
... The frontend, on the other hand, is constructed utilizing HTML, CSS, and JavaScript, which are relatively familiar among developers, enabling users to quickly change it. Asynchronous JavaScript and XML (AJAX) (Garrett, 2007) is used to manage communication between the frontend and backend, allowing our system to support asynchronous messaging. Our annotation tool also supports Common Gateway Interface and Fast Common Gateway Interface; using the latter may greatly cut response time and enhance the user experience for annotators. ...
Preprint
Full-text available
Weak labeling is a popular weak supervision strategy for Named Entity Recognition (NER) tasks, with the goal of reducing the necessity for hand-crafted annotations. Although there are numerous remarkable annotation tools for NER labeling, the subject of integrating weak labeling sources is still unexplored. We introduce a web-based tool for text annotation called SciAnnotate, which stands for scientific annotation tool. Compared to frequently used text annotation tools, our annotation tool allows for the development of weak labels in addition to providing a manual annotation experience. Our tool provides users with multiple user-friendly interfaces for creating weak labels. SciAnnotate additionally allows users to incorporate their own language models and visualize the output of their model for evaluation. In this study, we take multi-source weak label denoising as an example, we utilized a Bertifying Conditional Hidden Markov Model to denoise the weak label generated by our tool. We also evaluate our annotation tool against the dataset provided by Mysore which contains 230 annotated materials synthesis procedures. The results shows that a 53.7% reduction in annotation time obtained AND a 1.6\% increase in recall using weak label denoising. Online demo is available at https://sciannotate.azurewebsites.net/(demo account can be found in README), but we don't host a model server with it, please check the README in supplementary material for model server usage.
... The view part of our web applications was constructed using JavaServer Pages (JSP) [40]. To improve the user experience, we used asynchronous JavaScript and XML (AJAX) [41], thus allowing the user's interaction with the application to happen asynchronously. ...
Article
Full-text available
Anonymous service delivery has attracted the interest of research and the industry for many decades. To obtain effective solutions, anonymity should be guaranteed against the service provider itself. However, if the full anonymity of users is implemented, no accountability mechanism can be provided. This represents a problem, especially when referring to scenarios in which a user, protected by anonymity, may perform illegally when leveraging the anonymous service. In this paper, we propose a blockchain-based solution to the trade-off between anonymity and accountability. In particular, our solution relies on three independent parties (one of which is the service provider itself) such that only the collaboration of all three actors allows for the disclosure of the real identity of the user. In all other cases, anonymity is guaranteed. To show the feasibility of the proposal, we developed a prototype with user-friendly interfaces that minimize the client-side operations. Our solution is then also effective from the point of view of usability.
... Some general JavaScript libraries such as jQuery and Backgrid were also used. JSON [25] was used as the data transfer format between server and client. ...
Article
Full-text available
Environmental data visualization tools are used for data validation, maintenance, and assessment of status and trends of environmental variables. However, currently available visualization tools do not meet all the requirements needed for efficient data management. In this paper, we propose a new approach and present a web-based implementation of a visualization tool that focuses on efficient visualization and seamless integration of maps and graphs. Our approach emphasizes the spatio-temporal relationship of environmental data stored in a relational database. Several new advantages emerge with this approach. Through a case study of two oceanographic datasets - the HarmoNIA project database and the Croatian national monitoring database - we show how this approach enables intuitive status and trend assessments, simplifies data validation, enables updating of corrections, and is suitable for a web-based implementation that works efficiently even with large datasets.
... The tool's interface also uses an event and object model operated with the aid of the jQuery library 11 , which also enables asynchronous communication among client and server, using the Ajax protocol (GARRETT et al., 2005). This feature runs natively on all modern browsers without the need to install additional software, which meets R2 and R3 requirements. ...
