Home

WEMS User Manual - Wildlife Enforcement Monitoring System

image

Contents

1. Given Name Sex Select Gender w Alias Date of Birth Select Clear Country of Birth Select Country Nationality Address ID Type National Card ID Number Passport National Card Country of Issue y Driver License Issue Date Select Clear Expire Date l Select Clear Profession Other Save Cancel f Company Management Company Management is very similar to Person Management It s used to manage com panies involved in offenses 5 3 User Management User Management as its name indicates deals with various tasks related to users We distinguish to kinds of user normal user and administrator A normal user can only change his password and update his profile while an administrator besides these opera tions can add new user delete a user list all users that he has the right to administer and update user privilege 7 8 2011 Section 5 Accessing Services 28 An administrator is normally associated with an organization It means that he can only manage its users However there is a super administrator who is cross organization administrator and can manage all users User Management is launched by first clicking on the tab Administration and then click ing the link User Management A submenu is displayed as follow Figure 19 User Management Main Menu Click to perform desired operations Change Password Update Profile List Users Add Us
2. The companies involved in the seizure can be added after persons are specified Figure below shows the procedurefor adding new company to the seizure Figure 9 Adding new offense Companies involved in offense 6 Company involved Offense Code code 1 Company SelectCompany Add New Company J Refresh f Adding the transportation details After specifying the companies involved user moves to the page where he can specify the transportation means of the seizure a sample location of the seizure is showed in the figure below 7 8 2011 Section 5 Accessing Services 18 Figure 10 Adding new offense Transport means and location 7 Means of Transport and Route Mode of Transport AIR y Carrier Comair y From Point of Origin Paris Country of Origin France Nearest City Paris y To the Point of Seizure Tokyo Country of Seizure Japan y Nearest City Tokyo X Other information No other information 8 Locations Country of Origin according to France X Custom definition Country of Provenance Japan X Countries of Transit Singapore Ee Country of Destination as on Japan y transport document Country of real destination Japan X Address of final destination Some where f Adding law enforcement details Once transport means and location are defined user moves to the page where he can enter information related to law enforcement agency as showed i
3. To view top 10 number species involved in offenses user has to enter species category and the year when offenses take place Figure below shows the top 10 number for all categories and every year 7 8 2011 Section 5 Accessing Services 33 Figure 25 Top 10 number species involved in all cases Number of Species Seized Category All Categories Year 1 Number of Species Seized Lorises 15 Eagles hawks 23 Chinese Alligator e Pantholops hodgsonii 5 200 e Chinese Alligator 2 000 Olive Ridley Turtle 800 Crocodiles 50 Black Rhinocerous 200 Cockatoos 10 Eagles hawks 23 Lorises 15 View Number of Species Again 5 6 WEMS IMAP WEMS IMAP provides some basic GIS features such as showing seizure map of offenses or tracking routes of all offenses satisfying certain criteria It s advisable to have broad band connection in order to use this functionality because map loading and manipulation may be long a Places of seizure This GIS feature permits user to see the seizure map of offenses in a chosen area cur rently the notion area is related to continent in the world So that before viewing the map user must choose an area as shown in the figure below 7 8 2011 Section 5 Accessing Services 34 Figure 26 Input for viewing seizure map Seizure Map in an Area Map Type ESRI Area Asia v Year of Seizure Upon clicking on the Subm
