The incredible development in the utilization of smartphones has driven the development of billions of software applications famously known as ‘apps’ to accomplish roles outside phone call and SMS messages in the day-to-day lives of users. Current assessments show that there are a huge number of applications developed at a meteor pace to give clients a rich and quick client experience. Mobile apps users are more concerned about stability and quality now more than ever despite the increase in the scale and size of apps. As such, mobile apps have to be designed, built, and produced for less money (maintainability, portability, and reusability), with greater performance, reliable security and fewer resources (efficiency) than ever before. This paper aimed at providing support for mobile application developers in dealing with the evereluding non-functional requirements by proposing a data-driven model that simplifies the non-functional requirements (NFR) p in the development of an application for mobile devices. The study tries to find out if NFR can be treated the same way as functional requirements in mobile application development. Finally, this paper shows the experimental evaluation of the proposed data-driven model of dealing for nonfunctional requirements in the development of mobile apps and the results obtained from the application of the model are also discussed
This study investigates the importance of the usability of a Mobile First Company (MFC) app. The number of
MFCs is growing rapidly worldwide, and the existence of such companies primarily rely on their apps being used. There
is a broad range of usability literature, however scarce data exists, that describes how app usability contributes to the
success of MFCs. This research uses a case study to empirically extract an initial link between MFC success and the perceived usability of its app. Arabic-System Usability Scale (A-SUS) is employed to evaluate the usability of an MFC app
in Kuwait. The results are used to start collecting data in order to initiate a correlation between MFC success with its app
perceived usability.
Every single day thousands of android devices are activated, the success of android owes to its simplicity and usability. This system aims at helping users with minimum or no programming background to build their own simple android application, which will in turn reduce the cost and makes the application friendlier. The principle behind the proposed system is simplicity and user friendliness for minimalistic applications. Development of mobile applications brings new challenges in possibilities for their adjustment to actual context of a user and a device. Our long-term goal is to design and implement a mobile client which can dynamically adapt to the surrounding conditions and requirements of the user.
Augmented reality browsers a proposal for architectural standardizationijseajournal
The technology evolution of smartphones, systems and the growing of telecommunications, allow the use of
Augmented Reality in the exploration of geo-referenced information, complementing the real environment
of the users with various types of content displayed on robust mobile cameras through applications called
augmented reality browsers. Although this type of application is being in development and growing use by
society, the technology, and especially its software architecture do not have any kind of standardization.
This work presents concepts about augmented reality browsers for mobile devices. It shows the main
aspects and applications of those types of reality. Besides that, the specific features of those types of
architecture are discussed and compared, and new architecture, whose most relevant feature is the
interoperability of applications in various platforms for mobile devices, are presented. This work has the
objective to develop an architectural framework for the development of these browsers
This study investigates the importance of the usability of a Mobile First Company (MFC) app. The number of
MFCs is growing rapidly worldwide, and the existence of such companies primarily rely on their apps being used. There
is a broad range of usability literature, however scarce data exists, that describes how app usability contributes to the
success of MFCs. This research uses a case study to empirically extract an initial link between MFC success and the perceived usability of its app. Arabic-System Usability Scale (A-SUS) is employed to evaluate the usability of an MFC app
in Kuwait. The results are used to start collecting data in order to initiate a correlation between MFC success with its app
perceived usability.
Every single day thousands of android devices are activated, the success of android owes to its simplicity and usability. This system aims at helping users with minimum or no programming background to build their own simple android application, which will in turn reduce the cost and makes the application friendlier. The principle behind the proposed system is simplicity and user friendliness for minimalistic applications. Development of mobile applications brings new challenges in possibilities for their adjustment to actual context of a user and a device. Our long-term goal is to design and implement a mobile client which can dynamically adapt to the surrounding conditions and requirements of the user.
Augmented reality browsers a proposal for architectural standardizationijseajournal
The technology evolution of smartphones, systems and the growing of telecommunications, allow the use of
Augmented Reality in the exploration of geo-referenced information, complementing the real environment
of the users with various types of content displayed on robust mobile cameras through applications called
augmented reality browsers. Although this type of application is being in development and growing use by
society, the technology, and especially its software architecture do not have any kind of standardization.
This work presents concepts about augmented reality browsers for mobile devices. It shows the main
aspects and applications of those types of reality. Besides that, the specific features of those types of
architecture are discussed and compared, and new architecture, whose most relevant feature is the
interoperability of applications in various platforms for mobile devices, are presented. This work has the
objective to develop an architectural framework for the development of these browsers
Factors influncing quality of mobile apps role of mobile app development life...IJCSEA Journal
In this paper, The mobile application field has been receiving astronomical attention from the
past few years due to the growing number of mobile app downloads and withal due to the
revenues being engendered .With the surge in the number of apps, the number of lamentable
apps/failing apps has withal been growing.Interesting mobile app statistics are included in this
paper which might avail the developers understand the concerns and merits of mobile apps.The
authors have made an effort to integrate all the crucial factors that cause apps to fail which
include negligence by the developers, technical issues, inadequate marketing efforts, and high
prospects of the users/consumers.The paper provides suggestions to eschew failure of apps. As
per the various surveys, the number of lamentable/failing apps is growing enormously, primarily
because mobile app developers are not adopting a standard development life cycle for the
development of apps. In this paper, we have developed a mobile application with the aid of
traditional software development life cycle phases (Requirements, Design, Develop, Test, and,
Maintenance) and we have used UML, M-UML, and mobile application development
technologies.
Mobile app delivery has unique considerations that cannot be addressed by utilizing a generic digital delivery framework. To build, manage, and maintain mobile apps requires specific processes and skill sets layered into a traditional Agile-based project approach to ensure success. With Gartner stating that “many organizations are asking what skills and tools to adapt to successfully deliver mobile apps,” it is critical that organizations build their understanding in this area.
www.shockoe.com
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
Mobile applications are becoming an emerging property in today’s world. Delivering high quality mobile applications by improving the quality of the user interface is a definitive guide in building successful mobile applications and will have a significant increase in the market for that application. This paper addresses some issues related to mobile user interface, current input system and user dictionary. After analysing these issues we have proposed a new system by making some improvements to the current input system and user dictionary. In order to improve the current system, we have taken some issues related to one of the most widely used data entry methods ‘Keyboard’ and proposed some improvements by introducing Smart Optimized Keyboard (STOKE). We have provided the results, which include performance, reduction in number of keystrokes, and screen space. This describes the significant change after adopting the proposed keyboard. In the end, we have proposed an optimized way of building up
the user dictionary, which assists the user in inserting the input very easily, rapidly and effectively. In a combine, these two will help in providing the best user experience to the users.
