Software Engineering - Proceedings of CSI 2015

von: M. N. Hoda, Naresh Chauhan, S. M. K. Quadri, Praveen Ranjan Srivastava

Springer-Verlag, 2018

ISBN: 9789811088483 , 711 Seiten

Format: PDF, Online Lesen

Kopierschutz: Wasserzeichen

Mac OSX,Windows PC für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Mac OSX,Linux,Windows PC

Preis: 85,59 EUR

eBook anfordern eBook anfordern

Mehr zum Inhalt

Software Engineering - Proceedings of CSI 2015


 

Preface

6

The Organization of CSI-2015

9

Chief Patron

9

Patrons

9

Chair, Programme Committee

9

Secretary, Programme Committee

9

Advisory Committee

9

Editorial Board

10

Contents

11

About the Editors

17

1 A Multi-agent Framework for Context-Aware Dynamic User Profiling for Web Personalization

19

Abstract

19

1 Introduction

19

2 User Modeling Techniques

20

2.1 Information Gathering

21

2.2 User Profile Representation

21

2.3 User Profile Construction

22

3 Related Work

22

4 Proposed Framework for Multi-agent-Based Dynamic User Profiling

24

5 Detailed Description of Framework

26

5.1 Client-Side Agents

27

5.2 Server-Side Agents

27

6 Flow Diagram of the Proposed Work

31

7 Conclusion and Future Work

32

References

33

2 Implementation of Equivalence of Deterministic Finite-State Automation and Non-deterministic Finite-State Automaton in Acceptance of Type 3 Languages Using Programming Code

