Suche
Lesesoftware
Info / Kontakt
Software Engineering - Proceedings of CSI 2015
von: M. N. Hoda, Naresh Chauhan, S. M. K. Quadri, Praveen Ranjan Srivastava
Springer-Verlag, 2018
ISBN: 9789811088483 , 711 Seiten
Format: PDF, Online Lesen
Kopierschutz: Wasserzeichen
Preis: 85,59 EUR
eBook anfordern
Preface
6
The Organization of CSI-2015
9
Chief Patron
9
Patrons
9
Chair, Programme Committee
9
Secretary, Programme Committee
9
Advisory Committee
9
Editorial Board
10
Contents
11
About the Editors
17
1 A Multi-agent Framework for Context-Aware Dynamic User Profiling for Web Personalization
19
Abstract
19
1 Introduction
19
2 User Modeling Techniques
20
2.1 Information Gathering
21
2.2 User Profile Representation
21
2.3 User Profile Construction
22
3 Related Work
22
4 Proposed Framework for Multi-agent-Based Dynamic User Profiling
24
5 Detailed Description of Framework
26
5.1 Client-Side Agents
27
5.2 Server-Side Agents
27
6 Flow Diagram of the Proposed Work
31
7 Conclusion and Future Work
32
References
33
2 Implementation of Equivalence of Deterministic Finite-State Automation and Non-deterministic Finite-State Automaton in Acceptance of Type 3 Languages Using Programming Code
35
Abstract
35
1 Introduction
36
2 Finite Acceptors
36
3 Algorithm to Implement DFA
37
4 Programming Code to Implement DFA and NFA
38
5 Regular Languages or Type 3 Grammars
39
6 Equivalence of NFA to DFA on Acceptance of Regular Language
40
7 Example of NFA to DFA with Test Cases
41
8 Algorithm for Conversion of NFA to DFA
41
8.1 Test Case 1 for NFA and Its Equivalent DFA
42
9 Result and Conclusion
42
References
43
3 A Multi-factored Cost- and Code Coverage-Based Test Case Prioritization Technique for Object-Oriented Software
44
Abstract
44
1 Introduction
44
2 Related Work
45
3 Proposed Work
46
3.1 Considered Factors for Prioritized Test Cases
48
4 Result and Analysis
48
4.1 Faults Detected by Test Cases in Non-Prioritized Order
48
4.2 Faults Detected by Test Cases in Prioritized Order
50
4.3 Comparison of APFD Graphs Prioritized and Non-prioritized Order of Test Cases for Three Programs
50
4.4 Effectiveness of the Proposed Approach
51
5 Conclusion
52
References
53
4 A Novel Page Ranking Mechanism Based on User Browsing Patterns
54
Abstract
54
1 Introduction
54
2 Related Work
55
2.1 PageRank
56
2.2 Page Ranking Algorithm Based on Link Visits (PRLV)
57
3 Proposed Page Ranking Mechanism
59
3.1 Search Engine Interface
59
3.2 PPF Calculator
60
3.3 DB Builder
62
3.4 Query Processor
64
4 Example
64
5 Conclusion
64
References
65
5 Indexing of Semantic Web for Efficient Question Answering System
67
Abstract
67
1 Introduction
68
2 Related Work
68
3 Proposed Architecture
70
3.1 Query Interface Module
70
3.2 Query Processing Module
70
3.3 Question Categorization Module
71
3.4 Question Analysis Module
71
3.5 Question Categorization
71
3.6 Semantic Mapping in Question Answering System
72
3.7 Indexing Module
73
3.8 Result Processing Module
73
4 Experimental Evaluation
74
5 Conclusions and Future Scope
76
References
76
6 A Sprint Point Based Tool for Agile Estimation
78
Abstract
78
1 Introduction
78
1.1 Estimation
79
2 Sprint-point based Estimation Framework in SPBE Tool
79
2.1 Sprint Estimation
79
2.2 User Story-Based Prioritization Algorithm
80
2.3 Managing Uncertainty in Estimating User Stories
81
2.4 Sprint-Point Based Estimation Using Delay-Related Factors
81
2.5 Sprint-Point Based Estimation Tool
82
2.5.1 Contents of SPBE Tool
83
2.6 Case Study
83
2.7 Results
84
3 Conclusion
86
References
86
7 Improving Search Results Based on Users’ Browsing Behavior Using Apriori Algorithm
88
Abstract
88
1 Introduction
88
1.1 Introduction to Apriori Algorithm
89
2 Related Work
89
3 Working Methodology
91
4 Example