Mobile VAS & Apps Conference, 2012, Sankt Petersburg
Russian and global mobile VAS market trends
The mythical mobile app developer (Michael Vakulenko, Strategy Director, VisionMobile)
The Importance of Object-Oriented Programming in This Era of Mobile Applicati...iosrjce
In the past two decades object oriented programming has become the dominant programming OOP
paradigm used by application developers. Object oriented programming scales very well, from the most trivial
of problems to the most complex tasks. It provides a form of abstraction that resonates with techniques people
use to solve problems in their everyday life. Although the fundamental features of what we now call objectoriented
programming were invented in the 1960's, object oriented languages really came to the attention of the
computing public in the 1980's. Software producers rush to release object oriented versions of their products.
Countless books and special issues of academic and trade journals have appeared on the subject. Objectoriented
programming is being greeted with even more enthusiasm than we saw heralding earlier revolutionary
ideas, such as structured programming". The intent in this publication is to emphasize and explain the
importance of object-oriented programming in this era of mobile development, and in doing so to illustrate the
following two propositions: OOP is a revolutionary idea, totally unlike anything that has come before in
programming, OOP is an evolutionary step, following naturally on the heels of earlier programming techniques.
Hybrid Smart phone application development analysisSandeep Krishna
Describes how to analyze requirement and choose the application development platform for smart phones apps. Suggests approach and platform on prior implementation experience. An Analysis initiated by UST global Malaysia Microsoft Excellence Team.
DEVELOPMENT OF A LOCATION-BASED APPROACHING NOTIFICATION SYSTEM USING ANDROID...csandit
Mobile application uses and development is a rapidly growing sector. Nowadays mobile devices
are more powerful and portable with plenty of useful tools for assisting people handle daily life.
The main objective of this paper is to develop a mobile application that solves the problems
facing bus drivers and parents when parents do not show up, and when kids wait for a long
time. The application also produces the current drivers map to be used for bus fleet
management purposes. The application makes use of the location service on Android to specify
the current location of the driver, and the Google’s cloud to device messaging to push
approaching notifications to parents. The application is developed using an Extreme
Programming (XP) based methodology that performs the analysis, design, implementation, and
testing iteratively.
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...Antenna Software
To offer a truly differentiated mobile experience, businesses need to consider the full spectrum of what mobility has to offer. AMPchroma provides the overarching paradigm for achieving mobility excellence and is the only mobile cloud platform that enables you to deliver on this promise.
Brands are building up their mobile presence - comprised of apps, websites, and app stores - with the goal of interacting and engaging with consumers across every touch point. But why have relatively few brands effectively mastered the mobile channel? Find out in a report detailing survey findings of 1,000+ mobility influencers across the US and UK. We uncovered how much brands are investing in mobile projects, what their mobile priorities are and what frustrates them about mobilizing their businesses.
The top 5 mobile myths that CIOs fall forAbhishek Sood
According to Gartner analysts, spending on mobility is among the top five priorities for most CIOs – but some common mobile myths can lead these same CIOs astray when it comes to building a mobile strategy. Are you falling for one of these misconceptions?
Today’s featured resource dispels five myths surrounding mobility and mobile apps. Also inside, find out why so many organizations struggle to overcome mobile problems (and learn what you can do differently). Read on to get started now.
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...mathsjournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible
software process, which can deal with many challenges facing the mobile app development process. These
challenges include: volatility of requirements, strong user involvement, development time tightness, process
simplicity, and production of valuable software in low cost. This research study investigates the current
mobile app development approaches adopted in Omani market and provides a comparison between
existing methods. The results reveal that Agile approach is the most popular model for mobile software
engineering in Omani, as it naturally fits most of the applications required in this market. The study also
discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that
XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature
for different mobile app processes. The study provides also a series of recommendations for mobile app
developers which should help in selecting the most appropriate method that suits the targeted market
sector.
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...ijseajournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approaches adopted in Omani market and provides a comparison between existing methods. The results reveal that Agile approach is the most popular model for mobile software engineering in Omani, as it naturally fits most of the applications required in this market. The study also discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature for different mobile app processes. The study provides also a series of recommendations for mobile app developers which should help in selecting the most appropriate method that suits the targeted market sector.
Factors influncing quality of mobile apps role of mobile app development life...IJCSEA Journal
In this paper, The mobile application field has been receiving astronomical attention from the
past few years due to the growing number of mobile app downloads and withal due to the
revenues being engendered .With the surge in the number of apps, the number of lamentable
apps/failing apps has withal been growing.Interesting mobile app statistics are included in this
paper which might avail the developers understand the concerns and merits of mobile apps.The
authors have made an effort to integrate all the crucial factors that cause apps to fail which
include negligence by the developers, technical issues, inadequate marketing efforts, and high
prospects of the users/consumers.The paper provides suggestions to eschew failure of apps. As
per the various surveys, the number of lamentable/failing apps is growing enormously, primarily
because mobile app developers are not adopting a standard development life cycle for the
development of apps. In this paper, we have developed a mobile application with the aid of
traditional software development life cycle phases (Requirements, Design, Develop, Test, and,
Maintenance) and we have used UML, M-UML, and mobile application development
technologies.
Mobile app delivery has unique considerations that cannot be addressed by utilizing a generic digital delivery framework. To build, manage, and maintain mobile apps requires specific processes and skill sets layered into a traditional Agile-based project approach to ensure success. With Gartner stating that “many organizations are asking what skills and tools to adapt to successfully deliver mobile apps,” it is critical that organizations build their understanding in this area.
www.shockoe.com
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
Mobile applications are becoming an emerging property in today’s world. Delivering high quality mobile applications by improving the quality of the user interface is a definitive guide in building successful mobile applications and will have a significant increase in the market for that application. This paper addresses some issues related to mobile user interface, current input system and user dictionary. After analysing these issues we have proposed a new system by making some improvements to the current input system and user dictionary. In order to improve the current system, we have taken some issues related to one of the most widely used data entry methods ‘Keyboard’ and proposed some improvements by introducing Smart Optimized Keyboard (STOKE). We have provided the results, which include performance, reduction in number of keystrokes, and screen space. This describes the significant change after adopting the proposed keyboard. In the end, we have proposed an optimized way of building up
the user dictionary, which assists the user in inserting the input very easily, rapidly and effectively. In a combine, these two will help in providing the best user experience to the users.
Mobile VAS & Apps Conference, 2012, Sankt Petersburg
Russian and global mobile VAS market trends
The mythical mobile app developer (Michael Vakulenko, Strategy Director, VisionMobile)
The Importance of Object-Oriented Programming in This Era of Mobile Applicati...iosrjce
In the past two decades object oriented programming has become the dominant programming OOP
paradigm used by application developers. Object oriented programming scales very well, from the most trivial
of problems to the most complex tasks. It provides a form of abstraction that resonates with techniques people
use to solve problems in their everyday life. Although the fundamental features of what we now call objectoriented
programming were invented in the 1960's, object oriented languages really came to the attention of the
computing public in the 1980's. Software producers rush to release object oriented versions of their products.
