Volume 9, Issue 2, February 2018


Quality Assurance of Web-Based Applications

Tariq Aziz Rao, Ehsan-ul-Haq and Sadia Tariq

Department of Computer Science, Virtual University of Pakistan, Lahore, Pakistan

Abstract– Use of E-commerce applications is swiftly growing worldwide as businesses are now drifting from obsolete desktop applications to web-based applications. Due to the large volume of these applications and distributed, heterogeneous, multiplatform, multilingual and autonomous computing environment of the internet, quality assurance of web-based products is becoming more significant and decisive. Testing and maintaining are key processes to acquire the optimum quality of web-based applications. There is also a dire need to understand the typical structure of a web application and the divergence between traditional desktop applications testing and web-based applications testing. Quality assurance team uses different kinds of testing and maintenance approaches to ensure the production of best quality web-based products but in fact, conventional testing methods are not enough, so, emphasis on seven basic parameters for quality assurance of web-based applications.

Keywords— Web Applications, Requirements, Quality Assurance, System Testing, Website Structure and Web Versus Desktop Applications Testing

Download full paper PDF format (Page: 1-5)

Predicting eGovernment Acceptance by Employees Working in the Public Human Development Organizations: Case of Morocco

ADERKAOUI Abderazak, OUMLIL Rachid and AQUELMOUN Abdessalam

Ibn Zohr University, LaRGe at ENCG Agadir, Morocco

Abstract– Nowadays, efficiency of human development policies is devoted to the eGovernment (eGov) systems contribution in improving activities of public organizations. However, investment in these systems is faced to financial, organizational, and behavioral issues. These latter could be explained by the eGov acceptance matter. Moroccan government has carried out many eGov initiatives. However, the majority of eGov programs have failed to meet the fixed objectives [40], [16]. This failure caused the recedes of Morocco in the last world ranking of eGov. The low score of Human Capital sub-index was reported as one of the main causes of this recedes [60]. This brings us to question the eGov acceptance factors, especially within Public Human Development Organizations (PHDO). Referring to the Technology Acceptance Model (TAM), this paper aims to develop a model predicting employee’s Intention to accept eGov within PHDO in Morocco. For this issue, authors conducted a study on eGov acceptance by employees working in a PHDO named: Social Development Agency, located in Rabat-Moroccan administrative capital. The data was collected through an online questionnaire during a two months period. The collected data was captured and analyzed with SPSS software, while a further analysis was conducted using the structural equation modeling approach. Findings showed that the proposed model explains about 38,6 % of the variance in employees Intention to use eGov system. They also asserted that Attitude, and Perceived Risk influence considerably the Intention to use eGov system. However, perceptions of Usefulness and Ease of Use had no significant impact on this Intention.

Keywords— eGov Acceptance, Human Development, Public Sector and Morocco

Download full paper PDF format (Page: 6-13)

Hydrological Analysis of Loko Watershed Using Arc SWAT and HEC-HMS: A Tool for Vital Geospatial Information

Anthony Goji Tumba

Department of Surveying & Geoinformatics, Modibbo Adama University of Technology, P.M.B.2076, Yola, Adamawa State, Nigeria

Abstract– This study analyzes Loko watershed from the hydrological point of view using Arc SWAT and HEC_HMS. The Arc SWAT, an Arc Map extension interface was used to delineate and simulate the watershed to extract spatial parameters useful for the hydrological simulation and soil-water relationship analysis. The objective is to simulate the hydrologic behaviour of flow discharge with respect to, land use, soil, slope, and water movement from the upstream areas in order to analyze its effect on the Loko settlement. The Arc SWAT was used to provide the needed hydrologic flow parameters from ASTER DEM, while simulation of flow discharge was done in the HEC_HMS. Weather data for SWAT simulation were downloaded from the National Centers for Environmental Prediction’s Climate Forecast System Reanalysis (CFSR) website. Land use and soil data were downloaded from the NASA Reverb/ECHO and the Harmonized World Soil Data (HWSD) web sites respectively. Results from the study show that the location of Loko settlement at the junction of clustered pour points and a strategic transition slope of the uppermost trough of the Benue River, is identified as one of the major factors for persistent flooding. The second factor identified is that the volume discharge per cubic meter seconds (cms), is high at this junction and thirdly, the porosity index of the upstream and low stream soils which encourages high flooding. It has also proven that the study is useful for organic minerals analysis. This information is a useful and vital hydrological data for planning mitigation measures against flood: through adequate engineering design and standard, and for soil analysis, useful for agricultural purposes.

Keywords— Loko Watershed, Hydrology, Arc SWAT, HEC-HMS and Geospatial Information

Download full paper PDF format (Page: 14-20)

Securing High Level Data Services from Different Threats: SPAM Over Internet Telephony, Eavesdropping, Denial of Service, Call Tampering

Farrukh Musa and M. J. Arshad

Department of Computer Science and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract– Communication technologies use have been largely transformed with the introduction of digital and high-level data services over Internet Protocol which fuses telecommunication and digital television delivery services together. Another revolution is that the user will be capable to have a bidirectional communication, the ability to interact with the service provider and enjoy high quality end-to-end service. These high-level data services afford rich multimedia services over a measured IP network. Networks require advanced security solution that protects data from hackers, threats and vulnerabilities resulting in secure high-level data services. This research work gives an overview of these high-level data services, security problems and threats that should be resolve for better quality and greater safety. It also identifies and describes the best techniques to secure VOIP that are acceptable and effective for the call participants. As a result, with this research work user will become familiar with the security risks that must be removed while doing any conversation.

Keywords— BHigh Level Data Services, Security Threats in VoIP, SPAM Over Internet Telephony, SPIT, Eavesdropping, Denial of Services and Call Tampering

Download full paper PDF format (Page: 21-26)