602,723 research outputs found

    Usability Metrics of Web-based Mapping Applications

    Get PDF
    In academic libraries, the rise of web-based mapping applications or web geographic information systems (web GIS) brings great opportunities for information seeking. Users can search spatial information, create customized maps, as well as perform simple spatial analysis with these tools. In this presentation, we report results from an empirical usability evaluation of major web-based mapping applications, including ESRI Business Analyst Online, PolicyMap, SimplyMap, and Social Explorer. Eighteen university students participated in the evaluation in which they completed tasks of creating a customized map about business-related information (e.g., unemployment rate of an area), changing map display options (map unit, data range, and center location), and exporting maps. These tasks represent the typical workflow of using a web-based mapping application for users without GIS background and experience. We measured task successfulness, time to task completion, number of times help was needed, number of errors, and participants’ ratings of the System Usability Scale (SUS). Participants’ comments were also analyzed for the evaluation. Results of the evaluation indicated a number of usability issues for each application. Furthermore, we examined the effectiveness of task measures in terms of their predictive power of users’ task performance and usability issues. Our results show that task successfulness and task time are good indicators of potential performance and workflow issues, while number of errors made by participants could provide additional evidence of potential interface design issues. The number of help needed from participants and the SUS rating is less indicative of the differences of applications’ usability. To the best of our knowledge, this is the first study to evaluate web-based mapping applications from a usability and task performance perspective. Results of the study will be a valuable tool for librarians as well as general users who don’t have a background of GIS and usability to evaluate web GIS resources

    Preliminary Investigations of User Evaluation of the WWW

    Get PDF
    Many service providers are now providing applications on the Web that encourage people to do business and satisfy information needs on the Web: educational, banking, shopping, library and medical. The proposed research attempts to investigate the evaluation of these Web-based information services. Three streams of literature are considered: usage of the Web, user satisfaction of the Web, and the complementary field of individual performance and the impact of information technology. Two models emerge from the literature which may be useful in attempting to measure the evaluation of the Web: The theory of planned behaviour and the technology to performance chain. The latter model is the preferred model as it emphasises the fit between technology and the task, an issue not considered by other models. Finally the paper reports on preliminary work investigating the dimensionality of evaluation and usage of the Web

    Surfing the Internet-of-Things: lightweight access and control of wireless sensor networks using industrial low power protocols

    Get PDF
    Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as important in IoT communications. In this paper, we present a RESTful web service architecture for energy-constrained wireless sensor networks (WSNs) to enable remote data collection from sensor devices in WSN nodes. Specifically, we consider both IPv6 protocol support in WSN nodes as well as an integrated gateway solution to allow any Internet clients to access these nodes.We describe the implementation of a prototype system, which demonstrates the proposed RESTful approach to collect sensing data from a WSN. A performance evaluation is presented to illustrate the simplicity and efficiency of our proposed scheme

    An empirical comparison of commercial and open‐source web vulnerability scanners

    Get PDF
    Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web services. Although both commercial and open-source WVSs exist, their vulnerability detection capability and performance vary. In this article, we report on a comparative study to determine the vulnerability detection capabilities of eight WVSs (both open and commercial) using two vulnerable web applications: WebGoat and Damn vulnerable web application. The eight WVSs studied were: Acunetix; HP WebInspect; IBM AppScan; OWASP ZAP; Skipfish; Arachni; Vega; and Iron WASP. The performance was evaluated using multiple evaluation metrics: precision; recall; Youden index; OWASP web benchmark evaluation; and the web application security scanner evaluation criteria. The experimental results show that, while the commercial scanners are effective in detecting security vulnerabilities, some open-source scanners (such as ZAP and Skipfish) can also be effective. In summary, this study recommends improving the vulnerability detection capabilities of both the open-source and commercial scanners to enhance code coverage and the detection rate, and to reduce the number of false-positives

    A Voice-Enabled Framework for Recommender and Adaptation Systems in E-Learning

    Get PDF
    With the proliferation of learning resources on the Web, finding suitable content (using telephone) has become a rigorous task for voice-based online learners to achieve better performance. The problem with Finding Content Suitability (FCS) with voice E-Learning applications is more complex when the sight-impaired learner is involved. Existing voice-enabled applications in the domain of E-Learning lack the attributes of adaptive and reusable learning objects to be able to address the FCS problem. This study provides a Voice-enabled Framework for Recommender and Adaptation (VeFRA) Systems in E-learning and an implementation of a system based on the framework with dual user interfaces – voice and Web. A usability study was carried out in a visually impaired and non-visually impaired school using the International Standard Organization’s (ISO) 9241-11 specification to determine the level of effectiveness, efficiency and user satisfaction. The result of the usability evaluation reveals that the prototype application developed for the school has “Good Usability” rating of 4.13 out of 5 scale. This shows that the application will not only complement existing mobile and Web-based learning systems, but will be of immense benefit to users, based on the system’s capacity for taking autonomous decisions that are capable of adapting to the needs of both visually impaired and non-visually impaired learners

    Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems

    Full text link
    Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet certain technical requirements including performance, security and fault--tolerance. This paper presents an experimental evaluation of SOAP performance using realistic business application message content. To get some indication of whether SOAP is appropriate for high performance capital markets systems, the results are compared with a widely used existing protocol. The study finds that, although SOAP performs relatively poorly, the difference is less than in scientific computing environments. Furthermore, we find that in realistic business applications it is possible for text--based wire formats to have comparable performance to binary, and that the text--based nature of XML is not sufficient to explain SOAP's inefficiency. This suggests that further work may enable SOAP to become a viable wire format for high performance business applications

    A Fuzzy Classifier-Based Penetration Testing for Web Applications

    Get PDF
    The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul- nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec- tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications

    A horizontally-scalable multiprocessing platform based on Node.js

    Full text link
    This paper presents a scalable web-based platform called Node Scala which allows to split and handle requests on a parallel distributed system according to pre-defined use cases. We applied this platform to a client application that visualizes climate data stored in a NoSQL database MongoDB. The design of Node Scala leads to efficient usage of available computing resources in addition to allowing the system to scale simply by adding new workers. Performance evaluation of Node Scala demonstrated a gain of up to 74 % compared to the state-of-the-art techniques.Comment: 8 pages, 7 figures. Accepted for publication as a conference paper for the 13th IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA-15
    • 

    corecore