Countless books and special issues of academic and trade journals have appeared on the subject. Objectoriented
programming is being greeted with even more enthusiasm than we saw heralding earlier revolutionary
ideas, such as structured programming". The intent in this publication is to emphasize and explain the
importance of object-oriented programming in this era of mobile development, and in doing so to illustrate the
following two propositions: OOP is a revolutionary idea, totally unlike anything that has come before in
programming, OOP is an evolutionary step, following naturally on the heels of earlier programming techniques.
Hybrid Smart phone application development analysisSandeep Krishna
Describes how to analyze requirement and choose the application development platform for smart phones apps. Suggests approach and platform on prior implementation experience. An Analysis initiated by UST global Malaysia Microsoft Excellence Team.
DEVELOPMENT OF A LOCATION-BASED APPROACHING NOTIFICATION SYSTEM USING ANDROID...csandit
Mobile application uses and development is a rapidly growing sector. Nowadays mobile devices
are more powerful and portable with plenty of useful tools for assisting people handle daily life.
The main objective of this paper is to develop a mobile application that solves the problems
facing bus drivers and parents when parents do not show up, and when kids wait for a long
time. The application also produces the current drivers map to be used for bus fleet
management purposes. The application makes use of the location service on Android to specify
the current location of the driver, and the Google’s cloud to device messaging to push
approaching notifications to parents. The application is developed using an Extreme
Programming (XP) based methodology that performs the analysis, design, implementation, and
testing iteratively.
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...Antenna Software
To offer a truly differentiated mobile experience, businesses need to consider the full spectrum of what mobility has to offer. AMPchroma provides the overarching paradigm for achieving mobility excellence and is the only mobile cloud platform that enables you to deliver on this promise.
Brands are building up their mobile presence - comprised of apps, websites, and app stores - with the goal of interacting and engaging with consumers across every touch point. But why have relatively few brands effectively mastered the mobile channel? Find out in a report detailing survey findings of 1,000+ mobility influencers across the US and UK. We uncovered how much brands are investing in mobile projects, what their mobile priorities are and what frustrates them about mobilizing their businesses.
The top 5 mobile myths that CIOs fall forAbhishek Sood
According to Gartner analysts, spending on mobility is among the top five priorities for most CIOs – but some common mobile myths can lead these same CIOs astray when it comes to building a mobile strategy. Are you falling for one of these misconceptions?
Today’s featured resource dispels five myths surrounding mobility and mobile apps. Also inside, find out why so many organizations struggle to overcome mobile problems (and learn what you can do differently). Read on to get started now.
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...mathsjournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible
software process, which can deal with many challenges facing the mobile app development process. These
challenges include: volatility of requirements, strong user involvement, development time tightness, process
simplicity, and production of valuable software in low cost. This research study investigates the current
mobile app development approaches adopted in Omani market and provides a comparison between
existing methods. The results reveal that Agile approach is the most popular model for mobile software
engineering in Omani, as it naturally fits most of the applications required in this market. The study also
discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that
XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature
for different mobile app processes. The study provides also a series of recommendations for mobile app
developers which should help in selecting the most appropriate method that suits the targeted market
sector.
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...ijseajournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approaches adopted in Omani market and provides a comparison between existing methods. The results reveal that Agile approach is the most popular model for mobile software engineering in Omani, as it naturally fits most of the applications required in this market. The study also discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature for different mobile app processes. The study provides also a series of recommendations for mobile app developers which should help in selecting the most appropriate method that suits the targeted market sector.
demystifying_the_architectures_of_a_mobile_app_development.pdfsarah david
Explore the secrets of mobile app development in 2023! Uncover the latest trends, including 5G, AI, AR/VR, and more. Learn about mobile app architectures, from layers to iOS and Android specifics. Cuneiform Consulting offers top-notch solutions—contact us for the best in mobile app development!
Layered programatical api framework for real time mobile social networkIshara Amarasekera
Published in The National Conference on Technology and Management - January 2012
Authors : N.T.G.K. Padmabandu, P.A.I.U. Amarasekera, H.A.C.M. Hewagama, M.N. Dheerasinghe
demystifying_the_architectures_of_a_mobile_app_development.pptxsarah david
Explore the secrets of mobile app development in 2023! Uncover the latest trends, including 5G, AI, AR/VR, and more. Learn about mobile app architectures, from layers to iOS and Android specifics. Cuneiform Consulting offers top-notch solutions—contact us for the best in mobile app development!
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
Over a last decade, mobile telecommunication industry has observed a rapid growth, proved to be highly competitive, uncertain and dynamic environment. Besides its advancement, it has also raised number of questions and gained concern both in industry and research. The development process of mobile application differs from traditional softwares as the users expect same features similar to their desktop computer applications with additional mobile specific functionalities. Advanced mobile applications require assimilation with existing enterprise computing systems such as databases, legacy applications and Web services. In addition, the lifecycle of a mobile application moves much faster than that of a traditional Web application and therefore the lifecycle management associated therein must be adjusted accordingly. The Security and application testing are more stimulating and interesting in mobile application than in Web applications since the technology in mobile devices progresses rapidly and developers must stay in touch with the latest developments, news and trends in their area of work. With the rising competence of software market, researchers are seeking more flexible methods that can adjust to dynamic situations where software system requirements are changing over time, producing valuable software in short duration and within low budget. The intrinsic uncertainty and complexity in any software project therefore requires an iterative developmental plan to cope with uncertainty and a large number of unknown variables. Agile Methodologies were thus introduced to meet the new requirements of the software development companies. The agile methodologies aim at facilitating software development processes where changes are acceptable at any stage and provide a structure for highly collaborative software development. Therefore, the present paper aims in reviewing and analysing different prevalent methodologies utilizing agile techniques that are currently in use for the development of mobile applications. This paper provides a detailed review and analysis on the use of agile methodologies in the proposed processes associated with mobile application skills and highlights its benefit and constraints. In addition, based on this analysis, future research needs are identified and discussed.
Using machine learning to improve a telco self-service mobile application in ...IAESIJAI
The use of mobile applications extends to the telecommunication sector, mainly due to COVID-19. Failure to provide it can cause dissatisfaction and result in the removal of the mobile application. Moreover, this leads to lost service opportunities, so paying attention to the mobile application's quality is essential. There has yet to be a study on measuring the service quality of a self-service mobile application in the telecommunication sector using online customer reviews. This study uses sentiment analysis and topic modeling to determine the service quality of a self-service mobile application in the telecommunication sector from reviews on Google Play Store and Apple App Store. This study uses myIndiHome as a case study. The total data obtained from both platforms are 20,452 reviews. Sentiment analysis was performed using Naïve Bayes, support vector machine, and logistic regression, while topic modeling was performed using latent dirichlet allocation. The results show that logistic regression performs better than support vector machine and Naïve Bayes. Meanwhile, topic modeling shows that the positive review data has three topics, including application features, products/services, and application interfaces. Moreover, the negative review data has five topics, including application availability, application feature reliability, application processing speed, bugs, and application reliability.