Thesis
Full-text available
A system-of-systems (SoS) is an arrangement of independent systems that work in synergy to fulfill missions that any of these systems in isolation cannot accomplish. SoS could be observed in several domains such as urban mobility, healthcare, and smart cities, to mention a few. A significant concern of SoS engineers refers to the independence of the constituent systems that have the autonomy to stop contributing or abandon an SoS, making it difficult to guarantee the quality of SoS at design time. This study aims to investigate good practices and recommendations that can be applied to the design of SoS to assure its proper operation. There fore, we herein adopted the term “heuristics” to refer to such good practices and recommendations. An exploratory study was conducted to understand the concerns regarding an SoS operating in a Brazilian public organization. We further conducted a systematic mapping study (SMS) to identify which practices have been applied in SoS design. The results were discussed in a focus group to organize the first set of heuristics. Finally, we surveyed experts to evaluate which heuristics are appropriate to SoS design, resulting in a heuristics catalog. To facilitate the understanding and implementation, the heuristics in this catalog have been organized into groups. Each heuristic was categorized according to its suitability for use based on the coordination level of the SoS. A tool was created that incorporates some of the heuristics from catalog to verify verify how the heuristics can facilitate the SoS design process. A feasibility study was conducted with practitioners to evaluate the ease of use and the usefulness of the tool. It was expected that the heuristics catalog and the tool would support researchers and professionals in the SoS design process and help identify critical issues during the design phase.
... The term "Ajax" (Garrett 2005) refers to a combination of techniques that allow continuous client-side updating with server-side information. AJAX stands for Asynchronous JavaScript And XML. ...
... Per ovviare alla lentezza del passaggio di informazioni sincrono da server a client, nel 2005 è stata sviluppata una tecnica chiamata AJAX (Garrett 2005). Sebbene esistessero implementazioni sperimentali prima di allora, fu solo nel 2004 e 2005 che la relativa implementazione divenne una best practice, anche grazie allo sviluppo dell'applicazione Google Maps che ne fece largo uso (Kawamata 2007). ...
Book
The series Ca' Foscari Japanese Studies , strong in the tradition well-established at the Dipartimento di Studi sull’Asia e sull’Africa Mediterranea, aims to be an international benchmark for the studies on Japan. It collects publications of high scientific rigor aimed at documenting the most original and theoretically advanced developments in this field, ranging from classicism to modernity. Its highly multidisciplinary vocation results in a production structured in four thematic areas: Arts and Literature; History and Society; Religion and Thought; Linguistic and Language Education.
... Further processing and analysis steps in the machine learning module, such as energy disaggregation, can be achieved with these energy consumption data. The processed digital data of the smart meter is sent to the master device's server via the Asynchronous Java-Script and XML (AJAX) technique [32] and is displayed in real-time as a dynamic line chart on the dashboard of the web-based GUI. ...
Article
Full-text available
Recent advances in machine learning and computer vision brought to light technologies and algorithms that serve as new opportunities for creating intelligent and efficient manufacturing systems. In this study, the real-time monitoring system of manufacturing workflow for the Smart Connected Worker (SCW) is developed for the small and medium-sized manufacturers (SMMs), which integrates state-of-the-art machine learning techniques with the workplace scenarios of advanced manufacturing systems. Specifically, object detection and text recognition models are investigated and adopted to ameliorate the labor-intensive machine state monitoring process, while artificial neural networks are introduced to enable real-time energy disaggregation for further optimization. The developed system achieved efficient supervision and accurate information analysis in real-time for prolonged working conditions, which could effectively reduce the cost related to human labor, as well as provide an affordable solution for SMMs. The competent experiment results also demonstrated the feasibility and effectiveness of integrating machine learning technologies into the realm of advanced manufacturing systems.
... Instead of loading a new webpage, an AJAX engine written in JavaScript is loaded by the browser. This engine is responsible for communicating with the server, allowing user interaction with the application to happen asynchronously and independent of the communication with the server(Garrett, 2005). ...
Thesis
Collaborative work has become an essential part of education, especially in higher education. Educational institutions are making increasing use of web-based technologies to support communication and collaboration among students. In this thesis, I address the problems of complexity and inflexibility in collaborative tools provided by educational institutions, such as Course Management System (Blackboard) and the different collaborative features it provides. There have been research studies that indicated the unsatisfactory adoption rate of collaborative features in CMS by students and teachers due to the complication and inflexibility of these tools (Guidry and BrckaLorenz, 2010; Papastergiou, 2006; Rosato et al., 2007). An examination of the key features and success factors in existing collaborative tools can provide insight into the design of a collaborative tool that better addresses students’ needs. First, I conducted a survey study with students in an urban university in Midwestern U.S, through which I identified the key features and success factors in collaborative tools from students’ perspectives. Second, through the integration of Web 2.0 technologies, I designed and developed U-Connect, a dynamic and interactive collaborative tool that allows students to easily and quickly create or join groups and share their ideas, thoughts and resources with each other while working in groups. Third, I conducted a pilot study to evaluate U-Connect and proposed a set of additional features and design recommendations for collaborative tools to better support academic group work.
