Controlling Epics from a Web Browser
نویسنده
چکیده
An alternative to using a large graphical display manager like MEDM [1,2] to interface to a control system, is to use individual control objects, such as text boxes, meters, etc., running in a browser. This paper presents three implementations of this concept, one using ActiveX controls, one with Java applets, and another with Microsoft Agent [3]. The ActiveX controls have performance nearing that of MEDM, but they only work on Windows platforms. The Java applets require a server to get around Web security restrictions and are not as fast, but they have the advantage of working on most platforms and with both of the leading Web browsers. The agent works on Windows platforms with and without a browser and allows voice recognition and speech synthesis, making it somewhat more innovative than MEDM.
منابع مشابه
A Web Synchronization Method for Browser-Based Communications
In this paper, we propose a web synchronization method (WSM) to share operation data on a browser and synchronize output time of data among browsers in browser-based communications such as video conferencing and remote control services. WSM continually provides users with an environment for smooth browser-based communications even if users are in a heterogeneous environment where network delay ...
متن کاملEPICS - Experimental Physics and Industrial Control System at GSI
EPICS (Experimental Physics and Industrial Control System) is a widely used scalable control system. At GSI the HADES group uses EPICS since its startup [1]. In order to build a GSI wide knowledge base on EPICS some other projects than HADES are started. For example FOPI is a nice target for different controls developments like the LabView based CS [2] and EPICS. For the FUTURE DAQ project of C...
متن کاملTowards the Roles and Motives of Open Source Software Developers
The software ecosystems of current web browsers include thousands of extensions, which provide additional and customized features for end users and which can generate stronger loyalty towards the browser. Not much research has been done on the development of browser extensions and, in particular, why developers chose to develop for a certain browser. Hence, this research tries to do so by (1) i...
متن کاملsePlugin: Towards Transparently Secure Plugins in Your Internet Explorers
To support a variety of web applications with diverse contents such as video and audio, plugins have been widely adopted to extend the functionality of existing web browsers. Although instrumental for developing web applications efficiently, the open mechanism of plugins poses tremendous threats to browser security. While a plethora of approaches have been proposed to improve the overall securi...
متن کاملA Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor
Web browsers are becoming the universal interface to reach applications and services related with these systems. Different browsing contexts may be required in order to reach them, e.g., use of VPN tunnels, corporate proxies, anonymisers, etc. By browsing context we mean how the user browsers the Web, including mainly the concrete configuration of its browser. When the context of the browser ch...
متن کامل