35

Abstract

35

1 Introduction

36

2 Finite Acceptors

36

3 Algorithm to Implement DFA

37

4 Programming Code to Implement DFA and NFA

38

5 Regular Languages or Type 3 Grammars

39

6 Equivalence of NFA to DFA on Acceptance of Regular Language

40

7 Example of NFA to DFA with Test Cases

41

8 Algorithm for Conversion of NFA to DFA

41

8.1 Test Case 1 for NFA and Its Equivalent DFA

42

9 Result and Conclusion

42

References

43

3 A Multi-factored Cost- and Code Coverage-Based Test Case Prioritization Technique for Object-Oriented Software

44

Abstract

44

1 Introduction

44

2 Related Work

45

3 Proposed Work

46

3.1 Considered Factors for Prioritized Test Cases

48

4 Result and Analysis

48

4.1 Faults Detected by Test Cases in Non-Prioritized Order

48

4.2 Faults Detected by Test Cases in Prioritized Order

50

4.3 Comparison of APFD Graphs Prioritized and Non-prioritized Order of Test Cases for Three Programs

50

4.4 Effectiveness of the Proposed Approach

51

5 Conclusion

52

References

53

4 A Novel Page Ranking Mechanism Based on User Browsing Patterns

54

Abstract

54

1 Introduction

54

2 Related Work

55

2.1 PageRank

56

2.2 Page Ranking Algorithm Based on Link Visits (PRLV)

57

3 Proposed Page Ranking Mechanism

59

3.1 Search Engine Interface

59

3.2 PPF Calculator

60

3.3 DB Builder

62

3.4 Query Processor

64

4 Example

64

5 Conclusion

64

References

65

5 Indexing of Semantic Web for Efficient Question Answering System

67

Abstract

67

1 Introduction

68

2 Related Work

68

3 Proposed Architecture

70

3.1 Query Interface Module

70

3.2 Query Processing Module

70

3.3 Question Categorization Module

71

3.4 Question Analysis Module

71

3.5 Question Categorization

71

3.6 Semantic Mapping in Question Answering System

72

3.7 Indexing Module

73

3.8 Result Processing Module

73

4 Experimental Evaluation

74

5 Conclusions and Future Scope

76

References

76

6 A Sprint Point Based Tool for Agile Estimation

78

Abstract

78

1 Introduction

78

1.1 Estimation

79

2 Sprint-point based Estimation Framework in SPBE Tool

79

2.1 Sprint Estimation

79

2.2 User Story-Based Prioritization Algorithm

80

2.3 Managing Uncertainty in Estimating User Stories

81

2.4 Sprint-Point Based Estimation Using Delay-Related Factors

81

2.5 Sprint-Point Based Estimation Tool

82

2.5.1 Contents of SPBE Tool

83

2.6 Case Study

83

2.7 Results

84

3 Conclusion

86

References

86

7 Improving Search Results Based on Users’ Browsing Behavior Using Apriori Algorithm

88

Abstract

88

1 Introduction

88

1.1 Introduction to Apriori Algorithm

89

2 Related Work

89

3 Working Methodology

91

4 Example

92

5 Conclusion

96

References

96

8 Performance Efficiency Assessment for Software Systems

98

Abstract

98

1 Introduction

99

2 Related Work

99

3 Proposed Performance Efficiency Model

101

3.1 Performance Efficiency in Quality Models

101

4 Assessment of the Proposed Performance Efficiency Model

102

5 Case Study

104

6 Conclusion and Future Scope

106

References

107

9 Impact of Programming Languages on Energy Consumption for Sorting Algorithms

108

Abstract

108

1 Introduction

108

2 Related Works

109

3 Role of Programming Language in Energy Efficiency

109

4 Sorting Algorithms

110

4.1 Bubble Sort

110

4.2 Selection Sort

111

4.3 Insertion Sort

111

4.4 Quick Sort

111

5 Programming Language

111

5.1 Java [18]

111

5.2 Visual Basic 6.0

112

5.3 C#.Net

112

6 Experimental Setup

112

7 Experimental Run

113

8 Experimental Result and Analysis

113

9 Conclusion

115

References

116

10 Crawling Social Web with Cluster Coverage Sampling

117

Abstract

117

1 Introduction

117

2 Related Work

118

3 Problem Description

119

4 Cluster Coverage Sampling (CCS) Methodology

120

5 Experiments and Result Analysis

124

6 Conclusion and Future Scope

128

References

128

11 Efficient Management of Web Data by Applying Web Mining Pre-processing Methodologies

129

Abstract

129

1 Introduction

129

2 Literature Review

130

3 Data Pre-processing on Web Log File

130

3.1 Field Extraction

131

3.2 Significant Attributes Selection

132

3.3 Data Selection

132

3.4 Data Cleaning

132

3.4.1 Remove Duplicacy

133

3.4.2 Missing Value

133

3.4.3 Noise

133

4 Results and Interpretation

133

5 Conclusion

135

References

135

12 A Soft Computing Approach to Identify Multiple Paths in a Network

137

Abstract

137

1 Introduction

137

2 Related Work

138

3 AntNet Routing Algorithm

139

4 Proposed AntNet Modifications

140

5 Conclusion

143

References

143

13 An Efficient Focused Web Crawling Approach

144

Abstract

144

1 Introduction

144

2 Related Work

146

3 Proposed Method

149

4 Conclusion

151

References

151

14 A New Log Kernel-Based Possibilistic Clustering

152

Abstract

152

1 Introduction

152

2 Literature Work

154

2.1 Fuzzy C-Means Clustering (FCM)

154

2.2 Possibilistic C-Means Clustering (PCM)

155

2.3 Unsupervised Possibilistic C-Means Clustering (UPC)

156

3 Kernel-Based Algorithm

156

3.1 Kernel-Based Approach

156

4 Proposed kernelized UPC-Log Algorithm

157

5 Experimental Results

159

5.1 Synthetic Datasets

159

5.2 High-Dimensional Real Datasets

161

6 Conclusions

164

References

165

15 Fuzzy c-Means Clustering Strategies: A Review of Distance Measures

166

Abstract

166

1 Introduction

167

2 Related Work

167

2.1 Fuzzy c-Means Algorithm

167

2.2 Distance Measures

168

2.2.1 Euclidean Distance

168

2.2.2 Standard Euclidean Distance

169

2.2.3 Mahalanobis Distance

169

2.2.4 Standard Mahalanobis Distance

169

2.2.5 Minkowski Distance

169

2.2.6 Chebyshev Distance

170

3 Experiments’ Results

170

3.1 Synthetic Datasets

170

3.1.1 X_{12} Dataset

170

3.2 High-Dimensional DataSets

173

4 Conclusions

175

References

175

16 Noise Reduction from ECG Signal Using Error Normalized Step Size Least Mean Square Algorithm (ENSS) with Wavelet Transform