4. Wildlife Enforcement Monitoring System User Manual Khoi Nguyen Remi Chandran Ng Chong type User Manual date July 07 2011 version Version 1 1 K ee J UNITED NATIONS A UNIVERSITY UNU IAS UNIVERSITY OF TWENTE Institute of Advanced Studies IFAW www ifaw orq Extensible Message Gateway User Manual About this Document This document is the User Manual of the Wildlife Enforcement Monitoring System WEMS database The aim of this report is to provide guidelines for using the WEMS da tabase management software including descriptions of the deployment components and a possible deployment environment Extensible Message Gateway User Manual iii Table of Contents Table of Contents siii AAA AA a a a iii ADDreViationS norn case cecilia E alten i n iv DOCUMENT LOCA Ns ii dd ds a etd tater Id aaa as iv REVISION HISLORY a caia v Distribution sran coat et Gah e aA te ciate ada V Listiof FIGUERAS eh doa IA AA A AAA A vi Le IMtrOGdUCtilON air A A E A IE E IR 7 2 Deployment Components sima a eee nar Ene EEE DEEDS TESTES EEE rr rr EEE rr nn nana 8 3 Deployment Environment 20 cc ccc EERE EEE EEE EEE 9 4 Deployment Procedure S dic a PAKAR EEDAN ANE peewee 10 Sa Acc sSsiNg SEIVICES ia a E amir A gee ENa 11 5 1 Section 1 Adding Seizure Information s s sssssssrsssrrrsrrrrssrrusrrrusrrnnsrrnnsrrnnerrnene 11 a Enterin a Case ORENSE viii a dd 11 5222 Section 2 Manag
5. Tracking Routes Pay Attention cities without geographical data will not be or wrongly displayed on the map If you feel that this data is incorrect please make modification at following link modify city Vo o f i Map Provider ESRI Species Category Select Category y Country of Origin Select Country i Select Species Select Species v Country of Destination India Select Year Range Select Year Range Indian Ocean Australia gt L 5 7 Log File This feature is reserved to administrator and shows the log of all actions performed in application i e the time of entering or deleting an information and the details of access 7 8 2011 Section 5 Accessing Services 38 7 8 2011 References 39 6 Frequently Asked Questions This section presents a set of frequently asked questions FAQs related to the Gateway Q1 What are the technologies used by the WEMS The technologies used by the WEMS include Programming language Java 1 5 Database Mysql 5 Object Relational Mapping Hibernate 3 2 Object XML mapping XMLBeans 2 3 0 WEB framework Struts 1 2 9 Spring 1 2 5 7 8 2011
6. new user e Delete Users This function allows ad administrator to delete an existing user from the list of users that he can manage f Update User Privilege This function allows an administrator to update privilege for a user promote a normal user to administrator or change other administrator to normal user 5 4 Search Facilities Search functions are loaded by clicking on the tab Query on menu bar The list of available functions is displayed as follows 7 8 2011 Section 5 Accessing Services 30 Figure 21 Query Menu Query Search Offenses Species involved in most offenses Species Category involved in most offenses Number of species seized Upon click on the menu following screen will appear Figure 22 Search offenses Search Offenses Enter data and click Submit button Operator Sano Cor Appendix 2006 y All Agencies All Persons All Companies Country of Seizure All Countries There are several search parameters and user can choose appropriate value from the combo box These parameters can be combined to limit search results by specifying AND operator Figure below shows the all offenses seized in 2006 7 8 2011 Section 5 Accessing Services 31 Figure 23 All seizures in 2006 List of Offenses Export All From the result user can view the detail of each offense by clicking on the corresponding button He or she can export result in Excel or PDF fo
7. ample Provinces Of TONdia ocooocccccncncnncncnnnnnoncnnnnnnnnncnnnnrnnnnenannrnnnnrrnnes 24 PA GIMGIN EW Clty wie siea a ana aN A AAN aaa eens 25 PSPECleS MS A A ET E TT 26 Adding NEW PESO Mii A aa TAAA 27 User Management Main M nu ccc narran narra 28 Error while changing user password coooccccnccnnnccnnnccnnnnrnnnnrnnnncrnnerennnrranes 29 Query MENU AAA A A A A A AA aa 30 Search Off NSS iii aa diana 30 NETA 20007 aeaa i aae aE EE A A A a Aa a a 31 Top 10 species involved in all CASES sssssrrrrrrrrrrrrrnrrrrnrrnrnnrrrnnnnnnnnn 32 Top 10 number species involved in all CaSesS oococcocconcnncnnnannannan nan nnn nano 33 Input for viewing seizure Map ococcnccncnconcncnnnnnnnennnnnnnnncnnnnrnrnnenannrnanernanees 34 Seizure Map in Asia every year sssssssssrssrresssrrennnssnsrrnnnnesnorrennnennes 35 Input for tracking FOULES session a A a a dd Na 36 Tracking routes of offenses in INdi2 ooccccccconccnconcnncnncnnnan narran narrar narran 37 Section 1 Introduction 7 Summary 1 Introduction Wildlife Enforcement Monitoring System is a GIS based model which will help in monitor ing the effectiveness of enforcement and compliance of wildlife law at a regional level The purpose of WEMS project is to monitor trafficking and illegal wildlife crime through a joint effort carried out through United Nations bodies national governments and re search institutions by building up a common data collection an
