Fault Analysis in Software with the Data Interaction of Classes
|
|
|
- Myron Carpenter
- 10 years ago
- Views:
Transcription
1 , pp Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental Engineering Laboratory, Beihang University, Beijing , China 2 Science & Technology on Reliability & Environmental Engineering Laboratory, Beihang University, Beijing , China [email protected] 1, [email protected] 2 Abstract With the development of science, software becomes more and more complex, which makes it difficult to do fault propagation analysis. Software Network is a general tool in studying fault propagation, but because of the diversification of software s architecture, we can no longer oversimplify the data flow of nodes in the software network which is universal in conventional method to analyze fault propagation. This paper put forward a new structure Class Interactive Network based on the data interaction of classes in software to analyze software s fault propagation in the class hierarchy and simulate software classes performance in fault propagation with quantitative analysis in Class Interactive Network. Keywords: Fault Analysis; Class; software; data interaction 1. Introduction Fault analysis is a key link in the whole software reliability research; and there are a lot of researches for the fault analysis at present, most of them are based on Software Network since it was proved that massive software system is a complex network [1-5]. For example, Mac Cormack proposed DSMs method for extracting software source files and dependencies and used The Change of Price to measure error propagation [6]. J. Liu studied on measuring the volatility of software structure by using Software network model [7]. Hassan and Holt presented a propagation model focused on software changes [8]. However, these researches didn t consider the connection of data in different modules of software. Complex software system is under ongoing evolution as a whole [9], so we should consider the data interaction between different nodes in the Software Network. Some researches do consider the connection of different nodes or modules, such as Pan s software quality metrics to describe fault propagation [10], Li s fault propagation model based on signals and module level [11]. But these researches oversimplified the data flow of nodes in the software network, which is also not accurate. In the process of fault propagation, conventional method can t tell the performance of a module or node in software accurately when it has a plurality of outputs, in which situation conventional method can t describe the changes of software structure introduced by the data interaction. So this paper aims to develop a new method that represents Class-calling output network to study the fault propagation in software based on the data interaction in class hierarchy. For the purpose of studying the data connection of different classes in Fault propagation process, Interaction coefficient has been proposed at the first time, which is very valuable in describing the degree of data interaction between different classes. With this concept, some quantitative analysis has been studied and proved. At last, an experiment is designed to prove the correctness of the mode. ISSN: IJSIA Copyright c 2015 SERSC
2 2. Class-calling Output Network Definition 1 Class-calling output network CCON can be represented by directed graph P(M,E), in which M is the set of software s classes and E is a set of directed edges which represents the call relationship for the outputs of different classes and directed by the callee to caller. Which should be noted is that we defined a class s output as a set of outputs of all this class s member functions. Generally speaking, class A have a output A.f(), in which f() is a output of class A s member function, if A.f() call, inheritance or reference class B s output B.h(), then there is call relationship between class A and class B, in which class A is the caller and class B is the callee and we can call class A as the caller-class and call class B as the callee-class. A B C A.a() A.b() A.c() B.d() B.e() C.f() Figure 1. An Example of CCON In this example, A, B, C are three classes of the software, A.a(),A.b(),A.c() are three outputs of class A s member functions. B.d(), B.e() are two outputs of class B s member functions. C.f() is a output of class C s member functions. The arrows indicate the call relationships between these outputs and directed by callee to caller. 3. Interaction Coefficient and Class Interactive Network Definition 2 Interaction coefficient is a description of two adjacent classes strength of data interaction in CCON. Interaction coefficient values between 0-1. The bigger interaction coefficient the two adjacent classes have, the higher degree of data interaction they have. Let U i indicate the number of class i s all member functions outputs in CCON; U ij represent the number of class i s outputs that were called by class j; U j is the number of outputs which belong to class j s member functions ; U j i represent the number of class j s outputs which called class i s outputs. Then we can define the interaction coefficient K ij from class i to class j as: K ij = U ij U i U j i U j (1) For further study, we put forward Class Interactive Network which is transformed from Class-calling output network and easier to realize. Class Interactive Network applies Interaction coefficient to Class-calling output network. We can use directed graph N=(M,C,K) to describe Class Interactive Network. M is the set of software s classes and E is a set of directed edges which represents the call relationship of different classes and directed by the callee-class to caller-class in CCON.K is the set of interaction coefficient in CCON, which contains every edge s interaction coefficient from callee-class to caller-class. For example, if we change the example of CCON above into Class Interactive Network, the conversion is as follows: 190 Copyright c 2015 SERSC
