Добірка наукової літератури з теми "Secure web-application development"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure web-application development".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Secure web-application development"

1

Arif Ulla, Sayyad. "Secure Development - Web Application Security." IOSR Journal of Computer Engineering 14, no. 6 (2013): 14–22. http://dx.doi.org/10.9790/0661-1461422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lee, Junho, Jungwoong Woo, Cheongan Lee, and Kyungsoo Joo. "A Software Development Methodology for Secure Web Application." International Journal on Advanced Science, Engineering and Information Technology 9, no. 1 (February 28, 2019): 336. http://dx.doi.org/10.18517/ijaseit.9.1.5987.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Moon, Jae-Chan, and Seong-Je Cho. "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development." Journal of the Korea Society of Computer and Information 17, no. 2 (February 29, 2012): 127–37. http://dx.doi.org/10.9708/jksci.2012.17.2.127.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Kornienko, D. V., S. V. Mishina, and M. O. Melnikov. "The Single Page Application architecture when developing secure Web services." Journal of Physics: Conference Series 2091, no. 1 (November 1, 2021): 012065. http://dx.doi.org/10.1088/1742-6596/2091/1/012065.

Повний текст джерела
Анотація:
Abstract The article is devoted to the development of a prototype of a secure single page-application (SPA) web service for automating user information accounting. The relevance of this study is very high due to the use of web services. The article provides a classification of web applications and shows the features of the architecture of a single page application used in the development of the service. Based on a comparative analysis of the architectural styles of the API, the most appropriate style was selected. Considered and taken into account the key points of the development of a secure application programming interface (API), the requirements that must be met by RESTful API services. The work used popular authentication schemes (methods). A comparative characteristic of web frameworks of the Python programming language is given, on the basis of which a tool for implementing a web service is selected. Shows the main advantages of using Python when developing paged web services and the security tools included in the standard package of the Flask web services development framework. Shows how to securely prototype a Python RESTful SPA Web Service API using Flask. An example of using the Swagger tool to describe the specifications of the developed API is given. The process of setting up the application is considered in detail. The main recommendations for securing a web application, setting up a database and a web server are listed. The key points of ensuring the protection of the developed web application are considered. Conclusions are made regarding the choice of the architectural style of the application API, the most suitable tools and technologies for the software implementation of the service.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pathak, Nitish, B. M. Singh, and Girish Sharma. "UML 2.0 based framework for the development of secure web application." International Journal of Information Technology 9, no. 1 (February 22, 2017): 101–9. http://dx.doi.org/10.1007/s41870-017-0001-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nathawat, Mukul Singh. "Development of Ecommerce Web Application: Pick & Buy." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3683–85. http://dx.doi.org/10.22214/ijraset.2021.35628.

Повний текст джерела
Анотація:
Electronic commerce is a process of performing business through online modes using computer networks. Now-a-days Ecommerce is seen as an important part of many businesses and business plan. It is beneficial in terms of cost reduction, fast buying, affordable advertisements and marketing, flexibility for buyers, product and price comparison and last but not the least time- saving. Using Ecommerce websites for shopping is not only easy and effortless but also less time consuming. Ecommerce is useful for feedbacks and helps the business owners to build a more efficient and secure business environment for customers.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mouratidis, Haralambos, and Miao Kang. "Secure by Design." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 23–41. http://dx.doi.org/10.4018/jsse.2011070102.

Повний текст джерела
Анотація:
This paper describes results and reflects on the experience of engineering a secure web based system for the pre-employment screening domain. In particular, the paper presents results from a Knowledge Transfer Partnership (KTP) project between the School of Computing, IT and Engineering at the University of East London and the London-based award winning pre-employment company Powerchex Ltd. The Secure Tropos methodology, which is based on the principle of secure by design, has been applied to the project to guide the development of a web based system to support employment reference and background checking specifically for the financial services industry. Findings indicate the potential of the methodology for the development of secure web based systems, and support the argument of incorporating security considerations from the early stages of the software development process, i.e., the idea of secure by design. The developed system was tested by a third, independent to the project, party using a well known method of security testing, i.e., penetration testing, and the results provided did not indicate the presence of any major security problems. The experience and lessons learned by the application of the methodology to an industrial setting are also discussed in the paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Korneva, L. A., and P. B. Khorev. "Development of framework secure application with client-server architecture." Informacionno-technologicheskij vestnik 15, no. 1 (March 30, 2018): 112–19. http://dx.doi.org/10.21499/2409-1650-2018-1-112-119.

