application developers
Recently Published Documents


TOTAL DOCUMENTS

312
(FIVE YEARS 133)

H-INDEX

17
(FIVE YEARS 3)

2022 ◽  
Vol 27 (2) ◽  
pp. 1-33
Author(s):  
Liu Liu ◽  
Sibren Isaacman ◽  
Ulrich Kremer

Many embedded environments require applications to produce outcomes under different, potentially changing, resource constraints. Relaxing application semantics through approximations enables trading off resource usage for outcome quality. Although quality is a highly subjective notion, previous work assumes given, fixed low-level quality metrics that often lack a strong correlation to a user’s higher-level quality experience. Users may also change their minds with respect to their quality expectations depending on the resource budgets they are willing to dedicate to an execution. This motivates the need for an adaptive application framework where users provide execution budgets and a customized quality notion. This article presents a novel adaptive program graph representation that enables user-level, customizable quality based on basic quality aspects defined by application developers. Developers also define application configuration spaces, with possible customization to eliminate undesirable configurations. At runtime, the graph enables the dynamic selection of the configuration with maximal customized quality within the user-provided resource budget. An adaptive application framework based on our novel graph representation has been implemented on Android and Linux platforms and evaluated on eight benchmark programs, four with fully customizable quality. Using custom quality instead of the default quality, users may improve their subjective quality experience value by up to 3.59×, with 1.76× on average under different resource constraints. Developers are able to exploit their application structure knowledge to define configuration spaces that are on average 68.7% smaller as compared to existing, structure-oblivious approaches. The overhead of dynamic reconfiguration averages less than 1.84% of the overall application execution time.


The current study developed a proposed mobile app for tourism companies in Egypt and tested its usability. A survey from a group of 53 respondents was conducted based on the mobile app features which were developed by tourists. The proposed mobile app was then tested by using usability measurement framework which was used to test the usability of the app interface and to ensure that this app meets user requirements. Three main usability metrics were employed in this study; effectiveness, efficiency and satisfaction. This study contributes to the current Mobile tourism and Mobile apps literature and offers useful information for ministry of tourism, software companies, mobile application developers and, of course, mobile device users in addition to entrepreneurs, policy makers, practitioners, researchers and educators through providing a clearer view and deep understanding for the issues related to the adoption of tourism-related new mobile phone application in Egypt.


Author(s):  
Przemysław Falkowski-Gilski

Today, thanks to mobile devices, satellite communication is available to anyone and everywhere. Gaining information on one’s position using GNSS (Global Navigation Satellite Systems), particularly in unknown urban environments, had become an everyday activity. With the widespread of mobile devices, particularly smartphones, each person can obtain information considering his or her location anytime and everywhere. This paper is focused on a study, considering the quality of satellite communication in case of selected mobile terminals. It describes a measurement campaign carried out in varying urban environments, including a set of Android-powered smartphones coming from different manufacturers. Based on this, respective conclusions and remarks are given, which can aid consumers as well as device manufacturers and application developers.


Author(s):  
Shesagiri Taminana ◽  
◽  
Lalitha Bhaskari ◽  
Arwa Mashat ◽  
Dragan Pamučar ◽  
...  

With the Present days increasing demand for the higher performance with the application developers have started considering cloud computing and cloud-based data centres as one of the prime options for hosting the application. Number of parallel research outcomes have for making a data centre secure, the data centre infrastructure must go through the auditing process. During the auditing process, auditors can access VMs, applications and data deployed on the virtual machines. The downside of the data in the VMs can be highly sensitive and during the process of audits, it is highly complex to permits based on the requests and can increase the total time taken to complete the tasks. Henceforth, the demand for the selective and adaptive auditing is the need of the current research. However, these outcomes are criticised for higher time complexity and less accuracy. Thus, this work proposes a predictive method for analysing the characteristics of the VM applications and the characteristics from the auditors and finally granting the access to the virtual machine by building a predictive regression model. The proposed algorithm demonstrates 50% of less time complexity to the other parallel research for making the cloud-based application development industry a safer and faster place.