... Was okonomisch zählt ist der Faktor " Sessions pro Server" . Speziell Webseiten die AJAX [7], Dynamisches HTML und Flash vielfältig einsetzen, können dabei ein Problem darstellen -hier wird manchmal sehr viel CPU-Leistung beansprucht, was zur Folge hat dass man die einzelnen Sessions bzgl. Ihres Ressourcenverbrauchsüberwachen und gegebenenfalls eingreifen muss (z.B.: die Priorität der ressourcenhungrigen Browser-Sitzung verringern). ...
... The next step was to move from server-side document generation to client-side. And later AJAX (Asynchronous JavaScript and XML) came into play [10]. It introduced a new level of User Experience and allowed to create dynamic user interfaces for complex systems rater than simple documents. ...
Article
Full-text available
This paper explores the concept of micro-frontends in web-development. Micro-frontends are the logical evolution of architecture for the front-end side of web-applications. It was evolved in conditions of continuous development browser platform that allowed to create rich applications that are easy to distribute and deliver to the user and at the same time provide an experience close to desktop applications. The article begins with an overview of how web-development and the architectural approaches within it evolved, including emergence of micro-services concept in back-end development , and existing researches on micro-frontends. Then, a case study on implementing the concept in an actual project is presented and issues risen during development are discussed. Topics of routing, static assets serving, and repository organization in the projects are discussed based on the experience of development. As a result of the case study, the micro-frontends architecture is found to better suit complex large-scale projects and big teams with experienced developers. The approach increases the complexity of project structure and development. At the moment of publication, the community does not have any ready-to-use solutions that can bootstrap the project and handle the additional complexity .
... The collected browser statistics are standard values like webdriver, webgl, header, language, device meomory, etc. according to the FingerprintJS [3]. To store the data online we used a local Apache server [76] with a MySQL database [56], to which the data was sent via Ajax [52] using Javascript [55]. Figure 3 shows the normalized gaze and mouse movement data. Each row corresponds to a separate image. ...
Preprint
Full-text available
In this work we inspect different data sources for browser fingerprints. We show which disadvantages and limitations browser statistics have and how this can be avoided with other data sources. Since human visual behavior is a rich source of information and also contains person specific information, it is a valuable source for browser fingerprints. However, human gaze acquisition in the browser also has disadvantages, such as inaccuracies via webcam and the restriction that the user must first allow access to the camera. However, it is also known that the mouse movements and the human gaze correlate and therefore, the mouse movements can be used instead of the gaze signal. In our evaluation we show the influence of all possible combinations of the three information sources for user recognition and describe our simple approach in detail. The data and the Matlab code can be downloaded here https://atreus.informatik.uni-tuebingen.de/seafile/d/8e2ab8c3fdd444e1a135/?p=%2FThe%20Gaze%20and%20Mouse%20Signal%20as%20additional%20Source%20...&mode=list
... • Data: Handles input data. As mentioned previously, the data table for OPENEDEYES is a JSON structure, that can be returned by AJAX [26] or by JSONP [27], regardless it's a local resource or a remote one. The choice for JSON instead of another popular format, such as XML [28], is because JSON is light-weight (faster and cheaper to be transfered through a network), easy to be read or written (can be manipulated in lots of programming languages, making it easy to be sent by a data server), subset of JavaScript (language on which OPENEDEYES is written), among other reasons [29]. ...