176

Abstract

176

1 Introduction

176

2 Proposed Implementation

177

2.1 ENSS Algorithm-Based ANC System

177

2.2 1-D Wavelet Transform (Haar Wavelet Transform)

178

2.3 ENSS-LMS Algorithm

179

2.4 Implementation Steps

179

3 Simulation Results

180

4 Conclusion

183

References

183

17 A Novel Approach for Extracting Pertinent Keywords for Web Image Annotation Using Semantic Distance and Euclidean Distance

185

Abstract

185

1 Introduction

186

2 Related Work

186

3 Proposed Architecture

187

3.1 Crawl Manager

187

3.2 URL Queue

188

3.3 Parser

188

3.4 Visual Web Page Segmenter

189

3.5 Block Analyzer

189

3.6 Nearest Text Block Detector

189

3.7 Tag Text Extractor

190

3.8 Keyword Extractor

190

3.9 Semantic Distance Calculator

190

3.10 Text Extractor

191

3.11 Keyword Determiner

192

3.12 Image Annotation

192

4 Algorithm

192

5 Conclusion

193

References

194

18 Classification of Breast Tissue Density Patterns Using SVM-Based Hierarchical Classifier

196

Abstract

196

1 Introduction

196

2 Methodology

197

2.1 Description of Dataset

197

2.2 Selecting Regions of Interest

197

2.3 Proposed Method

198

3 Results

199

3.1 Classification Performance of Laws’ Texture Features Using Hierarchical Classifier

199

4 Conclusion

201

References

201

19 Advances in EDM: A State of the Art

203

Abstract

203

1 Introduction

203

2 Materials and Methods

204

2.1 Dataset and Its Features

204

2.2 Feature Measurement

205

3 Methodology

205

3.1 AdaBoost Algorithm

206

3.2 Feature Importance Using AdaBoost Algorithm

206

3.3 Machine Learning Methods

207

4 Model Evaluation

208

5 Experimental Result

208

6 Conclusion and Future Scope

210

References

211

20 Proposing Pattern Growth Methods for Frequent Pattern Mining on Account of Its Comparison Made with the Candidate Generation and Test Approach for a Given Data Set

