The applications presented in this conference paper focus on the development of a mobile and web application serving as a planner with a focus on tracking persons with Down syndrome. These innovative technological solutions contribute to the development of independence and functionality for persons with Down syndrome while emphasizing the importance of inclusivity in society. In addition to focusing on organizing activities, the mobile and web applications provide support and facilitate daily tasks. The web application allows parents/guardians/teachers to add new activities to the planner and track the progress of these activities. On the other hand, the mobile application enables persons with Down syndrome to record their activities within the application, considering their specific challenges, and customizing the user interface to their needs.
Software development is implemented in several key phases, one of which is software testing. Software testing consists of selecting techniques for the purpose of finding software defects and bugs in the process of writing code. There are several ways and approaches that lead us to that purpose, with the goal of selecting the most adequate method in terms of cost, complexity, and efficiency. In this paper, we will take a deeper dive into mutation testing techniques. Mutation testing techniques are fault-based and focus more on test structures than the input data, which is considered the testing start point. The basic concept of mutation testing consists of a few steps, which will be covered in this paper, and metrics that measure how effective the tests really are. With a few code examples, we will show why code coverage, which is mostly taken as a measure while testing, is sometimes not the most reliable source and does not give a full picture when talking about the quality of written tests.
Digital credentials represent a cornerstone of digital identity on the Internet. To achieve privacy, certain functionalities in credentials should be implemented. One is selective disclosure, which allows users to disclose only the claims or attributes they want. This paper presents a novel approach to selective disclosure that combines Merkle hash trees and Boneh-Lynn-Shacham (BLS) signatures. Combining these approaches, we achieve selective disclosure of claims in a single credential and creation of a verifiable presentation containing selectively disclosed claims from multiple credentials signed by different parties. Besides selective disclosure, we enable issuing credentials signed by multiple issuers using this approach.
Digital credentials represent crucial elements of digital identity on the Internet. Credentials should have specific properties that allow them to achieve privacy-preserving capabilities. One of these properties is selective disclosure, which allows users to disclose only the claims or attributes they must. This paper presents a novel approach to selective disclosure BLS-MT-ZKP that combines existing cryptographic primitives: Boneh-Lynn-Shacham (BLS) signatures, Merkle hash trees (MT) and zero-knowledge proof (ZKP) method called Bulletproofs. Combining these methods, we achieve selective disclosure of claims while conforming to selective disclosure requirements. New requirements are defined based on the definition of selective disclosure and privacy spectrum. Besides selective disclosure, specific use cases for equating digital credentials with paper credentials are achieved. The proposed approach was compared to the existing solutions, and its security, threat, performance and limitation analysis was done. For validation, a proof-of-concept was implemented, and the execution time was measured to demonstrate the practicality and efficiency of the approach.
The visual layout has an enormous influence on human perception and is a subject of many studies, including research on web page similarity comparison. Structure-based approaches use the possibility of direct access to HTML content, whereas visual methods have widespread usage due to the ability to analyze image screenshots of entire web pages. A solution described within this paper will focus on extracting web page layout in forms needed by both above-mentioned approaches.
In this paper, we introduce and provide insight into the two innovative applications designed to enhance the lives of persons with Down syndrome, focusing on seamless integration between the two. The first is a mobile application that helps users manage their daily routines by monitoring and predicting activity durations, considering their unique challenges. The second is a web application for parents/teachers/other adults to streamline activity scheduling, progress tracking, and reminders.
Webpage layout presentation failures can negatively affect the usability of a web application as well as the end-to-end user experience. The need for automated methods of visual inspection becomes obvious in complex web applications. However, visual inspection still heavily relies on manual inspection because the tools currently available are not yet advanced enough. This paper compares the performance results of three visual testing tools: Galen, AyeSpy, and Percy, and focuses on opportunities for their enhancement.
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više