8. d reporting mechanism at a National level The project plans to address this issue by bringing together various national institutions to a common information sharing platform and thereby building the capacity of the states to manage knowledge on wildlife crime trends and threat assessments It will also bring together various agencies Customs Police Forests within the national govern ment in enhancing collection and sharing information on environmental crime Hence the objective of the project can be summarized as e Strengthening Partnership of Public sector and Research Institutions in the im plementing region to strengthen E Governance with regard to information sharing on Environmental law enforcement e Develop an information sharing portal for monitoring enforcement and com pliance of national environmental law and feeding information through research and analysis to the WEMS model at a regional level e Produce a Global Wildlife Law Enforcement Governance Map depicting the illegal extractions at the range state and seizures at the destination country with indi cators identifying the actions taken by parties to the CITES convention in reduc ing the loss WEMS has to major development steps WEMS database and Analysis WEMS GIS This document is principally related to WEMS database The basic concept is WEMS database holds data about offenses seized according to Interpol ecomessage format In addition spatial information is also
9. e 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 Figure 18 Figure 19 Figure 20 Figure 21 Figure 22 Figure 23 Figure 24 Figure 25 Figure 26 Figure 27 Figure 28 Figure 29 WEMS Deployment Folders for TOMCAat eeceeee eee ee teens teens teens ee eeeeaeees 8 Accessing the Web Application ccecceeeeeee eect ee eee eee teense ene eae ee en eneed 11 Offense Search FO Mira iia mana AAA i iaia 12 Offense LIST vies ceed BE Rea Meese CP SS EE eerie cee ened elena cae Rebels 13 Adding new offense general information ccceeeeeeeee eee ee eens eee eeeeeeees 14 Adding new offense species information ccceeeeeeeee eee ee eens eee eeeeeees 15 Adding new offense value product in US dollars cccccceeeeeeeeeeeeeeeeneenenas 16 Adding new offense Persons involved in OffENSE ccceceeeeeeeeeeeeeeneeneeneeas 16 Adding new offense Companies involved in offense cecceeeeeeeeeeeeeaeeneeas 17 Adding new offense Transport means and location sceeeeeee teens 18 Adding new offense Law Enforcement AGeNnCy eceeeeeeeeeeee teens eeeeees 19 Adding new offense Other Information cececeee eee e cece eee ee eee eeeeeee es 20 gt Listing all COUNTIES awh ad det ota neal a ide 22 Select country for listing itS PrOVINCES ooococcoconcnnnnnnnnnnnnnnnnnnncnnnnnnnnnrnnnnes 23 Ex
10. ers Delete Users Update User Privilege The sub menu content is varied based on user credentials provided at login If a normal user logs in only the first 2 items are displayed Trying another item using direct link will raise an error a Change Password Changing password is initialized by clicking on the corresponding link a page will be dis played requiring user to enter his old password new password and the confirmation of new password Some validations are performed before the new password is stored in da tabase Verify if the new password and the confirmation are identical if they are not identical an error message will be displayed Verify if the old password is correct or not If it s not correct another error message is displayed If both validations are correct new password will be stored in database and a confirm message will be showed Figure below shows the case where old password is not correct 7 8 2011 Section 5 Accessing Services 29 Figure 20 Error while changing user password Change Password Current Password New Password Confirm New Password Old password is incorrect b Update Profile Updating user profile only updates user email address and his full name only c List Users This function is reserved for administrators only It shows a list of users that an adminis trator can manage d Add Users This function allows an administrator to add
