Blockchain > Internet of Things > Internet

Total Page:16

File Type:pdf, Size:1020Kb

Blockchain > Internet of Things > Internet > Blockchain > Internet of Things > Internet Trends and Applications > Virtual and Augmented Reality JANUARY 2019 www.computer.org IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380 STAFF Editor Publications Portfolio Managers Cathy Martin Carrie Clark, Kimberly Sperka Publications Operations Project Specialist Publisher Christine Anthony Robin Baldwin Publications Marketing Project Specialist Meghan O’Dell Senior Advertising Coordinator Debbie Sims Production & Design Carmen Flores-Garvey Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Printed in USA. Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space. Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected]. Copyright © 2019 IEEE. All rights reserved. Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per- copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at [email protected] and type “unsubscribe ComputingEdge” in your subject line. IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html. IEEE Computer Society Magazine Editors in Chief Computer IEEE Security & Privacy Computing in Science David Alan Grier (Interim), David Nicol, University of Illinois & Engineering George Washington University at Urbana-Champaign Jim X. Chen, George Mason University IEEE Micro IEEE Software IEEE Intelligent Systems Lizy Kurian John, University of Ipek Ozkaya, Software V.S. Subrahmanian, Dartmouth Texas, Austin Engineering Institute College IEEE MultiMedia IEEE Internet Computing IEEE Computer Graphics Shu-Ching Chen, Florida George Pallis, University of and Applications International University Cyprus Torsten Möller, University of Vienna IEEE Annals of the History IT Professional of Computing Irena Bojanova, NIST IEEE Pervasive Computing Marc Langheinrich, University of Gerardo Con Diaz, University of Lugano California, Davis www.computer.org/computingedge 1 JANUARY 2019 • VOLUME 5, NUMBER 1 THEME HERE 17 24 29 Adaptable Accurate The Last Mile Blockchain-Based Indoor for IoT Privacy Systems Location for the IoT Blockchain 10 Blockchain: The Emperor’s New PKI? HILARIE ORMAN 17 Adaptable Blockchain-Based Systems QINGHUA LU AND XIWEI XU Internet of Things 24 Accurate Indoor Location for the IoT ROY WANT, WEI WANG, AND STAN CHESNUTT 29 The Last Mile for IoT Privacy RICHARD CHOW Internet Trends and Applications 33 5G in E-Commerce Activities NIR KSHETRI 38 A New Era for Web AR with Mobile Edge Computing XIUQUAN QIAO, PEI REN, SCHAHRAM DUSTDAR, AND JUNLIANG CHEN Virtual and Augmented Reality 48 360-Degree Virtual-Reality Cameras for the Masses JACK TAN, GENE CHEUNG, AND RUI MA 56 Virtual Travel CHARLES DAY Departments 4 Magazine Roundup 8 Editor’s Note: Emerging Blockchain Applications 58 Career Opportunities 38 A New Era for Web AR with Mobile Edge Computing Subscribe to ComputingEdge for free at www.computer.org/computingedge. CS FOCUS Magazine Roundup Computer, the authors provide insight into artifi cial emotional intelligence (AEI) and present three major areas of emotion— recognition, generation, and augmentation—needed to reach a new emotionally intelligent epoch of AI. Computing in Science & Engineering he IEEE Computer Computer The Heat Equation: High- Society’s lineup of 12 Performance Scientifi c T peer-reviewed technical The Age of Artifi cial Computing Case Study magazines covers cutting-edge Emotional Intelligence In recent years, high-performance topics ranging from software Science fi ction often portrays computing and powerful super- design and computer graphics to future AI technology as having computers have become staples Internet computing and security, sophisticated emotional intelli- in many areas of academia and from scientifi c applications gence skills to the degree industry. The author of this arti- and machine intelligence to where technology can develop cle from the September/October visualization and microchip compassion. But where are 2018 issue of Computing in Sci- design. Here are highlights from we today? In this article from ence & Engineering introduces recent issues. the September 2018 issue of the concept of shared memory 4 January 2019 Published by the IEEE Computer Society 2469-7087/19/$33.00 © 2019 IEEE programming in the context of propose real-time algorithms that uses in the areas of psychology, solving the heat equation, which detect multiple body poses and health informatics, pharmacovigi- will allow the exploration of several recognize punching and touching lance, and aff ective computing. fi nite diff erence