3 A B C A.a() A.b() A.c() B.d() B.e() 2/3 1/2 C.f() A B C Class-calling output network Class Interactive Network Figure 2. The Conversion Example of CCON to Class Interactive Network According to the definition of Class Interactive Network, if we make the value of Interaction coefficient as 1 in Class Interactive Network, then the degree of two adjacent classes rely on each other s data will be the maximum, in which case caller-class will run totally wrong if callee-class has fault. In this situation, our Class Interactive Network will change into conventional method in which the data dependency between different classes is ignored. 4. Fault Classification and Interaction Failure Rate As we know, faults have so many species that we cannot study every kind of their impact on software. Some faults can cause the software memory overflow, but most of them just make the software to produce output that does not meet the requirements of users [10]. To simplify the problem, we divided fault into two types in CCON: physical fault and interactive fault. Physical fault is the situation that the machine registers and other hardware devices have errors or there is data error in member function of class. Interactive fault represents the situation that a class calls the wrong data as input, resulting in the error of output where the class may have right outputs given correct inputs. What should be noted that we assume the physical fault is the cause of interactive fault. So the fault propagation in this paper can be denoted as 3 cases: a. Callee-class has physical fault in which case the caller-class will get error input and have error output. b. Callee-class has interactive fault in which case the caller-class will have interactive fault either. c. Callee-class has no fault in which case the caller-class will have error output only if the caller-class has physical fault. Obviously, we can define the fault propagation as the circulation of case a and case b. According to the definition of Interaction coefficient, we can use Interaction coefficient to denote the probability of case a and case b between two adjacent classes, but for any two classes in a software, it will fail when there have different paths between class A and class B in the Class Interactive Network. So, combined with fault classification above, we put forward the concept of Interaction Failure Rate to describe two classes data interaction strength in this situation. Definition 3 Interaction Failure Rate indicates the possibility that the caller-class have interactive fault caused by callee-class physical fault or interactive fault in the Class Interactive Network. If class i is the callee-class, class j is the caller-class. G is the set of all paths directed by class i to class j. K ijp is the Interaction coefficient between class i and class j through path p in the Class Interactive Network. R p is the set of Interaction coefficient K on path p. Then we can define Interaction Failure Rate S ij from class i to class j as : S ij = p G K ijp (2) K ijp = K K R p (3) Copyright c 2015 SERSC 191
4 For example, in the example of Class Interactive Network above, there is a path p between class A and class C:A B C, R p ={2/3,0.5}. Then the Interaction Failure Rate between class A and class C is S AB =K ABp =2/3 1/2. According to the definition of Interaction Failure Rate, if there is only one path between two classes i and j, then the Interaction Failure Rate S ij is the same as Interaction coefficient K ij from class i to class j, so Interaction coefficient is the exceptional of the Interaction Failure Rate. As an extension of Interaction coefficient, Interaction Failure Rate is a description of any two classes data interaction strength in the Class Interactive Network. The bigger Interaction Failure Rate to two classes, the higher degree that the two classes rely on each other s data, in which situation that caller-class is more prone to have interactive fault when the callee-class have physical fault or interactive fault. 