Bug Detection Using Particle Swarm Optimization with Search Space Reduction
|
|
- Marilynn King
- 8 years ago
- Views:
Transcription
1 2015 6th International Conference on Intelligent Systems, Modelling and Simulation Bug Detection Using Particle Swarm Optimization with Search Space Reduction Arun Reungsinkonkarn Department of Computer Information System Assumption University Paskorn Apirukvorapinit Faculty of Information Technology Thai-Nichi Institute of Technology Abstract A bug detection tool is an important tool in software engineering development. Many research papers have proposed techniques for detecting software bug, but there are certain semantic bugs that are not easy to detect. In our views, a bug can occur from incorrect logics that when a program is executed with a particular input, the program will behave in unexpected ways. In this paper, we propose a method and tool for software bugs detection by finding such input that causes an unexpected output guided by the fitness function. The method uses a Hierarchical Similarity Measurement Model (HSM) to help create the fitness function to examine a program behavior. Its tool uses Particle Swarm Optimization (PSO) with Search Space Reduction (SSR) to manipulate input by contracting and eliminating unfavorable areas of input search space. The programs under experiment were selected from four different domains such as financial, decision support system, algorithms and machine learning. The experimental result shows a significant percentage of success rate up to 93% in bug detection, compared to an estimated success rate of 28% without SSR. Keywords- Bug Detection; Fitness Function; Hierarchical Similarity Measurement Model (HSM); Particle Swarm Optimization (PSO); Optimization. I. INTRODUCTION A software bug is any fault or error which causes an unexpected results or an unintended behavior in computer programs. There are several reasons why bugs occur ranging from human error in code implementation to design errors from frameworks and operating system [1][2]. On the other hand, an error that caused by programmers unintentional coding logic is called semantic bug. To further explain, software bug behaves abnormally in program execution which results in unexpected outcomes. A particular bug can be a major root cause for a costly system failure. Sponsor by Bangkok University To develop a bug detection tool, several techniques have been proposed, however, their effectiveness are largely based on types of bugs [3][4][13]. Optimization is one of techniques which using in software bug detection including Particle Swarm Optimization (PSO), Genetic Algorithm, and Evolutionary Computation [14][15]. Each appropriates for different situation [5]. For example, PSO is used in test case generation in order to reach a global maximal while reduce number of test case significantly [6][12]. There is research paper that indicates the strategy so called Boolean formula which automatically generates test data for any implementations intended to expected specification. The effectiveness in fault detection of the strategy is identified both analytically and empirically. Yet, costs are evaluated based on compared test set size [7]. In conclusion, a tool of software bug detection is created from the two concepts which are Hierarchical Similarity Measurement Model HSM and Particle Swarm Optimization (PSO) with Search Space Reduction (SSR) [8][9]. HSM facilitates the fitness function creation to detect software behaviors where PSO with SSR manipulates inputs causing the actual output converged to expected output. II. RELATED WORK Organizational Evolutionary PSO has developed to be used in test case generation. It proves the reduction in number of test case by reaching global maximal [6]. Regression and Machine Learning method is also used to validate the predicted fault-proneness of software system. To illustrate, the method is used in Mozilla, the open source web and suite, in order to detect the fault-proneness of the source code. Yet, the metric are applied in several versions of Mozilla in order to observe how it changes during the development phase [10]. Several strategies for test data generation are presented to implement for effective fault detection [7]. Another technique is called Fault Injection, which is used to evaluate web vulnerability scanners. By injecting the common types of software faults in the web application code, results show the coverage of vulnerability and the percentage of false positives [4]. Calysto is another effective