scholarly journals HTCPM: A HYBRID TEST CASE PRIORITIZATION MODEL FOR WEB AND GUI APPLICATIONS

Author(s):  
P.DILEEP KUMAR REDDY ◽  
A. ANANDA RAO

Web and Event-driven applications (EDS) is a class of applications that is quickly becoming ubiquitous. All EDS take sequences of events (e.g., messages, mouse-clicks) as input, change their state, and produce an output (e.g., events, system calls, text messages), where as in web, user session data gathered as users operate web applications can be considered as input, change their state, and produce an output. Examples include web applications, graphical user interfaces (GUIs), network protocols, device drivers, and embedded applications. Testing for functional correctness of EDS such as stand-alone GUI and web-based applications is critical to many organizations. These applications share several important characteristics. Both are particularly challenging to test because users can invoke many different sequences of events that affect application behavior. Hence here a novel model is provided to rank the test cases based on their prioritization.

Author(s):  
Ícaro A. Fonseca ◽  
Felipe F. de Oliveira ◽  
Henrique M. Gaspar

Abstract This paper focuses on virtual prototyping and simulation of marine operations based on web technologies. The ship is represented as a digital object, which can be used to perform different types of analyses and simulations. The presented simulations are: motion of a single hull and of multiple hulls in regular waves calculated with closed-form expressions, induced pendulum motion response to a lifted load, and motion of a barge with initial movements in still water calculated with equations of motion. The simulations are developed as web applications in JavaScript and HTML, with graphical user interfaces and 3D renders of the operations. Relevant parameters of the simulations such as wave characteristics and design dimensions are linked to interactive dashboards, allowing the user to modify them and visualize the results in real-time. The applications are lightweight enough to be executed locally in the web browser of most modern devices. The work employs an open source approach, relying most notably on the Vessel.js library. This aims to foster reuse of models and collaboration with external contributors.


2019 ◽  
Author(s):  
Emily K.W. Lo ◽  
Remy M. Schwab ◽  
Zak Burke ◽  
Patrick Cahan

AbstractSummaryAccessibility and usability of compute-intensive bioinformatics tools can be increased with simplified web-based graphic user interfaces. However, deploying such tools as web applications presents additional barriers, including the complexity of developing a usable interface, network latency in transferring large datasets, and cost, which we encountered in developing a web-based version of our command-line tool CellNet. Learning and generalizing from this experience, we have devised a lightweight framework, Radiator, to facilitate deploying bioinformatics tools as web applications. To achieve reproducibility, usability, consistent accessibility, throughput, and cost-efficiency, Radiator is designed to be deployed on the cloud. Here, we describe the internals of Radiator and how to use it.Availability and ImplementationCode for Radiator and the CellNet Web Application are freely available at https://github.com/pcahan1 under the MIT license. The CellNet WebApp, Radiator, and Radiator-derived applications can be launched through public Amazon Machine Images from the cloud provider Amazon Web Services (AWS) (https://aws.amazon.com/).


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Muhammad Bilal ◽  
Muhammad Asif ◽  
Abid Bashir

It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session hijacking situation because in other existing OpenID communication methods such double factor authentication has more chances of valid user session hijacked. The proposed communication protocol secures the OpenID URL with the help of additional innovative parameters such as Special Alphanumeric String (SAS) and Special Security PIN (SSP). The anticipated triple authentication protocol authenticated client unique OpenID URL at OpenID Provider (OP) side once and SAS and SSP field at Relying Party (RP) side. The anticipated protocol provides unique Single-Sign-On (SSO) services to OpenID users. The experimental website is tested by experts of web developers for avoiding session hijacking situation in the presence of hackers. The findings demonstrated that Dense Authentication Authorization and Accounting (DAAA) protocol minimizes the risk of a session hijacking in OpenID communication environment.


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Jose Luis Fernandez-Marquez ◽  
Ioannis Charalampidis ◽  
Oula Abu-Amsha ◽  
Francois Grey ◽  
Daniel K. Schneider ◽  
...  

Analytics tools have been widely used over the last years for the development of web-based application and services. Analytics data allows improving user interfaces through planning, executing, and evaluating actions intended to increase user engagement. Measuring and improving user engagement in citizen science projects is not different from other web applications such as on-line shopping, newspapers, or sites for recommending music or movies. However, citizen science projects also aim to produce learning outcomes on the participants. Current analytics tools do not present sufficient information regarding user behaviour with the application, thus making measuring engagement and learning outcomes difficult. This paper presents the CCLTracker analytics framework that is intended to overcome current limitations in analytics tools, by providing an API for monitoring user activities such as time spent watching a video, time to complete a task, or how far down a page is scrolled. CCLTracker has been integrated in 3 different citizen science projects which have proved its value for measuring user engagement and learning.