The recent explosion in the popularity of apps has seen more and more people set out to develop their own, and the technology behind them has changed as a result. The big technology companies which easily dominated the market in years past have had to become more competitive in order to keep up sales, while people with limited technical skills have sought out simple design modules to enable them to develop their ideas.
Mobile application development is a term used to denote the act or process by which application software is developed for handheld devices, such as personal digital assistants, enterprise digital assistants or mobile phones.
These applications can be pre-installed on phones during manufacturing platforms, or delivered as web applications using server-side or client-side processing (e.g. JavaScript) to provide an "application-like" experience within a Web browser.
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTTekRevol LLC
The world of technology and mobile app development is demanding developers to have a more future-oriented mindset. The future of mobile apps is heavily dependent on the evolution of technology. As technology grows, its use cases will create more dynamic change within the app development world. Mobile app technology is diverse and can help break barriers of personalization and convenience. These technologies have immense potential, and when hiring app developers, app development companies have to ensure compliance with these changes. For developers, it is essential to gain expertise concerning these technologies to ensure their applications are competitive and set industry standards.
Research Paper OutlineI. INTRODUCTIONa. Exploring mobile app.docxronak56
Research Paper Outline
I. INTRODUCTION
a. Exploring mobile applications.
b. People spend more time on mobile applications, than on their mobile web browser.
c. Discovering the diversity of mobile applications and preferred mobile operating system and economics among consumers.
II. MAIN TOPIC
a. Why mobile applications are growing and how it effects businesses.
b. Molding applications to different mobile devices.
c. Developers, applications, consumers, and expectations.
III. CONCLUSION
a. Recap on why consumers use mobile applications over web browsers.
b. Summarize the main topics on mobile applications growth, how each devices have different specification needs, and the expectations for developers and consumers.
c. Mobile applications are easy to use and fits the consumer needs. It eliminates unnecessary objects, rather condensed to a better view.
VI. REFERENCES
(All sources (information and graphics) are accurately documented in APA)
a. Henricksen, K., & Indulska, J. (2006). Developing context-aware pervasive computing applications: Models and approach. Pervasive and mobile computing, 2(1), 37-64.
b. Joorabchi, M. E., Mesbah, A., & Kruchten, P. (2013, October). Real challenges in mobile app development. In Empirical Software Engineering and Measurement, 2013 ACM/IEEE International Symposium on (pp. 15-24). IEEE.
c. Khalid, H., Shihab, E., Nagappan, M., & Hassan, A. E. (2015). What do mobile app users complain about?. IEEE Software, 32(3), 70-77.
Running head: MOBILE COMPUTING APPLICATIONS 1
MOBILE COMPUTING APPLICATIONS 2
Mobile Computing Applications
Name
School
Professor
Date
Mobile Computing Applications
Purpose statement
We live in a world of technology. Therefore, mobile devices have gained a multimedia communication legacy that will be hard to replace in the future. The mobile devices range from smartphones with a wide range of OS applications including Android, iPhone, BlackBerry and Windows among others of which there are some that are under development today. This study aims at exploring the diversity of mobile applications and preferred mobile operating system and economics among consumers. Are they enhancing lifestyle, more to business or killing business? The term app is a short form of software applications that have been popular listed as word of the year in 2010, by the American Dialect Society. Nowadays, the mobile devices can be purchased with several applications which are pre-installed like the web browser, and e-mail client among others. There are many options for mobile apps. The use depends on personal preference. For example, if consumers do not want to use pre-installed applications they can be removed by the use of a simple uninstall process to create space for more applications.
A mobile device user can get apps that are not pre-installed through the platforms like app stores where they are readily available. In the year 2008, these apps began to appear and are being operated ...
Can Node.js Security be used for mobile app development.pdfNews Knol
As individuals increasingly depend on smartphones for almost every aspect of their day-to-day lives, the demand for mobile apps is growing at an exponential rate. A recent survey found that consumers spend roughly 90 percent of their total mobile time on app use.
Source: https://newsknol.com/technology/node-js-security/
I was inspired to build a job recommender because of recent layoffs at my old company. Many of my former colleagues who were let go were less than 3 years into their careers, and they wondered, based on their experiences, what roles they fit in and where they should start their job search. I remembered a similar struggle coming out of college, where I didn’t really know where to focus my search either. I believe that this issue is quite common for people with non-technical backgrounds.
Building the Right Mobile App Development Strategy: The rate at which the mobile app market is growing reflects the important role it plays in the communication space. Statistics show that mobility is the primary way people are interacting and getting things done. Mobile phones prices and browsing rates get cheaper every day, and number of mobile internet users have multiplied manifold in the past few years. This has also led increase in the download numbers of mobile applications.
Mobile application development services is penetrating every aspect of individual life with over 5 billion subscribers on the planet. Mobile marketing is one of the most effective forms of marketing we have and if your business is not making the best use of these mobile platforms, then it is definitely evident that you are far behind in the game.
Mobile Performance Testing Approaches and ChallengesNous Infosystems
This whitepaper speaks about how Mobile Apps play a key role in daily business functions and the changing trends of consumer web-usage along with a brief summary of mobile application performance drivers...
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
DATA-DRIVEN MODEL FOR NON-FUNCTIONAL REQUIREMENTS IN MOBILE APPLICATION DEVELOPMENT
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
DOI: 10.5121/ijcsit.2019.11209 97
DATA-DRIVEN MODEL FOR NON-FUNCTIONAL
REQUIREMENTS IN MOBILE APPLICATION
DEVELOPMENT
Salisu Garba1
Babangida Isyaku2
and Mujahid Abdullahi3
1,2,3
Department of Mathematics & Computer Science, Sule Lamido University,
Kafin Hausa. Jigawa State.
ABSTRACT
The incredible development in the utilization of smartphones has driven the development of billions of
software applications famously known as ‘apps’ to accomplish roles outside phone call and SMS messages
in the day-to-day lives of users. Current assessments show that there are a huge number of applications
developed at a meteor pace to give clients a rich and quick client experience. Mobile apps users are more
concerned about stability and quality now more than ever despite the increase in the scale and size of apps.
As such, mobile apps have to be designed, built, and produced for less money (maintainability, portability,
and reusability), with greater performance, reliable security and fewer resources (efficiency) than ever
before. This paper aimed at providing support for mobile application developers in dealing with the ever-
eluding non-functional requirements by proposing a data-driven model that simplifies the non-functional
requirements (NFR) p in the development of an application for mobile devices. The study tries to find out if
NFR can be treated the same way as functional requirements in mobile application development. Finally,
this paper shows the experimental evaluation of the proposed data-driven model of dealing for non-
functional requirements in the development of mobile apps and the results obtained from the application of
the model are also discussed.