11. icity both Tomcat and MySQL are installed on the same machine Detailed instructions for installing these requirements are described in the development document chapter 6 Deployment 7 8 2011 Section 4 Deployment Procedures 10 4 Deployment Procedures Deploying software is quite straightforward just simply start Tomcat and MySQL engine in condition that the wems war must be placed in the webapps folder 7 8 2011 Section 5 Accessing Services 11 5 Accessing Services This section explains how to access the WEMS services Using WEMS online server 1 Start a browser 2 Access the following page http wems unu edu wems africa For local machine deployment 1 Ip address the IP address of the web server hosting the web application If it is a testing environment and the application is deployed in the local machine the IP address can be replaced by the text localhost 2 port number is the port number used by the web server for listening to incom ing requests Usually 8080 is the default value For example if user sits on the computer where wems war is deployed on the Tomcat server that is running on port 8080 he can type the following address in a web browser http localhost 8080 wems After executing this request a page will be displayed re quiring user provide his credentials in order to perform the other tasks Figure 2 Accessing the Web Application The Wildlife Enfo
12. ies on the menu bar Upon clicking a list of species will be loaded as showed in the following figure 7 8 2011 Section 5 Accessing Services 26 Figure 17 Species List COMPANY ADMINISTRATION QUERY LOG List of Species 622 Species found displaying 1 to 20 lt lt First Prev 1 2 3 4 5 6 7 8 Next Last gt gt A e E os Actually the list of all species is loaded but in the future species should be re organized applying the structure in the document provided by CITES In principle user can add new species delete an existing species and edit an existing species but it is not advisable once CITES data is imported to the system e Person Management Person Management deals with managing persons who involve in offenses It provides following capabilities by clicking on the appropriate buttons Adding new person Editing a person 7 8 2011 Section 5 Accessing Services 27 Deleting a person Listing all persons Viewing person details Person Management is initialized by clicking on the tab Person a list of persons will be loaded when user clicks on it To add a new person or edit an existing person some data must be validated such as family name should be provided date of birth must be provided etc Person data cannot be stored unless all this information is provided and valid Figure 18 Adding new person Add New Person fields with are mandatory Family Name
13. information Adding Offense fields with are mandatory 1 Subject Brief Description of the Offense Code Name Legal Description of the Offense 2 Place and Method of Discovery Place How the offense was discovered Province SelectProvince v City SelectCity v 3 Date and Time of the Offense Date of Actual Crime f Select Clear Date of Seizure Select Clear Time of actual Crime Hr mts Time of Seizure Hr mts 7 8 2011 Section 5 Accessing Services 15 Fields marked with asterisk are mandatory In addition some data must be validated be fore submitting to server For example Date of actual crime should have correct format 31 02 2004 is an invalid date because there is no 31th day of February Date of actual crime cannot be late than date of seizure Date of actual crime and date of seizure cannot be late than current date Note all date fields are handled by Calendar user cannot input them directly in the text box If there are still errors user cannot submit the page thus nothing will be writ ten in database Error messages are also displayed in red color permitting user to correct them easily If all data is valid user will move to the second page where he can enter information about species involved as showed in the figure below b Contraband Product Figure 6 Adding new offense species information Ry Contraband Product Offense Code t