212

Abstract

212

1 Introduction

213

1.1 Association Rule Mining

213

2 Literature Survey

214

3 Experiment

214

4 Result and Discussion

215

5 Conclusion

216

References

217

21 A Study on Initial Centroids Selection for Partitional Clustering Algorithms

219

Abstract

219

1 Introduction

220

2 Study on Initial Centroid Selection for Clustering Algorithms

220

3 Developed Farthest Distributed Centroid Clustering Algorithm

223

3.1 Basic Concept

223

3.2 Farthest Distributed Centroid Clustering Algorithm

223

4 Experimental Study

224

5 Conclusion

226

References

226

22 A Novel Rare Itemset Mining Algorithm Based on Recursive Elimination

229

Abstract

229

1 Introduction

229

1.1 Rare Itemset Mining

230

2 Related Work

231

3 Proposed Rare Itemset Mining Algorithm

232

3.1 Illustration

233

4 Proof of Correctness

237

5 Simulation Results and Discussion

237

6 Conclusion

240

References

240

23 Computation of Various Entropy Measures for Anticipating Bugs in Open-Source Software

242

Abstract

242

1 Introduction

242

2 Literature Review

243

3 Information Theoretic Approach

244

4 Basic Model for Entropy Measurement

245

5 Data Collection and Preprocessing

246

6 Calculation of Arimoto, Havrda–Charvat, and Renyi Entropy

248

7 Analysis and Bug Prediction Approach

249

8 Result and Discussion

251

9 Conclusion

252

References

253

24 Design of Cyber Warfare Testbed

255

Abstract

255

1 Introduction

255

2 Testbed Requirements

256

3 Testbed Design

256

3.1 Design of Cluster

257

3.2 Composing Attack System

257

3.3 Composing Defence System

258

3.4 Data Logger and Report Generation

258

4 Operational Configuration

259

4.1 Scenarios

259

4.2 Attack Emulation

259

5 Analysis

260

5.1 Identification of Measures of Effectiveness (MOEs)

260

5.2 Vulnerability Analysis

260

5.3 Development of Strategy and Tactics

260

6 Conclusion

261

7 Future Scope

261

References

262

25 Performance Evaluation of Features Extracted from DWT Domain

263

Abstract

263

1 Introduction

263

2 Steganography Algorithms

264

3 Proposed DWT Feature Extraction

265

3.1 Histogram

265

3.2 Markov

265

3.3 Existing DWT Farid Features

266

4 Neural Network Classifier

266

5 Experimental Results

267

6 Analysis

267

7 Conclusion

269

References

270

26 Control Flow Graph Matching for Detecting Obfuscated Programs

272

Abstract

272

1 Introduction

272

2 Disassembly of Executables

273

3 Obfuscation Techniques

273

4 Control Flow Graph

274

4.1 Control Flow Graph Reduction

274

4.2 Control Flow Graph Matching

275

5 Proposed Framework

275

5.1 Explanation

275

6 Conclusion

279

References

280

27 A Novel Framework for Predicting Performance of Keyword Queries Over Database

281

Abstract

281

1 Introduction

281

2 Related Work

282

2.1 Post-retrieval Methods

283

2.2 Clarity Score Based

283

2.3 Popularity Based

283

2.4 Challenges in Information Retrieve in Structured Database with Keyword Query

283

3 Proposed System

284

3.1 Objective

284

4 Implementation and Discussion

288

5 Conclusion

289

References

290

28 Predicting and Accessing Security Features into Component-Based Software Development: A Critical Survey

291

Abstract

291

1 Introduction

292

2 Security Specification for Software Component

292

3 Architecture and Design for Secure Software Component

294

4 Proposed Framework for Security of Component-Based Software

296

5 Conclusion and Future Scope

297

References

297

29 Traditional Software Reliability Models Are Based on Brute Force and Reject Hoare’s Rule

299

Abstract

299

1 Introduction

300

2 Software Reliability Measurement

302

3 Brute Force Nature of Traditional Models

303

4 Perceiving Reliability with Hoare’s Logic

304

5 Proposed Model Framework

306

6 Conclusion

307

References

307

30 Object-Oriented Metrics for Defect Prediction

309

Abstract

309

1 Introduction

309

2 Literature Survey

310

3 Methodology

312

3.1 Performance Evaluation Parameters

313

4 Collection of Data

314

5 Results

316

6 Conclusion

320

References

321

31 A Comparative Analysis of Static and Dynamic Java Bytecode Watermarking Algorithms

323

Abstract

323

1 Introduction

323

2 Background

324

2.1 Difficulties Faced by Software Watermarking

325

2.2 Watermarking Techniques

325

2.3 Classification of Watermark

326

2.4 Types of Attacks to Watermarks [13]

326

3 The Empirical Evaluation

326

3.1 The Watermarker

327

3.1.1 Static Watermarking Algorithms Are as

327

3.1.2 Dynamic Watermarking Algorithms

328

3.2 The Transformation Attacks

328

3.3 The Test Case Jar Files

328

4 Results

328

4.1 Static Watermarking Algorithms

329

4.1.1 Watermarking

329

4.1.2 Obfuscation

