Reconstructing Traceability between Bugs and Test Cases: An Experimental Study

Author(s):  
Nilam Kaushik ◽  
Ladan Tahvildari ◽  
Mark Moore
Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6131
Author(s):  
Mamun Abu-Tair ◽  
Soufiene Djahel ◽  
Philip Perry ◽  
Bryan Scotney ◽  
Unsub Zia ◽  
...  

Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them. An experimental study is performed to provide more insights about the suitability of several lightweight cryptographic algorithms for use in securing the constrained IoT devices used in the proposed architecture. The obtained results showed that many modern lightweight symmetric cryptography algorithms, as CLEFIA and TRIVIUM, are optimized for hardware implementations and can consume up to 10 times more energy than the legacy techniques when they are implemented in software. Moreover, the experiments results highlight that CLEFIA significantly outperforms TRIVIUM under all of the investigated test cases, and the latter performs 100 times worse than the legacy cryptographic algorithms tested.


2022 ◽  
pp. 671-686
Author(s):  
Manoj Kumar Pachariya

This article presents the empirical study of multi-criteria test case prioritization. In this article, a test case prioritization problem with time constraints is being solved by using the ant colony optimization (ACO) approach. The ACO is a meta-heuristic and nature-inspired approach that has been applied for the statement of a coverage-based test case prioritization problem. The proposed approach ranks test cases using statement coverage as a fitness criteria and the execution time as a constraint. The proposed approach is implemented in MatLab and validated on widely used benchmark dataset, freely available on the Software Infrastructure Repository (SIR). The results of experimental study show that the proposed ACO based approach provides near optimal solution to test case prioritization problem.


2020 ◽  
Vol 8 (2) ◽  
pp. 23-37
Author(s):  
Manoj Kumar Pachariya

This article presents the empirical study of multi-criteria test case prioritization. In this article, a test case prioritization problem with time constraints is being solved by using the ant colony optimization (ACO) approach. The ACO is a meta-heuristic and nature-inspired approach that has been applied for the statement of a coverage-based test case prioritization problem. The proposed approach ranks test cases using statement coverage as a fitness criteria and the execution time as a constraint. The proposed approach is implemented in MatLab and validated on widely used benchmark dataset, freely available on the Software Infrastructure Repository (SIR). The results of experimental study show that the proposed ACO based approach provides near optimal solution to test case prioritization problem.


2012 ◽  
Vol 134 (11) ◽  
Author(s):  
Pengfei Li ◽  
John E. Seem ◽  
Yaoyu Li

Calculation of time derivatives of refrigerant pressures is important for dynamic simulation of heat exchangers in vapor compression cycles, i.e., typically the condenser and evaporator. This technical brief presents an experimental study on the pressure transient for the condenser and evaporator of a screw chiller with R134a, along with the analysis for the associated time derivatives. The experimental results from eight test cases suggest that the time derivatives of the condenser and evaporator pressures at their inlet are extremely close to those at the respective outlets. This observation can thus justify the key assumption of equal time derivatives of pressures in the dynamic modeling of heat exchangers, which in consequence improves the numerical efficiency and/or convergence, especially for large and complex thermal-fluid systems.


2019 ◽  
Vol 8 (3) ◽  
pp. 1732-1738

Recently, security has become the prime concern for any organization and other civil and military applications. In this field of security, the data security during communication over an insecure wireless channel is the most important task which can be done by performing cryptography, watermarking and steganography. However, cryptography and watermarking schemes can be identified easily because of change in the data structure hence attackers can focus on that particular part to hack the secret information whereas steganography is a hiding mechanism in which secret message can be concealed into the cover and it can be retrieved at the receiver end. Several techniques have been introduced during last decade which are focused on image-image steganography and audio steganography. In the proposed work, we concentrate on audio steganography and develop a novel approach where secret message can be in the form of plain text or image, whereas cover message is in the form of audio. In order to provide additional security to this model we incorporate AES encryption scheme where secret message is encrypted and hidden in the cover audio. The proposed approach uses DCT coefficient computation and AES encryption scheme. An extensive experimental study is carried based on different test cases and evaluated against state-of-art techniques. The experimental study shows that the proposed approach achieves better performance for audio steganography.