5. Interaction Factor In the fault propagation process, it s difficult to make measurement methods to describe fault propagation process exactly. This is due to the software complexity of the structure itself, but we can build some quantitative indicators to estimate the impact of software s structure. To achieve it, we put forward Interaction coefficient and Interaction Failure Rate to describe mutual influence between the two classes, which can t describe the impact of a class to whole software. So we propose Interaction factor. Interaction factor T i indicates class i s ability to spread fault in the Class Interactive Network. Using directed graph N=(M,C,K) to describe Class Interactive Network, S ij represents the Interaction Failure Rate from class i to class j, then class i s Interaction factor T i : T i = j M,j i S ij (4) According to the formula above, Interaction factor T i is the sum of Interaction Failure Rate from class i to all of the rest classes. If class i has a great value of Interaction factor T i, then other classes have great possibilities to get interactive fault when class i has interactive fault or physical fault. Because of this property of Interaction factor, software analyst can get theoretical value of software s classes by building the Class Interactive Network. Then analyst can simulate software classes fault propagation process by counting Interaction factor of classes timely. 6. Fault Propagation based on the Data Interaction of Classes As a conclusion, our quantitative analysis put forward a probability model of fault propagation in the class hierarchy. In this paper, the source of fault propagation is physical fault in a class which can be a bug, a defect of algorithm, a program error or even a failure of hardware, the physical fault may cause other interactive faults in different classes. What should be noted is that we don t consider the specific of faults, in this paper, the trend of fault propagation is what we focused on. The architecture or our model is shown as below: a. Construct the CCON of software b. Get the Class Interactive Network and Interaction coefficient c. Calculate the Interaction Failure Rate and Interaction factor d. Quantitative analysis for fault propagation 7. Tests To test the validity of the theory, we did fault injection experiment to the SHA-1 software. The SHA-1 program is a classic algorithm used to encrypt the information 192 Copyright c 2015 SERSC
5 processing. The program is an iterative procedure which has 80 rounds of iteration. In order to avoid redundancy, the test only selected the first 20 rounds of iteration of SHA-1 as the experimental object. Table 1. The Theoretical Value of Interactive Factor in Class Interactive Network Table 1 the theoretical value of Interactive factor in Class Interactive Network classes 1(round) ft S_ XOR_ XOR_ S_ Table 2. The Number of Fault Classes in the Fault Propagation Experiment Table 2 the number of fault classes classes 1(round) ft S_ XOR_ XOR_ S_ In the test, we made three groups of contrast experiments. At the first experiment, we built Class Interactive Network for SHA-1 program and calculated every class s Interaction factor in every round by the definition. In the second experiment, we did the first experiment again but made the value of Interaction coefficient as 1 in Class Interactive Network this time, in which situation that Class Interactive Network is the same as conventional method. The last experiment is a fault propagation experiment, we inserted physical fault into every class in program and got the statistical number of fault classes in the process of program operation in every round. According to the theory above, we could insert a data error into class s member functions to make class produce physical fault. To be brief, we selected class ft as an example to analyze the result, Other classes were very similar to class ft. The experimental results are shown in Figure 3: Interaction factor Interaction factor fault classes round round (a)the model of Class (b) Conventional method (c) fault propagation Interactive Network experiment Figure 3. The Experimental Results round Copyright c 2015 SERSC 193
6 As can be seen from the graph above, the Interaction factor of class ft has a steady increasing from round 1 to round 5 and then reaches an equilibrium state in the model of Class Interactive Network. In conventional method, the Interaction factor of class ft reaches the max value after the first round which is very abrupt. In the fault propagation experiment, the number of classes that get interactive fault caused by class ft s physical fault has a steady increasing from round 1 to round 5 and then reaches an equilibrium state after round 5, which is very similar to the variation of interaction factor in the model of Class Interactive Network. In order to avoid the divergence caused by the results of experiment data in different units, we processed the test data with the following formula: E n = I n I 1 I max I 1 (5) In the first and second experiment,i n is the Interaction factor of class ft in the nth round. I max is the max Interaction factor of class ft in the experiment. In the fault propagation experiment, I n is the number of fault classes in nth round, I max is the max number of fault classes in the fault propagation experiment. E n is the percentage of data changing. It is necessary to minus I 1 to balance the divergence caused by the results of experiment data in different units. The results are as follows: the model of Class Interactive Network conventional method fault propagation experiment E n 0.5 Figure 4. The Result of Data Changing As we can see in the graph, the percentage of data changing E n has a great change from round 1 to round 2 in conventional method, which is overhyped 100%. At the same time, the performance of model of Class Interactive Network is very similar to the actual situation of the fault propagation. So we can simulate one class s fault propagation with the model of Class Interactive Network. Table 1 is the result of the theoretical value of Interaction factor in the model of Class Interactive Network. Table 2 is the result of the number of classes that get interactive fault caused by specific class's physical fault in fault propagation experiment. From the tables, we can see that class A s Interaction factor in every round is in direct proportion to the number of fault classes caused by class A s fault every round in fault propagation process. If two classes had similar Interaction factor like class S_5 and class XOR_1, the number of fault classes caused by them were nearly the same in every round. So it is feasible to simulate classes process of fault propagation with Interaction factor. 