The document describes the design and development of the "China Well Logging Network" website based on a three-tier browser/server (B/S) structure. Key aspects discussed include choosing Dreamweaver as the web authoring tool, Active Server Pages (ASP) for server-side scripting, and Microsoft Access as the backend database. The site is divided into static pages covering well logging knowledge, experiments, terminology, researchers, and companies, and dynamic pages like industry news, logging methods, logging while drilling, and case studies. The database supports hierarchical tables to store content and user data. The three-tier structure improves efficiency, maintainability, scalability and security over a two-tier client/server model.
Scoopshot is a free mobile application and online store that allows citizen photographers and journalists to connect. Photographers can take newsworthy photos and videos and set a price to sell them through the online store. Journalists can then purchase fresh eyewitness content. Scoopshot currently has over 160,000 registered photographers in 160 countries who can provide content on demand. The service aims to provide media professionals a way to get timely content from around the world through crowdsourcing.
This document provides tips for earning a profit using Craigslist. It discusses how independent contractors and small business owners can use Craigslist to find work or advertise their services. Specific tips include creating an account for easier posting, including pictures in listings to attract more interest, and searching by location and keywords when looking for jobs or services. The document promotes Craigslist as an affordable advertising platform with a large audience.
This document summarizes an ECLIPS webinar that took place on September 21, 2012. The webinar included check-ins from participants, stories about how ECLIPS has created value, a social network analysis of the group's expertise and connections, and a discussion of an upcoming session at AEA on the ECLIPS model. Upcoming October calls and an October 28th meeting were also outlined. The webinar provided opportunities for reflection on involvement in ECLIPS and discussion of dissemination plans going forward.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document presents a mathematical model for the static I-V characteristics of optically controlled GaAs MESFETs. The model characterizes photo-induced voltages, including internal and external photovoltages, as well as photoconductive current in the channel. It also considers the effects of deep level traps in the semi-insulating GaAs substrate, including the phenomenon of backgating, on the I-V characteristics. The model is developed analytically and expressions are derived for the I-V characteristics in both the linear and saturation regions of the MESFET under dark and illuminated conditions. Small-signal parameters of the GaAs MESFET are also derived based on the static I-V model under optical control conditions
Scoopshot is a free mobile application and online store that allows citizen photographers and journalists to connect. Photographers can take newsworthy photos and videos and set a price to sell them through the online store. Journalists can then purchase fresh eyewitness content. Scoopshot currently has over 160,000 registered photographers in 160 countries who can provide content on demand. The service aims to provide media professionals a way to get timely content from around the world through crowdsourcing.
This document provides tips for earning a profit using Craigslist. It discusses how independent contractors and small business owners can use Craigslist to find work or advertise their services. Specific tips include creating an account for easier posting, including pictures in listings to attract more interest, and searching by location and keywords when looking for jobs or services. The document promotes Craigslist as an affordable advertising platform with a large audience.
This document summarizes an ECLIPS webinar that took place on September 21, 2012. The webinar included check-ins from participants, stories about how ECLIPS has created value, a social network analysis of the group's expertise and connections, and a discussion of an upcoming session at AEA on the ECLIPS model. Upcoming October calls and an October 28th meeting were also outlined. The webinar provided opportunities for reflection on involvement in ECLIPS and discussion of dissemination plans going forward.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document presents a mathematical model for the static I-V characteristics of optically controlled GaAs MESFETs. The model characterizes photo-induced voltages, including internal and external photovoltages, as well as photoconductive current in the channel. It also considers the effects of deep level traps in the semi-insulating GaAs substrate, including the phenomenon of backgating, on the I-V characteristics. The model is developed analytically and expressions are derived for the I-V characteristics in both the linear and saturation regions of the MESFET under dark and illuminated conditions. Small-signal parameters of the GaAs MESFET are also derived based on the static I-V model under optical control conditions
WEB BASED AND BLOCKCHAIN APPLICATION FOR EDUCATIONAL INSTITUTIONIRJET Journal
The document discusses a student's web-based portfolio created using web development tools. It summarizes the technologies used to build the full-stack web application, including ReactJS for the front-end, Node.js and ExpressJS for the back-end, and MongoDB for the database. The document also discusses blockchain technology and its potential applications in education.
