Abstract-Mobile devices have become more pervasive in our daily lives, and are gradually replacing regular computers to perform traditional processes like Internet browsing, editing photos, playing videos and sound track, and reading different files. The importance of mobile devices in our life necessitates more concerns of the reliability and compatibility of mobile applications, and thus, testing these applications arises as an important phase in mobile devices adaption process. This paper addressed various research directions on mobile applications testing by investigating essential concepts, scope, features and requirements for testing mobile application. We highlight the similarities and the differences between mobile APP testing and mobile web testing. Furthermore, we discuss and compare different mobile testing approaches and environments, and provide the challenges as emergent needs in test environments. As a case study, we compared the testing experience of hybrid application in an emulator and a real world device. The purpose of the experiment is to verify to which extent a virtual device can emulate a complete client experience. Set of experiments are conducted where five android mobile browsers are tested. Each browser will be on a real device as well as an emulated device with the same features (CPU used, memory size, etc). The application will be tested on the following metrics: Performance and function/behavior testing.
In modern interaction, web applications has gained more and more popularity, which leads to a significate growth of exposure to malicious users and vulnerability attacks. This causes organizations and companies to lose valuable information and suffer from bad reputation. One of the effective mitigation practices is to perform security testing against the application before release it to the market. This solution won't protect web application 100% but it will test the application against malicious codes and reduce the high number of potential attacks on web application. One of known security testing approach is threat modeling, which provides an efficient technique to identify threats that can compromise system security. The authors proposed method, in this paper, focuses on improving the effectiveness of the categorization of threats by using Open 10 Web Application Security Project's (OWASP) that are the most critical web application security risks in generating threat trees in order to cover widely known security attacks.
Abstract-Software testing is an embedded activity in all software development life cycle phases. Due to the difficulties and high costs of software testing, many testing techniques have been developed with the common goal of testing software in the most optimal and cost-effective manner. Model-based testing (MBT) is used to direct testing activities such as test verification and selection. MBT is employed to encapsulate and understand the behavior of the system under test, which supports and helps software engineers to validate the system with various likely actions. The widespread usage of models has influenced the usage of MBT in the testing process, especially with UML. In this research, we proposed an improved model based testing strategy, which involves and uses four different diagrams in the testing process. This paper also discusses and explains the activities in the proposed model with the finite state model (FSM). The comparisons have been done with traditional model based testings in terms of test case generation and result.
Software is unequivocally the foremost and indispensable entity in this technologically driven world. Therefore quality assurance, and in particular, software testing is a crucial step in the software development cycle. This paper presents an effective test selection strategy that uses a Spectrum of Complexity Metrics (SCM). Our aim in this paper is to increase the efficiency of the testing process by significantly reducing the number of test cases without having a significant drop in test effectiveness. The strategy makes use of a comprehensive taxonomy of complexity metrics based on the product level (class, method, statement) and its characteristics.We use a series of experiments based on three applications with a significant number of mutants to demonstrate the effectiveness of our selection strategy.For further evaluation, we compareour approach to boundary value analysis. The results show the capability of our approach to detect mutants as well as the seeded errors.
During the last years, blockchain has been getting interest by both academic and professional researchers. This is primarily due to the innovative techniques in which records are effectively stored in a distributed manner. Started as a value transfer mechanism, blockchain now has several applications in a vast array of fields including healthcare, banking, and Internet of Things (IoTs). Despite the considerable amount of interest given to these fields, little is known about the possible applications of blockchain in education. Because of COVID-19 outbreak and the rise in the need of online and automated solutions in academia, this paper proposes an overview of a blockchain solution in education. This technology relies on the unique features it offers, such as decentralization, data integrity, and security. The presented solution aims to reduce the paperwork needed to perform tasks, secure the stored data, increase transparency, as well as to offer new recruitment possibilities and statistics capabilities to the current educational system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.