tool for automatic bugs detection. This tool is an inter-procedurally path-sensitive, fully-context sensitive, and bit accurate in modeling data operations. The result shows the discovery of bugs, completely automatically, and a very low rate of false error reports [11]. The effectiveness on detection of compiler optimization varies by the different optimization scenarios. Under the same race detection, it can produce different race of detection probabilities [3]. A Hierarchical Similarity Measurement Model (HSM) of program s execution avoids having to explicitly form an equation by working like a Black-box model. It uses a similarity value to compute a fitness function and supports primitive, abstract, and complex data types [8]. Applying the Search Space Reduction (SSR) to Particle Swarm Optimization (PSO) identifies the solution, which is not feasible to be found for problems, by reducing the excessive sexploitation step [9] /15 $ IEEE DOI /ISMS
2 III. BUG DETECTION USING HSM AND PSO WITH SSR A software bug is program error that causes the program to behave in unintentional ways. This research introduces the method and tool of software bug detection based on HSM and PSO-SSR concepts. The tool is classified as a dynamic bug detection tool used during execution. Therefore source code is required for execution but there is no need for analyzing source code. Program specification is used to specify normal behavior and describe the expected output. After executing the program, if the actual output is not equivalent to the expected output, the program has an error. So in order to detect a bug, it is necessary to find an input (if possible) that makes the actual output differ from the expected output. For example, in installment program, the monthly payment should not exceed the principal. The proposed bug detection tool is divided into five parts, as shown in Figure 1. search space reduction. When the input that satisfies a condition of the program behavior is found the tool will store the related input and output with data logging module. Otherwise, the tool will repeat running HSM with PSO-SSR module until resources are exhausted. PSO uses a fitness function as a guide line to find a solution, an input to a program. However, the fitness function is not a typical mathematic equation that can be easily formulated. So HSM is used to help create the fitness function to examine a program behavior. The fitness function is computed, and the value can be between 0 and 1. When the value of the fitness function becomes one, it means that the solution is found. The fitness function is created based on the program behaviors and its expected output. The program behaviors can be a) normal behavior, for example, in the installment program, the principle should be more than zero or there is no negative monthly payment, and b) abnormal behavior, for example, no loan can have a monthly payment exceed the principle. In addition, the fitness function can be written in a form of one-line expression or a function. Stock analysis is program to recommend a stock trader to buy a stock. When the high price (HP) and low price (LP) of the stock are greater than zero, indicating that there is a trading volume in the market, therefore the recommend buying ratio (RBR) shall be more than zero, and RBR and stock trading density (STD) shall be between zero and one. The fitness function can be written as below: If HP >= 0 and LP >= 0 Then RBR < 0 and RBR > 1, STD < 0 and STD > 1 Traveling Salesman Problem (TSP) is another example that a fitness function has to be created with a function because of its behavior s complexity. The behavior of TSP must meet the following conditions: a) home town and last town must be the same, b) there must not be repeated towns in a route, and c) a traveling town must be in the list of towns. The fitness function can be illustrated as in Figure 2. Figure 1. Flow Chart of Research Tool. The input generator consists of a random number generator that randomly selects the input within the boundary of search space. After the input is generated, it will be fed to the execution part. Code execution is performed by C# compiler, and the actual output (AO), expected output (EO) and inputs are stored for every execution. HSM with PSO-SSR is then applied to compare the actual output with the expected output. Data type of output is determined to select an appropriate similarity measurement method (or technique) according to the hierarchical similarity measurement model. The similarity measurement method is calculated to compare the similarity between actual output and expected output. And the similarity value is stored as well. PSO-SSR is a technique, used to find an input, consists of three steps: exploration, exploitation and Figure 2. Example of TSP Fitness Function. 54
