Automatic functional tests are a long-standing issue in software development projects, and they are still carried out manually. The Selenium testing framework has gained popularity as an active community and standard environment for automated assessment of web applications. As a result, the trend setting of web services is evolving on a daily basis, and there is a need to improve automatic testing. The study involves to make the system to understand the experiences of previous test cases and apply new cases to predict the status of test case using Tanh activated Clustering and Classification model (TACC). The primary goal is to improve the model's clustering and classification output. The outcomes show that the TACC model has increased performance and demonstrated that automated testing results can be predicted, which is cost effective and reduces manual effort to a greater extent.
Energy efficient semiconductor chips are in high demand to cater the needs of today’s smart products. Advanced technology nodes insert high design margins to deal with rising variations at the cost of power, area and performance. Existing run time resilience techniques are not cost effective due to the additional circuits involved. In this paper, we propose a design time resilience technique using a clock stretched flip-flop to redistribute the available slack in the processor pipeline to the critical paths. We use the opportunistic slack to redesign the critical fan in logic using logic reshaping, better than worst case sigma corner libraries and multi-bit flip-flops to achieve power and area savings. Experimental results prove that we can tune the logic and the library to get significant power and area savings of 69% and 15% in the execute pipeline stage of the processor compared to the traditional worst-case design. Whereas, existing run time resilience hardware results in 36% and 2% power and area overhead respectively.
With cloud computing systems becoming popular, it has been a hotspot to design a scalable, highly available and cost-effective data platform. This paper proposed such a data platform using MySQL DBMS blocks. For scalability, a three-level (system, super-cluster, cluster) architecture is applied, making it scalable to thousands of applications. For availability, we use asynchronous replication across geographically dispersed super clusters to provide disaster recovery, synchronous replication within a cluster to perform failure recovery and hot standby or even process pair mechanism for controllers to enhance fault tolerance. For resource utility, we design a novel load balancing strategy by exploiting the key property that the throughput requirement of web applications is flucatuated in a time period. Experiments with NLPIR dataset indicate that the system can scale to a large number of web applications and make good use of resources provided.
The work is devoted to the research of sources of risks of formation and management of human resources of the company and the development of a project of an information system to minimize the risks of dismissal. Existing approaches to employee incentives and programmatic decisions on the human capital accounting are described. This work analyzes the most famous modern information systems for monitoring and management of personnel. A target tree has been built to address the current problematic situation. Alternative means for the realization of the project of the information system considering the peculiarities of the scope are considered. The hierarchy of the general purpose of choosing the optimal means of implementing the information system for minimizing the risks of personnel management is presented. Using the method of analytical hierarchy, the priorities of alternatives relative to the focus are calculated. The most appropriate project implementation for such a system is to use the WordPress platform. A complex of UML diagrams was developed for the project implementation. The structure of the project in the form of WBS is given. Gantt chart, which shows in detail the schedule of information system design. To track all possible deviations of the project, the critical path of the project is calculated. The prototype information system for minimizing the risks of dismissal of workers runs on an Apache Web Server using MySQL as a database. The design was based on a suite of tools for creating WordPress sites and web applications. The project of the information system implements the policy of identification and management of risks associated with the outflow of valuable employees, describes and allows to regulate the procedure of identification and accounting of employees who are the sole owners of project knowledge. It also defines the sequence of steps that make it impossible to incur the risks associated with the outflow of staff, complicate, and/or slow down the process. The information system in the field of software development, database design, and support of existing information systems is offered.
Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In the second quarter of 2020, Wearesocial released information related to internet users in the world around 4.54 billion with 59% penetration. People become very dependent on the internet and also technology. This condition was also triggered due to the Covid-19 pandemic.One thing that becomes an issue on website application security is internet attacks on website platforms and we never expected the vulnerability. One type of attack or security threat that often arises and often occurs is Cross Site Scripting (XSS). XSS is one of Top 10 Open Web Application Security Projects (OWASP) lists.There are several alternatives that we can use to prevent cyber-attack. OWASP Security Shepherd can be used as a way to prevent XSS attacks. The OWASP Security Shepherd project allows users to learn or develop their manual penetration testing skills. In this research, there are several case examples or challenges that we can use as a simulation of the role of OWASP Security Shepherd to detect this XSS. The purpose of this paper is to conduct a brief and clear review of technology on OWASP Security Shepherd. This technology was chosen as an appropriate and inexpensive alternative for users to ward off XSS attacks.