329

4.1.3 Recognition

330

4.2 Dynamic Watermarking Algorithms

331

4.2.1 Watermarking

331

4.2.2 Obfuscation

332

4.2.3 Recognition

334

4.3 Comparative Analysis of Static and Dynamic Software Watermarking Algorithms

334

4.4 Analysis of Results

336

5 Conclusion

336

References

337

32 Software Architecture Evaluation in Agile Environment

339

Abstract

339

1 Introduction

339

1.1 Definition of Software Architecture

340

1.2 Software Architectonics and Software Architect

340

1.3 Agile Software Development

340

1.4 Agile Architecture Is a Paradox

341

2 Literature Survey

342

3 Problem Definition

344

4 Objectives

344

5 Experimental Design

345

5.1 Software Architecture Metrics

345

5.2 Agile Software Metrics

345

5.3 Eclipse

347

5.4 X-Ray

350

5.5 JArchitect

352

5.6 JFreeChart

352

6 Results and Discussion

353

7 Conclusion

359

8 Future Scope

359

References

359

33 Mutation Testing-Based Test Suite Reduction Inspired from Warshall’s Algorithm

361

Abstract

361

1 Introduction

361

2 Related Work

362

3 Methodology

363

3.1 Research Questions

363

3.2 Experimental Design

363

3.3 Procedure

364

3.3.1 Algorithm of Proposed Approach

364

3.3.2 Time Complexity of the Proposed Approach

366

4 Results

366

5 Conclusion and Future Work

367

References

367

34 Software Component Retrieval Using Rough Sets

369

Abstract

369

1 Introduction

369

2 Related Work

370

3 Decision Making Using Rough Sets

371

3.1 Rough Sets

371

3.2 Methodology for Component Extraction

371

4 Results and Analysis

374

5 Conclusion

377

References

377

35 Search-Based Secure Software Testing: A Survey

379

Abstract

379

1 Introduction

379

2 Key Points

380

3 Strategies of Research

381

3.1 Research Questions

381

4 Elucidation for Research Questions

381

4.1 RQ1: What Is Metaheuristic and Its Techniques?

381

4.2 RQ2: Why SBST Is Used to Tackle Security Vulnerabilities?

382

4.3 RQ3: What Is Meant by Software Security Testing?

383

5 Threats

383

6 Conclusion

384

References

384

36 Limitations of Function Point Analysis in Multimedia Software/Application Estimation

386

Abstract

386

1 Introduction

387

2 Function Point Analysis (FPA)

388

2.1 External Inputs (EIs)

388

2.2 External Outputs (EOs)

388

2.3 External Inquiries (EQs)

389

2.4 Internal Logical Files (ILFs)

389

2.5 External Interface Files (EIFs)

389

2.6 Rating of Components

389

2.7 Calculation of Complexity Adjustment Factor (CAF)

390

3 Multimedia Systems Features Against FPA

392

3.1 Limitations of FPA

393

4 Conclusion

394

References

395

37 Maintainability Analysis of Component-Based Software Architecture

396

Abstract

396

1 Introduction

396

2 Maintainability Scenario and Graph

398

3 Maintainability Analysis and Scenario Evaluation

402

4 Conclusion

403

References

403

38 An Assessment of Vulnerable Detection Source Code Tools

405

Abstract

405

1 Introduction

405

2 Tools

407

2.1 Cppcheck 1.68 [7]

407

2.2 Flawfinder [8]

407

2.3 Visual Code Grepper (VCG) [9]

408

3 Comparison/Analysis of Tools

409

3.1 Conceptual Comparison

409

3.2 Empirical Comparison

410

4 Conclusion and Future Scope

413

References

413

39 Devising a New Method for Economic Dispatch Solution and Making Use of Soft Computing Techniques to Calculate Loss Function

415

Abstract

415

1 Introduction

415

2 New Approach for the Solution of Economic Dispatch Problem

416

2.1 Steps of the Deterministic Approach

416

2.2 Description of Fuzzy Sets Used in the New Approach

418

2.3 Usage of Genetic Algorithm in the Method

419

3 Illustrations and Result

419

3.1 Sample System Consisting of Two Generators

419

3.2 Conclusions

420

References

421

40 Trusted Operating System-Based Model-Driven Development of Secure Web Applications

422

Abstract

422

1 Introduction

423

2 Secure Web Application Modeling

425

3 Axes of Change in Round-trip Engineering

427

4 Conclusion

432

References

432

41 Navigational Complexity Metrics of a Website

434

Abstract

434

1 Introduction

434

2 Factors Affecting Navigational Complexity of the Website

435

2.1 Website Structural Complexity

435

2.2 Other Factors

436

2.2.1 Website Defects

436

2.2.2 Maximum Depth

437

2.2.3 Path Density

437

3 Methodology

437

4 Results and Discussion

439

5 Conclusions

440

References

440

42 Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems

442

Abstract

442

1 Introduction

442

2 Background and Related Work

443

3 Methodology

444

3.1 Metrics

444

3.2 Web Server Tests

445

4 Case Study—Results and Discussion

446

References

448

43 Component-Based Quality Prediction via Component Reliability Using Optimal Fuzzy Classifier and Evolutionary Algorithm