and parallelization gestures from top-view depth schemes. images. A pointing and touching IEEE Internet Computing test shows that the proposed IEEE Annals of the History algorithm outperforms other Real-Time Identity-Deception of Computing algorithms. In addition, the authors Detection Techniques for created a game to make the best Social Media: Optimizations How Atex Helped an Industry use of the proposed system. and Challenges Change the World Identity-deception detection Douglas Drane was one of three IEEE Intelligent Systems me thods have been proposed for co-founders of Atex, an early social-media platforms with high dominant supplier of digital Detecting Personal Intake of eff ectiveness, but their effi ciency systems for newspaper and Medicine from Twitter can vary. Previous literature has magazine publication. In the July– Mining social media messages not examined the potential of September 2018 issue of IEEE such as tweets, blogs, and Face- these methods to work as real-time Annals of the History of Computing, book posts for health- and drug- monitoring systems. Such imple- Drane recounts his memories of related information has received mentations further highlight the Atex’s founding and operation signifi cant interest in pharmaco- challenges of applying computa- until it was bought by Kodak. vigilance research. Social media tionally intensive methods in online websites have been used for moni- environments that involve large IEEE Computer Graphics toring drug abuse, searching for datasets and high speeds of data. and Applications adverse reactions to drug usage, This article, which appears in the and analyzing expression of sen- September/October 2018 issue of ThunderPunch: A Bare- timents related to drugs. Most of IEEE Internet Computing, attempts Hand, Gesture-Based, Large these studies are based on aggre- to classify detection methods Interactive Display Interface gated results from a large popula- based on the approaches and iden- with Upper-Body-Part tion rather than specifi c sets of tifi es factors that, in real-time sys- Detection in a Top View individuals. To conduct studies at tems, will impact the eff ectiveness The authors of this article from an individual level or in specifi c and effi ciency of these methods. the September/October 2018 groups of people, identifying posts Optimizations are proposed that issue of IEEE Computer Graphics mentioning intake of medicine can limit the computational over- and Applications present a new by the user is necessary. Toward head. Further challenges involving bare-hand gesture interface for this objective, the authors of this real-time identity-deception detec- large-screen interaction in which article
Recommended publications
  • Automated Testing Clinic Follow-Up: Capybara-Webkit Vs. Poltergeist/Phantomjs | Engineering in Focus
    Automated Testing Clinic follow-up: capybara-webkit vs. polter... https://behindthefandoor.wordpress.com/2014/03/02/automated-... Engineering in Focus the Fandor engineering blog Automated Testing Clinic follow-up: capybara-webkit vs. poltergeist/PhantomJS with 2 comments In my presentation at the February Automated Testing SF meetup I (Dave Schweisguth) noted some problems with Fandor’s testing setup and that we were working to fix them. Here’s an update on our progress. The root cause of several of our problems was that some of the almost 100 @javascript scenarios in our Cucumber test suite weren’t running reliably. They failed occasionally regardless of environment, they failed more on slower CPUs (e.g. MacBook Pros only a couple of years old), when they failed they sometimes hung forever, and when we killed them they left behind webkit-server processes (we were using the capybara-webkit driver) which, if not cleaned up, would poison subsequent runs. Although we’ve gotten pretty good at fixing flaky Cucumber scenarios, we’d been stumped on this little handful. We gave up, tagged them @non_ci and excluded them from our build. But they were important scenarios, so we had to run them manually before deploying. (We weren’t going to just not run them: some of those scenarios tested our subscription process, and we would be fools to deploy a build that for all we knew wouldn’t allow new users to subscribe to Fandor!) That made our release process slower and more error-prone. It occurred to me that I could patch the patch and change our deployment process to require that the @non_ci scenarios had been run (by adding a git tag when those scenarios were run and checking for it when deploying), but before I could put that in to play a new problem appeared.
