scholarly journals On web-applications usability testing

Author(s):  
Boris M. Basok ◽  
Alena N. Rozhanskaya ◽  
Sergey L. Frenkel

The paper discusses the task of organizing the usability testing of web applications that are in pilot or industrial operation. A usability testing technique is described that combines the development, debugging and execution of test scenarios, and analysis of the received test data. The development of test scenarios is based: on the use of the accumulated experience of users who have already worked with this application or with another, similar in functionality; on the use of web analytics, which can provide scenarios of the behavior of user data on the site; and on the use of statistical data on visits to specific pages. Simultaneously with this approach, a different approach is used in the construction of tests. It is based on the development of tests aimed at identifying defects in the program. Debugging and execution of test tasks is carried out in the same way as it is realized when performing functional testing of web applications using testing automation tools. In addition, the analysis of the data obtained during the operation using web analytics makes it possible to form a group of respondent testers, whose capabilities reflect the capabilities of the entire set of probable users of this web application. The approaches outlined in the work were put into practice. As an example, the article provides test data for the page of the admissions committee of MIREA – Russian Technological University – priem.mirea.ru. The obtained experimental data showed that, despite testing the usability of software at the development stages, some errors in the operation of web applications remain undetected. The cost of detecting and eliminating these errors increases significantly. Therefore, it is recommended in the work to increase the level of usability already in the early stages of development. In particular, for the operational prediction of the level of usability, it is desirable to have mathematical tools for modeling the behavior of the designed system and the user.

Author(s):  
Romulo de Almeida Neves ◽  
Willian Massami Watanabe ◽  
Rafael Oliveira

Context: Widgets are reusable User Interfaces (UIs) components frequently delivered in Web applications.In the web application, widgets implement different interaction scenarios, such as buttons, menus, and text input.Problem: Tests are performed manually, so the cost associated with preparing and executing test cases is high.Objective: Automate the process of generating functional test cases for web applications, using intermediate artifacts of the web development process that structure widgets in the web application. The goal of this process is to ensure the quality of the software, reduce overall software lifecycle time and the costs associated with tests.Method:We elaborated a test generation strategy and implemented this strategy in a tool, Morpheus Web Testing. Morpheus Web Testing extracts widget information from Java Server Faces artifacts to generate test cases for JSF web applications. We conducted a case study for comparing Morpheus Web Testing with a state of the art tool (CrawlJax).Results: The results indicate evidence that the approach Morpheus Web Testing managed to reach greater code coverage compared to a CrawlJax.Conclusion: The achieved coverage values represent evidence that the results obtained from the proposed approach contribute to the process of automated test software engineering in the industry.


Computers ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 50
Author(s):  
Ivan ◽  
Vasile ◽  
Dadarlat

Cloud vendors offer a variety of serverless technologies promising high availability and dynamic scaling while reducing operational and maintenance costs. One such technology, serverless computing, or function-as-a-service (FaaS), is advertised as a good candidate for web applications, data-processing, or backend services, where you only pay for usage. Unlike virtual machines (VMs), they come with automatic resource provisioning and allocation, providing elastic and automatic scaling. We present the results from our investigation of a specific serverless candidate, Web Application Programming Interface or Web API, deployed on virtual machines and as function(s)-as-a-service. We contrast these deployments by varying the number of concurrent users for measuring response times and costs. We found no significant response time differences between deployments when VMs are configured for the expected load, and test scenarios are within the FaaS hardware limitations. Higher numbers of concurrent users or unexpected user growths are effortlessly handled by FaaS, whereas additional labor must be invested in VMs for equivalent results. We identified that despite the advantages serverless computing brings, there is no clear choice between serverless or virtual machines for a Web API application because one needs to carefully measure costs and factor-in all components that are included with FaaS.


2018 ◽  
Vol 10 (1) ◽  
Author(s):  
A. Antonova ◽  
B. Shanovskiy

The article discusses the issues of technology and methodology for automating the process of testing Web applications. Currently, developers and automation professionals are moving to popular developing development environments. In the process of developing and testing software in the team, not only developers and testers work, but also business professionals who define a set of changes when new versions of software products are released. When you update the product, an integral part of the release is the creation of automated testing. Means of providing automation is the use of an object-oriented approach to project implementation, a standard set of tools for providing processes for building and debugging programs, connecting auxiliary libraries for the programming language used (C++, C#, Java, etc.); checking the system versions, storing the automation project and the software product in one location.The main goal of this study is to identify and then analyze the weaknesses and strengths of methods for automating the testing of web applications, which are currently in the stage of rapid development. To carry out the research itself, information work was carried out (articles, reports, automation tools themselves) of the development stages of this topic. As a result, the authors made conclusions about further directions in the development of web application testing, identified the merits of existing solutions and identified areas that are not sufficiently developed.