Повний текст джерела
Анотація:
When creating software systems developers need to choose the most effective design solutions, which may make frameworks, created by other developers. Such a framework can be used as a basis for new applications. Not all available client-server application developers frameworks give due regard to the safety of such applications. So there is a need to develop a framework to create a secure client-server application. To create such a framework in the Java programming language is selected. This article provides a set of components that are required to create a framework of information security-oriented Web applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Qu, Bo, and Zhong Xue Yang. "Design of Web Based Secure Embedded System in C." Applied Mechanics and Materials 347-350 (August 2013): 1635–40. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1635.

Повний текст джерела
Анотація:
This paper describes the design and implementation of Web based secure embedded system, including tiny secure Web server, embedded system-based CGI library, and utilities for security, such as CAPTCHA program and mail sending program. The entire system is designed in C by the author of this paper on Linux platform with GNU tool chain. A Web based secure embedded application demo system is also designed to show the architecture and running effect. On the premise of implementing essential functions, the scale of the system is designed as small as possible therefore it is suitable not only for embedded Linux development on Web based applications but also for embedded system course teaching in colleges and universities. By some further extensions, it can also be used on development of general Web based MIS.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Xu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.

Повний текст джерела
Анотація:
Mobile e-commerce systems are the big trend of international economy and social development now days, and also the key process of industry upgrade, industrialization and modernization in our country. Mobile e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. With the help of Chinese Wall, web services are becoming popular in Web applications. In the end, we present strategies for e-commerce application: trusted e-commerce module.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Secure web-application development"

1

Chen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.

Повний текст джерела
Анотація:
This project "Designing Secure, Java Based Online Registration Systems to Meet Peak Load Performance Targets" is a simulation of a Web-based exposition management system plus a performance testing procedure to examine this web application.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Соколов, Руслан Миколайович. "Поліпшення захисту веб-застосунків впровадженням моделі білого списоку при розробці". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2019. https://ela.kpi.ua/handle/123456789/31341.

Повний текст джерела
Анотація:
Робота обсягом 46 сторінок містить 9 рисунків, 9 таблиць та 13 літературних посилань, 1 додаток. Метою даної кваліфікаційної роботи є проектування та створення прототипу методики розробки захищених веб-застосунків на основі моделі білого списку. Об’єктом дослідження є сучасні методи розробки захищених безпечних веб-застосунків Предметом дослідження є поліпшення захисту і контроль за впровадженням механізмів захисту веб-застосунків. Наукова новизна полягає в тому, що вперше було застосовано модель білого списку як методику розробки захищених веб-застосунків. Результати роботи представлені методикою розробки захищених веб-застосунків, яка була успішно застосована і демонструє особливості безпеки впровадження моделі білого списку під час розробки. Результати роботи можуть бути використані як додатковий модуль при проектуванні повноцінних методик розробки захищених застосунків для удосконалення механізмів захисту і контролем за їх працездатністю.
The work contains 46 pages, 9 figures, 9 tables, 13 references, 1 attachment. The aim of this qualification work is to design method concept for secure web application development based on whitelist model. The subject of the study is improving security and controlling web-application security implementation. Scientific novelty is the fact that for the first time whitelist model was used as methodic for secure web-application development. The results of the work are presented by secure development methodic which was successfully used and demonstrate security features of whitelist model implementation during development stage. The results of the work can be used as additional module during designing completed secure web apps development methodology for improving and controlling web-application security implementation.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Secure web-application development"

1

Bhargav, Abhay. Secure Java: For web application development. Boca Raton, FL: CRC Press, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

IBM WebSphere Application Server 8.0 administration guide: Learn to administer a reliable, secure, and scalable environment for running application with IBM WebSphere Application Server 8.0. Birmingham, U.K: Packt Publishing, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Developing Java Web services: Architecting and developing secure Web services using Java. Indianapolis, Ind: Wiley, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Inc, ebrary, ed. WebSphere Application Server 7.0 administration guide: Manage and administer your Websphere Application Server to create a reliable, secure, and scalable environment for running your applications. Birmingham, UK: Packt Publishing, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Michel, Van Zoest, and ebrary Inc, eds. Oracle APEX 4.0 cookbook: Over 80 great recipes to develop and deploy fast, secure, and modern web applications with Oracle Application Express 4.0. Birmingham, U.K: Packt Enterprise, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Inc, ebrary, ed. Oracle WebCenter 11g PS3 administration cookbook: Over 100 advanced recipes to secure, support, manage, and administer Oracle WebCenter. Birmingham [England]: Packt Pub. Ltd., 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Secure Java: For Web Application Development. Taylor & Francis Group, 2017.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kabir, Mohammed J. Secure PHP Development: Building 50 Practical Applications. Wiley, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Nagappan, Ramesh, Robert Skoczylas, and Rima Patel Sriganesh. Developing Java Web Services: Architecting and Developing Secure Web Services Using Java. Wiley, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Secure your Node.js web application: Keep attackers out and users happy. 2016.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Secure web-application development"