This document describes the development of a web chat application using React framework. The application allows for real-time text communication between users. It was built using React.js for the front-end, Node.js and Express for the backend, and MongoDB for the database. Testing showed the React-based application was over 35 times faster than one built with traditional PHP and MySQL. The application provides a user-friendly interface and allows users to easily communicate with contacts in real-time.
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET Journal
This document discusses the development of a cross-platform mobile application for educational purposes using Ionic framework. The application aims to provide students important information regarding courses, timetables, exam schedules, study materials and more in a convenient mobile app. It analyzes challenges with existing manual systems and benefits of the new app. The architecture uses Ionic, AngularJS, Cordova and other technologies. Key modules include registration, syllabus, question papers, exams and an e-book library. Screenshots demonstrate functionality for login, registration and module selection. It concludes the app will make information readily available and reduce paper usage, helping students.
Impact of web life cycle activities & web services in modern era a reviewJyoti Parashar
Web technologies related to the interface B/w Web services and their client. To access web, the user need a computer machine or related device, a browser on the machine and an internet connection. This information include programming interface and languages And standards for documents identification and display
Evaluations of User Creation Personal Portal Page Using DACS Web Service dannyijwest
A personal portal, which is an entrance wherein each user can acquire the information that s/he is
interested in on a network, is often used as an alternative means of communication. However, there are a
number of problems with the existing personal portals. For example, because the Web page as a personal
portal is generated by the program located on the specific Web server which is managed by a system
administrator, it is not always ideal for all users. To solve this kind of problems, we developed two Web
Service functions, which are realized on the network by introducing the Destination Addressing Control
System (DACS) Scheme. These two Web Service functions are as next. The first is the function to extract the
data for each user from a database and display it on the Web browser.
Impact of web life cycle activities & web services in modern era a reviewJyoti Parashar
The document discusses the evolution of web services and their life cycles. It describes how web services allow for program-to-program interactions and how standards like SOAP, WSDL, and UDDI facilitate web service discovery, description, and composition. The key activities in a web service life cycle include service wrapping, specification, planning, advertisement, discovery, scheduling, negotiation, construction, execution, and monitoring.
Web application architecture guide how it works types, components, best pract...Katy Slemon
In this blog, we will learn and discover the fundamentals of web application architecture and discuss its working, types, components, models, and much more.
This document discusses building a software tool to archive websites using web crawling and blockchain technology. It proposes a system that crawls websites, stores web page content and metadata in WARC files, and records this information in a blockchain database with two layers - a domain blockchain to store domain information and a web content blockchain to store WARC files. This approach aims to provide a consistent and secure system for archiving websites while allowing users to monitor and analyze archived web content. The document reviews related work on web archiving and outlines the proposed system architecture and implementation requirements.
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET Journal
This document discusses transforming a traditional web application into a Software as a Service (SaaS) model using a multi-tenant architecture. It proposes an approach for developing a multi-tenant dental website that allows individual dentists to register for and customize their own unique instance of the site. The key aspects covered include a literature review on SaaS and multi-tenancy research, the proposed system architecture featuring tenant registration and customization, a database approach using tenant IDs to isolate data, and examples of the tenant-specific interfaces. The goal is to provide a reusable SaaS solution that eliminates the need for dentists to build and maintain their own individual websites.
A Comprehensive Guide to Web Application Architecturestevefary
Discover the intricate world of Web Application Architecture. From Monolithic to Microservices and Serverless, explore the core components, best practices, and the importance of choosing the right architecture. Learn it all in this comprehensive guide and optimize your digital experience.
