Mobile Software Testing: Thoughts, Strategies, Challenges, and Experimental Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Mobile devices have become more pervasive in our daily lives, and are gradually replacing regular computers to perform traditional processes like Internet browsing, editing photos, playing videos and sound track, and reading different files. The importance of mobile devices in our life necessitates more concerns of the reliability and compatibility of mobile applications, and thus, testing these applications arises as an important phase in mobile devices adaption process. This paper addressed various research directions on mobile applications testing by investigating essential concepts, scope, features and requirements for testing mobile application. We highlight the similarities and the differences between mobile APP testing and mobile web testing. Furthermore, we discuss and compare different mobile testing approaches and environments, and provide the challenges as emergent needs in test environments. As a case study, we compared the testing experience of hybrid application in an emulator and a real world device. The purpose of the experiment is to verify to which extent a virtual device can emulate a complete client experience. Set of experiments are conducted where five android mobile browsers are tested. Each browser will be on a real device as well as an emulated device with the same features (CPU used, memory size, etc). The application will be tested on the following metrics: Performance and function/behavior testing
Authors and Affiliations
Mohammed Akour, Bouchaib Falah, Ahmad Al-Zyoud, Salwa Bouriat, Khalid Alemerien
Towards a Fine-Grained Access Control Mechanism for Privacy Protection and Policy Conflict Resolution
Access control is a security technique that specifies access rights to resources in a computing environment. As information systems nowadays become more complex, it plays an important role in authenticating and authorizi...
Managing Open Educational Resources on the Web of Data
In the last few years, the international work on Massive Open On-line Courses (MOOCS) underlined new needs for open educational resources (OER) management within the context of the Web of Data. First, within MOOCs, all (...
Analysis of Software Tools for Longitudinal Studies in Psychology
Longitudinal studies allow to access the review of causal hypotheses directly. It means that they make possible causal relation between the order of impacts (i.e. life events, educational effects, etc.) and the consequen...
Network Packet Classification using Neural Network based on Training Function and Hidden Layer Neuron Number Variation
Distributed denial of service (DDoS) is a structured network attack coming from various sources and fused to form a large packet stream. DDoS packet stream pattern behaves as normal packet stream pattern and very difficu...
Time Varying Back Propagating Algorithm for MIMO Adaptive Inverse Controller
In the field of automatic control system design, adaptive inverse is a powerful control technique. It identifies the system model and controls automatically without having prior knowledge about the dynamics of plant. In...