1

Susheel, S., N. V. Narendra Kumar, and R. K. Shyamasundar. "Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control." In Information Systems Security, 551–61. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

"Web Application Attack Surface." In Secure Development for Mobile Apps, 15–36. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17561-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

"Web Application Attack Surface." In Secure Development for Mobile Apps, 44–65. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17561-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Balasubramanian, Kannan. "Developing Security Enabled Applications for Web Commerce." In Application Development and Design, 384–96. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch015.

Повний текст джерела
Анотація:
As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Tappenden, A. F., T. Huynh, J. Miller, A. Geras, and M. Smith. "Agile Development of Secure Web-Based Applications." In Integrated Approaches in Information Technology and Web Engineering, 257–77. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-418-7.ch017.

Повний текст джерела
Анотація:
This article outlines a four-point strategy for the development of secure Web-based applications within an agile development framework and introduces strategies to mitigate security risks that are commonly present in Web-based applications. The proposed strategy includes the representation of security requirements as test cases supported by the open source tool FIT, the deployment of a highly testable architecture allowing for security testing of the application at all levels, the outlining of an extensive security testing strategy supported by the open source unit-testing framework HTTPUnit, and the introduction of the novel technique of security refactoring that transforms insecure working code into a functionally-equivalent secure code. Today, many Web-based applications are not secure, and limited literature exists concerning the use of agile methods within this domain. It is the intention of this article to further discussions and research regarding the use of an agile methodology for the development of secure Web-based applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chung, Sam, Conrado Crompton, Yan Bai, Barbara Endicott-Popovsky, Seung-Ho Baeg, and Sangdeok Park. "Analyses of Evolving Legacy Software into Secure Service-Oriented Software using Scrum and a Visual Model." In Software Design and Development, 1764–86. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4301-7.ch084.

Повний текст джерела
Анотація:
This chapter explores using service-oriented computing to reengineer non-secure legacy software applications to create new secure target applications. Two objectives of this chapter are: (1) to analyze the architectural changes required in order to adopt new web technologies and cope with resultant vulnerabilities in source code; and (2) to measure the level of effort required to modernize software by adopting new web technologies and adding security countermeasures. To meet these objectives, a model-driven Scrum for Service-Oriented Software Reengineering (mScrum4SOSR) methodology was chosen and applied to a reengineering project. Scrum is employed to manage the reengineering project, as well as to measure implementation effort related to the modernization process. Further, a re-documentation technique called 5W1H Re-Doc is used to re-document the non-secure software application at a high level of abstraction in order to help project participants comprehend what is needed to identify candidate services for service-oriented reengineering. Case studies with and without security features are created for different types of applications - a desktop graphical user interface, a web application, a web services application, a restful web services application, and an enterprise service bus application.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Atzeni, Andrea, John Lyle, and Shamal Faily. "Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms." In Application Development and Design, 539–64. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch023.

Повний текст джерела
Анотація:
The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable solutions for the development, implementation, and deployment of complex cross-domain systems, in this chapter, the authors analyse and critically discuss the security-relevant decisions made developing the Webinos security framework. Webinos is an EU-funded FP7 project, which aims to become a universal Web application platform for enabling development and usage of cross domain applications. Presently, Webinos runs on a number of different devices (e.g. mobile, tables, PC, in-car systems, etc.) and different Operating Systems (e.g. various Linux distributions, different Windows and MacOSx versions, Android 4.x, iOS). Thus, Webinos is a representative example of cross-platform framework, and even if yet at beta level, is presently one of the most mature, as a prototype has been publicly available since February 2012. Distilling the lessons learned in the development of the Webinos public specification and prototype, the authors describe how potential threats and risks are identified and mitigated, and how techniques from user-centred design are used to inform the usability of security decisions made while developing the alpha and beta versions of the platform.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Dixit, Priyanka. "Security Issues in Web Services." In Handbook of Research on Network Forensics and Analysis Techniques, 57–64. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch004.