This document provides a 3-page project report on developing an e-portal website for Vedant BCA & B Com College in Vijayapur. It includes an introduction to the topic and project, as well as chapters on system analysis and the proposed system. The proposed system aims to make the college website more dynamic and interactive by adding a database and features like displaying latest events. It will use ASP.NET for the front end, SQL Server for the back end database, and C# as the programming language. The report provides an overview of the key features of ASP.NET that will be leveraged for the project.
Discuss the role of programming languages such as C# (C-Sharp) and Visual Basic in ASP.NET development. Explore their syntax, features, and usage scenarios.
In the ever-evolving landscape of web development, ASP.NET stands as a powerful framework, empowering developers to create robust, dynamic, and feature-rich web applications.
Recently, with the impact of AJAX a new way of web development techniques have been emerged. Hence, with the help of this model, single-page web application was introduced which can be updated/replaced independently. Today we have a new challenge of building a powerful single-page application using the currently emerged technologies. Gaining an understanding of navigational model and user interface structure of the source application is the first step to successfully build a single- page application.
In this paper, it explores not only building powerful single-page application but also Two Dimensional (2D) drawings on images and videos. Moreover, in this research it clearly express the findings on 2D multi-points polygon drawing concepts on client side; real-time data binding in between drawing module on image , video and view pages.
In the last few years, web applications have experienced a rapid and drastic development in terms of scale, complexity and underlying technologies. A Web site is a collection of Web pages containing text, images, audio and videos. The complete structure of the Internet is made up of Web sites, a mode of sharing information on the Internet
Web Application Architecture: A Comprehensive Guide for Success in 2023stevefary
Delve into the world of web app architecture - from components to best practices. Uncover the secrets of successful design and implementation. Explore now!
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
NEED ANALYSIS: PORTABLE WEB SERVER DEVELOPMENT KITS FOR TEACHING AND LEARNINGijma
A Portable server is the combination of popular web server software, namely Apache, MySQL, PHP and
PhpMyAdmin. With a portable server, users can develop and display a developed website anywhere at any
time as all web server configurations have been installed on the storage drive. Portable servers are ideal for
displaying the offline version of the website anywhere when developing a website. Using a mobile server as
well, users do not need hosting that requires complicated configuration and can be used to run tests before
putting the website online. This study aims to obtain preliminary findings on building portable web server
development kits for the teaching and learning process.
NEED ANALYSIS: PORTABLE WEB SERVER DEVELOPMENT KITS FOR TEACHING AND LEARNINGijma
A Portable server is the combination of popular web server software, namely Apache, MySQL, PHP and
PhpMyAdmin. With a portable server, users can develop and display a developed website anywhere at any
time as all web server configurations have been installed on the storage drive. Portable servers are ideal for
displaying the offline version of the website anywhere when developing a website. Using a mobile server as
well, users do not need hosting that requires complicated configuration and can be used to run tests before
putting the website online. This study aims to obtain preliminary findings on building portable web server
development kits for the teaching and learning process.
NEED ANALYSIS: PORTABLE WEB SERVER DEVELOPMENT KITS FOR TEACHING AND LEARNINGijma
A Portable server is the combination of popular web server software, namely Apache, MySQL, PHP and
PhpMyAdmin. With a portable server, users can develop and display a developed website anywhere at any
time as all web server configurations have been installed on the storage drive. Portable servers are ideal for
displaying the offline version of the website anywhere when developing a website. Using a mobile server as
well, users do not need hosting that requires complicated configuration and can be used to run tests before
putting the website online. This study aims to obtain preliminary findings on building portable web server
development kits for the teaching and learning process
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
More Related Content
Similar to Welcome to International Journal of Engineering Research and Development (IJERD)
WEB BASED AND BLOCKCHAIN APPLICATION FOR EDUCATIONAL INSTITUTIONIRJET Journal
The document discusses a student's web-based portfolio created using web development tools. It summarizes the technologies used to build the full-stack web application, including ReactJS for the front-end, Node.js and ExpressJS for the back-end, and MongoDB for the database. The document also discusses blockchain technology and its potential applications in education.