14. ing Data ivcinci be 21 a Organization ManageMent ococnccccnconcnccnnnncnnnnnnnnrrnnnr cnn nr erre rrnnrrranrrrrnrrranernanernanees 21 a Country MAA MEN ba cias 21 5 PROVINCE MaNaGeMeNn iia cl ad O lt nbs 22 E City MAN AJEMENE dt a la ee A AAA A AA dae 24 d Species MANAGE MENE iii dai 25 Persom Management diria E E AN la 26 f Company Management 1 cece EERE EEE EEE EEE ES 27 USO Managem A 27 a Change PasS WO diiniita 28 b Update Profilen e ii A A A a A A AA 29 CJUS USERS it A E tr ae Pe ede aa de ane 29 d Add Us Sica a ai es 29 Delete Us A A a da 29 f Update USE Privilege 0 O io 29 5 4 Se archuESCIlItOS iaa li Ae 29 5 5 Reporting Facilities midi id in id A AAA A AA AAA 31 Bi O WEMS IMA Pa a 33 a Places Of Size la ia Li eaten eae ein In eee kee eee 33 b TRACKING ROUTES a ii 35 Bi 7 LOG FUG aa ade neh AA vad en end a 37 6 Frequently Asked QUESTIONS 0coccoccoccocnoonoononnconconconconcon corran narrar narrar narrar nar narnanannns 39 Extensible Message Gateway User Manual Abbreviations Document Location Extensible Message Gateway User Manual Revision History Date Changes 18 05 2011 Creation of document 07 06 2011 Updated add description about data sharing policy Distribution Extensible Message Gateway User Manual vi List of Figures Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figur
15. it button the result is shown in the figure below the seizure points cities are highlighted as red circle The year of seizure is not specified application will look up all cases in database 7 8 2011 Section 5 Accessing Services 35 Figure 27 Seizure map in Asia every year Seizure Map in an Area Pay Attention cities without geographical data will not be displayed on the map If you feel that this data is incorrect please make modification at following link modify city Map Type ESRI y Area Asia Year of Seizure User can zoom in seizure points if he she wants b Tracking Routes This GIS feature shows the routes of offenses satisfying certain criteria from origin to the seizure point Figure below show the input screen to filter the offenses 7 8 2011 Section 5 Accessing Services 36 Figure 28 Input for tracking routes Tracking Routes Map Provider ESRI y Species Category SelectCategory v Country of Origin Select Country a Select Species SelectSpecies v Country of Destination Select Country f X Select Year Range Select Year Range i There are two working modes as shown in the figure one is based on species in offenses and another is based on destination country where seizures took place Figure below shows tracking routes for all offenses seizures in India 7 8 2011 Section 5 Accessing Services 37 Figure 29 Tracking routes of offenses in India
16. ls listing all countries and deleting a country Country data is part of geographical data which is used in GIS features User initializes country management tasks by first clicking on the Administration tab and then choosing Country Management link a number of links related to administra tion will be loaded upon clicking on this tab Whenever user clicks on this link the list of all countries will be loaded as illustrated in the figure below 7 8 2011 Section 5 Accessing Services 22 Figure 13 Listing all countries 2 TT aaa Exactly the same way as offense management user can perform the management task by clicking on appropriate button Add button at the bottom of the list and View Edit and Delete button on each line which briefly display country name b Province Management Province data is also part of geographical data User can follow the same steps described in previous section to initialize province management tasks But there is a minor change when he clicks on the link Province Management detailed as follow The list of provinc es is not loaded because province cannot be standalone data they should belong to a country so that a country must be selected before listing Figure below show the screen where user can choose a country to list its provinces 7 8 2011 Section 5 Accessing Services 23 Figure 14 Select country f
17. n the figure below 7 8 2011 Section 5 Accessing Services 19 Figure 11 Adding new offense Law Enforcement Agency 9 Law Enforcement Agency Offense Code code 1 SelectAgency AddNewAgency Save ListAgencies Skip to final step Adding other information After completing this information user moves to the final page where he can enter other information showed in the figure below 7 8 2011 Section 5 Accessing Services 20 Figure 12 Adding new offense Other Information 10 Identification of Ducuments Used Specify the types of documents including authorizations transport documents permits and certificates Were the documents alteredor yes O No fraudulent 11 Modus Operandi Description of Modus Operandi 12 Addtional Information Other Details 13 Information Requested Does investigators need information fromforeign countries 7 8 2011 Section 5 Accessing Services 21 5 2 Section 2 Managing Data a Organization Management Organization management activities are reserved for LATF user and include following functions Adding new organization Deleting an organization Updating an organization Viewing organization details a Country Management Country management deals with various tasks concerning country users can perform following actions adding new country editing an existing country viewing country de tai