Computing ◽  
2021 ◽  
Author(s):  
Carlos Sáenz-Adán ◽  
Francisco J. García-Izquierdo ◽  
Beatriz Pérez ◽  
Trung Dong Huynh ◽  
Luc Moreau

AbstractData provenance is a form of knowledge graph providing an account of what a system performs, describing the data involved, and the processes carried out over them. It is crucial to ascertaining the origin of data, validating their quality, auditing applications behaviours, and, ultimately, making them accountable. However, instrumenting applications, especially legacy ones, to track the provenance of their operations remains a significant technical hurdle, hindering the adoption of provenance technology. UML2PROV is a software-engineering methodology that facilitates the instrumentation of provenance recording in applications designed with UML diagrams. It automates the generation of (1) templates for the provenance to be recorded and (2) the code to capture values required to instantiate those templates from an application at run time, both from the application’s UML diagrams. By so doing, UML2PROV frees application developers from manual instrumentation of provenance capturing while ensuring the quality of recorded provenance. In this paper, we present in detail UML2PROV’s approach to generating application code for capturing provenance values via the means of Bindings Generation Module (BGM). In particular, we propose a set of requirements for BGM implementations and describe an event-based design of BGM that relies on the Aspect-Oriented Programming (AOP) paradigm to automatically weave the generated code into an application. Finally, we present three different BGM implementations following the above design and analyze their pros and cons in terms of computing/storage overheads and implications to provenance consumers.


2021 ◽  
Vol 6 (2) ◽  
pp. 210
Author(s):  
Rudi Hermawan

<p><em>In recent years cases of cyber attacks that lead to website security have increased. The most widely used website hacking threat is sql injection. By using the sqlmap tool that runs on the Kalilinux  operating system, attackers can easily take over very important user authentication data with their passwords. Attackers only use a special SQL query script using the python programming language will force the web server to output database information, tables, columns and data contents. This sql injection technique is not difficult, knowing how sql injection works is expected to be useful for web admins and web application developers to be able to secure user access from attackers. This attack simulation uses a virtual machine, by creating two virtual computers that are scripted as the attacker and the target server. By testing through this simulation, we can find out how the attack process and the consequences of attacks carried out by attackers.</em></p>


Author(s):  
Georgios Bouloukakis ◽  
Nikolaos Georgantas ◽  
Ajay Kattepur ◽  
Valerie Issarny

AbstractWith the emergence of the Internet of Things (IoT), application developers can rely on a variety of protocols and Application Programming Interfaces (APIs) to support data exchange between IoT devices. However, this may result in highly heterogeneous IoT interactions in terms of both functional and non-functional semantics. To map between heterogeneous functional semantics, middleware connectors can be utilized to interconnect IoT devices via bridging mechanisms. In this paper, we make use of the Data eXchange (DeX) connector model that enables interoperability among heterogeneous IoT devices. DeX interactions, including synchronous, asynchronous and streaming, rely on generic post and get primitives to represent IoT device behaviors with varying space/time coupling. Nevertheless, non-functional time semantics of IoT interactions such as data availability/validity, intermittent connectivity and application processing time, can severely affect response times and success rates of DeX interactions. We introduce timing parameters for time semantics to enhance the DeX API. The new DeX API enables the mapping of both functional and time semantics of DeX interactions. By precisely studying these timing parameters using timed automata models, we verify conditions for successful interactions with DeX connectors. Furthermore, we statistically analyze through simulations the effect of varying timing parameters to ensure higher probabilities of successful interactions. Simulation experiments are compared with experiments run on the DeX Mediators (DeXM) framework to evaluate the accuracy of the results. This work can provide application developers with precise design time information when setting these timing parameters in order to ensure accurate runtime behavior.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7449
Author(s):  
Min-Zheng Shieh ◽  
Yi-Bing Lin ◽  
Yin-Jui Hsu

An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, which result in the execution of wrong operations on network functions. To resolve these issues, we propose the VerificationTalk mechanism to prevent inappropriate IoT application deployment. VerificationTalk consists of two subsystems: the BigraphTalk subsystem which verifies IoT device configuration; and AFLtalk which validates the network functions. VerificationTalk provides mechanisms to conduct online anomaly detection by using a runtime monitor and offline by using American Fuzzy Lop (AFL). The runtime monitor is capable of intercepting potentially harmful data targeting IoT devices. When VerificationTalk detects errors, it provides feedback for debugging. VerificationTalk also assists in building secure IoT applications by identifying security loopholes in network applications. By the appropriate design of the IoTtalk execution engine, the testing capacity of AFLtalk is three times that of traditional AFL approaches.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7450
Author(s):  
Jesús Burgueño ◽  
Isabel de-la-Bandera ◽  
Raquel Barco