This document describes the development of a web chat application using React framework. The application allows for real-time text communication between users. It was built using React.js for the front-end, Node.js and Express for the backend, and MongoDB for the database. Testing showed the React-based application was over 35 times faster than one built with traditional PHP and MySQL. The application provides a user-friendly interface and allows users to easily communicate with contacts in real-time.
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET Journal
This document discusses the development of a cross-platform mobile application for educational purposes using Ionic framework. The application aims to provide students important information regarding courses, timetables, exam schedules, study materials and more in a convenient mobile app. It analyzes challenges with existing manual systems and benefits of the new app. The architecture uses Ionic, AngularJS, Cordova and other technologies. Key modules include registration, syllabus, question papers, exams and an e-book library. Screenshots demonstrate functionality for login, registration and module selection. It concludes the app will make information readily available and reduce paper usage, helping students.
Impact of web life cycle activities & web services in modern era a reviewJyoti Parashar
Web technologies related to the interface B/w Web services and their client. To access web, the user need a computer machine or related device, a browser on the machine and an internet connection. This information include programming interface and languages And standards for documents identification and display
Evaluations of User Creation Personal Portal Page Using DACS Web Service dannyijwest
A personal portal, which is an entrance wherein each user can acquire the information that s/he is
interested in on a network, is often used as an alternative means of communication. However, there are a
number of problems with the existing personal portals. For example, because the Web page as a personal
portal is generated by the program located on the specific Web server which is managed by a system
administrator, it is not always ideal for all users. To solve this kind of problems, we developed two Web
Service functions, which are realized on the network by introducing the Destination Addressing Control
System (DACS) Scheme. These two Web Service functions are as next. The first is the function to extract the
data for each user from a database and display it on the Web browser.
Impact of web life cycle activities & web services in modern era a reviewJyoti Parashar
The document discusses the evolution of web services and their life cycles. It describes how web services allow for program-to-program interactions and how standards like SOAP, WSDL, and UDDI facilitate web service discovery, description, and composition. The key activities in a web service life cycle include service wrapping, specification, planning, advertisement, discovery, scheduling, negotiation, construction, execution, and monitoring.
Web application architecture guide how it works types, components, best pract...Katy Slemon
In this blog, we will learn and discover the fundamentals of web application architecture and discuss its working, types, components, models, and much more.
This document discusses building a software tool to archive websites using web crawling and blockchain technology. It proposes a system that crawls websites, stores web page content and metadata in WARC files, and records this information in a blockchain database with two layers - a domain blockchain to store domain information and a web content blockchain to store WARC files. This approach aims to provide a consistent and secure system for archiving websites while allowing users to monitor and analyze archived web content. The document reviews related work on web archiving and outlines the proposed system architecture and implementation requirements.
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET Journal
This document discusses transforming a traditional web application into a Software as a Service (SaaS) model using a multi-tenant architecture. It proposes an approach for developing a multi-tenant dental website that allows individual dentists to register for and customize their own unique instance of the site. The key aspects covered include a literature review on SaaS and multi-tenancy research, the proposed system architecture featuring tenant registration and customization, a database approach using tenant IDs to isolate data, and examples of the tenant-specific interfaces. The goal is to provide a reusable SaaS solution that eliminates the need for dentists to build and maintain their own individual websites.
A Comprehensive Guide to Web Application Architecturestevefary
Discover the intricate world of Web Application Architecture. From Monolithic to Microservices and Serverless, explore the core components, best practices, and the importance of choosing the right architecture. Learn it all in this comprehensive guide and optimize your digital experience.
This document provides a 3-page project report on developing an e-portal website for Vedant BCA & B Com College in Vijayapur. It includes an introduction to the topic and project, as well as chapters on system analysis and the proposed system. The proposed system aims to make the college website more dynamic and interactive by adding a database and features like displaying latest events. It will use ASP.NET for the front end, SQL Server for the back end database, and C# as the programming language. The report provides an overview of the key features of ASP.NET that will be leveraged for the project.
