Display omitted
Machine learning approaches, enabled by the emergence of comprehensive databases of materials properties, are becoming a fruitful direction for materials analysis. As a result, a ...plethora of models have been constructed and trained on existing data to predict properties of new systems. These powerful methods allow researchers to target studies only at interesting materials – neglecting the non-synthesizable systems and those without the desired properties – thus reducing the amount of resources spent on expensive computations and/or time-consuming experimental synthesis. However, using these predictive models is not always straightforward. Often, they require a panoply of technical expertise, creating barriers for general users. AFLOW-ML (AFLOW Machine Learning) overcomes the problem by streamlining the use of the machine learning methods developed within the AFLOW consortium. The framework provides an open RESTful API to directly access the continuously updated algorithms, which can be transparently integrated into any workflow to retrieve predictions of electronic, thermal and mechanical properties. These types of interconnected cloud-based applications are envisioned to be capable of further accelerating the adoption of machine learning methods into materials development.
This research addresses the inefficiencies of manual garbage data management by developing a dual-platform system: a website-based application for Garongan Asri Garbage Bank staff and a mobile ...application for customers. Utilizing the waterfall method for systematic development, the project involved stages of analysis, design, coding, testing, support, and maintenance. Key technologies used include the Bootstrap framework, Visual Studio Code, Android Studio, and MySQL database. The resulting website application enables staff to efficiently manage garbage data, while the mobile app allows customers to access their disposal history. The effectiveness of these applications was confirmed through black box testing, demonstrating their functionality and suitability for improving garbage data management and customer service.
This study is focused on developing a data collection system to enhance the performance of Koperasi, an organization with complex data collection. An Android application was created to automate the ...processing of member and transaction data, significantly improving data processing efficiency. However, building a quality system takes time and requires error-free data processing. To achieve this, Automated Test Case Generation with EvoMaster was used to test the REST API and identify errors. The testing process went through several iterations until almost no errors were found. EvoMaster generated over 19.5 million scenarios and found 78 errors in the REST API in 58 hours, which were promptly fixed between iterations. The use of EvoMaster not only reduced development time but also helped maintain code quality.
Using various types of broadly classified and large-scale datasets, Ethiopian Construction Design and Supervision Works Corporation (ECDSWC) provides professional services such as engineering studies ...and design. Storing, managing and sharing dataset within the workgroups and research teams is not an easy task because ECDSWC has not yet implemented database system. To resolve the issues related to data management, this study implements Secured and modular data portal using REST API principle. The data portal is used to manage a wide variety of datasets such as spatial data and its attributes, metadata and other serialized documents that support the business operations of ECDSWC. On the top of data management strategies, the Security in Depth (SiD) mechanism is developed by implementing Unified Identity Authentication Service, which provides multilayered security. The applicability of data portal is demonstrated using datasets obtained from ECDSWC. Furthermore, the accuracy, integrity and privacy of data is evaluated, and system performance is tested through the experiment.
Beacon is a basic data discovery protocol issued by the Global Alliance for Genomics and Health (GA4GH). The main goal addressed by version 1 of the Beacon protocol was to test the feasibility of ...broadly sharing human genomic data, through providing simple “yes” or “no” responses to queries about the presence of a given variant in datasets hosted by Beacon providers. The popularity of this concept has fostered the design of a version 2, that better serves real‐world requirements and addresses the needs of clinical genomics research and healthcare, as assessed by several contributing projects and organizations. Particularly, rare disease genetics and cancer research will benefit from new case level and genomic variant level requests and the enabling of richer phenotype and clinical queries as well as support for fuzzy searches. Beacon is designed as a “lingua franca” to bridge data collections hosted in software solutions with different and rich interfaces. Beacon version 2 works alongside popular standards like Phenopackets, OMOP, or FHIR, allowing implementing consortia to return matches in beacon responses and provide a handover to their preferred data exchange format. The protocol is being explored by other research domains and is being tested in several international projects.
Beacon is a basic data discovery protocol issued by the Global Alliance for Genomics and Health (GA4GH). Beacon version 2 serves real world requirements and addresses the needs of clinical genomics research and healthcare, allowing implementing consortia to return matches in beacon responses and provide a handover to their preferred data exchange format. Beacon is designed as a “lingua franca” to bridge data collections hosted in software solutions with different and rich interfaces. Beacon queries could be send to Beacon instances directly or via Beacon networks. The response could be yes/no, counts or details if the user is properly authorized.