    [Show full text]
  • Automated Testing of Your Corporate Website from Multiple Countries with Selenium Contents
    presents Automated Testing of Your Corporate Website from Multiple Countries with Selenium Contents 1. Summary 2. Introduction 3. The Challenges 4. Components of a Solution 5. Steps 6. Working Demo 7. Conclusion 8. Questions & Answers Summary Because of the complexities involved in testing large corporate websites and ecommerce stores from multiple countries, test automation is a must for every web and ecommerce team. Selenium is the most popular, straightforward, and reliable test automation framework with the largest developer community on the market. This white paper details how Selenium can be integrated with a worldwide proxy network to verify website availability, performance, and correctness on a continuous basis. Introduction Modern enterprise web development teams face a number of challenges when they must support access to their website from multiple countries. These challenges include verifying availability, verifying performance, and verifying content correctness on a daily basis. Website content is presented in different languages, website visitors use different browsers and operating systems, and ecommerce carts must comprehend different products and currencies. Because of these complexities involved, instituting automated tests via a test automation framework is the only feasible method of verifying all of these aspects in a repeatable and regular fashion. Why automate tests? Every company tests its products before releasing them to their customers. This process usually involves hiring quality assurance engineers and assigning them to test the product manually before any release. Manual testing is a long process that requires time, attention, and resources in order to validate the products’ quality. The more complex the product is, the more important, complex, and time- consuming the quality assurance process is, and therefore the higher the demand for significant resources.
    [Show full text]
  • Casperjs Documentation Release 1.1.0-DEV
    CasperJs Documentation Release 1.1.0-DEV Nicolas Perriault Sep 13, 2018 Contents 1 Installation 3 1.1 Prerequisites...............................................3 1.2 Installing from Homebrew (OSX)....................................4 1.3 Installing from npm...........................................4 1.4 Installing from git............................................4 1.5 Installing from an archive........................................5 1.6 CasperJS on Windows..........................................5 1.7 Known Bugs & Limitations.......................................6 2 Quickstart 7 2.1 A minimal scraping script........................................7 2.2 Now let’s scrape Google!........................................8 2.3 CoffeeScript version...........................................9 2.4 A minimal testing script......................................... 10 3 Using the command line 11 3.1 casperjs native options.......................................... 12 3.2 Raw parameter values.......................................... 13 4 Selectors 15 4.1 CSS3................................................... 15 4.2 XPath................................................... 16 5 Testing 17 5.1 Unit testing................................................ 17 5.2 Browser tests............................................... 18 5.3 Setting Casper options in the test environment............................. 19 5.4 Advanced techniques........................................... 20 5.5 Test command args and options....................................
    [Show full text]
  • API Measurement
    Serving Two Masters An Empirical Study of Browser API Cooptation Pete Snyder, Chris Kanich University of Illinois at Chicago Less More Features Features Less More Features Features Managed Pointer Memory Arithmetic Outline • Browser Complexity is Increasing • Complexity is Often Not Useful • Complexity is Harmful to Privacy • Is Complexity is Harmful to Security? 1. Browser Complexity is Growing 1993: Mosaic 1995: Netscape 2.0 1996: CSS 1998: DOM1 1999: AJAX / XMLHttpRequest Observations • API growth started off very slow • API growth was “document” centric • “Broad” APIs API Growth 2013 2014 2015 • CSSOM View Module • Calendar API • Encrypted Media Extensions • Web Audio API • Messaging API • Web MIDI • Proximity Events • RDF Extensions • Service Workers • Crypto Extensions • Progress events • Performance API • • Touch Events Network Info API • Raw Socket API • GeoLocation API • Ambient Light API • WebDriver API • Pointer API • HTML 5 • SVG 2 API • CSS Animations • WebCrypto API • WebRTC 2. Is This Complexity Useful? Determining API “Usefulness” • Measure how often APIs are called • Decide whether those calls are “useful" • Simulate real world web browsing Measuring API Calls • Selected 45 APIs and features • Instrumented PhantomJS / WebKit • Implemented missing APIs “Usefulness” Oracle • Subjective measure • Ghostery and AdBlock+ filter rules • Measure API usage pre-and-post filters Simulated Browsing • Alexa 10,000 • 10,000 random URLs • 10,000 random Hosts • “Random” sites taken from searching UNIX dictionary tri-grams on DDG AJAX DOM 1 + 2 APIs Rare APIs API Name URLs Battery API 21 Page Transition API 9 GeoLocation API 55 Shadow DOM 5 Non-used APIs • IndexDB • SVG API • WebGL • Vibration API • WebRTC • WebAudio API • Browser Name API • WebWorker API • Gamepad API GeoLocation API Touch Events API 3.