Article
Full-text available
A huge amount of digital data is produced everyday, which led us to a situation called ”data pollution”. A big challenge is to extract knowledge from all this data, but many times it is presented in a way that is not friendly for a human being. Information visualization tries to solve this problem by representing datasets graphically and so making easier the task of comprehending a large dataset. Many of the available information visualization tools focus on desktop, require advanced skills from the user or are based on proprietary technologies. This work proposes an open source framework for information visualization called OPENEDEYES, written in pure JavaScript and based on web standards. The framework implements some interactive visualization tools that run on any modern web browser, which shows its flexibility and extensibility. A case study using a real dataset was made for an empirical framework evaluation. Finally, a new visualization technique was proposed, a variation of the classic parallel coordinates technique, optimized for the web environment and for large datasets.
... The term Ajax (shorthand for Asynchronous JavaScript and XML) is known to have been coined by Jesse James Garrett in the year 2005 (Langley, 2006 (Garrett, 2005). The term very quickly became conventional to describe a phenomenon that started developing about eight years earlier and that came to the limelight with the use of such technologies by Google (Bisson, 2005;Gomes, 2005;LaMonica, 2005a) . ...
Article
Full-text available
As the Web enters its third decade of existence, I draw attention to the need to better understand the Web as a potential reference case for how an information system transforms through incremental innovations, with particular focus on the Web’s advancement as a communication media platform. As a necessary research step in this quest, I critically examine whether one can use existing media capacity theories and media-related buzzwords (such as rich media, multimedia, hypermedia, social media) to characterize Web innovations as media. I examine and clarify these buzzwords’ origins, meanings, and relationship with media capacity theories. I also elucidate discrepancies between them. Via inductive reasoning, I synthesize three media capacity dimensions (sensibility support, interactivity support and logistical support) as potential framework for objective media characterization. Each dimension could metamorphize into individual theories or one theory (e.g., sensibility interactivity and logistical support theory (SILST)). I present these dimensions’ indicators and demonstrate three-dimensional typology of Web innovation milestones anchored on the three dimensions—a step forward in substantiating the framework’s applicability to media capacity characterization. The final publication is available at the URL https://aisel.aisnet.org/cais/vol48/iss1/36/
Article
Full-text available
Oil spills pose a significant threat to the marine ecological environment. The intelligent interpretation of synthetic aperture radar (SAR) remote sensing images serves as a crucial approach to marine oil spill detection, offering the potential for real-time, continuous, and accurate monitoring. This study makes valuable contributions to the field of marine oil spill detection based on low-quality SAR images, focusing on the following key aspects: (1) We thoroughly analyze the Deep SAR Oil Spill dataset, known as the SOS dataset, a prominent resource in the domain of marine oil spill detection from low-quality SAR images, and rectify identified issues to ensure its reliability. (2) By identifying and rectifying errors in the original literature that presented the SOS dataset, and reproducing the experiments to provide accurate results, benchmark performance metrics for marine oil spill detection with low-quality SAR remote sensing images are established. (3) We propose three progressive deep learning-based marine oil spill detection methods (a direct detection method based on Transformer and UNet, a detection method based on FFDNet and TransUNet with denoising before detection, and a detection method based on integrated multi-model learning) and the performance advantages of the proposed methods are verified by comparing them with semantic segmentation models such as UNet, SegNet, and DeepLabV3+. (4) We introduce a feasible, highly robust and easily scalable system architecture approach that effectively addresses practical engineering applications. This paper is an important addition to the research on marine oil spill detection from low-quality SAR images, and the proposed experimental method and performance details can provide a reference for related research.