Cloud computing provides scalable network services and makes network management more flexible by combining Software-Defined Networking (SDN). Through the northbound interface (e.g., REST API) offered ...by the SDN controller, users can easily deploy diversified applications to access the network resources. However, exploiting the openness of the northbound interface, malicious applications abuse APIs to launch hostile attacks, which poses serious threats to the network. In this paper, we propose SEAPP, a secure application management framework based on REST API access control. Our main idea is to granularly manage application permissions and encrypt REST API calls to defend against malicious attacks. SEAPP includes two components: 1) permissions detection engine identifies the facticity of application permissions by analyzing permission manifests and byte codes and further identifies the legality of permissions with constructed sensitive API list; 2) registration authorization engine executes encrypted registration between applications and controller by virtue of NTRU algorithm and authorizes applications to call the requested REST APIs based on their risk levels after securely authenticating them. Besides, SEAPP is a lightweight logic architecture between application plane and control plane and supports quick deployment and reconfiguration in runtime. Both theoretical analysis and evaluation results show the security and effectiveness of SEAPP. Besides, SEAPP introduces negligible CPU and memory overheads.
•The fidelity and legality of application permissions are identified.•Application registration information is encrypted by NTRU.•A dynamic REST APIs authorization is developed.
Reservasi merupakan salah satu hal penting untuk dilakukan ketika pasien ingin berobat di suatu instansi kesehatan. Pada klinik dr. Candra Safitri ini, proses reservasi pasien untuk berobat masih ...menggunakan cara yang konvensional yaitu dengan memaksa pasien untuk melakukan antri dengan cara datang langsung ke klinik dr. Candra Safitri. Kemudian, ketika pasien tiba di klinik, pasien diminta untuk mengambil nomor antrian yang tersedia pada klinik tersebut. Proses ini dinilai kurang efektif karena pasien harus melakukan antri yang panjang dan menunggu giliran untuk dipanggil ke ruang dokter. Adapun tujuan dari penelitian ini yaitu untuk membuat sebuah aplikasi android untuk melakukan reservasi supaya pasien yang ingin berobat dapat melakukan reservasi tanpa datang langsung ke klinik untuk mengambil nomor antrian yang tersedia pada klinik dr. Candra Safitri ini. Pengembangan aplikasi ini dilakukan menggunakan metode RAD (Rapid Application Development) dengan tahapan Requirement Planning, User Design, Construction and Cutover. Hasil dari penelitian ini berupa aplikasi reservasi berbasis android dan didukung dengan website admin yang diimplementasikan di klinik dr. Candra Safitri supaya memudahkan pasien dalam melakukan reservasi. Berdasarkan pengujian aplikasi menggunakan metode Black Box, dapat ditarik kesimpulan bahwa hasil pengujian fungsionalitas dari website admin dan aplikasi mobile pasien semuanya sukses dan semua modul yang dibuat sudah sesuai dengan rancangan sistem.
Keamanan data merupakan hal paling utama yang harus dijaga oleh perusahaan guna mendapatkan kepercayaan lebih dari pelanggan. Web service merupakan salah satu teknologi yang rentan terhadap kebocoran ...data jika tidak dirancang dengan benar. PT. XYZ pada kasus ini telah memiliki web service yang sedang berjalan di sisi production. Namun dari segi keamanan masih ada celah yang harus diperbaiki. Dari hasil studi literatur yang dilakukan, peneliti melakukan rancang ulang dari web service dengan menggunakan REST API yang dibangun pada framework Lumen dengan pertimbangan dari kecepatan load data dan kemudahan deploy di shared hosting. Penelitian dilakukan dengan melakukan melakukan analisis terhadap sistem yang sedang berjalan kemudian dilakukan rancang ulang, implementasi ke sistem, dan pengujian API menggunakan Postman. Dari hasil penelitian didapatkan hasil bahwa Lumen mampu digunakan untuk membangun REST API sesuai dengan rancangan guideline dan mampu mengamankan data-data pelanggan dari akses pihak yang tidak berkepentingan dengan menerapkan token saat pengguna melakukan request ke REST API. Dengan rancang ulang REST API ini, membuat keamanan data pelanggan PT. XYZ lebih menjadi aman lagi, karena tidak bisa diakses secara sembarangan.
Abstract
Data security is the most important thing that must be maintained by companies to get more trust from customers. Web service is a technology that is prone to data leakage if it is not designed properly. PT. XYZ in this case already has a web service running on the production side. However, from a security point of view, there are still gaps that need to be fixed. From the results of the literature study conducted, researchers redesigned the web service using the REST API which was built on the Lumen framework with consideration of data load speed and ease of deployment on shared hosting. The research was conducted by analyzing the running system and then redesigning it, implementing it to the system, and testing the API using Postman. The results showed that Lumen can be used to build a REST API following the draft guidelines and can secure customer data from unauthorized access by applying a token when the user requests the REST API. With this REST API redesign, making customers data of PT. XYZ is even more secure because it cannot be accessed carelessly.