3 Figure 3. Screen Shot of the Tool. The Figure 3 illustrates the user interface of the developed tool with a number of essential details and ease of use. IV. EXPERIMENT Programs written for four domains are used in this research; Finance, Decision Support System, Algorithm and Machine Learning. We assume that 1) A program is executable by C# compiler 2) An output of program execution is limited to the data types supported in HSM [8]. The details of each program are shown in Table I. Install ment TABLE I. Application Domain Financial Module Application Type Web Service PROGRAM SELECTION SUMMARY. No. of Input(s) No. of Output(s) LOC Program Complexity Low A. Experiment and Measurements In an experiment, ten particles are generated with random positions of input in the search space boundary. Twenty rounds of exploration with 20 rounds of exploitation per each exploration are executed. In total, 4000 particles with various positions will be executed for each experiment regardless whether the solution is found or not. Moreover the experiment will not stop at the first solution found because the tool may discover more than one solution. The computer specification used to run the experiment is Intel Corei7 2.2 GHz, 8 GB DDR3 of RAM and 1 TB 5,400 rpm of hard disk. To evaluate the performance of the bug detection tool, we define Success Rate (SR). The formula is SR = b / t (1) where b is number of bugs found and t is a total number of bugs fed into a program under experiment. The success rate measures the success in finding input that satisfies the fitness function. Whenever the value of the fitness function becomes one, it means that the bug is found. To determine the complexity of program behavior, we define Behavior Complexity Ratio (BCR) as BCR = 1 (f/e) (2) where e is the maximum round of exploitation and f is the fastest round that a solution is found. When solution is not found, BCR is zero. Behavior Complexity Ratio defines a degree of complexity of program behavior. High value of BCR indicates that the program behavior s complexity is low because the fastest round to a solution found is low, and many of the fitness functions are easy to satisfy. Stock Analys is Decision Support System Win App Medium TSP Algorithm Console App High Naïve Bayes Machine Learning Console App High In our experiment, 29 bugs are seeded into programs for bug detection tool evaluation. Table II shows types of seeded bugs and criteria for program selection and bugs. TABLE II. A CRITERIA S SELECTION SET. Figure 4. Box Plot of the Fastest Round to a Solution Found. Bug seeded in program Incorrect conditions Incorrect calculation operator Incorrect order of calculation Incorrect order of statements Missing line of code Missing operator Criteria in Selecting a Program Various areas of application A certain degree of complexity 200 lines for minimum LOC Criteria in Seeded Bug Easily occurred or reproduced Should not be trivial Not easy to detect manually From Figure 4, the experimental results show that the median of the fastest round to the solution found of all programs are skewed to the left, meaning that the proposed method and tool produce an exceptional performance in detecting the bugs. For the Stock Analysis and Installment, their medians are below 200, indicating that the programs are not very complex, which corresponds to what already stated in the Table 1. For the Travelling Salesman Problem, the median of the fastest round to the solution found is nearly 500, 55
4 implying that the program is rather robust since it took the largest round compared to the other programs. Notice that the bar s length of the Naïve Bayes in the box plot is the longest compared to the shortest of the Stock Analysis. It indicates that solutions of Naïve Bayes are largely spread out all over the search space, whereas solutions of Stock Analysis are clustered in a particular area. To demonstrate the search space reduction capability, with the massive size of search space of approximately 15 million inputs in Naïve Bayes, the abnormal behavior is found at the 1600 th round with the SSR. This results from eight times of contraction of the search space. Figure 7. Average of Execution Time. Figure 7 shows the average execution (or running) time