    [Show full text]
  • Angular Vs React.Js Vs Vue.Js
    EVERYTHING YOU NEED TO KNOW TO MAKE AN EDUCATED DECISION ABOUT YOUR TECHNOLOGY STACK ANGULAR VS REACT.JS VS VUE.JS + Our evaluation of UI Frameworks, Tools & Technologies 2019 3 What’s inside? 1 Preface 3 2 Angular, ReactJS & Vue JS - Comparison 4 3 Angular, ReactJS & Vue JS - Pros & Cons 6 4 Angular, ReactJS & Vue JS - Conclusion 11 5 UI Technoverse 13 a.Frameworks 15 b.Technologies 19 c.Tools 22 2 Are you a front-end superstar, excited to build feature-rich beautiful UI? Join Us 3 STATE OF FRONTEND TECHSTACKS 2019 PREFACE Preface he only constant in the web frontend development landscape is that it is in constant flux year after year. So, it becomes paramount to reevaluate the tools, frameworks, Tlibraries and practices after every few quarters. As of this writing most of the web frontend development happens in either Angular, ReactJS or VueJS. Compared to our previous evaluation in 2018 which only had Angular and ReactJS as major players, now, we also have VueJS with significant traction. As always a direct comparison between Angular, ReactJS and VueJS alone will not be sufficient. So, it will not be an individual comparison but a comparison of their respective ecosystems on the whole. 3 Are you a front-end superstar, excited to build feature-rich beautiful UI? Join Us Angular, React.JS & Vue.JS - Comparison In this section, we compare all three frameworks using a plethora of parameters to highlight how they fare against 2each other. STATE OF FRONTEND TECHSTACKS 2019 COMPARISON Angular ReactJS VueJS Type JavaScript Framework JavaScript Library JavaScript Library Web development and Web development and Web development and Hybrid mobile app Native mobile app Hybrid mobile app Used for development (Ionic) development (React development Native) (Onsen UI) Maintained by Google & Community Facebook & Community Community TypeScript Javascript (Also Javascript (Also Coded in supports Typescript) supports Typescript) Steep learning curve Easier Easiest among the three Ease of Learning since it is an end to end framework.
    [Show full text]
  • System for Detection of Websites with Phishing and Other Malicious Content
    Masaryk University Faculty of Informatics System for detection of websites with phishing and other malicious content BachelorŠs Thesis Tomáš Ševčovič Brno, Fall 2017 Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Tomáš Ševčovič Advisor: prof. RNDr. Václav Matyáš, M.Sc., Ph.D. i Acknowledgement I would like to thank prof. RNDr. Václav Matyáš, M.Sc., Ph.D. for the management of the bachelor thesis, valuable advice and comments. I would also like to thank the consultant from CYAN Research & Development s.r.o., Ing. Dominik Malčík, for useful advice, dedicated time and patience in consultations and application development. Also, I would like to thank my family and friends for their support throughout my studies and work on this thesis. ii Abstract The main goal of this bachelor thesis is to create a system for detection of websites with phishing and other malicious content with respect to Javascript interpretation. The program should be able to download and process thousands of domains and get positive results. The Ąrst step involves examining an overview of automated web testing tools to Ąnd an optimal tool which will be used in the main implementation. The thesis contains overview of technologies for website testing, their comparison, overview of malware methods on websites, implementation and evaluation of the system. iii Keywords Chrome, Javascript, link manipulation, malware, phishing, URL redi- rects, XSS, Yara iv Contents 1 Introduction 1 2 Overview of approaches to website testing 3 2.1 Manual testing .......................