2021 ◽  
Vol 5 (2(61)) ◽  
pp. 9-14
Author(s):  
Oksana Herasymenko ◽  
Valeriia Bachynska

The object of research is software for financial accounting and distribution of funds in a non-profit charitable foundation using smart contracts of the Ethereum platform. The work is aimed at designing and implementing a software application for a charitable foundation, which allows to exclude the misuse of funds of a non-profit charitable foundation. The paper proposes an implementation of the Ethereum smart contract for the software of a charitable foundation. In the app, users can apply for financial aid or make a charitable donation. The request for financial support is confirmed by administrators to avoid abuse by those seeking help. Anyone who has a crypto wallet can become a sponsor by transferring funds from its account to a selected request. The sponsor remains incognito when making a charitable contribution. After collecting the entire declared amount, the funds are automatically transferred to the crypto wallet of the request’s owner. A smart contract and a corresponding decentralized web application for interacting with it were experimentally deployed, and their joint work was tested. To implement the smart contract, the Solidity programming language was chosen; developed smart contract converted to bytecode using remix. The resulting bytecode is ready to be deployed on the Ethereum platform. Decentralized web application for interacting with the contract is implemented using Web3.js, Vue.js. A rough estimate of the cost of deploying a project on the Ethereum platform has been made. The deployment and operation of smart contracts and web applications comes with a certain overhead, which is most dependent on the cost of ether. However, this is a justified price to pay for the transparency of transactions and the shadowing of the turnover of funds of the charitable foundation. The results of the research can be used as a basis for further transformation into full-fledged software with the ability to submit all reporting documents to the relevant government agencies and sponsors.


Author(s):  
Kannan Balasubramanian

Applications that operate on the Web often interact with a database to persistently store data. For example, if an e-commerce application needs to store a user's credit card number, they typically retrieve the data from a Web form (filled out by the customer) and pass that data to some application or script running on the company's server. The dominant language that these database queries are written in is SQL, the Structured Query Language. Web applications can be vulnerable to a malicious user crafting input that gets executed on the server. One instance of this is an attacker entering Structured Query Language (SQL) commands into input fields, and then this data being used directly on the server by a Web application to construct a database query. The result could be an attacker's gaining control over the database and possibly the server. Care should be taken to validate user input on the server side before user data is used.


Author(s):  
Kannan Balasubramanian

Applications that operate on the Web often interact with a database to persistently store data. For example, if an e-commerce application needs to store a user's credit card number, they typically retrieve the data from a Web form (filled out by the customer) and pass that data to some application or script running on the company's server. The dominant language that these database queries are written in is SQL, the Structured Query Language. Web applications can be vulnerable to a malicious user crafting input that gets executed on the server. One instance of this is an attacker entering Structured Query Language (SQL) commands into input fields, and then this data being used directly on the server by a Web application to construct a database query. The result could be an attacker's gaining control over the database and possibly the server. Care should be taken to validate user input on the server side before user data is used.


JAMIA Open ◽  
2019 ◽  
Vol 2 (4) ◽  
pp. 434-439 ◽  
Author(s):  
Edward R Melnick ◽  
Wesley C Holland ◽  
Osama M Ahmed ◽  
Anthony K Ma ◽  
Sean S Michael ◽  
...  

Abstract Computerized clinical decision support (CDS) faces challenges to interoperability and scalability. Centralized, web-based solutions offer a mechanism to share the cost of CDS development, maintenance, and implementation across practices. Data standards have emerged to facilitate interoperability and rapid integration of such third-party CDS. This case report describes the challenges to implementation and scalability of an integrated, web-based CDS intervention for EMergency department-initiated BuprenorphinE for opioid use Disorder which will soon be evaluated in a trial across 20 sites in five healthcare systems. Due to limitations of current standards, security concerns, and the need for resource-intensive local customization, barriers persist related to centralized CDS at this scale. These challenges demonstrate the need and importance for future standards to support two-way messaging (read and write) between electronic health records and web applications, thus allowing for more robust sharing across health systems and decreasing redundant, resource-intensive CDS development at individual sites.


2019 ◽  
Vol 20 (2) ◽  
pp. 399-432 ◽  
Author(s):  
Parminder Singh ◽  
Pooja Gupta ◽  
Kiran Jyoti ◽  
Anand Nayyar

Cloud computing emerging environment attracts many applications providers to deploy web applications on cloud data centers. The primary area of attraction is elasticity, which allows to auto-scale the resources on-demand. However, web applications usually have dynamic workload and hard to predict. Cloud service providers and researchers are working to reduce the cost while maintaining the Quality of Service (QoS). One of the key challenges for web application in cloud computing is auto-scaling. The auto-scaling in cloud computing is still in infancy and required detail investigation of taxonomy, approach and types of resources mapped to the current research. In this article, we presented the literature survey for auto-scaling techniques of web applications in cloud computing. This survey supports the research community to find the requirements in auto-scaling techniques. We present a taxonomy of reviewed articles with parameters such as auto-scaling techniques, approach, resources, monitoring tool, experiment, workload, and metric, etc. Based on the analysis, we proposed the new areas of research in this direction.


2020 ◽  
Vol 3 (1) ◽  
pp. 320-330
Author(s):  
Adam Muc ◽  
Tomasz Muchowski ◽  
Albert Zawadzki ◽  
Adam Szeleziński

AbstractBusinesses are increasingly confronted with server-related problems. More and more, businesses are enabling remote working and need to rely on network services. The provision of network services requires rebuilding the network infrastructure and the way employees are provided with data. Web applications and server services use common dependencies and require a specific network configuration. This often involves collisions between network ports and common dependencies’ configuration. This problem can be solved by separating the conflicting applications into different servers, but this involves the cost of maintaining several servers. Another solution may be to isolate applications with virtual machines, but this involves a significant overhead on server resources, as each virtual machine must be equipped with an operating system. An alternative to virtual machines can be application containerization, which is growing in popularity. Containerization also allows to isolate applications, but operates on the server’s native operating system. This means eliminating the overhead on server resources present in virtual machines. This article presents an example of web application containerization.


2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


Sign in / Sign up

Export Citation Format

Share Document