Chapter
The World Wide Web, as a collection of Web sites, Web services, and Web-enabled technologies, is a space of expression and contestation—a social construction of sorts. Additionally, the Web, as a locus of investigation, is gaining attention from scholars in the social sciences, feminist and critical theorists, as well as more recent poststructural reconceptualizations across many disciplines. One unifying interest is precisely the topic of this article: How might we recognize what is considered political and personal in a virtual space? To what sense can we distinguish political and personal expression online? This article frames the diverse perspectives for interrogating political and personal expression on the Web, while offering considerations for why these sorts of projects are at all necessary or useful. The determinacy of virtual, Web-based locations as political and/or personal is a complex endeavor. Does a prochoice posting to an anti-abortion online discussion group constitute a political act? What is potentially meant by “political”? Several discussion forums or news groups contain categories like “politics” or “government and politics” (see Yahoo! Groups for example); and yet, such groups may or may not be perceived as “political”. This perception of “being political” is dependent on certain philosophical tensions about what can be considered political in certain spaces and times. Other Web sites seek to build politics through the Web, via such movements as e-democracy, online deliberation, or public participation geographic information systems (Davies & Novack, forthcoming; Dragicevic & Balram, 2006). However, while building politics is certainly political, surficial analysis of such online-coalition building endeavors may resist or gloss the multiple political implications for constructing a politics. Therefore this entry contains a discussion of politics and “the political”; each as a perspective has certain methodological and empirical contingencies. Namely, how do we study online interactions? What sorts of data might we collect? Furthermore, how are we, as researchers, already implicated in our studies of online interactions? This entry proposes a diversity of approaches in studying interactions within the Web as informed by both the information sciences and the humanities and is organized into four sections: first, a background section which contemplates more traditional debate in political theory made relevant to studies of the Web; a second section which proposes (post)modernist and poststructuralist framings for researching personal and political expression; third, a section offering future research questions in this research area; and finally, conclusions that reflect upon research on the Web.
Article
The article discusses technologies for fast web application deployment design based on continuous information exchange with a corporate system developed using the 1C:Enterprise 8.3 platform. We identify data exchange formats between a web application and a software product based on the 1C:Enterprise 8.3 platform to handle the tasks of dynamically generated and adaptable interfaces. The study proposes the concept of a modifiable component-based architecture for the interaction of a web application with commercial data storage and processing systems. This concept makes it possible to implement a dynamic web application interface design and to automate the data management functionality directly from the enterprise solution based on the 1C:Enterprise 8.3 platform. The article formulates the criteria and operating principles for such an application. We have also developed system technologies to design a web application that can be integrated into replicated software solutions permitting control of the mechanisms for dynamic interface design and data transfer from the solution to a web application. The launched application for web application interfaces designing makes it possible to dynamically change the components of web forms as well as determine the details displayed to the user in the output interface. In addition, we describe the principles of dynamic interaction between a web application and the data interface management component. The research enabled us to identify the components of the module for interaction of interfaces with the web application. A conceptual universal control scheme for generating dynamic interfaces has been formulated. It can be implemented to create almost any kind of web forms, including processing incoming data from a web application using the REST interchange in JSON format. The article provides a comparison of interchange formats. We describe implemented IT-projects for organizing a prospective student’s personal account and the applicant’s dynamic rating. These projects are the result of the ideas proposed in the article.
Article
The explosion of information has resulted in incremental search becoming an essential tool for many websites. This technology provides real-time suggestions by sending the current query to the server. Despite encryption, search requests can be leveraged by passive attackers to infer the query typed by the user. In this paper, we show that at least nine of Alexa’s top 50 websites have serious side-channel leaks. More importantly, we use information theory to quantify the leakage and report the upper bound of recognition accuracy that an attacker can achieve. We further develop a generic attack attempting to infer users’ queries by monitoring web search traffic. Experimentally, the attack performance is close to the theoretical bounds. The most vulnerable website allows up to 53% of English queries and 76% of Chinese queries to be identified from 825k and 140k queries, respectively. Overall, our work highlights the prevalence of such side-channel leaks on the Internet and provides insights for developers to help mitigate the threat.
Preprint
Full-text available
Earlier there was no mode of online communication between users. In big or small organizations communication between users posed a challenge. There was a requirement to record these communications and store the data for further evaluation. The idea is to automate the existing Simple Chat Room system and make the users utilize the software so that their valuable information is stored digitally and can be retrieved for further management purposes. There was no online method of communicating with different users. There were many different interfaces available in the market but this method of using windows sockets to communicate between nodes would be fast and reliable. The main objective of our Simple Chat Room project is to create a chat application that helps different users to communicate with each other through a server connected. This is a simple chat program with a server and can have many clients. The server needs to be started first and clients can be connected later. Simple Chat Room provides bidirectional communication between client and server. It enables users to seamlessly communicate with each other. The user can chat using this chat application. If the user at the other end is active then they can start a chat session. The chat is recorded in this application.