KEYWORDS
Non-Functional Requirements, Mobile Application Development, Data-Driven Requirement Engineering,
Requirement Modelling
1. INTRODUCTION
The modern incarnation of the mobile applications began in 2007 when a 1st generation of
iPhones together with a concentrated market for applications called the 'Application Store',
through which the end-users can download and install different applications. Not long after in
2008, Google set-up another platform called Google Play, officially known as (Android) to rival
the 'Application Store' and boost-up the 'Android Market'. Microsoft and BlackBerry also tag
along with comparable application markets for mobile apps. With these application markets, now
the mobile application engineers have a considerably bigger client base to pitch to. It is assessed
that there are as of now 2.6 Billion smartphone users [12].
However, seeing that mobile applications are developing into a more intricate, shifting away from
inexpensive frivolous applications to more business-critical uses, it will be vital to apply software
engineering processes to guarantee the development of stable, safe and qualitative mobile
applications [21]. Having said that, numerous “classic” software engineering techniques can
easily be transformed into the mobile application domain, requirement engineering is among the
areas that need further exploration.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
98
One of the well-established differences between functional and non-functional requirements is the
functions of the system and how the system shall carry-out the functions. This difference has a
huge influence on the elicitation, documentation, analysis, and validation of both sets of
requirements practically as demonstrated by several types of research such as [3]. There is a
scarcity of generally accepted approach for elicitation, documentation, analysis, and validation of
non-functional requirements practically, as a result, non-requirement is more often than not
describe imprecisely, usually not quantified, thereby generating a result that is complicated even
before its tested.
Moreover, non-requirements are frequently retrofitted in the mobile application development
process otherwise pursue in concurrently with, but independently from, functional requirements
and, therefore, are completely managed with diminutive analysis. Mobile application developers,
requirements analysts, and managers could systematically use explicit and implicit user feedback
in an aggregated form to support non-functional requirements decisions.
This paper proposed a data-driven model for dealing with non-functional requirements in mobile
application development so as to enhanced quality as well as effectiveness in carrying out
requirements’ engineering activities including requirements priority and traceability for mobile
application development. The remaining of this paper shows the background and related works in
section 2. The proposed model is illustrated and discussed in section 3. The evaluation and results
obtained from the application of the model are discussed in section 4. The conclusion and future
work are discussed in section 6.
2. BACKGROUND & RELATED WORK
The ever-increasing complexity of devices, the escalating market for applications and the growing
edge of wireless networks all work together making mobile application development industry
with great potential. Consequently, powerful development tools and frameworks are fashioned to
greatly simplify the task of implementing a mobile application. However, they are predominantly
focused on the individual developer who is trying to create an application as quickly as possible.
In an effort to gain a better understanding of development practices for mobile applications,
recent surveys such as that conducted by [6] have shown that mobile application developers
adhered relatively well to recommendations or the most effective method but rarely used any
formal development processes, moreover, there is a lack of persistence effort by developers in
tracking developed apps so as to gather new metrics for future use.
Several recent studies investigating non-functional requirements in mobile application
development, [12] discover that BlackBerry applications are bigger and depend more on foreign
libraries, while, Android applications depend intensely on the Android stage. [10] proposed a
paradigm to deal with biases of requirement specification tools as the majority of requirements
specification tools are more suitable for functional requirements than for non-functional
requirements. Reliability, availability, maintenance, and performance (RAMP) requirements are
left unstipulated, or at best vaguely stipulated, which makes requirements specifications more of
an art than a science. Furthermore, the cost of testing for RAMP requirements is frequently
excessive.
According to [12], [4], there have been a lot of focuses on a wide range of information that can be
mined from the application markets, with the application themselves being only one sort of
information. For instance, [8] utilized etymological principles to identify features demands from
user application reviews to generate more abstract requirements. [1] mine opinions, ideas and
facts from user application reviews with a specific end goal to revise requirements, the results of
the comparison between automatically extracted requirements and manually extracted
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
99
requirements are coherent in requirements specifications. [5] utilize natural language processing
(NLP) methods to discover features in application review and use sentiment analysis to establish
how users experience about application features.
Researches on mobile application requirements have been mostly restricted to off-the-shelf
natural language processing (NLP) tools that not design to mine text from user-reviews (which
can be extremely concise, have a tendency to be vastly unstructured, and have grammatical
mistakes). However, [2] proposes AR-Miner; a ranking algorithm that helps in prioritizing the
identified user-reviews which is consistent to real developers, and recognizing traceability
interfaces between user-reviews and application features.
The work nearest to our own is the work by [21], which looks at the non-functional requirements
through the mobile application Developers’ eyes. The fundamental contrast between our work
and their work is the way that we find issues through mining inquiries from tack overflow to
supplement the data extracted from app reviews posted by users in different app stores.
Additionally, our work supplements theirs by including more profundity into their investigation,
i.e., our approach takes a look at the issues by analyzing genuine inquiries asked by users, instead
of getting information from the developers.
3. THE DATA-DRIVEN MODEL FOR NFR IN MAD
After going through a considerable amount of literature on requirement engineering, mobile
application development, non-functional requirements in the development of mobile applications,
challenges in non-functional requirements identification and elicitation, the proposesed data-
driven model of dealing with non-functional requirements in mobile application development is
shown in Figure 1 below. The activities in each layer are discussed below.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
100
Figure 1. The proposed data-driven model for NFR in MAD
3.1. NON-FUNCTIONAL REQUIREMENTS ELICITATION
Elicitation is about collecting the requirements from stakeholders. The upper part of this model
identifies stakeholders as the source of data. Though the conventional methods of requirement
App Components Design,
Implementation and Testing
App Components’ Requirements
App Components Design,
Implementation and Testing
Mobile Apps’ Requirements
Mobile Apps Final Solution
Requirements
Elicitation
Requirements
Analysis
Requirements
Documentation
Requirements
Validation
Non-functional requirements Engineering Activities
Non-Functional Requirements Specifications
Non-Functional Requirements
Revision RequirementOperation Requirements Transition Requirements
Getting clarification from stakeholdersIdentifying needs, assumptions and rationales
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
101
gathering such as questionnaire and interview are still important, identifying and capturing non-
functional requirements from mobile-app users can be a quite complicated process as mobile-app
users find it difficult to specify these hidden requirements. Therefore, a wide range of information
on non-functional requirements can be mined from the application markets, the app rating and
review where mobile app users can depict their assessments on the mobile app can be used as a
source of data.
Subsequently, such information can be turned into a source where non-functional requirements
can be extracted by mobile-app developers. The information is rich in what mobile-app user’s
need from the application in terms of functionality and solutions to bug-related problems,
alongside praise for the features they cherish. In this model, the target problem and the
stakeholders’ needs should be identified and mine by the mobile app developer, in order to look
for rationales and assumptions from the identified needs representing the basis for an appropriate
requirements specification.