Discuss the role of programming languages such as C# (C-Sharp) and Visual Basic in ASP.NET development. Explore their syntax, features, and usage scenarios.
In the ever-evolving landscape of web development, ASP.NET stands as a powerful framework, empowering developers to create robust, dynamic, and feature-rich web applications.
Recently, with the impact of AJAX a new way of web development techniques have been emerged. Hence, with the help of this model, single-page web application was introduced which can be updated/replaced independently. Today we have a new challenge of building a powerful single-page application using the currently emerged technologies. Gaining an understanding of navigational model and user interface structure of the source application is the first step to successfully build a single- page application.
In this paper, it explores not only building powerful single-page application but also Two Dimensional (2D) drawings on images and videos. Moreover, in this research it clearly express the findings on 2D multi-points polygon drawing concepts on client side; real-time data binding in between drawing module on image , video and view pages.
In the last few years, web applications have experienced a rapid and drastic development in terms of scale, complexity and underlying technologies. A Web site is a collection of Web pages containing text, images, audio and videos. The complete structure of the Internet is made up of Web sites, a mode of sharing information on the Internet
Web Application Architecture: A Comprehensive Guide for Success in 2023stevefary
Delve into the world of web app architecture - from components to best practices. Uncover the secrets of successful design and implementation. Explore now!
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
NEED ANALYSIS: PORTABLE WEB SERVER DEVELOPMENT KITS FOR TEACHING AND LEARNINGijma
A Portable server is the combination of popular web server software, namely Apache, MySQL, PHP and
PhpMyAdmin. With a portable server, users can develop and display a developed website anywhere at any
time as all web server configurations have been installed on the storage drive. Portable servers are ideal for
displaying the offline version of the website anywhere when developing a website. Using a mobile server as
well, users do not need hosting that requires complicated configuration and can be used to run tests before
putting the website online. This study aims to obtain preliminary findings on building portable web server
development kits for the teaching and learning process.
NEED ANALYSIS: PORTABLE WEB SERVER DEVELOPMENT KITS FOR TEACHING AND LEARNINGijma
A Portable server is the combination of popular web server software, namely Apache, MySQL, PHP and
PhpMyAdmin. With a portable server, users can develop and display a developed website anywhere at any
time as all web server configurations have been installed on the storage drive. Portable servers are ideal for
displaying the offline version of the website anywhere when developing a website. Using a mobile server as
well, users do not need hosting that requires complicated configuration and can be used to run tests before
putting the website online. This study aims to obtain preliminary findings on building portable web server
development kits for the teaching and learning process.
NEED ANALYSIS: PORTABLE WEB SERVER DEVELOPMENT KITS FOR TEACHING AND LEARNINGijma
A Portable server is the combination of popular web server software, namely Apache, MySQL, PHP and
PhpMyAdmin. With a portable server, users can develop and display a developed website anywhere at any
time as all web server configurations have been installed on the storage drive. Portable servers are ideal for
displaying the offline version of the website anywhere when developing a website. Using a mobile server as
well, users do not need hosting that requires complicated configuration and can be used to run tests before
putting the website online. This study aims to obtain preliminary findings on building portable web server
development kits for the teaching and learning process
Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 4, Issue 12 (November 2012), PP. 44-47
Design and Development of “China Well Logging
Network” Website Based on B/S Structure
Wen Zheng, Pan Yi, Yang Shuangchun
Liaoning Shihua University, Fushun, Liaoning, China 113001
Abstract:-China Well Logging Network is a professional website on well logging subject designed and developed
by Nuclear Magnetic Resonance (NMR) Imaging Laboratory of Research Center of Borehole Geophysics in China
University of Petroleum (Beijing). The intentions of the website are to spread the well logging knowledge,
promote the well logging subject and offer a platform with well logging information query service and
communication each other for teacher, researcher, student, enterprise and the public. Based on the practice of the
website development in the paper, we analyze the characteristic of B/S structure, synthetically depict the idea and
development tool and software. The function layout, models design, website management, maintenance and
security are all discussed
Keywords:-B/S structure, China Well Logging Network, website, design and development
I. INTRODUCTION
The world has enter the Internet age in 21st century. Internet has already penetrated into many areas, even the daily
lives of every ordinary people. The application of the Internet makes many traditional industries burst out new vitality, and
impact on people's daily work and lifestyle more and more increasingly. In a few short years, the Internet has evolved into
the fourth communication media after television, newspapers, radio media, the latecomer surpass the formers, and became
the world's largest information communication media. Network technology has become the basis of the progress and
development of various industries increasingly, collection and dissemination of information on the Internet has already more
and more attention from people. How to take advantage of the new media of the Internet for their professional services is the
topic that many people have been discussing. At present, the developing countries abroad, major research institutions,
enterprises, organizations have already utilize the convenience and quick advantage of the Internet, established service for
their professional website, and development of domestic professional website has only just started [1] .
