891 resultados para Mobile application testing
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
While mobile phones have become ubiquitous in modern society, the use of mobile phones while driving is increasing at an alarming rate despite the associated crash risks. A significant safety concern is that driving while distracted by a mobile phone is more prevalent among young drivers, a less experienced driving cohort with elevated crash risk. The objective of this study was to examine the gap acceptance behavior of distracted young drivers at roundabouts. The CARRS-Q Advanced Driving Simulator was used to test participants on a simulated gap acceptance scenario at roundabouts. Conflicting traffic from the right approach of a four-legged roundabout were programmed to have a series of vehicles having the gaps between them proportionately increased from two to six seconds. Thirty-two licensed young drivers drove the simulator under three phone conditions: baseline (no phone conversation), hands-free and handheld phone conversations. Results show that distracted drivers started responding to the gap acceptance scenario at a distance closer to the roundabout and approached the roundabout at slower speeds. They also decelerated at faster rates to reduce their speeds prior to gap acceptance compared to non-distracted drivers. Although accepted gap sizes were not significantly different across phone conditions, differences in the safety margins at various gap sizes—measured by Post Encroachment Time (PET) between the driven vehicle and the conflicting vehicle—were statistically significant across phone conditions. PETs for distracted drivers were smaller across different gap sizes, suggesting a lower safety margin taken by distracted drivers compared to non-distracted drivers. The results aid in understanding how cognitive distraction resulting from mobile phone conversations while driving influences driving behavior during gap acceptance at roundabouts.
Resumo:
This paper presents a framework, design and study of an ambient persuasive interface. We introduce a novel framework of persua sive Cues in Ambient Intelligence (perCues). Based on this framework we designed an application for mobile devices. The application aims to persuade people to abstain from using their cars and to use public mass transportation instead in order to reduce emissions. It contains a bus schedule and information about the pollution status. We evaluated the application in two successive studies regarding user acceptance, oppor tune moments of use and persuasive effects. The perCues received a high acceptance due to its benefit for the users. The results confirm the im portance of opportune moment and user acceptance for persuasion. The findings also indicate the persuasive potential of perCues.
Resumo:
This report shares findings and insights from an interview study conducted in 2009, with 34 ADF families. These families were identified in the communities of primary schools in both state and Catholic systems with high ADF family enrolments in 3 towns across 2 states, with the assistance of the DCO and their embedded Defence School Transition Aides (DSTAs). In the interviews the parents were invited to describe their history of ADF relocations, and how they managed transitions for each member in terms of school choice, child care arrangements, spouse employment, and educational transitions. Parallel interviews were conducted with 12 teachers and 6 DSTAs across the identified schools to describe how schools cater for mobile ADF families flowing through their classes. Parents were invited to tell the story of their family’s sequence of moves and how each member made the transition, then reflect more generally on what advice they’d give other mobile families. Teachers were asked to describe how they respond to the mobile families in their school community, and to illustrate some of the issues and challenges from the institutional perspective. By offering perspectives from both parents and teachers, the report hopes to facilitate a dialogue between parties to address their common goal – promoting productive continuities in education for children in mobile families.
Resumo:
This chapter surveys the landscape of mobile dating and hookup apps—understood as media technologies, as businesses, and as sites of social practice. It situates the discussion within the broader contexts of technologically mediated dating and digital sexual cultures. By outlining a number of methodological approaches and data sources that can be used in the study of dating and hookup apps, it equips the reader with tools and approaches for investigating hookup app culture in ways that go beyond “media panics” – the familiar combination of moral panics and media effects which is so prevalent in discussions of sexuality in digital media.
Resumo:
Historically, school leaders have occupied a somewhat ambiguous position within networks of power. On the one hand, they appear to be celebrated as what Ball (2003) has termed the ‘new hero of educational reform'; on the other, they are often ‘held to account’ through those same performative processes and technologies. These have become compelling in schools and principals are ‘doubly bound’ through this. Adopting a Foucauldian notion of discursive production, this paper addresses the ways that the discursive ‘field’ of ‘principal’ (within larger regimes of truth such as schools, leadership, quality and efficiency) is produced. It explores how individual principals understand their roles and ethics within those practices of audit emerging in school governance, and how their self-regulation is constituted through NAPLAN – the National Assessment Program, Literacy and Numeracy. A key effect of NAPLAN has been the rise of auditing practices that change how education is valued. Open-ended interviews with 13 primary and secondary school principals from Western Australia, South Australia and New South Wales asked how they perceived NAPLAN's impact on their work, their relationships within their school community and their ethical practice.
Resumo:
We employ a fluctuation-based technique to investigate the athermal component associated with martensite phase transition, which is a prototype of temperature-driven structural transformation. Statistically, when the phase transition is purely athermal, we find that the temporal sequence of avalanches under constant drive is insensitive to the drive rate. We have used fluctuations in electrical resistivity or noise in nickel titanium shape memory alloys in three different forms: a thin film exhibiting well-defined transition temperatures,a highly disordered film, and a bulk wire of rectangular cross-section. Noise is studied in the realm of dynamic transition,viz.while the temperature is being ramped, which probes into the kinetics of the transformation at real time scales,and could probably stand out as a promising tool for material testing in various other systems, including nanoscale devices.