92
5 Conclusion
96
References
96
8 Performance Efficiency Assessment for Software Systems
98
Abstract
98
1 Introduction
99
2 Related Work
99
3 Proposed Performance Efficiency Model
101
3.1 Performance Efficiency in Quality Models
101
4 Assessment of the Proposed Performance Efficiency Model
102
5 Case Study
104
6 Conclusion and Future Scope
106
References
107
9 Impact of Programming Languages on Energy Consumption for Sorting Algorithms
108
Abstract
108
1 Introduction
108
2 Related Works
109
3 Role of Programming Language in Energy Efficiency
109
4 Sorting Algorithms
110
4.1 Bubble Sort
110
4.2 Selection Sort
111
4.3 Insertion Sort
111
4.4 Quick Sort
111
5 Programming Language
111
5.1 Java [18]
111
5.2 Visual Basic 6.0
112
5.3 C#.Net
112
6 Experimental Setup
112
7 Experimental Run
113
8 Experimental Result and Analysis
113
9 Conclusion
115
References
116
10 Crawling Social Web with Cluster Coverage Sampling
117
Abstract
117
1 Introduction
117
2 Related Work
118
3 Problem Description
119
4 Cluster Coverage Sampling (CCS) Methodology
120
5 Experiments and Result Analysis
124
6 Conclusion and Future Scope
128
References
128
11 Efficient Management of Web Data by Applying Web Mining Pre-processing Methodologies
129
Abstract
129
1 Introduction
129
2 Literature Review
130
3 Data Pre-processing on Web Log File
130
3.1 Field Extraction
131
3.2 Significant Attributes Selection
132
3.3 Data Selection
132
3.4 Data Cleaning
132
3.4.1 Remove Duplicacy
133
3.4.2 Missing Value
133
3.4.3 Noise
133
4 Results and Interpretation
133
5 Conclusion
135
References
135
12 A Soft Computing Approach to Identify Multiple Paths in a Network
137
Abstract
137
1 Introduction
137
2 Related Work
138
3 AntNet Routing Algorithm
139
4 Proposed AntNet Modifications
140
5 Conclusion
143
References
143
13 An Efficient Focused Web Crawling Approach
144
Abstract
144
1 Introduction
144
2 Related Work
146
3 Proposed Method
149
4 Conclusion
151
References
151
14 A New Log Kernel-Based Possibilistic Clustering
152
Abstract
152
1 Introduction
152
2 Literature Work
154
2.1 Fuzzy C-Means Clustering (FCM)
154
2.2 Possibilistic C-Means Clustering (PCM)
155
2.3 Unsupervised Possibilistic C-Means Clustering (UPC)
156
3 Kernel-Based Algorithm
156
3.1 Kernel-Based Approach
156
4 Proposed kernelized UPC-Log Algorithm
157
5 Experimental Results
159
5.1 Synthetic Datasets
159
5.2 High-Dimensional Real Datasets
161
6 Conclusions
164
References
165
15 Fuzzy c-Means Clustering Strategies: A Review of Distance Measures
166
Abstract
166
1 Introduction
167
2 Related Work
167
2.1 Fuzzy c-Means Algorithm
167
2.2 Distance Measures
168
2.2.1 Euclidean Distance
168
2.2.2 Standard Euclidean Distance
169
2.2.3 Mahalanobis Distance
169
2.2.4 Standard Mahalanobis Distance
169
2.2.5 Minkowski Distance
169
2.2.6 Chebyshev Distance
170
3 Experiments’ Results
170
3.1 Synthetic Datasets
170
3.1.1 X_{12} Dataset
170
3.2 High-Dimensional DataSets
173
4 Conclusions
175
References
175
16 Noise Reduction from ECG Signal Using Error Normalized Step Size Least Mean Square Algorithm (ENSS) with Wavelet Transform
176
Abstract
176
1 Introduction
176
2 Proposed Implementation
177
2.1 ENSS Algorithm-Based ANC System
177
2.2 1-D Wavelet Transform (Haar Wavelet Transform)
178
2.3 ENSS-LMS Algorithm
179
2.4 Implementation Steps
179
3 Simulation Results
180
4 Conclusion
183
References
183
17 A Novel Approach for Extracting Pertinent Keywords for Web Image Annotation Using Semantic Distance and Euclidean Distance
185
Abstract
185
1 Introduction
186
2 Related Work
186
3 Proposed Architecture
187
3.1 Crawl Manager
187
3.2 URL Queue
188
3.3 Parser
188
3.4 Visual Web Page Segmenter
189
3.5 Block Analyzer
189
3.6 Nearest Text Block Detector
189