8. Conclusion round Class-calling output network CCON is suitable in analyzing software s data structure in the class hierarchy and Interaction factor T i does indicates class i s ability to spread fault in the Class Interactive Network. With the model of Class Interactive Network, we can simulate software s fault propagation on class hierarchies by analyzing Interaction 194 Copyright c 2015 SERSC
7 factor of classes. It also provides theoretical help in further improving the reliability of software and finding the vulnerabilities in a software. Acknowledgements I am grateful to Mr. Wang, Yichen, and Associate professor, Science & Technology on Reliability & Environmental Engineering Laboratory, Beihang University for his invaluable assistance, counsel and acute criticism. References [1] C. R. Myers, Software systems as complex networks: Structure, function, and evolvability of software collaboration graphs [J], Journal of Physical review, vol. 68, nos. 2, 4, (2003), p. 15. [2] K. He, B. Li and Y. Ma, Software network [M], Beijing: Science Press, (2008). [3] B. Li, Y. Ma and J. Liu, The progress in the study of complex networks [J], Advances in Mechanics, vol. 38, no. 06, (2006), pp [4] D. Yan and G. Qi, The scale-free feature and evolving model of large-scale software systems [J], Chinese Journal of Physics, vol. 55, no. 08, (2006), pp [5] Y. Ma and K. He, Empirical Study on the Characteristics of Complex Networked Software [J], Journal of Software, vol. 22, no. 3, (2011), pp [6] A. Mac Cormack, J. Rusnak and C. Y. Baldwin, Exploring the structure of complex software designs: An empirical study of open source and proprietary code [J], Management Science, vol. 52, no. 7, (2006), pp [7] J. Liu, J. Li and K. He, Characterizing the Structural Quality of General Complex Software Network [J], International Journal of Bifurcation and Chaos, vol. 18, no. 4, (2008), pp [8] H. A. E. and R. C. Holt, Predicting Change Propagation In Software System [C], In Proceeding(s) of the 20th IEEE Conference International Conference on Software Maintenance, Chicago, IL,USA, (2004), pp [9] H. Wang and W. Wu, Development of complex software systems structure and adaptive evolution [J], China Science Information Science, vol. 44, (2014), pp [10] W. Pan and B. Li, Quality metric of software based on software network error propagation [A], Journal of Central South University, Natural Science Edition, vol. 43, no. 11, (2012)-11. [11] A. Li, Error propagation analysis in the software [J], Computer research and development, vol. 44, no. 11, (2007), pp Authors Yan Xiaobo, he was born in He is a master at Beihang University. His research interests include software fault propagation, software testing, etc. Wang Yichen, he was born in He is a Master supervisor and Senior Engineer at Beihang University. His research interests include software fault propagation, software testing, Analysis of embedded software fault etc. Copyright c 2015 SERSC 195
8 196 Copyright c 2015 SERSC
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
UPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
An Imbalanced Spam Mail Filtering Method
, pp. 119-126 http://dx.doi.org/10.14257/ijmue.2015.10.3.12 An Imbalanced Spam Mail Filtering Method Zhiqiang Ma, Rui Yan, Donghong Yuan and Limin Liu (College of Information Engineering, Inner Mongolia
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,
A Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
Effects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
ATM Network Performance Evaluation And Optimization Using Complex Network Theory
ATM Network Performance Evaluation And Optimization Using Complex Network Theory Yalin LI 1, Bruno F. Santos 2 and Richard Curran 3 Air Transport and Operations Faculty of Aerospace Engineering The Technical
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
How To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
BSPCloud: A Hybrid Programming Library for Cloud Computing *
BSPCloud: A Hybrid Programming Library for Cloud Computing * Xiaodong Liu, Weiqin Tong and Yan Hou Department of Computer Engineering and Science Shanghai University, Shanghai, China [email protected],
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
Preventing and Detecting Plagiarism in Programming Course
, pp.269-278 http://dx.doi.org/10.14257/ijsia.2013.7.5.25 Preventing and Detecting Plagiarism in Programming Course Wang Chunhui, Liu Zhiguo and Liu Dongsheng Computer & Information Engineering College,
Scientific Collaboration Networks in China s System Engineering Subject
, pp.31-40 http://dx.doi.org/10.14257/ijunesst.2013.6.6.04 Scientific Collaboration Networks in China s System Engineering Subject Sen Wu 1, Jiaye Wang 1,*, Xiaodong Feng 1 and Dan Lu 1 1 Dongling School