Article
Full-text available
Earlier there was no mode of online communication between users. In big or small organizations communication between users posed a challenge. There was a requirement to record these communications and store the data for further evaluation. The idea is to automate the existing Simple Chat Room system and make the users utilize the software so that their valuable information is stored digitally and can be retrieved for further management purposes. There was no online method of communicating with different users. There were many different interfaces available in the market but this method of using windows sockets to communicate between nodes would be fast and reliable. The main objective of our Simple Chat Room project is to create a chat application that helps different users to communicate with each other through a server connected. This is a simple chat program with a server and can have many clients. The server needs to be started first and clients can be connected later. Simple Chat Room provides bidirectional communication between client and server. It enables users to seamlessly communicate with each other. The user can chat using this chat application. If the user at the other end is active then they can start a chat session. The chat is recorded in this application.
Article
Full-text available
Due to the COVID-19 emergency, Ca’ Foscari University of Venice has reorganized a large part of its courses for on-line delivery through the LMS Moodle. Unfortunately, this platform, besides having a particularly complex interface to use, does not have modules dedicated to the teaching of Japanese. Addressing this issue, this paper proposes the design of a module for kanji teaching integrated with the Moodle workflow, to produce complete and printable kanji sheets with all the necessary information, thus reducing teacher workload. The methodology used derives from an Instructional System Design development model (SAM, Successive, Approximation Model) that allows continuous feedback from the teacher, so as to adapt the developed prototype to his/her teaching needs.
Chapter
Due to the high maintenance cost of traditional online auction system, poor load balance ability and down problems occurring in the peak value of system access, this paper aims to propose a solution to transit from traditional online auction system to cloud computing to get higher work efficiency, lower expenditure and less energy cost. The GAE platform is used to deploy application of the overall framework of online auction system in cloud computing, including development environment as well as online auction system components, and software architecture. The online auction negotiation algorithms in cloud computing are also proposed. Based on these key technologies, the business processes of the online auction system in cloud computing is designed, including users' login system, starting an auction, bidding processes, online auction data storage, and logout system. The online auction system constructed on GAE platform with cloud computing resources and storage ability can reduce the pressure of terminal equipment, which is more robust than traditional online auction system facing users' changeable needs in the process of online auction.
Article
Full-text available
La tecnología como otras áreas se encuentra en constante evolución, buscando la “mejor” herramienta a nuestras necesidades, pero ¿nuestras necesidades son siempre iguales? ¿estamos evolucionando?, por ejemplo no estamos satisfechos si no contamos con una computadora con red inalámbrica, que reproduzca archivos mp3, etc, pero ¿y el software?, utilizamos productos que nos son de gran utilidad, pero ni son los mejores ni están al alcance de todos en relación a costo y beneficio, sin darnos la oportunidad de mejores opciones de software con menor hardware y costo de licencia. Este trabajo está enfocado en el uso de un S.O. JeOs (Sólo lo Necesario de un S.O.), el cual fue realizado en SUSE Studio, que permite crear versiones a medida de SUSE Linux, personalizado con aplicaciones libres orientadas a materias de la carrera de TICs en la Universidad Tecnológica del Usumacinta mitigando la gran cantidad de virus y software pirata.
Chapter
Dieses Kapitel befasst sich mit den Grundlagen des E-Shops als virtueller Verkaufsraum eines Unternehmens. Einleitend wird der E-Shop definiert und die Kerntreiber des elektronischen Verkaufs herausgestellt. Anschließend werden die Anforderungen an E-Shop-Systeme durch elektronische Verkaufsprozesse dargestellt sowie die Pflege, die äußere Gestaltung und die Basisfunktionen eines E-Shop-Systems erläutert. Die Systemanforderungen basieren dabei auf den allgemeinen Qualitätsmerkmalen internetbasierter Software: Benutzbarkeit (Usability), Barrierefreiheit (Accessibility), Skalierbarkeit, Erweiterbarkeit, Internationalisierbarkeit und Sicherheit.