3.1.1 DATA SOURCES AND EXTRACTION TECHNIQUES
Various examinations have utilized Stack Overflow information to classify its inquiries and
dissect textual contents of discourses [16], One of the principal discoveries is that designers
vigorously depend on Q&A sites such as Stack Overflow, Programmers Exchange, Project
Management and Quora for valuable information, however, Stack Overflow is preferred because
significant number of the inquiries get addressed rapidly.
Firstly, this research adopts [21] approach for data from Stack Overflow. This approach
comprises of three key strides. Initially, the post and comments are extracted from Stack
Overflow followed by data refinement and tokenization (pre-processing). In addition, we develop
a subject model LDA to outline the subject of the corpus. At last, we mark the subjects with the
NFRs by our wordlists. This enables us to talk about the implication of dealing with NFRs in
mobile application development. This work considered only a part of the NFR that we clearly
identified as a desired system property and dismissed whatever remains of the NFR (e.g., because
of unessential/ambiguous data).
Figure 2. Data extraction approach for Q&A websites
Secondly, this research use AR-Miner (a novel computational structure for App Review
Mining by performs thorough investigation from rudimentary user-reviews) for data form
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
102
app marketplaces, such as Apple App Store and Google Play, to encourage mobile
application engineers to find the most "constructive" user-reviews from an expansive and
quickly expanding the pool of user-reviews. This approach comprises of four key strides
(i) first mining constructive user-reviews by filtering relevant and irrelevant reviews, (ii)
then grouping the constructive user-reviews naturally utilizing subject modelling, (iii)
additionally organizing the useful user-reviews by a successful review ranking system,
(iv) lastly introducing the collection of most "constructive" user-reviews by means of an
instinctive perception approach.
Figure 3. Data extraction approach for app marketplaces (App Store and Google Play)
3.1.2 LATENT DIRICHLET ALLOCATION-BASED SUBJECT MODELLING
LDA has been recognized as one of the best techniques for finding the topics of discussions in
natural language text documents. It has been applied to various software engineerings research
questions, such as requirement gathering, software defect prediction, bug localization, and
software change message classification. In LDA, the topic is the conditional probability
distribution of words in the vocabulary. It uses word frequencies and co-occurrences of
frequencies in the document to build a model of related words. That is, LDA creates topics when
it finds there are sets of words that tend to co-occur frequently in the documents of the corpus.
The words in a topic are usually semantically related.
To help understand the Stack Overflow discussions, we apply the topic model LDA to summarize
the topics of the corpus. For example, a topic that contains the words “reliability, failure, error,
redundancy, fails, bug, crash, stable, reliable, maturity, recoverability, fault tolerance” (because
these words occur together frequently in documents of the corpus), indicates that this topic is
related to reliability.
3.2. NON-FUNCTIONAL REQUIREMENT ANALYSIS, DOCUMENTATION & VALIDATION
The middle part of this model identifies and discussed the process of non-functional requirement
engineering activities based on mobile-apps quality factors and design criteria. The taxonomy of
quality attributes [19] is adopted due to the fact that it is the modified version of [9] software
quality measurement manual, it also contained procedures and guidelines for assisting software
system developers in setting quality goals, applying metrics and making quality assessments. The
efficiency of this modified model plus its alignment with mobile-app development makes it
perfect for dealing with the non-functional requirement in mobile-apps development.
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
103
During Analysis of the non-functional requirements, identifying the relative significance of every
quality factor from the user's perspective and additionally recognizing the outline criteria on
which these elements depend is as imperative as making requirements quantifiable. The quality
factor such as reliability can be measured using the mean time to failure which can be tested by
running the app and count crashes per hour. Taxonomy of quality attributes [19] is used as a base
for identifying user concerns with the mobile app as shown in Table 1 below.
Table 1. User concerns based on a taxonomy of quality attributes.
User Needs User concerns with the Mobile App Non-Functional
Category
Operation
How well does the
system perform for
daily use?
Can I run it? Usability (USB)
Is it secure? Integrity (INT)
Will it run on my hardware as well as it
can?
Efficiency (EFC)
Does it do it accurately all the time? Reliability (REL)
Does it do what I want? Correctness (CRT)
Revision
How easy is it to
correct errors and
add on functions?
Can I change it? Flexibility (FLX)
Can I fix it? Maintainability
(MNT)
Can I test it? Testability (TST)
Transition
How easy is it to
adapt to changes in
the technical
environment?
Will I be able to interface it with another
app
Interoperability (IOP)
Will I be able to use it on another machine? Portability (POR)
Will I be able to reuse some of the apps Reusability (REU)
In the early mobile app development stages, each stakeholder has different needs that must be
considered. The proposed model ensures the identification and documentation of stakeholder’s
needs and their documentation sources. It was noteworthy that there was a direct link between the
stakeholders and the needs, and also between the documentation sources and the needs. User
feedback includes a variety of information. Users may share thoughts on the best way to enhance
by adding or changing features. This feedback helps provide documentation of the application, its
requirements, and features. The INVEST principle (independent, negotiable, valuable, estimable,
Small, Testable) Can Be Used To Write Detailed User Stories And For Each User Story, A
Scenario, acceptance criteria, limitations, and constraints can be written to avoid developers
guessing the details for a given feature during implementation.
A good mobile application’ requirement specification must be correct, complete, unambiguous,
consistent, ranked for importance and stability, modifiable, traceable. Inspection is the primary
way to validate non-functional requirements and all the stakeholders mentioned in the elicitation
process must be involved. A validation checklist can be used in getting clarification from
stakeholders based on the questions raised in Table 1.
3.3. BACK END (MODELLING LAYER)
Once finished the components verification, all activities of the third process of "System
Integration and Testing" were conducted taking into account all systems’ components. At this
point, it is recommended to send feedback to the previous processes, aiming to improve system
requirements’ specification throughout this iterative and incremental process.
Component-based architecture can be used to design and facilitate the system in a stage by stage
process with the involvement of the stakeholders. This can be a very tedious and time-consuming
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
104
task but it’s a worthwhile process. The advantage of approaching the developed system in a stage
by stage basis with the feedback of the users will enable the team to tackle and address all the
issues at the initial stages itself, thus avoiding disappointments after the final application is
delivered.
The proposed model uses product-oriented approaches that focus on apps quality, capture
operational criteria for each non-functional requirement so that it can be measured once the
application is built. Furthermore, it’s important to note that quality factors and design criteria are
related, each factor depends on a number of associated criteria, e. g. correctness depends on
completeness, consistency, traceability while verifiability depends on modularity, self-
descriptiveness, and simplicity.
