The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the iMPAcT tool that tests recurring behaviour, i.e., UI Patterns, on mobile applications. This tool is implemented in Java and makes use of Android's APIs UI Automator and UiAutomation. The tool automatically explores a mobile application in order to automatically identify and test UI Patterns. Each UI Pattern has a test strategy, Test Patterns, associated, which is applied when...
Mobile app developers often wish to make their apps available on a wide variety of platforms, e.g., Android, iOS, and Windows devices. Each of these platforms uses a different programming environment, each with its own language and APIs for app development. Small app development teams lack the resources and the expertise to build and maintain separate code bases of the app customized for each platform...
Soft keyboard is perhaps the most common human input device on smartphone. This study designed and implemented a proof-of-concept soft keyboard keylogger in Android. The soft keyboard app was designed to have the capability to capture keystrokes from user and save it. It also can record the GPS location of user at the time of typing and sent it to a remote server. From our testing, the app was capable...
Mobile devices become more and more prevalent in recent years, especially in young groups. The rapid progress of mobile devices promotes the development of M-Commerce business. The purchase on mobile terminals accounts for a considerable percentage in the total trading volume of E-Commerce and begins to draw the attention of E-Commerce corporation. Alibaba held a Mobile Recommendation Algorithm Competition...
We proposed a deep Convolutional Neural Network (CNN) approach and a Multi-View Stacking Ensemble (MVSE) method in Ali Mobile Recommendation Algorithm competition Season 1 and Season 2, respectively. Specifically, we treat the recommendation task as a classical binary classification problem. We thereby designed a large amount of indicative features based on the logic of mobile business, and grouped...
Recently, there has been an increasing need for secure, efficient and simple notification methods for mobile systems. Such systems are meant to provide users with precise tools best suited for work or leisure environments and a lot of effort has been put into creating a multitude of mobile applications. However, not much research has been put at the same time into determining which of the available...
BML(Broadband Mobile Lab.) at NCTU has been utilized to support the testing & measurement for communication and networking products. It also has proven to be able to develop applications and services in a campus scale experimental networking environment. In the meantime, ITRI in Taiwan is conducting a greater metropolitan (Hsinchu) scale experimental networking environment, called ITRINET under...
Usability of educational applications is essential for the effectiveness of the learning environment. Nowadays, these applications are developed on mobile devices since their use widespread rapidly. Considering these applications would be used by children, usability evaluation methods to be used would be different than conventional methods. In this study usability evaluation of a mobile hand-writing...
Those living with an acquired brain injury often have issues with fatigue due to factors resulting from the injury. Cognitive impairments such as lack of memory, concentration and planning have a great impact on an individual's ability to carry out general everyday tasks, which subsequently has the effect of inducing cognitive fatigue. Moreover, there is difficulty in assessing cognitive fatigue,...
The results of design and preliminary open path testing mobile tropospheric communication system are discussed. Practical recommendations to improve the characteristics of quality in mobile tropospheric communications systems are made.
Keeping in mind technological trends and student behaviour, higher educational institutes are adopting major changes in content delivery. The objective is to keep students engaged in the courses that they learn, which in turn would help them perform better academically. This paper describes students' online engagement in terms of their learning, participation and academic performance after teaching...
With the rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This brings new business requirements and demands in mobile software testing, and causes new issues and challenges in mobile testing service. In this paper, informative and insightful discussions about cloud-based mobile testing-as-a-service (Mobile TaaS) are offered,...
The threat landscape is changing and the connected-car now becomes a new cyber attack target. When mobile connects both car and the vehicle cloud via mobile apps, connected-car solutions are bringing new threats into the vehicle. As early as late 2013, we began to find security vulnerabilities for car makers, TSP (Telematics Service Providers), car sharing companies, OBD dongle manufacturers and auto...
Directory is defined as a board in an organization or large store listing names and locations of departments, individuals and others. Directory is important as guidance to people because it provides information about the mall such as list of shops and locations of the shops. Some of the directory boards are difficult to find, especially in the big shopping mall. Generic Shopping Mall Directory Mobile...
A well-known proverb says “If it looks like a duck, walks like a duck and quacks like a duck, it is a duck”. This statement raises an interesting approach to identifying counterfeit mobile devices. If we substitute the “duck” for a device and map the proverb to the following characteristics of a device, we can use the proverb to help validate if a device is counterfeit: 1) Looks like a duck: user...
Ensuring that mobile device applications are free from bugs is difficult. The difficulty stems, in part, from the unpredictability inherent in the use of multiple mobile networks. Testers typically design and run tests to discover bugs, modify the software and then re-run the test to demonstrate the bug's absence. However, when using wireless networks, it is difficult to recreate the original operating...
Performance of rapidly evolving mobile apps is one of the top concerns for users and developers nowadays. Despite the efforts of researchers and mobile API designers to provide developers with guidelines and best practices for improving the performance of mobile apps, performance bottlenecks are still a significant and frequent complaint that impacts the ratings and apps' chances for success. However,...
Early exposure to devices such as smart phones and tablets among children as a learning tool has been very common nowadays. Learning using devices like iPads and tablets can stimulate children's motivation and concentration. Therefore, evaluation and measurement of user experience for mobile learning application become crucial. There were some studies have been done in order to get feedback from users...
The intent mechanism is a powerful feature of the Android platform that helps compose existing components together to build a Mobile application. However, hackers can leverage the intent messaging to extract personal data or to call components without credentials by sending malicious intents to components. This paper tackles this issue by proposing a security testing method which aims at detecting...
The rapid development of mobile technologies currently impact on increasing the number of users. This is supported by the emergence of mobile application which begin to replace the role of dektop application. The growing of the mobile device technology also supported by Android Operating System. With Android SDK, developer can develop their application to use feature of mobile device technology. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.