449

Abstract

449

1 Introduction

449

2 Related Work

450

3 Proposed Methodology for Software Quality Prediction

450

3.1 Steps Involved in the Software Quality Prediction

451

3.2 Software Cost and Reliability Measure to Estimate the Quality

451

3.2.1 Software Reliability Measure

451

Fuzzy Logic

452

Fuzzy Rule Optimization Using Evolutionary Programming (EP)

452

3.2.2 Software Cost Measure

454

4 Results and Discussion

454

5 Conclusion

455

References

456

44 Applying Statistical Usage Testing Along with White Box Testing Techniques

457

Abstract

457

1 Introduction

458

2 White Box Testing Techniques (WBTT)

459

2.1 Use of White Box Testing Techniques (WBTTs) with SUT

459

2.2 Types of White Box Testing Techniques

460

3 Testing ‘HTML to Text Converter Utility’ Using SUT

463

3.1 HTML to TEXT Utility

463

3.2 SUT for HTML to TEXT Converter

463

4 Applying SUT Along with WBTT

466

4.1 Control Flow Testing (CFT)

466

4.2 Data Flow Testing (DFT)

470

4.3 Mutation Testing

472

5 Findings and Conclusion

473

6 Limitations and Future Work

473

Acknowledgements

473

References

474

45 A Review on Application Security Management Using Web Application Security Standards

476

Abstract

476

1 Introduction

477

2 Objective

477

3 Scope

477

4 Types of Vulnerabilities

477

5 Methodology

479

5.1 Design

479

5.2 Coding

480

5.3 Security Testing

480

5.4 Delivery and Deployment

480

6 Management Practices

481

6.1 Requirements, Design, and Development

481

6.2 Testing

482

6.3 Audience

482

6.4 Verification Matrix

482

7 Conclusion

485

References

485

46 A Review of Software Testing Approaches in Object-Oriented and Aspect-Oriented Systems

486

Abstract

486

1 Introduction

486

2 Evaluation Criteria

487

3 Object-Oriented Testing

490

4 Aspect-Oriented Testing

491

5 Conclusion and Limitations

492

Acknowledgements

493

References

493

47 A Literature Survey of Applications of Meta-heuristic Techniques in Software Testing

496

Abstract

496

1 Introduction

496

2 Meta-heuristic Techniques

497

2.1 Ant Colony Optimization

497

2.2 Genetic Algorithm

497

3 Benchmark for Evaluation

498

4 Analysis of ACO and GA

500

4.1 Genetic Algorithm

500

4.2 Aco

501

5 Conclusion

502

References

503

48 A Review of Test Case Prioritization and Optimization Techniques

505

Abstract

505

1 Introduction

505

1.1 Regression Testing

506

1.2 Test Case Prioritization

506

1.3 Techniques of Test Case Prioritization and Optimization

506

2 Literature Survey

507

2.1 Research Questions

507

3 Analysis of Papers

507

4 Conclusion

512

References

512

49 Software Development Activities Metric to Improve Maintainability of Application Software

515

Abstract

515

1 Introduction

515

2 Software Development Activities Metric to Improve the Maintainability

516

3 Analysis of SDA Metric

517

4 Conclusion

521

References

521

50 Label Count Algorithm for Web Crawler-Label Count

522

Abstract

522

1 Introduction

522

2 Preliminaries

523

2.1 Crawling Strategy

523

2.2 Architecture

524

3 Schemes for Web Crawling

525

3.1 Genetic Algorithm

525

3.2 Breadth-First Search Algorithm

525