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Network Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain
Send Orders for Reprints to [email protected] 384 The Open Cybernetics & Systemics Journal, 2015, 9, 384-389 Open Access Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge
Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks
Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks Benjamin Schiller and Thorsten Strufe P2P Networks - TU Darmstadt [schiller, strufe][at]cs.tu-darmstadt.de
A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce
, pp.231-242 http://dx.doi.org/10.14257/ijsia.2014.8.2.24 A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao School
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
A Systematic Review of Software Process Improvement by CMMI
, pp.21-26 http://dx.doi.org/10.14257/ijseia.2014.8.2.03 A Systematic Review of Software Process Improvement by CMMI Poonam Dhankhar 1 and Anil Kumar Mishra 2 1 M.Tech (Software Engineering) 2 Assistant
Function and Structure Design for Regional Logistics Information Platform
, pp. 223-230 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.22 Function and Structure Design for Regional Logistics Information Platform Wang Yaowu and Lu Zhibin School of Management, Harbin Institute of
Software Testing Strategies and Techniques
Software Testing Strategies and Techniques Sheetal Thakare 1, Savita Chavan 2, Prof. P. M. Chawan 3 1,2 MTech, Computer Engineering VJTI, Mumbai 3 Associate Professor, Computer Technology Department, VJTI,
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups
An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,
A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks
, pp.100-104 http://dx.doi.org/10.14257/astl.2014.45.19 A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks Li Ma 1,2,3, Jingzhou Yan 1,2,Kuo Liao 3,4, Shuangshuang Yan
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research
Modern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
International Language Character Code
, pp.161-166 http://dx.doi.org/10.14257/astl.2015.81.33 International Language Character Code with DNA Molecules Wei Wang, Zhengxu Zhao, Qian Xu School of Information Science and Technology, Shijiazhuang
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
An Empirical Analysis on the Performance Factors of Software Firm
, pp.121-132 http://dx.doi.org/10.14257/ijseia.2014.8.7,10 An Empirical Analysis on the Performance Factors of Software Firm Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi and Jae-Sung Choi #3-707, DGIST,
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
An Analysis of Regenerative Braking and Energy Saving for Electric Vehicle with In-Wheel Motors
, pp. 219-23 http://dx.doi.org/1.14257/ijca.214.7.12.2 An Analysis of Regenerative Braking and Energy Saving for Electric Vehicle with In-Wheel Motors 1 Li-qiang Jin, 2 Peng-fei Chen and 3 *Yue Liu State
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
Software Engineering from an Engineering Perspective: SWEBOK as a Study Object
Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Alain Abran a,b, Kenza Meridji b, Javier Dolado a a Universidad del País Vasco/Euskal Herriko Unibertsitatea b Ecole de technologie
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm
www.ijcsi.org 54 Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm Linan Zhu 1, Qingshui Li 2, and Lingna He 3 1 College of Mechanical Engineering, Zhejiang
Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics
, pp.377-388 http://dx.doi.org/10.14257/ijunesst.2015.8.12.38 Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics Yang Bo School of Information Management Jiangxi University
Modeling Software Maintainability and Quality Assurance in the Agile Environment
, pp.83-90 http://dx.doi.org/10.14257/ijdta.2014.7.3.09 Modeling Software Maintainability and Quality Assurance in the Agile Environment Priyanka Upadhyay, Abhishek Singh and Naveen Garg Department of
Simulating the Structural Evolution of Software
Simulating the Structural Evolution of Software Benjamin Stopford 1, Steve Counsell 2 1 School of Computer Science and Information Systems, Birkbeck, University of London 2 School of Information Systems,
Parallel Compression and Decompression of DNA Sequence Reads in FASTQ Format
, pp.91-100 http://dx.doi.org/10.14257/ijhit.2014.7.4.09 Parallel Compression and Decompression of DNA Sequence Reads in FASTQ Format Jingjing Zheng 1,* and Ting Wang 1, 2 1,* Parallel Software and Computational
Social Network Analysis
A Brief Introduction to Social Network Analysis Jennifer Roberts Outline Description of Social Network Analysis Sociocentric vs. Egocentric networks Estimating a social network TRANSIMS A case study What
The Design and Improvement of a Software Project Management System Based on CMMI
Intelligent Information Management, 2012, 4, 330-337 http://dx.doi.org/10.4236/iim.2012.46037 Published Online November 2012 (http://www.scirp.org/journal/iim) The Design and Improvement of a Software
Large-Scale Data Sets Clustering Based on MapReduce and Hadoop
Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics
Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Kumi Jinzenji NTT Software Innovation Canter NTT Corporation Tokyo, Japan [email protected] Takashi