18. or listing its provinces Select a Country to view its provinces Select a Country Selecta Country bd Figure below shows an example of the list provinces of India 7 8 2011 Section 5 Accessing Services 24 Figure 15 Example Provinces of India List of Provinces for country India 32 Provinces found displaying 1 to 20 lt lt First Prev 1 2Next Last gt gt ying 1 to 20 lt lt First Prev 1 2 Next Last c City Management City management tasks follow the same principle as those of Province management A country must be specified before listing all cities A city can optionally belong to a province so user can specify a province in creating or editing a country as show in the figure below 7 8 2011 Section 5 Accessing Services 25 Figure 16 Adding new city Pay Attention geographical data such as Longitude and Latitude is important for displaying seizure map Tf this data is not available the corresponding city will not be shown on the map If this data is incorrectly entered location will be wrong on the map To find out the correct value please download data for major cities at http backspace com mapapp coordinates zip or Coordinate data on WEMS server More complete data can be found at world gazetteer com Add new City Country India ad Province Select Province v d Species Management Species management tasks are launched by clicking the tab Spec
19. ortoise_01 Select an Option SelectPhylum y SelectClass y Select Order y Select Family y Species Gazella cuvieri v Add New Species Refresh Common Name gazelles v Local Name Quantity Unit Select Unit v Type Select Type y Save fi List Products User can repeat this process as many times as he wishes However he cannot choose the species that is already existed After choosing the species c Entering Value or amount The user will move to the page where value of the seizure is estimated in US dollars by clicking on the button Value Product 7 8 2011 Section 5 Accessing Services 16 Figure 7 Adding new offense value product in US dollars 4 Contraband Products Estimated Value in US 20000 d Adding the name of the offender After entering the contraband details the user moves to the page where he can specify persons involved in the seizure as showed in the following figure Figure 8 Adding new offense Persons involved in offense 5 Person involved Offense Code tortoise_01 Person Select Person Add New Person Refresh Date of Arrest Date of Prosecution Please be noted that every field in this page is mandatory User can add new person from this page and refresh the person list by clicking on Add New Person and Refresh buttons respectively e Adding the name of the company 7 8 2011 Section 5 Accessing Services 17
20. process When user clicks List button a list of offenses that he she is allow to view is dis played as shown in the figure below 7 8 2011 Section 5 Accessing Services 13 Figure 4 Offense List 25 Offenses found displaying 1 to 18 lt lt First Prev 1 2 Next Last gt gt to 18 lt lt First Prev 1 2Nextlast gt gt unono The rule for viewing offenses is below LATF users can view any cases Users in a country determined by organization where they work can only see cases entered by users of this country and cases published by LATF status of case is PUBLISHED From this list user can perform following actions by clicking on appropriate buttons Adding new offense Viewing offense details Editing an existing offense Deleting an existing offense 7 8 2011 Section 5 Accessing Services 14 Deleting an offense is simple a message is displayed and asking user about confirma tion If he agrees the chosen offense will be removed from database The other tasks are more complex because an offense has composite structure each offense is divided into several parts of data For illustration we only demonstrate the steps for adding new offense User launches this action by clicking on the Add button at the bottom of the list of of fenses page The first screen will be loaded and user can enter general data about this new offense Figure 5 Adding new offense general