“Chinese logging " it is in this background, to popular logging professional knowledge, to promote the
development of logging professional, and for the vast number of education and scientific research workers provide service
for logging information query and communication platform for guiding ideology, by teachers and students of China
University of Petroleum NMR laboratory work together development and construction. This article describes the
development mode and main content of the site.
II. BROWSER / SERVER MODE THREE-TIER ARCHITECTURE
A. Tthree-tier B / S structure
Browser / Server model of the three-tier architecture is developed from the original Client / Server 2-layer
structure, to avoid access bottlenecks, improve system scalability, security and reusability, the structure shown in Figure 1.
Request
Browser Web Server Data Base
Response
Figure 1 three- tier B / S model
B. Three-tier B / S structure works
The three-tier B / S structure model is a state-of-the-art collaborative application development model, this three-
layer model of the server-side further decomposed into an application server (Web server) and a database server. Users enter
information on the browser side, Web server based on the user information received from the browser to the database server
queries and query results are returned to the browser, the user feedback information from the browser; database server
mainly completes definition, query and update operation of the data, and maintain the security and integrity of the data[2].
C. The advantages of the three-tier B / S structure
By using a three-tier structure of the program, can more quickly than traditional developed two layer structure
efficiency higher web database applications, but also to client computer hardware and software configuration request is not
high, for the user does not require for special computer and software training[3]. Compared to three- tier B / S structure and
the second floor of the C / S structure, advantages mainly in: (a) High efficiency, and reduce the burden on the client to the
44
2. Design and Development of “China Well Logging Network” Website Based on B/S Structure
application server, and also reduce the consideration of the connection with the database server; (b) Easy to maintain, when
application logic changes, just need modify the application server, to improve the maintainability and enhance the
consistency of the data; (c) Scalability, emphasized by the three-layer structure is a logical sense rather than a physical
meaning, it describes how to design applications, rather than how specific deployment; (d)Eliminating database bottlenecks.
When the application server becomes a bottleneck, can any increase the number of application servers, and services to end
customers by more than one application server, load balancing, while improving system overall reliability; (e) Improve
system security, users can not directly operate the server in the three-tier structure, but only on the browser, thereby
enhancing the security of the system.
III. THE CHOICE OF DEVELOPMENT TOOLS
A. Web authoring tool
Dreamweaver is a product of the Macromedia company, is a page editing tools of what you see is what you get, or
web publishing software, it is a popular web authoring software at present, its powerful functionality and combine with
Macromedia introduced Flash (animation software) and Firework (image processing software), can create beautiful, full of
dynamic web pages.
B. Server-side technology
Server system software uses the Microsoft Windows 2000Server, configuration Server, IIS, ODBC Driver &
Administration and related aids. Generate dynamic web pages using ASP (Active Server Pages) technology, which Microsoft
launched a high-performance web application development technology, and its essence is a server-side scripting language that
runs it is fully integrated with the ADO provides a powerful database access functions [4]. ASP belongs to the ActiveX server-
side technology, and usually client realize dynamic homepage technology is different, ASP command and scripts are in the
server explain implementation, sent to the browser’s just standard HTML page, developers don’t need to consider the
browser’s type, also don’t have to consider whether to support ASP browser. Do not see the ASP source code in the browser
side, so the security of the program can be guaranteed [5].