of all fitness functions for each program. Note that the average execution times of all programs under 1000 LOCs were approximately 60 seconds. We can conclude that our technique and tool can detect most of the bugs, with a low overhead of execution time. Figure 5. Success Rate. Figure 5 shows the success rate of each program under experiment. There were 27 bug founds out of 29 bugs seeded, thereby the overall percentage of the success rate is 93%. The two bugs cannot be found in the Stock Analysis and Naïve Bayes because not only inputs that influence the fitness function but constants that cannot be manipulated also affect the value of the fitness function. Figure 6. Behavior Complexity Ratio. Figure 6 shows the Behavior Complexity Ratio of all programs under experiment. The overall average of BCR is approximately 43%, suggesting that the complexity of selected programs varied from low to high. V. CONCLUSIONS The bug detection tool using PSO with SSR was developed using C# in Microsoft Visual Studio.Net and JSon. Four programs developed in four areas of application were used to evaluate the method and tool. Twenty-nine bugs are seeded into the programs, and 27 bugs are found. A significantly high percentage 93% of success rate was obtained from the experiment because of the capability of PSO with SSR to substantially reduce the search space. ACKNOWLEDGMENT This paper would not have been possible without the help, support and patience of the two persons. The author would like to specially thank to Mr. Sarawut Rasniyom for his support of the programming assistance in this research. The author also wishes to thank Ms. Waraporn Duriyavanich for her assistance in finishing this paper. REFERENCES [1] Gyimothy, T., Ferenc, R. and Siket, I., Empirical validation of object-oriented metrics on open source software for fault prediction, IEEE Transactions on Software Engineering, pp , [2] R. Kuma, S. K. Pandey, S. I. Ahson, Security in Coding Phase of SDLC, Wireless Communication and Sensor Network, pp , [3] Changjiang Jia and Chan, W.K., Which compiler optimization options should I use for detecting data races in multithreaded programs, Automation of Software Test (AST), pp , [4] Fonseca, J., Vieira, M., Madeira, H., Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks, Dependable Computing, PRDC th Pacific Rim International Symposium, pp , [5] Nenortaite J., Butleris R., Application of Particle Swarm Optimization Algorithm to Decision Making Model Incorporating Cluster Analysis, Human System Interactions, pp , [6] Xiaoying P., Using Organizational Evolutionary Particle Swarm Techniques to Generate Test Cases for Combinatorial Testing, Computational Intelligence and Security, pp ,
5 [7] Weyuker, E., Goradia, T. and Singh, A., Automatically generating test data from a Boolean specification, Software Engineering, IEEE Transactions, pp , [8] Reungsinkonkarn A., Hierarchical Similarity Measurement Model of Program Execution, 4 th IEEE International Conference on Software Engineering and Service Science, pp , 2013 [9] Reungsinkonkarn, A., Apirukvorapinit, P., Search Space Reduction of PSO for Hierarchical Similarity Measurement Model, 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp , [10] Gyimothy, T., Ferenc, R. and Siket, I., Empirical validation of object-oriented metrics on open source software for fault prediction, IEEE Transactions on Software Engineering, pp , [11] Babic, D., Hu, A.J., Calysto, 30 th International Conference Software Engineering ICSE '08. ACM/IEEE, pp , 2008 [12] Chengying M., Xinxin Y., Jifu C., "Swarm Intelligence-Based Test Data Generation for Structural Testing", International Conference on Computer and Information Science, pp , [13] Michalewicz, Z., Deb, K., Schmidt, M., Stidsen, T., Test-case generator for nonlinear continuous parameter optimization techniques, IEEE Transactions onevolutionary Computation, pp , [14] Rudnick, E.M., Patel, J.H., Greenstein, G.S., Niermann, T.M., A genetic algorithm framework for test generation, IEEE Transactions oncomputer-aided Design of Integrated Circuits and Systems, pp , [15] Gent, Kelson, Hsiao, Michael S., Dual-Purpose Mixed-Level Test Generation Using Swarm Intelligence, IEEE 23rd AsianTest Symposium (ATS), pp ,
Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation http://www.owasp.org
Preventive Approach for Web Applications Security Testing 10/30/2009 Luiz Otávio Duarte Ferrucio de Franco Rosa Walcir M. Cardoso Jr. Renato Archer Information Technology Center Brazilian Ministry of Science