The location of user equipments (UEs) allows application developers to customize the services for users to perceive an enhanced experience. In addition, this UE location enables network operators to develop location-aware solutions to optimize network resource management. Moreover, the combination of location-aware approaches and new network features introduced by 5G enables to further improve the network performance. In this sense, dual connectivity (DC) allows users to simultaneously communicate with two nodes. The basic strategy proposed by 3GPP to select these nodes is based only on the power received by the users. However, the network performance could be enhanced if an alternative methodology is proposed to make this decision. This paper proposes, instead of power-based selection, to choose the nodes that provide the highest quality of experience (QoE) to the user. With this purpose, the proposed system uses the UE location as well as multiple network metrics as inputs. A dense urban scenario is assumed to test the solution in a system-level simulation tool. The results show that the optimal selection varies depending on the UE location, as well as the increase in the QoE perceived by users of different services.


2021 ◽  
Vol 10 (2) ◽  
pp. 85-90
Author(s):  
Refni Wahyuni ◽  
Rian Ordila ◽  
Abdi Muhaimin

Abstrak Saat ini pertumbuhan startup di Indonesia mengalami perkembangan yang pesat, setiap waktu selalu bermunculan startup baru. Sementara dalam hal aplikasi bergerak untuk perdagangan e-commerce masih memiliki tantangan dalam hal kemudahan pembayaran dan tingkat keamanan data yang masih perlu menjadi perhatian para pengembang aplikasi. Justru yang bertumbuh pesat adalah aplikasi informasi atau berita yang bertumbuh pesat seiring kebiasaan masyarakat menggunakan media sosial. Jasa cuci pakaian atau lebih populer dengan nama laundry, berkembang dengan pesat dikarenakan adanya pergeseran gaya hidup serta tuntutan kebutuhan ekonomi yang menyebabkan masyarakat semakin sibuk dengan tugas dan rutinitas. Dalam kondisi yang seperti ini, pebisnis mencoba mencari solusi untuk masyarakat yang semakin sibuk dengan kegiatan, pekerjaan, dan karir dengan menawarkan jasa lewat layanan laundry. Pelayanan Jemput Antar yang disediakan oleh pemilik usaha laundry saat ini masih menggunakan sistem offline, sistem tersebut masih tidak efektif karena sulit untuk dijangkau dan harus mengantarkan sendiri pakaian yang akan di laundry dan menjemput kembali setelah selesai. Komunikasi transaksi masih menggunakan via telepon antara pemilik usaha laundry dengan pelanggannya. Bisnis laundry sebagai bisnis yang berjalan di bidang jasa pun dirasa akan lebih mudah apabila memasukkan unsur teknologi dan informasi di dalamnya. Aplikasi startup Jemput Antar laundry berbasis online masih terbatas. Banyaknya usaha laundry yang menggunakan pelayanan jasa jemput antar untuk memudahkan pelanggan dalam pemesanan jasa laundry sehingga tidak akan menguras tenaga dan waktu pelanggan. Kata Kunci : android , Jasa berbasis teknologi, jasa kebersihan, Startup, web.   Abstract Currently the growth of startups in Indonesia is experiencing rapid development, every time a new startup always pops up. While in the case of mobile applications for e-commerce trading, there are still challenges in terms of ease of payment and the level of data security that still needs to be considered by application developers. It is precisely what grows rapidly that is the application of information or news that grows rapidly along with the community's habit of using social media. Washing clothes or more popularly known as laundry, is growing rapidly due to a shift in lifestyle and the demands of economic needs that cause people to be more busy with tasks and routines. In this condition, business people try to find solutions for people who are increasingly busy with activities, jobs, and careers by offering services through laundry services. Delivery service provided by the laundry business owner is currently still using the offline system, the system is still ineffective because it is difficult to reach and must deliver the clothes to be laundry and pick up after completion. Transaction communication still uses via telephone between the laundry business owner and his customers. Laundry business as a business that runs in the service sector is also considered to be easier if it incorporates elements of technology and information in it. The online shuttle Pickup startup application is still limited. The number of laundry businesses that use the shuttle service to facilitate customers in ordering laundry services so that it will not drain the energy and time of customers. Keywords: android, technology-based services, cleaning services, startup, web.


Sign in / Sign up

Export Citation Format

Share Document