Повний текст джерела
Анотація:
This chapter describes how security is an important aspect in today's digital world. Every day technology grows with new advancements in various areas, especially in the development of web-based applications. All most all of the web applications are on the internet, hence there is a large probability of attacks on those applications and threads. This makes security necessary while developing any web application. Lots of techniques have been developed for mitigating and defending against threats to the web based applications over the internet. This chapter overviews the important region of web application security, by sequencing the current strategies into a major picture to further the future research and advancement. Firstly, this chapter explains the major problem and obstacles that makes efforts unsuccessful for developing secure web applications. Next, this chapter distinguishes three basic security properties that a web application should possess: validation, integrity, accuracy and portray the comparing vulnerabilities that damage these properties alongside the assault vectors that contain these vulnerabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kaur, Daljit, and Parminder Kaur. "Case Study." In Designing, Engineering, and Analyzing Reliable and Efficient Software, 239–50. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2958-5.ch014.

Повний текст джерела
Анотація:
This chapter is an effort to develop secure web applications based on known vulnerabilities. It has been seen that in the rapid race of developing web applications in minimum time and budget, security is given the least importance, and a consequence of which is that web applications are developed and hosted with a number of vulnerabilities in them. In this race, one thing is constant that attackers take advantage of weaknesses existing in technology for financial gain and theft of intellectual property. In this proposed method of secure web development, most common vulnerabilities and their occurrence in development process is discussed. Mapping vulnerabilities to the actions needed to take during development process may help developers to understand vulnerability and avoid vulnerabilities in application.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yadav, Abhinav, Amrit Kanoi, and Ramani Selvanambi. "Blockchain Technology in E-Healthcare." In Blockchain Technologies for Sustainable Development in Smart Cities, 110–34. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9274-8.ch007.

Повний текст джерела
Анотація:
Blockchain is one of the technologies that is gaining significant attention within the healthcare industry. In order for blockchain to reach its full potential, it's essential that governments and public institutions map the blockchain ecosystem and establish a blockchain framework for coordinating early adopters. The authors have proposed a web-based application using blockchain with security algorithms to store patients' and other users' details who sign up on the website. Blockchain is highly secure as any tampering with data in any block is not possible. Blockchain attributes ensure smooth interaction between different applications and systems along the availability chain. They also reward the patient with their own implemented bitcoin on their transaction. Ethereum library Web3 is used to make a complete decentralized peer-to-peer chat service without any involvement of a third party. The application will be able to send encrypted messages both securely and anonymously. Blockchain technology has been seeing widespread interest as a means to ensure the CIA triad in fewer environments.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Secure web-application development"

1

Subedi, B., Abeer Alsadoon, P. W. C. Prasad, and A. Elchouemi. "Secure paradigm for web application development." In 2016 15th RoEduNet Conference: Networking in Education and Research. IEEE, 2016. http://dx.doi.org/10.1109/roedunet.2016.7753243.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lee, David, Brandon Steed, Yi Liu, and Onyeka Ezenwoye. "Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration." In 2021 IEEE Secure Development Conference (SecDev). IEEE, 2021. http://dx.doi.org/10.1109/secdev51306.2021.00014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lapets, Andrei, Nikolaj Volgushev, Azer Bestavros, Frederick Jansen, and Mayank Varia. "Secure MPC for Analytics as a Web Application." In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 2016. http://dx.doi.org/10.1109/secdev.2016.027.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Glisson, William Bradley, L. Milton Glisson, and Ray Welland. "Secure Web Application Development and Global Regulation." In Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Noor, Umara, and Zahid Rashid. "Secure Semantic Web Application Development: Present and Future." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.263.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Maier, Patrik, Zhendong Ma, and Roderick Bloem. "Towards a Secure SCRUM Process for Agile Web Application Development." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3103171.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gupta, Shivangi, and Saru Dhir. "Issues, Challenges and Estimation Process for Secure Web Application Development." In 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 2016. http://dx.doi.org/10.1109/cict.2016.51.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jakeri, Mazni Mohamed, and Mohd Fadzil Hassan. "A Review of Factors Influencing the Implementation of Secure Framework for in-House Web Application Development in Malaysian Public Sector." In 2018 IEEE Conference on Application, Information and Network Security (AINS). IEEE, 2018. http://dx.doi.org/10.1109/ains.2018.8631401.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cowan, Matthew, Joseph Lieberman, Jacob Cimbalista, and Bryan Schlake. "Electronic Freight Car Inspection Recording and Application of Internet-of-Things (IoT) and Machine-to-Machine (M2M) Frameworks." In 2018 Joint Rail Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/jrc2018-6192.