More informationPerformance Based Evaluation of New Software Testing Using Artificial Neural Network
Performance Based Evaluation of New Software Testing Using Artificial Neural Network Jogi John 1, Mangesh Wanjari 2 1 Priyadarshini College of Engineering, Nagpur, Maharashtra, India 2 Shri Ramdeobaba
More informationCOMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID. Jovita Nenortaitė
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.3 COMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID Jovita Nenortaitė InformaticsDepartment,VilniusUniversityKaunasFacultyofHumanities
More informationThe Devils Behind Web Application Vulnerabilities
The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium
More informationFault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
More informationFinding Execution Faults in Dynamic Web Application
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding
More informationMake Better Decisions with Optimization
ABSTRACT Paper SAS1785-2015 Make Better Decisions with Optimization David R. Duling, SAS Institute Inc. Automated decision making systems are now found everywhere, from your bank to your government to
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationSoftware Project Management Matrics. Complied by Heng Sovannarith heng_sovannarith@yahoo.com
Software Project Management Matrics Complied by Heng Sovannarith heng_sovannarith@yahoo.com Introduction Hardware is declining while software is increasing. Software Crisis: Schedule and cost estimates
More informationProtecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
More informationSecuring PHP Based Web Application Using Vulnerability Injection
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing
More informationAutomating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
More informationA New Quantitative Behavioral Model for Financial Prediction
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore A New Quantitative Behavioral Model for Financial Prediction Thimmaraya Ramesh
More informationA hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation
A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity
More informationData Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (dsarka@solidq.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
More informationA Novel Binary Particle Swarm Optimization
Proceedings of the 5th Mediterranean Conference on T33- A Novel Binary Particle Swarm Optimization Motaba Ahmadieh Khanesar, Member, IEEE, Mohammad Teshnehlab and Mahdi Aliyari Shoorehdeli K. N. Toosi
More informationA Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus
A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus SANON CHIMMANEE, THANYADA VEERAPRASIT, KRITSADA SRIPHAEW, ANIWAT HEMANIDHI Faculty of Information Technology
More informationUsing Web Security Scanners to Detect Vulnerabilities in Web Services
FACULDADE DE CIÊNCIAS E TECNOLOGIA DA UNIVERSIDADE DE COIMBRA DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira Nuno Antunes Henrique
More informationA Prediction Model for System Testing Defects using Regression Analysis
A Prediction Model for System Testing Defects using Regression Analysis 1 Muhammad Dhiauddin Mohamed Suffian, 2 Suhaimi Ibrahim 1 Faculty of Computer Science & Information System, Universiti Teknologi
More informationA Binary Model on the Basis of Imperialist Competitive Algorithm in Order to Solve the Problem of Knapsack 1-0
212 International Conference on System Engineering and Modeling (ICSEM 212) IPCSIT vol. 34 (212) (212) IACSIT Press, Singapore A Binary Model on the Basis of Imperialist Competitive Algorithm in Order
More informationNumerical Research on Distributed Genetic Algorithm with Redundant
Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,
More informationATLAS (Application for Tracking and Scheduling) as Location Guide and Academic Schedulling at Campus YSU (Yogyakarta State University)
International Journal of Computer and Communication Engineering, Vol. 3, No. 4, July 4 ATLAS (Application for Tracking and Scheduling) as Location Guide and Academic Schedulling at Campus YSU (Yogyakarta
More informationWeb Data Mining: A Case Study. Abstract. Introduction
Web Data Mining: A Case Study Samia Jones Galveston College, Galveston, TX 77550 Omprakash K. Gupta Prairie View A&M, Prairie View, TX 77446 okgupta@pvamu.edu Abstract With an enormous amount of data stored
More informationAN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of
More informationIOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark.