C. Back-end database
Access database of Microsoft company as its easy-to-use, affordable, has good compatibility and the same for the
company's products the Windows 2000Server and ASP[6], so often used in small and medium-sized website development,
"Chinese logging " also choose this software as its database
D. Database connection technology
Access database support ODBC (Open Database Connectivity), so you can establish a connection through ODBC
databases using ADO technology combined with Microsoft's launch of the high-performance web application development
technology ASP access to the database, such as the use of the ASP statement:
Setconn = Server.Createobject ("ADODB.Connection")
conn.open "DSN = mydsn";
And then use SQL statements can be achieved on the data source named mydsn database query, add, update, or delete
records.
IV. THE MAIN FUNCTION OF THE SITE DESIGN
The design structure of “Chinese logging” is divided into three blocks: the static part of the page, the dynamic part
of the page and the database (Figure 2), those three blocks as a two page. Website take template style, page style uniform,
clear structure, clear priorities and easy to use.
45
3. Design and Development of “China Well Logging Network” Website Based on B/S Structure
A. The part of static page
The part of static page include six two-pages, they are:
Logging knowledge: Introduce the knowledge of logging-related, such as the development history of logging and
characteristics of the industry.
NMR experiments: Introduction the development of magnetic resonance imaging laboratory of the Logging
Research Center of China University of Petroleum (Beijing), as well as the latest results of the laboratory in NMR logging
applications in basic theoretical research, experimental research, instrument research and applied research.
Jargon: logging-related jargon and the meaning of jargon, including Chinese and English, for the technical staff query.
Logging People: Introduce researchers of domestic logging industry, as well as the research work being carried out.
Company Directory: Introduce the main logging enterprises, as well as the state of the enterprises.
About Us: To introduce Chinese petroleum university (Beijing) logging the overall condition of the magnetic
resonance imaging laboratory, the basic situation of the team members, contact way and so on. As a result of the template
approach, entire page form change little, just the contents is different.
The jargon explained including English-English and English-Chinese two forms interpretation, and sort according
to the letters of the alphabet, using Dreamweaver’s localization and relevant link function to achieve "jargon" rapidly search.
"Jargon" will be the transition to a dynamic part of the page, achieve the link with the database to enhance its flexibility and
better service for logging people.
B. Dynamic web part
The dynamic part of page include six two-pages, they are:
(a) Industry News: scroll through the release of the latest technical information about logging, information of the
professional and technical conference, technical reviews, forecasting trend of technical development, divided into two
aspects of the technical and non-technical.
(b) Wireline logging: Introduce the basic principles of the various methods of wireline logging, main logging tools, as well
as the main explanation of methods and geological applications. The main contents include:
The Electrical Logging: spontaneous potential logging, ordinary resistivity logging, standard logging, lateral logging
microelectrode logging; laterolog, three-electrode laterolog, seven electrode laterolog, bilateral logging, microlaterolog,
neighboring laterolog microspheres, microspheres focusing logging, resistivity logging method combination; induction
logging, conventional induction logging, array induction logging; electromagnetic wave propagation logging, ordinary
electromagnetic waves dissemination of logging; array of electromagnetic wave propagation logging; imaging logging ,
microresistivity scan and so on.
Acoustic logging: acoustic velocity logging; sonic amplitude logging, acoustic amplitude logging, acoustic
variable density logging; full acoustic logging; the sonic underground television; dipole shear wave logging; multipole sonic
logging; sound imaging logging.
Logging of nuclear radiation: gamma ray log, natural gamma ray logging, natural gamma ray spectral logging, the formation
density logging, lithology density logs, radioisotope tracer logging; neutron logging, epithermal neutron logging, thermal
neutron logging, neutron gamma logging, pulsed neutron gamma spectroscopy logging, neutron lifetime logging, activation
logging and so on.