    [Show full text]
  • Flare-On 3: Challenge 10 Solution - FLAVA
    Flare-On 3: Challenge 10 Solution - FLAVA Challenge Authors: FireEye Labs Advanced Vulnerability Analysis Team (FLAVA) Intro The first part of FLAVA challenge is a JavaScript puzzle based on the notorious Angler Exploit Kit (EK) attacks in 2015 and early 2016. All classic techniques leveraged by Angler, along with some other intriguing tricks utilized by certain APT threat actors, are bundled into this challenge. While Angler EK’s activities have quieted down since the takedown of a Russian group “Lurk” in mid 2016, its advanced anti-analysis and anti-detection techniques are still nuggets of wisdom that we think are worth sharing with the community for future reference. Walkthrough Compromising or malvertising on legitimate websites are the most common ways that exploit kits redirect victims to their landing pages. Exploit kits can redirect traffic multiple times before serving the victim the landing page. Once on the landing page, the exploit kit profiles the victim’s environment, and may choose to serve an exploit that affects it. In the case of this challenge, the landing page is only one redirect away from the compromised site (hxxp://10.11.106.81: 18089/flareon_found_in_milpitas.html). Often, Angler’s (and many other EKs’) landing page request has a peculiar, and thus fishy, URL after some seemingly legit HTTP transactions. Layer-0 Walkthrough The landing page may initially seem daunting, and that’s exactly the purpose of obfuscation. But it’s still code, regardless of the forms it may take. After all, it’s supposed to carry out the attack without any user interaction. It’s strongly advised to rewrite the code with meaningful names during analysis, just as one would in IDA when analyzing binaries.
    [Show full text]
  • Benefits and Challenges of Isomorphism in Single-Page Applications
    Master’s thesis Master’s Programme in Computer Science Benefits and Challenges of Isomorphism in Single-Page Applications: A Case Study and Review of Gray Literature Aleksi Huotala May 18, 2021 Faculty of Science University of Helsinki Supervisor(s) Dr. M. Luukkainen, Prof. T. Mikkonen Examiner(s) Dr. M. Luukkainen, Prof. T. Mikkonen Contact information P. O. Box 68 (Pietari Kalmin katu 5) 00014 University of Helsinki, Finland Email address: [email protected].fi URL: http://www.cs.helsinki.fi/ HELSINGIN YLIOPISTO – HELSINGFORS UNIVERSITET – UNIVERSITY OF HELSINKI Tiedekunta — Fakultet — Faculty Koulutusohjelma — Utbildningsprogram — Study programme Faculty of Science Master’s Programme in Computer Science Tekijä — Författare — Author Aleksi Huotala Työn nimi — Arbetets titel — Title Benefits and Challenges of Isomorphism in Single-Page Applications: A Case Study and Review of Gray Literature Ohjaajat — Handledare — Supervisors Dr. M. Luukkainen, Prof. T. Mikkonen Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages Master’s thesis May 18, 2021 42 pages Tiivistelmä — Referat — Abstract Isomorfiset web-sovellukset yhdistävät staattisten Hypertext Markup Language (HTML) - sivujen ja Single-page application (SPA) -sovellusten parhaat puolet. Isomorfinen web-sovellus jakaa koodia palvelimen ja käyttöliittymän välillä. Isomorfisista web-sovelluksista ei ole tehty kovinkaan paljoa tieteellistä tutkimusta. Web- sovellusten suorituskyvyn, käyttökokemuksen ja kehittäjäkokemuksen parantaminen on suosittu
    [Show full text]
  • Package 'Webdriver'
    Package ‘webdriver’ January 12, 2021 Title 'WebDriver' Client for 'PhantomJS' Version 1.0.6 Author Ariya Hidayat, Gábor Csárdi, Gabor Torok, Ivan De Marino, Robert Gieseke, Steven Masala, Winston Chang, Zack Weinberg Maintainer Gábor Csárdi <[email protected]> Description A client for the 'WebDriver' 'API'. It allows driving a (probably headless) web browser, and can be used to test web applications, including 'Shiny' apps. In theory it works with any 'WebDriver' implementation, but it was only tested with 'PhantomJS'. License MIT + file LICENSE LazyData true URL https://github.com/rstudio/webdriver BugReports https://github.com/rstudio/webdriver/issues RoxygenNote 6.0.1 Imports callr (>= 3.4.0), base64enc, curl (>= 2.0), debugme, httr, jsonlite, R6, showimage, utils, withr Suggests covr, pingr, rprojroot, servr, testthat Encoding UTF-8 SystemRequirements PhantomJS (http://phantomjs.org/) NeedsCompilation no Repository CRAN Date/Publication 2021-01-12 19:40:02 UTC R topics documented: Element . .2 install_phantomjs . .4 key..............................................5 run_phantomjs . .5 Session . .6 webdriver . .9 Window...........................................9 1 2 Element Index 11 Element HTML element Description HTML element Usage e <- s$findElement(css = NULL, linkText = NULL, partialLinkText = NULL, xpath = NULL) e$findElement(css = NULL, linkText = NULL, partialLinkText = NULL, xpath = NULL) e$findElements(css = NULL, linkText = NULL, partialLinkText = NULL, xpath = NULL) e$isSelected() e$getValue() e$setValue(value) e$getAttribute(name) e$getClass() e$getCssValue(name) e$getText() e$getName() e$getData(name) e$getRect() e$isEnabled() e$click() e$clear() e$sendKeys(...) e$moveMouseTo(xoffset = NULL, yoffset = NULL) e$executeScript(script, ...) e$executeScriptAsync(script, ...) Arguments e An Element object. s A Session object. css Css selector to find an HTML element.