IOmark- VDI HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Copyright 2010-2014 Evaluator Group, Inc. All rights reserved. IOmark- VDI, IOmark- VM, VDI- IOmark, and IOmark
More informationLearning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
More informationKeywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction
Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression
More informationThe Improvement of Test Case Selection for the Process Software Maintenance
The Improvement of Test Case Selection for the Process Software Maintenance Adtha Lawanna* Abstract following topics in software-development life cycle (SDLC) Software maintenance is one of the critical
More informationEmpirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics
Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Kumi Jinzenji NTT Software Innovation Canter NTT Corporation Tokyo, Japan jinzenji.kumi@lab.ntt.co.jp Takashi
More informationOptimization of PID parameters with an improved simplex PSO
Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng
More informationHMLV Manufacturing Systems Simulation Analysis Using the Database Interface
HMLV Manufacturing Systems Simulation Analysis Using the Database Interface JURAJ ŠVANČARA Faculty of Electrical Engineering and Information Technology Slovak University of Technology in Bratislava Ilkovicova
More informationTowards a Benchmark Suite for Modelica Compilers: Large Models
Towards a Benchmark Suite for Modelica Compilers: Large Models Jens Frenkel +, Christian Schubert +, Günter Kunze +, Peter Fritzson *, Martin Sjölund *, Adrian Pop* + Dresden University of Technology,
More informationMagic Numbers. An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security. Rafal Los HP Web Application Security Evangelist
Magic Numbers An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security Rafal Los HP Web Application Security Evangelist Version 3.2 2010 Hewlett-Packard Development Company, L.P.
More informationRandom Testing: The Best Coverage Technique - An Empirical Proof
, pp. 115-122 http://dx.doi.org/10.14257/ijseia.2015.9.12.10 Random Testing: The Best Coverage Technique - An Empirical Proof K Koteswara Rao 1 and Prof GSVP Raju 2 1 Asst prof, (PhD) @JNTUK, CSE Department,
More informationEXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,
More informationWHITE PAPER. CounThru TM 2 Professional Managed Print Service. Introduction. Management Science
CounThru TM 2 Professional Managed Print Service WHITE PAPER CounThru TM 2 Professional Managed Print Service Printing solutions as easy as Introduction This white paper contains information about the
More informationInternational Journal of Computer Engineering and Applications, Volume V, Issue III, March 14
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 PREDICTION OF RATE OF IMPROVEMENT OF SOFTWARE QUALITY AND DEVELOPMENT EFFORT ON THE BASIS OF DEGREE OF EXCELLENCE
More informationA Robust Method for Solving Transcendental Equations
www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,
More informationMODIS IMAGES RESTORATION FOR VNIR BANDS ON FIRE SMOKE AFFECTED AREA
MODIS IMAGES RESTORATION FOR VNIR BANDS ON FIRE SMOKE AFFECTED AREA Li-Yu Chang and Chi-Farn Chen Center for Space and Remote Sensing Research, National Central University, No. 300, Zhongda Rd., Zhongli
More informationPrinciples of Data Mining by Hand&Mannila&Smyth
Principles of Data Mining by Hand&Mannila&Smyth Slides for Textbook Ari Visa,, Institute of Signal Processing Tampere University of Technology October 4, 2010 Data Mining: Concepts and Techniques 1 Differences
More informationCHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
More informationSoftware testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
More informationPractical Applications of Evolutionary Computation to Financial Engineering
Hitoshi Iba and Claus C. Aranha Practical Applications of Evolutionary Computation to Financial Engineering Robust Techniques for Forecasting, Trading and Hedging 4Q Springer Contents 1 Introduction to
More informationEvent Processing Middleware for Wireless Sensor Networks
Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components
More informationOptimization of Cluster Web Server Scheduling from Site Access Statistics
Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand
More informationMetrics, methods and tools to measure trustworthiness
Metrics, methods and tools to measure trustworthiness Henrique Madeira AMBER Coordination Action University of Coimbra March 9 th, 2009 1 Measuring trustworthiness Trustworthy ICT should be: Secure Dependable
More informationIntelligent and Automated Software Testing Methods Classification
Intelligent and Automated Software Testing Methods Classification Seyed Reza Shahamiri Department of Software Engineering Faculty of Computer Science and Information s University Teknologi Malaysia (UTM)
More informationBlind Security Testing
Blind Security Testing An Evolutionary Approach Black Hat USA 2007 Scott Stender Vice President, Blind Security Testing An Evolutionary Approach Who are you? Co-Founder and Vice President of Security consultant
More informationMeasuring Software Complexity to Target Risky Modules in Autonomous Vehicle Systems
Measuring Software Complexity to Target Risky Modules in Autonomous Vehicle Systems M. N. Clark, Bryan Salesky, Chris Urmson Carnegie Mellon University Dale Brenneman McCabe Software Inc. Corresponding
More informationPeach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
More informationDell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationA Practical Approach to Process Streaming Data using Graph Database