NMR logging: NMR logging, downhole fluid laboratory and so on.
Other wireline methods: caliper logging; temperature logging; production logging.
(c) LWD: to introduce LWD related theory, methods, instruments and the main application. Including electrical method,
sound waves, nuclear radiation, and nuclear magnetic resonance methods.
(d)Dynamic monitoring: Introduce the theory, methods, equipment and major applications of the formation testing and
downhole permanent sensors.
(e)Typical case: Introduce the application of oil and gas exploration and development in the process to have wide application
value, can provide reference for well logging interpretation of the typical logging application instance, so that it can inspired
from a classic case.
(f) Technical forum: to provide professional and technical personnel for technical exchange platform.
C. Database section.
Microsoft Access 32 Microsoft launched the relational database management system (RDBMS), developed with
Microsoft's other software interface style is consistent and strong compatibility between, you can import data from Excel or
Word document [4]. It features fully object-oriented, event-driven mechanism to support multimedia applications, either in a
single-user environment can also work in a multi-user environment, and security management mechanism. It built a lot of
functions, and provides a number of macro operation, more convenient, flexible database application development. Access
characteristics and our own situation, we chose Access as the site's back-end database field "ID" as the primary key to
uniquely identify each "Industry News; the field" NTitle "is the title of the" Industry News "size of 50 characters, so the
maximum allowable title to 25 characters; the field "NType" is a type of "industry News", in order to "industry News"
statistical divided into two type of technology and non-technology type; fields "NDate" each "industry News" published, can
use this field to sort on the "News"; body content of the field "NText" is the "industry News", as shown in table 1.
46
4. Design and Development of “China Well Logging Network” Website Based on B/S Structure
In page design, "wireline", "LWD logging" and "dynamic monitoring" is separate, in order to facilitate database
queries and to facilitate the management, we adopt hierarchical type way to create a 1-4 level 4 table, and established
relationships by use of the correlation between them. Based on the same consideration we created as "a typical case of" 1-3
level 3 table. These data table plus the administrator tables and Technical Forum 2 Data Table ("Author table" and "Post
table") together constitute the "Chinese logging "database.
D. Other.
As the scan logging graphs is a large amount of data, not suitable for database management, so we have
established a file folder to store scanned image files, direct access to the image files do hypertext links. Other website folder
including images folder store website page graphics; Photos folder storage site content graphics; Admin folder store manage
files; the DOCS folder to store all relevant websites documentation.
V. CONCLUSIONS
The building of "Chinese logging" is in its infancy, a lot of function is not perfect. In addition to the future
direction of our efforts is to improve the existing functionality, but also the development of new features such as online
technical support, software downloads. Along with the development of the network, the future must be introduce streaming
media technology to realize visualization, let logging experts through this website, never leave home command, monitoring
logging site operation and accomplish data processing in real time. We will make unremitting efforts to construct "China
logging network", and make it become the largest and the best professional sites of the logging.
REFERENCES
[1]. Xue Huijun. Development and design of the elective system based on the Web-campus network [J] Journal of
Inner Mongolia Normal University(Natural Science Edition),2003,32(4):61-64.
[2]. Chu Lili. A Course Selection System Based on Web and Three-layers C/S Structure [J], Journal of Liaoning
Institute of Technology, 2001,21(6):11-12.
[3]. WU Qi, CHEN Xi-qiu. Design and Realization of the System of Selecting Courses on Net[J], Journal of
Changjiang Vocational University , 2004,21(2):22-24.
[4]. Li Ya. Dreamweaver MX & ASP web integration encompassing [M], Electronic industry press, 2004.1.
[5]. Long ma studio. Dreamweaver MX ASP web programming introduction and example making [M], Machinery
industry press. 2004.1.
[6]. Roger Jennings. Chinese Access 2000 development use manual [M], Machinery industry press. 2000.
47