4. EMPIRICAL EVALUATION AND RESULTS
To evaluate if the proposed model can really help and support application developers in dealing
with the ever-eluding non-functional requirements in requirement engineering for mobile
application development using a data-driven approach, we conduct numerous experimental
studies. Specifically, we aim to answer the following questions: (1) How can the proposed model
facilitate the management of NFRs just like functional requirements? (2) Why some NFRs
generate more user feedback than others? (3) What are the advantages of the proposed model over
conventional ways of dealing with NFRs?
We used the posts and comments of the Q&A site Stack Overflow from August 1, 2016, to July 1,
2017, to explore the NFRs trends in all discussions associated with mobile application
development. Since the original data is organized in the form of an XML file containing a lot of
redundant information, we used the Online XML Viewer to represent the XML data in convenient
way and to extract the “title” and “body” of the posts and the “text” of the comments, totaling
about 603,505 posts and 998,566 comments. For each post, we extract the tags associated with
that post. Tags are keywords that users attribute with their posts.
We also use the AR-Miner to extract data from app marketplaces, such as the Apple App Store
and Google Play totaling 88,591. In view of the fact that the user-reviews contain spams and
unstructured information, the AR-miner helps in filtering the constructive user-reviews from the
irrelevant or unconstructive user-reviews as shown in table 2. Fig. 4 shows the detailed data for
each month (period), with the month as the x-axis, for example, Aug-16 means August 2016, and
the number of posts, comments, and user-review as the y-axis.
Table 2. Constructive & unconstructive user-review for mobile application developers.
Class Type (Rule) Real Example
Constructive
User-review
Performance flaw that degrades the
apps’ performance
It’s so slow and doesn’t respond to my
touch, sometimes I have to restart
Request to remove permission
This game contains too many
unnecessary permissions. So annoying
The functional flaw that produces
unexpected results
None of the pictures will load in my
news feed.
Unconstructive
User-review
Description of apps, features, actions
etc.
I have changed my review from 3
starts to 2 start
Pure user emotional expression
This app is crap or this app is
awesome
Unclear expression of failure and
question
Bad app, this is not working on my
phone
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
105
Figure 4. The number of posts, comments, and user-review
In order to determine which of our tags are relevant to NFRs related posts exclusively, we use a
tag relevance threshold (TRT) value. The TRT is measured as
.
.
tag
No of posts
Total no of posts
NFRs
TRT = where
the No. of NFRs posts is the number of posts that contained at least one of the initial set of NFRs
keywords (from Table 1) and the Total no. posts are the total number of posts related to the tag.
We experimented with different TRT values, manually examining the output each time, and
found that using 45% yields good results without being too restrictive.
Another threshold, known as tag significance threshold (TST) is used to weed-out cases were the
TRTtag is = 1because incorporating such a tag is not very useful. The TST is measured
as
.
.
tag
NFRs
NFR
No of posts
No of posts for the most popular t gs a s
TRT = .
Table 3. The NFRs and their associated wordlists based.
Labels Related terms
Usability usability, flexibility, interface, screen, user, friendly, convention, human,
default, click, guidelines, dialog, ugly, icons, ui, focus, feature, standard,
convention, configure, menu, accessibility, gui, usability, serviceability,
serviceableness, usableness, useableness, utility, usefulness, serviceable,
usable, useable, learnability, understandability, operability
Integrity Security, confidentiality, integrity, accountability, authenticity, compliance,
non-repudiation, secure, vulnerability, vulnerable, trustworthy, malicious,
secured, exploit, compliant, access permissions, timeouts, encryption
Efficiency efficiency, optimization, fast, slow, faster, slower, penalty, factor, sluggish,
optimize, profiled, performance, efficiency, efficient, “time behavior”,
“resource behavior”
Reliability reliability, failure, error, redundancy, fail, bug, crash, stable, stability, integrity,
resilience, dependability, dependableness, reliability, reliableness,
responsibility, responsibleness, dependable, reliable, maturity, recoverability,
“fault tolerance”
Correctness correctness, accuracy, precision error, serviceable, serviceability,
serviceableness, conformance, consistency, operability, functionality,
vulnerability, secure, accurate, vulnerability, trustworthy, policy, simplicity,
stability, compliant, functionality, practicality, functional, suitability,
interoperability, accuracy, compliance
Flexibility flexibility, modifiability, reconfigurability, adaptability, adjustability,
changeability,
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
106
Maintainability maintainability, modular, decentralized, encapsulation, dependency,
interdependent, understandability, modifiability, modularity, maintainable,
maintain, stability, analyzability, changeability, testability
Testability testability, traceability, susceptibility, debuggability, auditability, integrity,
accountability, authenticity, compliance
Interoperability interoperability, installability, integratability, integrity, suitability,
supportability, survivability, susceptibility, sustainability, transferability
Portability portability, transferability, interoperability, documentation,
internationalization, i18n, localization, l10n, standardized, migration,
specification, portability, movability, movableness, portable, installability,
replaceability, adaptability, conformance
Reusability reusability, replaceability, replicability, reconfigurability, extendability,
enhanceability, evolvability, expandability, adaptability, adjustability,
changeability
Figure 5. The number (count) and percentage of NFRs
Figure 5 shows the distribution with respect to the taxonomy of quality attributes [19] and the
number (count) and percentage of NFRs (relative to the total number of NFRs) for each quality
characteristic.
RQ1: How can the proposed model facilitate the management of NFRs just like functional
requirements?
As shown in figure 5, the five quality attributes (correctness, usability, reliability, integrity, and
efficiency) stand out with an aggregate total of more than 55%. These attributes can be defined as
the ability of the application to fulfill users’ objectives effectively, accurately, honorably and
consistently. This essentially corresponds to a classical understanding of a functional requirement.
Furthermore, NFRs at a high level typically lead to functions at lower. For example, a
performance requirement may lead to throughput and subsequently functions such as transactions
per second which impact specific task as shown in Figure 6. We see these results together with
the abundant number of metrics for quantification as a strong argument for the proposed model
can facilitate the management of NFRs just like functional requirements. Based on our data, most
“non-functional” requirements describe functional aspects of an application and are, therefore,
fundamentally not non-functional. From experimental observations, these indicate that the
majority of NFRs can be elicited, specified, and analyzed similarly to functional requirements.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
107
Figure 6. The Non-functional requirements hierarchy
RQ2: Why some NFRs generate more user feedback than others?
Interestingly, quality attributes such as correctness, usability, reliability, integrity, efficiency, and
maintainability get a higher percentage of the user feedback. Contrarily, flexibility, testability,
interoperability, portability, and reusability get the lower percentage of the stakeholders as shown
in Figure 7. This indicates that most stakeholders tend to discuss NFRs that actually describe
behavioral properties of application rather than NFRs that describe representational properties of
the application. It also suggests the mobile application developers should attach greater
importance to the correctness, usability, reliability, integrity, efficiency, and maintainability of the
application.
RQ3: What are the advantages of the proposed model over conventional ways of dealing with
NFRs?