21. rcement Monitoring System WEMS is developed by United Nations University Campus Computing Center under the auspices of United Nations University Institute Advanced Studies and supported by ESRI Corporation Enter user name password to login User Name Password Following subsections describes various user tasks which are grouped into different cate gories The order of these categories is exactly the same as one in the development doc ument 5 1 Section 1 Adding Seizure Information a Entering a Case Offense User initializes functions related to offense management by clicking on the tab Case on the menu bar Upon clicking a search form is display as shown in following figure 7 8 2011 Section 5 Accessing Services 12 Figure 3 Offense Search Form List offenses enter criteria and click List button Start Year End Year List offenses Enter criteria and click List button Start Year End Year Status Select Status v Organization Country Select Country Kenya Tanzania Uganda Congo Brazzaville The search form on the left is loaded when a normal user logs in while the one on the right is reserved for LATF users LATF users can have more search criteria such as filter on offense status and country where offense is entered The common criteria are the year range in which offenses take place User can leave any criteria blank which means this will not count in the search
22. rmat by clicking on the b button 5 5 Reporting Facilities Just like the way search functionality is accessed various reporting facilities are available by clicking on the tab Query of menu bar For instance only 3 kinds of report are pro duced Top 10 species involved in most offenses Top 10 species categories involved in most offenses Top 10 number of species seized The first 2 reports are very similar except that the second one requires user select spe cies category from a dropdown list containing species categories in database User al ways has to enter the year when seizures take place or he can enters all for requesting data for every year After all required fields are entered a report in pie chart will be pro duced Figure below shows the top 10 species involved in all cases 7 8 2011 Section 5 Accessing Services 32 Figure 24 Top 10 species involved in all cases Top Species Involved in Offenses Category All Categories Year ALL Top Species Involved Dendrocygna arborea 1 Anas nesiotis 1 Lorises 1 al Canis lupus Black Rhinocerous 1 Crocodiles 1 Pantholops hodgsonii 3 Elephants 7 Olive Ridley Turtle 3 e Pantholops hodgsonii 3 Crocodiles 1 e Black Rhinocerous 1 Canis lupus 1 Lorises 1 e Anas nesiotis 1 e Dendrocygna arborea 1 Species involved in most offenses Species Category involved in most offenses
23. stored for further expansion integration with GIS software which will be the next step of WEMS Section 2 Deployment Components 8 2 Deployment Components WEMS database software consists of a single deployment component wems war that can be put in the deployment folder of any web servers Figure below shows the folder structure for Apache Tomcat server Figure 1 WEMS Deployment Folders for Tomcat Tomcat Root Directory AAA pss l WEB INF css Once wems war is copied to webapps folder Starting Tomcat will create folder wems which has following sub folders 1 WEB INF includes all the required libraries for implementing the WEMS data base all java classes for handling the application logic and configuration files 2 css includes all style sheet for rendering HTML 3 pages includes all JSP pages to interact with users 4 js stores all javascript codes to make user interface more friendly 5 tiles stores Struts tile components which define the look and feel of all the pages 7 8 2011 Section 3 Deployment Environment 9 3 Deployment Environment This section presents the system requirements for deploying the software The WEMS database software has web interface and will run on any web servers sup porting Servlet of Sun Microsystems Currently we use light weight servlet container Tomcat of Apache For DBMS Database Management System we use MySQL version 5 For simpl

Download Pdf Manuals

image

Related Search

Related Contents

Dermotrace® Mode d`emploi Dermotrace® Instructions  mySCAN Mouse    Manuel d`utilisation  Le dimanche entre le 11 septembre et le 17 septembre  Samsung Galaxy Tab 2 7.0 manual do usuário(CLARO)  Monitor Gnatus  Installation Manual_DW9000H-Series-00157A  Regex - the FreeBSD Documentation Server  Bedienungsanleitung  

Copyright © All rights reserved.
Failed to retrieve file