Conference Paper
Full-text available
Push Communication is an integral requirement in modern Rich Web-based Applications, to implement the features like push notifications or real-time updates. Aspects like push-communication related concepts and their development technologies – focusing on the roots of them and the rationale behind their advancements – are not collectively discussed in any available forum. An intensive literature survey was conducted on identifying the very roots of the push-communication and its evolution towards understanding the abstract architectural formalism of the push-communication in Rich Web-based Applications, also focusing on the aforementioned aspects. We collected and documented the literature regarding the evolution of the push-communication, for archiving and also for reviewing and comparing the reasoning behind the improvements of them over time. We also tried to capture the knowledge to answer some important questions like is push-communication important and how difficult to integrate push-communication into the Rich Web-based Applications? We expect to study the artefacts identified through the survey to identify the abstract characteristics of the push-communication to realize the integration of the push-communication into the Rich Web-based Applications in the form of Delta-Communication.
Chapter
Forms are a common part of web applications. They provide a method for the user to interact with the web application. However, forms in traditional applications require entire web pages to be refreshed every time they are submitted. This model is inefficient and should be replaced with Ajax-enabled forms. Ajax is a set of web development technologies that enables web applications to behave more like desktop applications, thus allowing a richer, more interactive and more efficient model for interactions between the user and the web application. This paper presents a refactoring system called Form Transformation Tool (FTT) to assist web programmers refactor traditional forms into Ajax-enabled forms while ensuring that functionality before and after refactoring is preserved.
Thesis
Full-text available
III摘要股市是现代经济活动的重要标志之一。有效市场假说认为每当相关信息出现时,这个信息就会被快速的传播,进而反映到股票的价格上。也就是说没有方法可以使投资者在不承担额外风险的情况下,得到额外的收益。但是随着相关领域研究的进步,发现了一些由于投资者心理因素产生的非理性投资选择产生的一些可以被利用的规律,其中包括过度反应以及股市的周期。这些规律可能存在于在上海证券交易所交易的股票之中。本篇论文中提出并实现了一个基于过度反应的、以股价变动程度为反转基准的预测股市未来走向的算法。通过自动根据既往股市数据进行模拟交易,确定以何种股价变动程度为反转阈值可以得到较高的且稳定的回报。除此之外,还实现了多步买入算法来减少投资的风险,并通过实验确定其对于投资收益的影响。最后,通过自动计算上述算法在不同股票上的适用程度,生成出适合使用本论文中所提出的算法进行投资的股票的列表。研究的结果表明,以本论文所提出的算法为依据在推荐的股票上在推荐的时机进行的交易可以获得比当年股市型基金平均收益更高的收益。可以使用本论文中基于Julia的软件系统,实现为用户提供股票推荐和买入卖出时机推荐。
Chapter
Online experimentation allows students from anywhere to operate remote instruments at any time. The current techniques constrain users to bind to products from one company and install client side software. We use Web services and Service Oriented Architecture to improve the interoperability and usability of the remote instruments. Under a service oriented architecture for online experiment system, a generic methodology to wrap commercial instruments using IVI and VISA standard as Web services is developed. We enhance the instrument Web services into stateful services so that they can manage user booking and persist experiment results. We also benchmark the performance of this system when SOAP is used as the wire format for communication and propose solutions to optimize performance. In order to avoid any installation at the client side, the authors develop Web 2.0 based techniques to display the virtual instrument panel and real time signals with just a standard Web browser. The technique developed in this article can be widely used for different real laboratories, such as microelectronics, chemical engineering, polymer crystallization, structural engineering, and signal processing.
Chapter
Geographic information is created by manipulating geographic (or spatial) data (generally known by the abbreviation geodata) in a computerized system. Geo-spatial information and geomatics are issues of modern business and research. It is essential to provide their different definitions and roles in order to get an overall picture of the issue. This article discusses about the problematic of definitions, but also the technologies and challenges within spatial data fusion.
Chapter
Product-related information can be found in various data sources and formats across the product lifecycle. Effectively exploiting this information requires the federation of these sources, the extraction of implicit information, and the efficient access to this comprehensive knowledge base. Existing solutions for product information management (PIM) are usually restricted to structured information, but most of the business-critical information resides in unstructured documents. We present a generic architecture for federating heterogeneous information from various sources, including the Internet of Things, and argue how this process benefits from using semantic representations. A reference implementation tailor-made to business users is explained and evaluated. We also discuss several issues we experienced that we believe to be valuable for researchers and implementers of semantic information systems, as well as the information retrieval community.
ResearchGate has not been able to resolve any references for this publication.