Resumo:
Background Diabetic foot ulcers (DFU) are a leading cause of diabetes-related hospitalisation and can be costly to manage without access to appropriate expert care. Within Queensland and indeed across many parts of Australia, there is an inequality in accessing specialist services for individuals with DFU. Recent National Health and Medical Research Council (NHMRC) diabetic foot guidelines recommend remote expert consultation with digital imaging should be made available to people with DFU to improve their clinical outcomes. Telemedicine appears to show promise in improving access to diabetic foot specialist services; however diabetic foot telemedicine models to date have relied upon videoconferencing, store and forward technology and/or customised appliances to obtain digital imagery which all require either expensive infrastructure or a timed reply to the request for advice. Whilst mobile phone advice services have been used with success in general diabetes management and telehealth services have improved diabetic foot outcomes, the rapid emergence in the use of mobile phones has established a need to review the role that various forms of telemedicine play in the management of DFU. The aim of this paper is to review traditional telemedicine modalities that have been used in the management of DFU and to compare that to new and innovative technology that are emerging. Process Studies investigating the management of DFU using various forms of telemedicine interventions will be included in this review. They include the use of videoconferencing technology, hand held digital still photography purpose built imaging devices and mobile phone imagery. Electronic databases (Pubmed, Medline and CINAHL) will be searched using broad MeSH terms and keywords that cover the intended area of interest. Findings It is anticipated that the results of this narrative review will provide delegates of the 2015 Australasian Podiatry Conference an insight into the types of emerging innovative diagnostic telemedicine technologies in the management of DFU against the backdrop of traditional and evidence based modalities. It is anticipated that the findings will drive further research in the area of mobile phone imagery and innovation in the management of DFU.
Resumo:
The room temperature (RT) tensile behaviour of a free-standing high activity Pt-aluminide bond coat has been evaluated by microtensile testing technique. The coating had a typical three-layer microstructure. The stress-strain plot for the free-standing coating was linear, indicating the coating to be brittle at RT. Different fracture features were observed across the coating layers, namely quasi-cleavage in the outer layer and inner interdiffusion zone, and cleavage in the intermediate layer. By employing interrupted tensile test and observing the cross-sectional microstructure of the tested specimens, it was determined that failure of the microtensile samples occurred by the initiation of a single crack in the intermediate layer of the coating and its subsequent inside-out propagation. Such a mechanism of failure has been explained in terms of the fracture features observed across the sample thickness. This mechanism of failure is consistent with fracture toughness values of the individual coating layers. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
This paper presents an experimental investigation on the lateral impact performance of axially loaded concrete-filled double-skin tube (CFDST) columns. These columns have desirable structural and constructional properties and have been used as columns in building, legs of off shore platforms and as bridge piers. Since they could be vulnerable to impact from passing vessels or vehicles, it is necessary to understand their behaviour under lateral impact loads. With this in mind, an experimental method employing an innovative instrumented horizontal impact testing system (HITS) was developed to apply lateral impact loads whilst the column maintained a static axial pre-loading to examine the failure mechanism and key response parameters of the column. These included the time histories of impact force, reaction forces, global lateral deflection and permanent local buckling profile. Eight full scale columns were tested for key parameters including the axial load level and impact location. Based on the test data, the failure mode, peak impact force, impact duration, peak reaction forces, reaction force duration, column maximum and residual global deflections and column local buckling length, depth and width under varying conditions are analysed and discussed. It is evident that the innovative HITS can successfully test structural columns under the combination of axial pre-loading and impact loading. The findings on the lateral impact response of the CFDST columns can serve as a benchmark reference for their future analysis and design.
Resumo:
Biological systems present remarkable adaptation, reliability, and robustness in various environments, even under hostility. Most of them are controlled by the individuals in a distributed and self-organized way. These biological mechanisms provide useful resources for designing the dynamical and adaptive routing schemes of wireless mobile sensor networks, in which the individual nodes should ideally operate without central control. This paper investigates crucial biologically inspired mechanisms and the associated techniques for resolving routing in wireless sensor networks, including Ant-based and genetic approaches. Furthermore, the principal contributions of this paper are as follows. We present a mathematical theory of the biological computations in the context of sensor networks; we further present a generalized routing framework in sensor networks by diffusing different modes of biological computations using Ant-based and genetic approaches; finally, an overview of several emerging research directions are addressed within the new biologically computational framework.
Resumo:
Mobile applications are being increasingly deployed on a massive scale in various mobile sensor grid database systems. With limited resources from the mobile devices, how to process the huge number of queries from mobile users with distributed sensor grid databases becomes a critical problem for such mobile systems. While the fundamental semantic cache technique has been investigated for query optimization in sensor grid database systems, the problem is still difficult due to the fact that more realistic multi-dimensional constraints have not been considered in existing methods. To solve the problem, a new semantic cache scheme is presented in this paper for location-dependent data queries in distributed sensor grid database systems. It considers multi-dimensional constraints or factors in a unified cost model architecture, determines the parameters of the cost model in the scheme by using the concept of Nash equilibrium from game theory, and makes semantic cache decisions from the established cost model. The scenarios of three factors of semantic, time and locations are investigated as special cases, which improve existing methods. Experiments are conducted to demonstrate the semantic cache scheme presented in this paper for distributed sensor grid database systems.
Resumo:
Next generation wireless systems employ Orthogonal frequency division multiplexing (OFDM) physical layer owing to the high data rate transmissions that are possible without increase in bandwidth. While TCP performance has been extensively studied for interaction with link layer ARQ, little attention has been given to the interaction of TCP with MAC layer. In this work, we explore cross-layer interactions in an OFDM based wireless system, specifically focusing on channel-aware resource allocation strategies at the MAC layer and its impact on TCP congestion control. Both efficiency and fairness oriented MAC resource allocation strategies were designed for evaluating the performance of TCP. The former schemes try to exploit the channel diversity to maximize the system throughput, while the latter schemes try to provide a fair resource allocation over sufficiently long time duration. From a TCP goodput standpoint, we show that the class of MAC algorithms that incorporate a fairness metric and consider the backlog outperform the channel diversity exploiting schemes.