A Practical Approach to Process Streaming Data using Graph Database Mukul Sharma Research Scholar Department of Computer Science & Engineering SBCET, Jaipur, Rajasthan, India ABSTRACT In today s information
More informationReview of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH
Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri
More informationSIP Registration Stress Test
SIP Registration Stress Test Miroslav Voznak and Jan Rozhon Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15/2172, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.voznak@vsb.cz,
More informationApplication of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu
More informationMaster of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationSearch Algorithm in Software Testing and Debugging
Search Algorithm in Software Testing and Debugging Hsueh-Chien Cheng Dec 8, 2010 Search Algorithm Search algorithm is a well-studied field in AI Computer chess Hill climbing A search... Evolutionary Algorithm
More informationA clustering Approach for Web Vulnerabilities Detection
A clustering Approach for Web Vulnerabilities Detection Mohamed Kaâniche Rim Akrout, Eric Alata, Yann Bachy, Anthony Dessiatnikoff, Vincent Nicome?e Design and Assessment of application Level Intrusion
More informationSecurity Test s i t ng Eileen Donlon CMSC 737 Spring 2008
Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether
More informationIT services for analyses of various data samples
IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical
More informationEvaluation of Complexity of Some Programming Languages on the Travelling Salesman Problem
International Journal of Applied Science and Technology Vol. 3 No. 8; December 2013 Evaluation of Complexity of Some Programming Languages on the Travelling Salesman Problem D. R. Aremu O. A. Gbadamosi
More informationData Mining Yelp Data - Predicting rating stars from review text
Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University rchada@cs.stonybrook.edu Chetan Naik Stony Brook University cnaik@cs.stonybrook.edu ABSTRACT The majority
More informationSoMA. Automated testing system of camera algorithms. Sofica Ltd
SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional
More informationChapter 17 Software Testing Strategies Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For
More informationEvaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array
Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array Evaluation report prepared under contract with Lenovo Executive Summary Love it or hate it, businesses rely on email. It
More informationAn Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp
More informationA Comparison of Genotype Representations to Acquire Stock Trading Strategy Using Genetic Algorithms
2009 International Conference on Adaptive and Intelligent Systems A Comparison of Genotype Representations to Acquire Stock Trading Strategy Using Genetic Algorithms Kazuhiro Matsui Dept. of Computer Science
More informationSoftware Implementation Technology report
Software Implementation Technology report Team: No Best 1 - Program Manager 2 - Developer 3- Tester 2007-8 Peking University Software Implementation Technology report 1 Problem & Plan 2 Design & Implementation
More informationArchitecting for the next generation of Big Data Hortonworks HDP 2.0 on Red Hat Enterprise Linux 6 with OpenJDK 7
Architecting for the next generation of Big Data Hortonworks HDP 2.0 on Red Hat Enterprise Linux 6 with OpenJDK 7 Yan Fisher Senior Principal Product Marketing Manager, Red Hat Rohit Bakhshi Product Manager,
More informationMetrics, Methods and Tools to Measure Security and Trustworthiness. Measuring trustworthiness
Metrics, Methods and Tools to Measure Security and Trustworthiness Henrique Madeira, University of Coimbra, Portugal Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS) Cascais, June 29
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationInternational Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013
A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:
More informationImprovised Software Testing Tool
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationA Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
More informationServer & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
More informationA Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files
A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs
More informationA New Approach in Software Cost Estimation with Hybrid of Bee Colony and Chaos Optimizations Algorithms
A New Approach in Software Cost Estimation with Hybrid of Bee Colony and Chaos Optimizations Algorithms Farhad Soleimanian Gharehchopogh 1 and Zahra Asheghi Dizaji 2 1 Department of Computer Engineering,
More informationDiploma Of Computing
Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B
More informationMethod for detecting software anomalies based on recurrence plot analysis
Journal of Theoretical and Applied Computer Science Vol. 6, No. 1, 2012, pp. 3-12 ISSN 2299-2634 http://www.jtacs.org Method for detecting software anomalies based on recurrence plot analysis Michał Mosdorf
More informationHARDWARE AND SOFTWARE REQUIREMENTS
HARDWARE AND SOFTWARE REQUIREMENTS WINDOWS SPECIFICATIONS File Server Pentium 4 64 - Bit Dual Core, 3.2 GHZ or better (dual/quad Xeon processors recommended) 4GB of RAM or better Two 72GB or better fast
More informationSCHEDULING IN CLOUD COMPUTING
SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism
More informationSOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
More informationKEYWORDS: Internet Applications, Security, Languages, Review and evaluation.