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
http://www.paper.edu.cn
5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission
The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
An Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers
Journal of Computational Information Systems 9: 7 (23) 689 6829 Available at http://www.jofcis.com An Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers Lianying
[Rokadiya,5(4): October-December 2015] ISSN 2277 5528 Impact Factor- 3.145
INTERNATIONALJOURNALOFENGINEERING SCIENCES&MANAGEMENT A MODEL FOR WEB BASED APPLICATION USING MANUAL AND AUTOMATED TESTING TECHNIQUES AND ALSO STUDY FAULTS, THEIR EFFECTS AND TESTING CHALLENGES IN WEB
Estimating Software Reliability In the Absence of Data
Estimating Software Reliability In the Absence of Data Joanne Bechta Dugan ([email protected]) Ganesh J. Pai ([email protected]) Department of ECE University of Virginia, Charlottesville, VA NASA OSMA SAS
Enterprise Computer Network Reliability Analysis
, pp. 285-294 http://dx.doi.org/10.14257/ijmue.2015.10.1.28 Enterprise Computer Networ Reliability Analysis Yongfeng Cui, Wei Liu and Ya Li School of Science and Technology, Zhouou Normal University, Zhouou
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
Processing and data collection of program structures in open source repositories
1 Processing and data collection of program structures in open source repositories JEAN PETRIĆ, TIHANA GALINAC GRBAC AND MARIO DUBRAVAC, University of Rijeka Software structure analysis with help of network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
An Empirical Study on the Performance of Software Company with Software Type
, pp.56-60 http://dx.doi.org/10.1257/astl.201.8.11 An Empirical Study on the Performance of Software Company with Software Type Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi, Jae-Sung Choi #3-707, DGIST,
. 1/ CHAPTER- 4 SIMULATION RESULTS & DISCUSSION CHAPTER 4 SIMULATION RESULTS & DISCUSSION 4.1: ANT COLONY OPTIMIZATION BASED ON ESTIMATION OF DISTRIBUTION ACS possesses
MVC Architecture Driven Design and Implementation of Java Framework for Developing Desktop Application
, pp.317-322 http://dx.doi.org/10.14257/ijhit.2014.7.5.29 MVC Architecture Driven Design and Implementation of Java Framework for Developing Desktop Application Iqbal H. Sarker and K. Apu Department of
Research on the Income Volatility of Listed Banks in China: Based on the Fair Value Measurement
Research on the Income Volatility of Listed Banks in China: Based on the Fair Value Measurement Pingsheng Sun, Xiaoyan Liu & Yuan Cao School of Economics and Management, North China Electric Power University,
Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur
Module 2 Software Life Cycle Model Lesson 4 Prototyping and Spiral Life Cycle Models Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a prototype is.
A Resilient Device Monitoring System in Collaboration Environments
, pp.103-114 http://dx.doi.org/10.14257/ijsh.2014.8.5.10 A Resilient Device Monitoring System in Collaboration Environments KeeHyun Park 1 and JongHwi Lee 1 Department of Computer Engineering, Keimyung
The WAMS Power Data Processing based on Hadoop
Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore The WAMS Power Data Processing based on Hadoop Zhaoyang Qu 1, Shilin
OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP
OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP Xing Xu School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: [email protected]
Study on Human Performance Reliability in Green Construction Engineering
Study on Human Performance Reliability in Green Construction Engineering Xiaoping Bai a, Cheng Qian b School of management, Xi an University of Architecture and Technology, Xi an 710055, China a [email protected],
Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1
, pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and
A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain
International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin
EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS
EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS Umamaheswari E. 1, N. Bhalaji 2 and D. K. Ghosh 3 1 SCSE, VIT Chennai Campus, Chennai, India 2 SSN College of
Tracking Software Development Progress with Earned Value and Use Case Point
ISBN 978-952-5726-06-0 Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, November 21-22, 2009 Tracking Software Development Progress with
Analyzing Download Time Performance of University Websites in India
, pp.1-6 http://dx.doi.org/10.14257/ijwse.2014.1.1.01 Analyzing Time Performance of University Websites in India G. Sreedhar Associate Professor Department of Computer Science, Rashtriya Sanskrit Vidyapeetha
Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING
Study of Lightning Damage Risk Assessment Method for Power Grid
Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. Presenter: Sancheng Peng Zhaoqing University
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Presenter: Sancheng Peng Zhaoqing University 1 2 3 4 35 46 7 Contents Introduction Relationship between SIA and BD
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Overview Software testing is a verification process in which an application of the software or the program meets the business requirements and technology that have dominated
