Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Web Applications

The introduction of the java programming language [206 considerably increased the interactivity of web applications and allowed chemical information to be into-... [Pg.138]

Geological Survey of Western Australia has combined its regional geochemical data with other lithogeochemical information in a corporate database, and delivered the data via a customised web application which combines... [Pg.415]

Bioinformadcs has invaded most wet-lab environments, where databank searches in Genbank and PubMed, and thus algorithms such as blast, have become indispensable tools in the daily routine. This is largely due to the fact that the most often used services are available as convenient web applications and require little or no thought about such details as getting and ins tailing software or reading technical manuals. [Pg.177]

Figure 8.2 is a typical layered architecture in a Web application. It also shows how the layers are typically distributed among the physical tiers. [Pg.45]

Figure 8.2 A layered architecture in a Web application and how typically these layers are distributed among the three physical tiers. Figure 8.2 A layered architecture in a Web application and how typically these layers are distributed among the three physical tiers.
Tang, W.Z. and Pierotti, A.J., WWW database of disinfection by-product properties and related QSAR information, in Handbook on Quantitative Structure Activity Relationships (QSARs) for Pollution Prevention, Toxicity Screening, Risk Assessment and Web Applications, Walker, J.D., Ed, SETAC Press, Pensacola, FL, 2000. [Pg.182]

Gobas, F.A.P.C. 1993. A model for predicting the bioaccumulation of hydrophobic organic chemicals in aquatic food-webs application to Lake Ontario. Ecol. Modelling 69 1-17. [Pg.249]

The main goal of the application is to provide system operators with a view of the security status of the information system. As such, it collects events generated by multiple components of the information system and normalizes them into a generic format. Events are then homogenized to facilitate the display in a generic web application. The architecture of the application is presented in Figure 1. [Pg.351]

Presentation is presented at the upper right comer of Figure 1. Presentation is the provider of information from our application to the outside world. Events are accessed by the operators through a web application. This web application supports both synthetic visualization for on-the-spot event handling and in-depth digging for forensics and trending purposes. [Pg.356]

O. Casher and H. S. Rzepa. 2006. SemanticEye a Semantic Web application to rationalize and... [Pg.166]

Use proper remote engineering tools and online web applications... [Pg.281]

If the process requires wiping of the excess liquid from the web, applicators of different design are used. The most wiping is achieved by sharp knives, the least with... [Pg.137]

An additional set for desktop applications (e.g., spreadsheets, databases, and Web applications) may be needed, but more typically these are included within the general scope of IT systems. [Pg.53]

The Internet by its nature is an insecure and unreliable environment and therefore without special precautions is not compliant with the above-mentioned requirements. For example, the TCP/IP Internet communication protocol was not originally designed to accommodate security commands. Almost daily we hear in the news about hackers, viruses, scam artists, and on-line predators. For example, the Open Web Application Security Project (OWASP) published a 27-page report about the top ten Web application security vulnerabilities. They include ... [Pg.898]

The Open Web Application Security Project (OWASP) has identified unvalidated paramters as the number one reason for vulnerability of Web applications. Validation of an Internet application... [Pg.904]

When we validate Web applications we should also look at Internet specifics. For example, special attention should be given to the validation of authorized access. Tests to validate authorized access should be performed during initial set-up and repeated on an ongoing basis. [Pg.905]

User interface of Web applications are browsers such as Netscape s Navigator or Microsoft s Internet explorer. The compatibility of various browsers with the applications should be tested. Testing should include ... [Pg.905]

Usability testing is important for any software project and done during the design phase. It is extremely important because Web applications are used by many different users with different skill sets and expectations. Typically user interface prototypes are developed and tested by all types of anticipated users. Easy navigation through screens and applications are most important for Web applications. There are a couple of more considerations specifically for Web applications ... [Pg.906]

Security testing is most important for Web applications. Users need to be confident that only authorized users can get accesses to confidential data. Access through the public Internet should be encrypted and confidentiality and authenticity should be tested. Test scenarios should be set up to ... [Pg.906]

In order to maximize the value of the applied thermodynamics system throughout the enterprise, it must be accessible to all process engineers and chemists who require accurate thermophysical property calculations in their daily work. Web applications, which do not require installation of the calculation engine on the user s computer, facilitate ea.sy access to the system. Web applications can be designed to provide pure component data such as normal boiling point and critical properties. They can also provide access to the most frequently carried out calculations, such as phase equilibrium calculations, tabulation, and plotting of pure component properties as a function of temperature and pressure, and mixture property calculations. [Pg.169]


See other pages where Web Applications is mentioned: [Pg.68]    [Pg.50]    [Pg.621]    [Pg.46]    [Pg.66]    [Pg.240]    [Pg.291]    [Pg.292]    [Pg.126]    [Pg.156]    [Pg.77]    [Pg.112]    [Pg.2]    [Pg.5]    [Pg.897]    [Pg.899]    [Pg.901]    [Pg.903]    [Pg.905]    [Pg.907]    [Pg.170]    [Pg.13]    [Pg.15]    [Pg.219]    [Pg.530]    [Pg.531]    [Pg.331]    [Pg.43]   


SEARCH



Spreading Awareness of Traffic Safety through Web Application

Use of the web application

© 2024 chempedia.info