[Madhusudhanan, 4(3): March, 2015] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY WEB SECURITY VULNERABILITY ASSESSMENT AND RECOVERY MACHANISAM M.Madhusudhanan*,
More informationNetwork Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
More informationISTQB Certified Tester. Foundation Level. Sample Exam 1
ISTQB Certified Tester Foundation Level Version 2015 American Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. #1 When test cases are designed
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationCoverage Criteria for Search Based Automatic Unit Testing of Java Programs
ISSN (Online): 2409-4285 www.ijcsse.org Page: 256-263 Coverage Criteria for Search Based Automatic Unit Testing of Java Programs Ina Papadhopulli 1 and Elinda Meçe 2 1, 2 Department of Computer Engineering,
More informationAugmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence
Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,
More informationQOS Based Web Service Ranking Using Fuzzy C-means Clusters
Research Journal of Applied Sciences, Engineering and Technology 10(9): 1045-1050, 2015 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2015 Submitted: March 19, 2015 Accepted: April
More informationSINGLE-STAGE MULTI-PRODUCT PRODUCTION AND INVENTORY SYSTEMS: AN ITERATIVE ALGORITHM BASED ON DYNAMIC SCHEDULING AND FIXED PITCH PRODUCTION
SIGLE-STAGE MULTI-PRODUCT PRODUCTIO AD IVETORY SYSTEMS: A ITERATIVE ALGORITHM BASED O DYAMIC SCHEDULIG AD FIXED PITCH PRODUCTIO Euclydes da Cunha eto ational Institute of Technology Rio de Janeiro, RJ
More informationWireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
More informationConfirmation Bias as a Human Aspect in Software Engineering
Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD Data Science Laboratory, Department of Mechanical and Industrial Engineering, Ryerson University Why Human Aspects in Software
More informationAccess Stations and other Services at SERC. M.R. Muralidharan
Access Stations and other Services at SERC M.R. Muralidharan Overview Platforms and Floors Access Stations Wireless Facility Software printing and plotting Software Packages Maintained by SERC Symantec
More information"Practical Security Testing for Web Applications"
T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,
More informationWhy Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012
Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization GENOME 560, Spring 2012 Data are interesting because they help us understand the world Genomics: Massive Amounts
More informationAn ACO Approach to Solve a Variant of TSP
An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents
More informationSoftware Security Testing
Software Security Testing Elizabeth Sanders Department of Electrical & Computer Engineering Missouri University of Science and Technology ejwxcf@mst.edu 2015 Elizabeth Sanders Pop Quiz What topics am I
More informationA Brief Overview of Software Testing Techniques and Metrics
A Brief Overview of Software Techniques and Metrics Anitha.A Programmer, School of Computer Studies (PG), RVS college of Arts & science, Coimbatore, India. Abstract: Software is the process of executing
More informationSoftware that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation. TRADING SYSTEM LAB Product Description Version 1.
Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation TRADING SYSTEM LAB Product Description Version 1.1 08/08/10 Trading System Lab (TSL) will automatically generate
More information