Повний текст джерела
Анотація:
Freight railroad classification yards have been compared to large-scale manufacturing plants, with inbound trains as the inputs and outbound trains as the outputs. Railcars often take up to 24 hours to be processed through a railyard due to the need for manual inbound inspection, car classification, manual outbound inspection, and other intermediate processes. Much of the inspection and repair process has historically been completed manually with handwritten documents. Until recently, car inspections were rarely documented unless repairs were required. Currently, when a defect is detected in the yard, the railcar inspector must complete a “bad order” form that is adhered to each side of the car. This process may take up to ten minutes per bad order. To reduce labor costs and improve efficiency, asset management technology and Internet-of-Things (IoT) frameworks can now be developed to reduce labor time needed to record bad orders, increase inspection visibility, and provide the opportunity to implement analytics and cognitive insights to optimize worker productivity and facilitate condition-based maintenance. The goal of this project is to develop a low-cost prototype electronic freight car inspection tracking system for small-scale (short line and regional) railroad companies. This system allows car inspectors to record mechanical inspection data using a ruggedized mobile platform (e.g. tablet or smartphone). This data may then be used to improve inspection quality and efficiency as well as reduce inspection redundancy. Data collection will involve two approaches. The first approach is the development of an Android-based mobile application to electronically record and store inspection data using a smartphone or rugged tablet. This automates the entire bad order form process by connecting to IBM’s Bluemix Cloudant NoSQL database. It allows for the information to be accessed by railroad mechanical managers or car owners, anywhere and at any time. The second approach is a web-based Machine-to-Machine (M2M) system using Bluetooth low energy (BLE) and beacon technology to store car inspection data on a secure website and/or a cloudant database. This approach introduces the freight car inspection process to the “physical web,” and it will offer numerous additional capabilities that are not possible with the current radio frequency identification device (RFID) system used for freight car tracking. By connecting railcars to the physical web, railcar specifications and inspection data can be updated in real-time and be made universally available. At the end of this paper, an evaluation and assessment is made of both the benefits and drawbacks of each of these approaches. The evaluation suggests that although some railroads may immediately benefit from these technological solutions, others may be better off with the current manual method until IoT and M2M become more universally accepted within the railroad industry. The primary value of this analysis is to provide a decision framework for railroads seeking to implement IoT systems in their freight car inspection practices. As an additional result, the software and IoT source code for the mobile app developed for this project will be open source to promote future collaboration within the industry.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

McIntosh, John, Renata Martin, Pedro Alcala, Stian Skjævesland, and John Rigg. "Implementation of a Digital Roadmap with Best-in-Class Applications." In SPE Offshore Europe Conference & Exhibition. SPE, 2021. http://dx.doi.org/10.2118/205418-ms.

Повний текст джерела
Анотація:
Abstract The paper describes a project known internally as "InWell" to address multiple requirements in Repsol Drilling & Completions. InWell is defined by a new Operating Model comprising Governance, People, Process, Functions and Technology. This paper addresses changes to the Technology element - often referred to as "Digitalization". The paper includes a discussion about the business transformation strategy and case studies for addressing three of 18 functionalities identified in the first round of development. The InWell development strategy followed four steps; identification of performance issues, envisioning of a future operating model, identification of functionalities required/supporting this operating model and matching to digital solutions. Our case studies focus on three functionalities provided by three separate companies, Unification of Planning and Compliance, Real Time Data aggregation and Key Performance Indicators. Each functionality was addressed with an existing commercial application customized to meet specific requirements. A corporate web-based Well Construction Process (WCP) was initially piloted and then extended to include all well projects. The WCP identifies the key Tasks that must be completed per project, and these are all tracked. Data from this application is used by a third-party Business Analytics application via an API. Real time data from many sites and a wide range of sources was aggregated and standardized, Quality Controlled and stored within a private secure cloud. The data collation service is an essential building block for current third-party applications such as the operating centre and is a prerequisite for the goal of increased automation. A suite of Operator specific Key Performance Indicators (KPIs) and data analytics services were developed for drilling and completions. Homogenized KPIs for all business units provide data for objective performance management and apples-to-apples comparison. Results are presented via custom dashboards, reports, and integrations with third party applications to meet a wide range of requirements. During a four-month Pilot Phase the InWell Project delivered € 2.5 million in tangible savings through improvements in operational performance. In the first 12 months € 16 million in savings were attributed to InWell. By 2022 forecast savings are expected to exceed € 60 million (Figures 1 & 2). The value of Intangible benefits is thought to exceed these objective savings. Figure 1 The Business Case for InWell – Actual & Projected Savings and Costs. Figure 2 InWell Services addressing Value Levers and quantified potential impact. A multi-sourced digital strategy can produce quick gains, is easily adapted, and provides high value at low risk. The full benefit of digital transformation can only be realised when supported by an effective business operating model.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії