Performance Testing of Mobile Applications on Smartphones

2014 ◽  
Vol 5 (4) ◽  
pp. 36-47
Author(s):  
Abdurhman Albasir ◽  
Valuppillai Mahinthan ◽  
Kshirasagar Naik ◽  
Abdulhakim Abogharaf ◽  
Nishith Goel ◽  
...  

Smartphones became the preferred means of communication among users due to the availability of thousands of applications (apps). Although the hardware and software capabilities of smartphones are on the rise, the apps are primarily constrained by the wireless bandwidth and battery life. In this paper, the authors present a test architecture to: (i) evaluate the energy performance of two different designs of the same mobile app service; and (ii) evaluate the bandwidth and energy impacts of advertisements (ads) on smartphones. The authors' measurements on two video players show that, the proper design results a more energy efficient video players. Next, they compare the bandwidth and energy performance news and magazine websites with ads and without ads. In some cases, ads bandwidth cost reaches 50%, whereas ads energy cost reaches 17.8%. The authors also identified the challenges in reliably performing such tests on a large scale. App developers, users, manufacturers, and Internet Service Providers will benefit from this research.

2018 ◽  
Vol 7 (3.33) ◽  
pp. 183
Author(s):  
Sung-Ho Cho ◽  
Sung-Uk Choi ◽  
. .

This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction of web application firewalls. The port redirection type configured with the help of peripheral network equipment such as routers or L4 switches can maintain web services even when physical obstruction of the web application firewall occurs and is suitable for large scale networks where several web services are mixed. In this study, port redirection type web application firewalls were configured in large-scale networks and there was a problem in that the performance of routers was degraded due to the IP-based VLAN when a policy was set for the ports on the routers for web security. In order to solve this problem, only those agencies and enterprises that provide web services of networks were separated and in-line type web application firewalls were configured for them. Internet service providers (ISPs) or central line-concentration agencies can apply the foregoing to configure systems for web security for unit small enterprises or small scale agencies at low costs.  


2016 ◽  
Vol 26 (09n10) ◽  
pp. 1605-1615 ◽  
Author(s):  
Chuanqi Tao ◽  
Jerry Gao

With the rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile applications (apps). This brings new business requirements and demands in mobile software testing, and causes new issues and challenges in mobile test automation. Existing mobile application testing approaches mostly concentrate on GUI-based testing, load and performance testing without considering large-scale concurrent mobile app test automation, and model-based test coverage analysis. In this paper, a mobile hierarchical GUI model is proposed to present mobile operation scenario flows and gesture features in a hierarchical manner, in order to facilitate test dependency analysis in test automation. Mobile app test coverage analysis is performed based on GUI ripping models. The paper also presents a developed system that provides a test automation solution using GUI models. Finally, the paper reports a case study to indicate the feasibility and effectiveness of the proposed approach.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2019 ◽  
Vol 10 (2) ◽  
pp. 168-177
Author(s):  
Haerdiansyah Syahnur ◽  
Jafar Basalamah

This study aimed to analyze the customer experience seen from the level of actual performance and the level of importance of services provided by internet service providers PT. XYZ in Makassar City. Variables and attributes issued by TM Forum GB 912 consisting of Customer Management, Fulfillment, Assurance, and Billing, are used to analyze the performance provided by customer service in the field. The analysis technique will be carried out using the Importance Performance Analysis and Customer Satisfaction Index consisting of quadrant analysis and gap analysis used to investigate customer satisfaction and identify variables whose performance is deemed to need improvement. Data were collected using a platform-based questionnaire application from 100 respondents selected using random sampling techniques. The results showed that customers were satisfied with the performance and quality of services provided. The customer satisfaction index value obtained by CSI analysis shows a value of 82.006%. In conclusion, that the Fulfillment variable is a service variable that is considered the most important customer and requires improvement because its performance is still relatively low. While the variables considered good and need to be maintained are the Billing variable. Other service variables are sorted based on priority of improvement in a row, namely Fulfillment, Customer Management, and Assurance.


2017 ◽  
Vol 15 (3) ◽  
pp. 41
Author(s):  
Zoltán Szűts ◽  
Jinil Yoo

Tanulmányunk témája a netsemlegesség. Először magát a fogalmat definiáljuk többféle módon, majd a netsemlegességgel kapcsolatos törvényhozói, internet- és tartalomszolgáltatói, valamint felhasználói kihívásokat, problémákat és válaszokat mutatjuk be. Számos szerző szerint az internet legnagyobb, immár tradicionális értéke a nyíltság, sokszínűség, tartalomgazdagság, tértől és időtől független társadalmi és perszonális kommunikációba való szabad belépés és a szabad verseny lehetősége. A netsemlegesség mellett és ellen felhozott érvek bemutatását is ezek a szempontok alapján tesszük. Kiemelt szerepet kap a netsemlegesség megsértésének kategorizálása is. Tanulmányunkban közlünk egy törvényalkotási kronológiát, mely az USA-ra, az EU-ra és Kelet-Ázsiára fókuszál, illetve ismertetjük a BEREC 2011-es felmérésének az EU-ban alkalmazott, internetszolgáltatói gyakorlatra vonatkozó eredményeit. A munkát az Internet.org kezdeményezést vizsgáló esettanulmány zárja, végül ezt követik a jövővel kapcsolatos kérdések, és néhány lehetséges válasz. --- Net neutrality - definitions and the standpoints of legislators, content providers, Internet service providers and users This article examines the topic of net neutrality. Firstly, it provides us with a theoretical insight and several definitions. Then it presents the issues and challenges legislators, ISP’s, content providers and users face. Several authors state that the biggest virtue and value of Internet lies in open access, diversity, richness of content, free competition, and low barrier entry for users in order to participate in personal social communication. Our presentation of arguments pro and cons net neutrality will be built on the basis of these considerations. Priority will be given to the introduction of several categories of net neutrality violations. In our paper we will present a legislative chronology in the topic focusing on USA, EU and Korea-Japan as well as the findings of the 2011 BEREC survey. Finally we examine the Internet.org project. In the conclusion, the article offers several more issues to be discussed and provides some possible answers.


Author(s):  
Bangaly Kaba

The purpose of this study is to understand the difference between Internet users' continuing use behavior in the context of digital inequality. Data were collected through a survey of Internet users in the Ivory Coast. The structural equation modeling technique was used to test the research hypothesis. This study showed empirically that concern over information and communication technologies (ICT) access as an explanation for digital inequality should be toned down. This research suggests emphasizing alternative factors to explain Internet sustained use intention by underprivileged individuals, including normative beliefs. The results will help internet service providers, governments, and international aid agencies to better understand users' behaviors or reactions to ICT available to them. This understanding provides a foundational platform upon which viable and effective information technology-enabled solutions and policies can be conceptualized and implemented. This study is one of the few that integrate three salient beliefs to differentiate ICT use continuance intention in the context of digital inequality.


Sign in / Sign up

Export Citation Format

Share Document