3.3 Page Rank Algorithm

526

3.4 Depth-First Search Algorithm

526

4 Conclusion and Future Work

528

References

528

51 Vulnerability Discovery in Open- and Closed-Source Software: A New Paradigm

529

Abstract

529

1 Introduction

529

2 Proposed Approach

531

3 Parameter Estimations

533

4 Prediction Capabilities of Models

533

5 Conclusion

534

References

534

52 Complexity Assessment for Autonomic Systems by Using Neuro-Fuzzy Approach

536

Abstract

536

1 Introduction

536

2 Autonomic Computing-Enabled Systems

537

2.1 Architecture of Autonomic System

538

3 Literature Review

539

4 Proposed Model

541

4.1 Implementation of the Proposed Approach

542

4.2 Empirical Evaluation

542

5 Conclusion and Future Work

543

References

543

53 Proposal for Measurement of Agent-Based Systems

545

Abstract

545

1 Introduction

545

2 Existing Metrics

547

3 The Necessity for New Metrics

548

4 Advancement in Metrics

549

5 Conclusion

554

References

554

54 Optimal Software Warranty Under Fuzzy Environment

557

Abstract

557

1 Introduction

558

2 The Cost Model

559

3 Problem Formulation

560

4 Numerical Example

561

5 Conclusion

562

References

563

55 Automation Framework for Test Script Generation for Android Mobile

564

Abstract

564

1 Introduction

564

2 Related Work

565

3 Architecture of Proposed Framework

566

3.1 Overview of the proposed framework

566

3.2 Architecture of the Virtual Test Engineer

566

3.3 Mobile side architecture

569

4 Case Study

571

5 Experimental Results

573

5.1 Horizontal deployment

573

5.2 Bug fixing/Enhancement

575

6 Comparison with Other Methods

575

7 Conclusions

576

References

576

56 Optimizing the Defect Prioritization in Enterprise Application Integration

578

Abstract

578

1 Introduction

578

2 Literature Review

579

3 Genetic Algorithm

581

4 Proposed Approach and Experimental Set-up

581

5 Outcomes and Discussions

584

6 Conclusions

589

References

589

57 Desktop Virtualization—Desktop as a Service and Formulation of TCO with Return on Investment

591

Abstract

591

1 Introduction

591

2 Components of DaaS

593

3 Comparison of DaaS Providers

595

4 Obstacles in Adoption of DaaS

596

5 Formulation of TCO/ROI

597

6 Conclusion

599

References

599

58 An Assessment of Some Entropy Measures in Predicting Bugs of Open-Source Software

601

Abstract

601

1 Introduction

602

2 Literature Review

603

3 Entropy Measures and Code Change Process

603

4 Methodology

605

4.1 Data Collection and Preprocessing

605

4.2 Evaluation of Shannon, Renyi, and Tsallis Entropies

605

5 Bug Prediction Modeling

606

6 Assessment of Entropy Measures

609

6.1 One-Way ANOVA

610

6.2 Tukey’s HSD Test

610

7 Conclusion and Future Scope

612

References

613

59 A Path Coverage-Based Reduction of Test Cases and Execution Time Using Parallel Execution

614

Abstract

614

1 Introduction

614

2 Problem Description

616

3 Proposed Technique

616

3.1 Algorithm

616

4 Parallel Test Case Executor

618

5 Result and Analysis

619

6 Conclusion

620

References

620

60 iCop: A System for Mitigation of Felonious Encroachment Using GCM Push Notification