2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


Author(s):  
Boon Yih Mah ◽  
Suzana Ab Rahim

The use of the internet for teaching and learning has become a global trend among the education practitioners over the recent decades. The integration of technology and media into Malaysian English as a Second Language (ESL) classrooms has altered the methods in English Language Teaching (ELT). In response to the impact of technology in ELT, the needs of a supplementary instructional platform, and the limitations of the learning management system (LMS) in fostering second language (L2) writing skill, a web-based instructional tool was designed and developed based on a theoretical-and-pedagogical framework namely Web-based Cognitive Writing Instruction (WeCWI). To determine the key concepts while identifying the research gap, this study conducted a literature review using online search on specific keywords including “blog”, “Blogger”, “widget”, and “hyperlink” found in the scholarly articles. Based on the review of literature, Blogger was opted due to its on-screen customisable layout editing features that can be embedded with web widgets and hypertext that share the identical features. By looking into the relationship between perceptual learning preferences on perceived information and the visual representations in iconic and symbolic views, the blogs can come with two different user interfaces embedded with web widgets or hypertext. The blog with web widgets appears in a graphical form of iconic view; while hypertext only displays textual form of symbolic view without involving the visual references. With the injection of web widgets and hypertext into the blogs, WeCWI attempts to offer a technological enhanced ELT solution to overcome the poor writing skill with a better engagement while learning online through the learners’ preferred perceptual learning preferences.


2020 ◽  
Vol 28 (1) ◽  
pp. 181-195
Author(s):  
Quentin Vanhaelen

: Computational approaches have been proven to be complementary tools of interest in identifying potential candidates for drug repurposing. However, although the methods developed so far offer interesting opportunities and could contribute to solving issues faced by the pharmaceutical sector, they also come with their constraints. Indeed, specific challenges ranging from data access, standardization and integration to the implementation of reliable and coherent validation methods must be addressed to allow systematic use at a larger scale. In this mini-review, we cover computational tools recently developed for addressing some of these challenges. This includes specific databases providing accessibility to a large set of curated data with standardized annotations, web-based tools integrating flexible user interfaces to perform fast computational repurposing experiments and standardized datasets specifically annotated and balanced for validating new computational drug repurposing methods. Interestingly, these new databases combined with the increasing number of information about the outcomes of drug repurposing studies can be used to perform a meta-analysis to identify key properties associated with successful drug repurposing cases. This information could further be used to design estimation methods to compute a priori assessment of the repurposing possibilities.


2010 ◽  
Vol 27 (3) ◽  
pp. 207-216 ◽  
Author(s):  
Luis Iribarne ◽  
Nicolás Padilla ◽  
Javier Criado ◽  
José-Andrés Asensio ◽  
Rosa Ayala

2021 ◽  
Vol 80 (Suppl 1) ◽  
pp. 1479.1-1479
Author(s):  
R. te Kampe ◽  
A. Boonen ◽  
T. Jansen ◽  
J. M. Elling ◽  
M. Flendrie ◽  
...  

Background:Adherence to prescribed urate-lowering therapy (ULT) among gout patients is considered to be among the poorest of all chronic conditions. eHealth programs can be a possible opportunity to foster ULT adherence.Objectives:This study describes the development and usability evaluation of a web-based tool to support ULT adherence among gout patients, specifically designed for a complement to usual care.Methods:The Integrated Change (I-Change) model was used as theoretical basis for the development. The model combines various socio-cognitive theories and differentiates between three phases: a pre-motivational, a motivational, and a post-motivational phase. In practices, the I-Change gout tool contains three sessions, following the three phases of the I-Change model. Patients receive tailored feedback based on their answers in the form of animated videos and text messages after each session, and are prompted to set specific goals and action plans for their ULT adherence. The content and development of the I-Change gout tool was determined along an iterative process within a steering group of clinicians and researchers, supported by patient interviews and gout specific literature related to key aspects of medication adherence behavior. A cross-sectional mixed methods design was used to test usability of the support tool consisting of a think aloud method and a usability questionnaire.Results:The steering group decided on the content of the three sessions of the I-Change gout tool. Depending on the intention to change ULT adherence behavior patients were navigated through the I-Change gout tool, patients with a low intention go through all 3 sessions and patients with a high intention go through the pre- and post-motivational session (figure 1). In total, the I-Change gout tool contains three sessions with 80 questions, 66 tailored textual feedback messages, and 40 tailored animated videos.Figure 1.Flowchart of the computer-tailored I-Change gout tool for urate-lowering therapy adherence.Twenty gout patients and seven healthcare professionals participated in the usability tests. The program end score rating for the gout tool was on average 8.4±0.9 (range 6-10) for patients and 7.7±1.0 (range 6-9) for healthcare professionals. Furthermore, participants reported a high intention to use and/or recommend the program in the future. Yet, participants identified some issues for further improvement of the systems user-friendliness by addressing barriers (e.g. more explicitly navigation) and weaknesses (e.g. technical and health literacy). The I-Change gout tool was updated according suggestions of improvements of the participants.Conclusion:This study provides initial support for the usability by patients and healthcare professionals of a ULT adherence I-Change gout tool. Further studies need to be conducted to assess its efficacy and (cost-) effectiveness in daily practice.Disclosure of Interests:None declared


2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Sign in / Sign up

Export Citation Format

Share Document