Author(s):  
П.А. Поливанов ◽  
А.А. Сидоренко

An experimental study of pulsations characteristics of the zone of flow separation arising at a small airplane-type UAV with a pushing two-blade propeller were carried out. The measurements were done in wind tunnel by unsteady pressure sensors and microphones built into the skin of the UAV for the test cases with and without a rotating propeller. A significant effect of the propeller on the level of pulsations was found. An increase of the incoming flow velocity led to a weakening of this effect. Analysis of the spectral data of the disturbances did not reveal a direct relationship between the propeller noise and the unsteady characteristics of the separation zone.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Ana Rosario Espada ◽  
María del Mar Gallardo ◽  
Alberto Salmerón ◽  
Pedro Merino

This paper presents the foundations and the real use of a tool to automatically detect anomalies in Internet traffic produced by mobile applications. In particular, our MVE tool is focused on analyzing the impact that user interactions have on the traffic produced and received by the smartphones. To make the analysis exhaustive with regard to the potential user behaviors, we follow a model-based approach to automatically generate test cases to be executed on the smartphones. In addition, we make use of a specification language to define traffic patterns to be compared with the actual traffic in the device. MVE also includes monitoring and verification support to detect executions that do not fit the patterns. In these cases, the developer will obtain detailed information on the user actions that produce the anomaly in order to improve the application. To validate the approach, the paper presents an experimental study with the well-known Spotify app for Android, in which we detected some interesting behaviors. For instance, some HTTP connections do not end successfully due to timeout errors from the remote Spotify service.


Materials ◽  
2020 ◽  
Vol 13 (6) ◽  
pp. 1358
Author(s):  
Xunchang Li ◽  
Rui Xu ◽  
Wei Yang ◽  
Pingan Li ◽  
Ke Yang ◽  
...  

This paper aimed to perform systematical study on the distribution of landslide thrust in pile-anchor support system, which has been a widely applicable treatment method in landslide control with safety, highly efficiency and adaptation. The advantage of photoelastic technique is visualization of strain and stress fields, therefore photoelastic model tests are conducted to show the distribution of landslide thrust in pile-anchor structure before failure in landslide. The effects of different materials and pile lengths are investigated by 6 photoelastic test cases under different loading conditions. It can be found from quantitative analysis of experimental results that load proportion of anchor would increase gradually with the decrease of pile embedded depth or the increase of landslide thrust force. Meanwhile, landslide thrust distribution in pile-anchor structure is directly affected by the stiffness of piles. The pile-anchor structure is significantly better at reducing bending moment value and optimizing bending moment distribution of pile. Finally, some theoretical analysis and design suggestions are proposed based on the experimental study.


Author(s):  
LEI ZHAO ◽  
ZHENYU ZHANG ◽  
LINA WANG ◽  
XIAODAN YIN

Coverage-based fault localization (CBFL) techniques contrast the execution spectra of a program entity to assess the extent of how much a program entity is being related to faults. However, different test cases may result in similar executions, which further make the execution spectra of program entities be indistinguishable among similar executions. As a consequence, most of the current CBFL techniques are impacted by the noise of indistinguishable spectra. To alleviate the impact of execution similarity and improve the effectiveness of CBFL techniques, we propose a general fault localization framework. This framework is general to current execution spectra based CBFL techniques, which could synthesize a fault localization technique based on a given base technique. To synthesize the new technique, we use the concept of coverage vector to model execution spectra and capture the execution similarity, then reduce the impact of execution similarity by counting distinct coverage vectors, and finally assess the suspiciousness of basic blocks being related to faults with the spectra of distinct coverage vectors. We adopt four representative fault localization techniques as base techniques, use seven Siemens programs and three median-sized real-life UNIX utility programs as subject programs, to conduct an experimental study on the effectiveness of our framework. The empirical evaluation shows that our framework can effectively alleviate the impact of execution similarity and generate more effective fault localization techniques based on existing ones.


Sign in / Sign up

Export Citation Format

Share Document