Given that there is no universal definition of NFR categories, we have observed that certain
discrepancy exists between the amount of NFRs information obtain using proposed model and
conventional ways of dealing with NFRs as shown in Figure 7. The proposed model ensures the
identification and documentation of stakeholder’s needs and their documentations sources. It was
noteworthy that there was a direct link between the stakeholders and the needs, and also between
the documentation sources and the needs as shown in Figure 1. The proposed model uses product-
oriented approaches that focus on apps quality, capture operational criteria for each non-
functional requirement so that it can be measure once the application is built.
Figure 7. Number of NFRs extracted by the proposed model as compared to the conventional model
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
108
5. CONCLUSION AND FUTURE WORK
This study set out to provide support for mobile application developers in dealing with non-
functional requirements for mobile application development using a data-driven approach, the
study also tries to find out if NFR can be treated the same way as functional requirements. The
results of this investigation show that the proposed model can facilitate the management of NFRs
just like functional requirements. Thereby enhancing the quality of requirements’ engineering
activities including requirements priority and traceability for mobile application development.
Based on data, most “non-functional” requirements describe functional aspects of an application
and are, therefore, fundamentally not non-functional. From experimental observations, these
indicate that the majority of NFRs can be elicited, specified, and analyzed similarly to functional
requirements. Although this study focuses on finding out if NFR can be treated the same way as
functional requirements in mobile application development, the findings may well have a bearing
on how mobile application developers prioritized NFRs. Given that most of the stakeholders tend
to discuss NFRs that actually describe behavioral properties of application such as correctness,
usability, reliability, integrity, efficiency, and maintainability rather than NFRs that describe
representational properties of the application such as flexibility, testability, interoperability,
portability, and reusability. Future research should, therefore, concentrate on building natural
language processing (NLP) techniques that can handle limitless user-reviews, coupled with
sampling techniques that take the sampling bias into account for more comprehensive user-
reviews. Besides, more research is also needed to come up with a new ranking algorithm to
surface apps that exhibit the best performance, lower number of crashes, and the high stability
rather than just the most install or highest rating.
REFERENCES
[1] Carreño, L. V. G., & Winbladh, K. (2013, May). Analysis of user comments: an approach for
software requirements evolution. In Software Engineering (ICSE), 2013 35th International
Conference on (pp. 582-591). IEEE.
[2] Chen, N., Lin, J., Hoi, S. C., Xiao, X., & Zhang, B. (2014, May). AR-miner: mining informative
reviews for developers from mobile app marketplace. In Proceedings of the 36th International
Conference on Software Engineering (pp. 767-778). ACM.
[3] Eckhardt, J., Vogelsang, A., & Fernández, D. M. (2016, May). Are" Non-functional"
Requirements really Non-functional? An Investigation of Non-functional Requirements in
Practice. In Software Engineering (ICSE), 2016 IEEE/ACM 38th International Conference on (pp.
832-842). IEEE.
[4] Finkelstein, A., Harman, M., Jia, Y., Sarro, F., & Zhang, Y. (2013). Mining app stores: Extracting
technical, business and customer rating information for analysis and prediction. RN, 13, 21.
[5] Guzman, E., & Maalej, W. (2014, August). How do users like this feature? a fine-grained
sentiment analysis of app reviews. In Requirements Engineering Conference (RE), 2014 IEEE
22nd International (pp. 153-162). IEEE.
[6] Grønli, T. M., & Ghinea, G. (2016, January). Meeting quality standards for mobile application
development in businesses: A framework for cross-platform testing. In System Sciences (HICSS),
2016 49th Hawaii International Conference on (pp. 5711-5720). IEEE.
[7] Huang, J., Xu, Q., Tiwana, B., Mao, Z. M., Zhang, M., & Bahl, P. (2010, June). Anatomizing
application performance differences on smartphones. In Proceedings of the 8th international
conference on Mobile systems, applications, and services (pp. 165-178). ACM.
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 2, April 2019
109
[8] Iacob, C., & Harrison, R. (2013, May). Retrieving and analyzing mobile apps feature requests
from online reviews. In Mining Software Repositories (MSR), 2013 10th IEEE Working
Conference on (pp. 41-44). IEEE.
[9] MacCall, J. A., & Matsumoto, M. T. (1980). Software quality measurement manual. National
Technical Information Service.
[10] Malkawi, M. I. (2013). The art of software systems development: Reliability, Availability,
Maintainability, Performance (RAMP). Human-Centric Computing and Information Sciences,
3(1), 22.
[11] Mushtaq, Z., Kirmani, M., & Saif, S. M. (2016). Mobile Application Development: Issues and
Challenges. International Research Journal of Engineering and Technology on (pp. 1096-1099).
IRJET
[12] Nagappan, M., & Shihab, E. (2016, March). Future trends in software engineering research for
mobile apps. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd
International Conference on (Vol. 5, pp. 21-32). IEEE.
[13] Niemelä, E., & Latvakoski, J. (2004, October). Survey of requirements and solutions for
ubiquitous software. In Proceedings of the 3rd international conference on Mobile and ubiquitous
multimedia (pp. 71-78). ACM.
[14] Rein, A. D., & Münch, J. (2013). Feature prioritization based on mock-purchase: A mobile case
study. In Lean Enterprise Software and Systems (pp. 165-179). Springer, Berlin, Heidelberg.
[15] Romano, B. L., Gomes, P. M. E., Fernandes, H. C., Montini, D. Á., Dias, L. A. V., & da Cunha,
A. M. (2011). A Model-Driven Method for Documentation and Analysis of Software-Intensive
Systems Requirements.
[16] Rosen, C., & Shihab, E. (2016). What are mobile developers asking about? a large-scale study
using stack overflow. Empirical Software Engineering, 21(3), 1192-1223.
[17] Sarro, F., Al-Subaihin, A. A., Harman, M., Jia, Y., Martin, W., & Zhang, Y. (2015, August).
Feature lifecycles as they spread, migrate, remain, and die in app stores. In Requirements
Engineering Conference (RE), 2015 IEEE 23rd International (pp. 76-85). IEEE.
[18] Spriestersbach, A., & Springer, T. (2004, April). Quality attributes in mobile web application
development. In International Conference on Product Focused Software Process Improvement (pp.
120-130). Springer Berlin Heidelberg.
[19] Van Vliet, H. (2000). Software Engineering: Principles and Practice. New York: Wiley.
[20] Zhao, H., Qiu, M., Gai, K., Li, J., & He, X. (2015, November). Maintainable mobile model using
pre-cache technology for high performance android system. In Cyber Security and Cloud
Computing (CSCloud), 2015 IEEE 2nd International Conference on (pp. 175-180). IEEE.
[21] Zou, J., Xu, L., Yang, M., Zhang, X., & Yang, D. (2017). Towards comprehending the non-
functional requirements through Developers’ eyes: An exploration of Stack Overflow using topic
analysis. Information and Software Technology, 84, 19-32.