622

Abstract

622

1 Introduction

623

2 Feasibility Study

623

3 A Brief About Arduino Platform

624

4 Methodology

625

5 iCop System

625

5.1 Testing Results

626

5.2 Risk Analysis

627

6 Conclusion

628

References

629

61 Clustering the Patent Data Using K-Means Approach

630

Abstract

630

1 Introduction

630

2 Background Study

631

2.1 Processing of Algorithm

632

3 Methodology

633

4 Experiments and Results

633

5 Conclusion

635

References

636

62 Success and Failure Factors that Impact on Project Implementation Using Agile Software Development Methodology

637

Abstract

637

1 Introduction

637

2 Literature Review

638

3 Different Factors in the Agile Development

639

4 Strategies for Mitigating Factors Affecting Agile and Distributed Agile Development

640

5 Case Study

641

6 Findings

642

6.1 Outcomes

642

7 Conclusion

644

References

644

63 Fuzzy Software Release Problem with Learning Functions for Fault Detection and Correction Processes

645

Abstract

645

1 Introduction

645

2 Formulation of Problem

646

2.1 Software Reliability Growth Models

646

2.2 The Cost Model

648

2.3 Problem Formulation

648

3 Problem Solution and Numerical Example

649

3.1 Problem Solution

649

3.2 Numerical Example

649

4 Conclusion

651

References

651

64 Reliability Assessment of Component-Based Software System Using Fuzzy-AHP

652

Abstract

652

1 Introduction

652

2 Methodology

653

2.1 Identification of Factors

653

2.1.1 The Deployment Context

653

2.1.2 Human Factor

654

2.1.3 Analysis and Design Factor

654

2.1.4 Testing Factor

654

2.2 Evaluation of Reliability Using Analytical Hierarchy Process

654

2.2.1 Building the Hierarchy

654

2.2.2 Pair-Wise Comparisons

654

2.2.3 Relative Weight Estimation

655

2.3 Fuzzy Comprehensive Evaluation

656

2.3.1 Create Sets of Grade Factors and Elements

656

2.3.2 Derive a Single-Factor Evaluation Matrix R from U to V

656

2.3.3 Find Results of Comprehensive Evaluation

657

2.3.4 Comprehensive Multi-level Fuzzy Evaluation

658

2.3.5 Conclude Evaluation

658

3 Conclusion

658

References

658

65 Ranking Usability Metrics Using Intuitionistic Preference Relations and Group Decision Making

660

Abstract

660

1 Introduction

660

2 Literature Survey

661

3 Basics of Group Decision Making

662

4 Application of Group Decision Making to Rank Usability Metrics

663

5 Illustrative Example

665

6 Conclusion

666

Appendix 1

667

Appendix 2

667

References

668

66 Research Challenges of Web Service Composition

669

Abstract

669

1 Introduction

669

2 Semantic-Based Composition Techniques

671

3 Composition Research Challenges

673

3.1 Semantic Web Services Languages, Discovery, and Selection Challenges

673

3.2 Composition Challenges

674

3.3 Scalability, Adaptation, and Management

675

4 Conclusions and Future Work

675

References

676

67 Automation Software Testing on Web-Based Application

678

Abstract

678

1 Introduction

678

2 Literature Review

679

3 Automated Testing

679

4 Proposed Method

680

4.1 Experimental Work

682

4.2 Comparison and Result Between Traditional and Agile Automated Testing Model

683

5 Conclusion

684

References

684

68 Automated Test Data Generation Applying Heuristic Approaches—A Survey

686

Abstract

686

1 Introduction

686

2 Literature Survey

688

2.1 Software Testing

688

2.2 Test Data Generation

689

2.3 Heuristic Approaches

689

2.4 Applying Heuristics in Test Data Generation

690

3 Heuristic Approaches Applied in Test Data Generation

692

4 Conclusion

694

69 Comparison of Optimization Strategies for Numerical Optimization

696

Abstract

696

1 Introduction

696

2 Related Work

697

3 Proposed Work

698

3.1 Particle Swarm Optimization

698

3.2 Artificial Bee Colony

698

3.3 Teacher–Learner-Based Optimization

699

3.4 Differential Evolution

700

3.5 Benchmark Functions

701

4 Experimental Results and Analysis

702

5 Conclusion

703

References

703

70 Sentiment Analysis on Tweets

704

Abstract

704

1 Introduction

705

2 Literature Survey

706

3 Proposed System

707

4 Implementation

707

4.1 Tweets Extraction

707

4.2 Stop Words Removal

709

4.3 Split Keywords

709

4.4 Bag of Words

709

4.5 Polarity Comparison

710

4.6 Calculating Polarity

710

5 Conclusion

710