    [Show full text]
  • Automated Testing of Database Driven Applications
    Automated Testing of Database Driven Applications PhD Thesis Dissertation Maryam Abdul Ghafoor 2015-03-0036 Advisor: Dr. Junaid Haroon Siddiqui Department of Computer Science School of Science and Engineering Lahore University of Management Sciences December, 2019 Dedicated to the faults in programs that make the possible; impossible. Hence making THIS WORK possible! Acknowledgements Someone said, and I quote, ”Diamond is just a piece of coal pressed hard under the ground for a long time.” Yes! It’s all about the journey of coal turning into a diamond. What a journey it was. My journey of Ph.D. was as straight as a sine wave that started with fuel of hope, motivation, and aspirations. There were peaks of achievements gained through constant hard work and also troughs of dead-ends in research apparently leading nowhere but then followed by the momentum of guidance of my advisor that takes a new twist and turns to continue this fantastic journey. What a test of patience it was! First and foremost, I would like to thank the One, who gave me strength when I was weak, courage when I was unsure of my circumstances and showed me the way even in the darkest night of my life. Thank you, Allah. I would like to express sincere gratitude and special thanks to my advisor, Dr. Junaid Haroon Siddiqui. I consider my self to be extremely privileged to have been part of his research group. You have been a tremendous mentor. You inspired me to start this journey. Your immense knowledge, valuable guidance, and constant effort assisted me in my research.
    [Show full text]
  • Preview Phantomjs Tutorial (PDF Version)
    PhantomJS About the Tutorial PhantomJS is a lightweight headless browser built on WebKit. It is called headless because the execution does not happen on the browser, but on the terminal. This tutorial covers most of the topics required for a basic understanding of PhantomJS. Additionally, this tutorial also explains how to deal with its various components and to get a feel of how it works. Audience This tutorial is designed for those programmers who want to learn the basics of PhantomJS and its programming concepts. It will give you enough understanding on various functionalities of PhantomJS with suitable examples. Prerequisites Before proceeding with this tutorial, you should have a basic understanding of HTML, CSS, JavaScript, and Document Object Model (DOM). Copyright and Disclaimer Copyright 2017 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected] i PhantomJS Table of Contents About the Tutorial ...........................................................................................................................................
    [Show full text]
  • Casperjs Documentation Release 1.1.0-DEV
    CasperJs Documentation Release 1.1.0-DEV Nicolas Perriault September 08, 2016 Contents 1 Installation 3 1.1 Prerequisites...............................................3 1.2 Installing from Homebrew (OSX)....................................3 1.3 Installing from npm...........................................4 1.4 Installing from git............................................4 1.5 Installing from an archive........................................5 1.6 CasperJS on Windows..........................................5 1.7 Known Bugs & Limitations.......................................6 2 Quickstart 7 2.1 A minimal scraping script........................................7 2.2 Now let’s scrape Google!........................................8 2.3 CoffeeScript version...........................................9 2.4 A minimal testing script......................................... 10 3 Using the command line 11 3.1 casperjs native options.......................................... 12 3.2 Raw parameter values.......................................... 13 4 Selectors 15 4.1 CSS3................................................... 15 4.2 XPath................................................... 16 5 Testing 17 5.1 Unit testing................................................ 17 5.2 Browser tests............................................... 18 5.3 Setting Casper options in the test environment............................. 19 5.4 Advanced techniques........................................... 20 5.5 Test command args and options....................................
    [Show full text]