3.7 Tag Text Extractor
190
3.8 Keyword Extractor
190
3.9 Semantic Distance Calculator
190
3.10 Text Extractor
191
3.11 Keyword Determiner
192
3.12 Image Annotation
192
4 Algorithm
192
5 Conclusion
193
References
194
18 Classification of Breast Tissue Density Patterns Using SVM-Based Hierarchical Classifier
196
Abstract
196
1 Introduction
196
2 Methodology
197
2.1 Description of Dataset
197
2.2 Selecting Regions of Interest
197
2.3 Proposed Method
198
3 Results
199
3.1 Classification Performance of Laws’ Texture Features Using Hierarchical Classifier
199
4 Conclusion
201
References
201
19 Advances in EDM: A State of the Art
203
Abstract
203
1 Introduction
203
2 Materials and Methods
204
2.1 Dataset and Its Features
204
2.2 Feature Measurement
205
3 Methodology
205
3.1 AdaBoost Algorithm
206
3.2 Feature Importance Using AdaBoost Algorithm
206
3.3 Machine Learning Methods
207
4 Model Evaluation
208
5 Experimental Result
208
6 Conclusion and Future Scope
210
References
211
20 Proposing Pattern Growth Methods for Frequent Pattern Mining on Account of Its Comparison Made with the Candidate Generation and Test Approach for a Given Data Set
212
Abstract
212
1 Introduction
213
1.1 Association Rule Mining
213
2 Literature Survey
214
3 Experiment
214
4 Result and Discussion
215
5 Conclusion
216
References
217
21 A Study on Initial Centroids Selection for Partitional Clustering Algorithms
219
Abstract
219
1 Introduction
220
2 Study on Initial Centroid Selection for Clustering Algorithms
220
3 Developed Farthest Distributed Centroid Clustering Algorithm
223
3.1 Basic Concept
223
3.2 Farthest Distributed Centroid Clustering Algorithm
223
4 Experimental Study
224
5 Conclusion
226
References
226
22 A Novel Rare Itemset Mining Algorithm Based on Recursive Elimination
229
Abstract
229
1 Introduction
229
1.1 Rare Itemset Mining
230
2 Related Work
231
3 Proposed Rare Itemset Mining Algorithm
232
3.1 Illustration
233
4 Proof of Correctness
237
5 Simulation Results and Discussion
237
6 Conclusion
240
References
240
23 Computation of Various Entropy Measures for Anticipating Bugs in Open-Source Software
242
Abstract
242
1 Introduction
242
2 Literature Review
243
3 Information Theoretic Approach
244
4 Basic Model for Entropy Measurement
245
5 Data Collection and Preprocessing
246
6 Calculation of Arimoto, Havrda–Charvat, and Renyi Entropy
248
7 Analysis and Bug Prediction Approach
249
8 Result and Discussion
251
9 Conclusion
252
References
253
24 Design of Cyber Warfare Testbed
255
Abstract
255
1 Introduction
255
2 Testbed Requirements
256
3 Testbed Design
256
3.1 Design of Cluster
257
3.2 Composing Attack System
257
3.3 Composing Defence System
258
3.4 Data Logger and Report Generation
258
4 Operational Configuration
259
4.1 Scenarios
259
4.2 Attack Emulation
259
5 Analysis
260
5.1 Identification of Measures of Effectiveness (MOEs)
260
5.2 Vulnerability Analysis
260
5.3 Development of Strategy and Tactics
260
6 Conclusion
261
7 Future Scope
261
References
262
25 Performance Evaluation of Features Extracted from DWT Domain
263
Abstract
263
1 Introduction
263
2 Steganography Algorithms
264
3 Proposed DWT Feature Extraction
265
3.1 Histogram
265
3.2 Markov
265
3.3 Existing DWT Farid Features
266
4 Neural Network Classifier
266
5 Experimental Results
267
6 Analysis
267
7 Conclusion
269
References
270
26 Control Flow Graph Matching for Detecting Obfuscated Programs
272
Abstract
272
1 Introduction
272
2 Disassembly of Executables
273
3 Obfuscation Techniques
273
4 Control Flow Graph
274
4.1 Control Flow Graph Reduction
274
4.2 Control Flow Graph Matching
275
5 Proposed Framework
275
5.1 Explanation
275
6 Conclusion
279
References
280
27 A Novel Framework for Predicting Performance of Keyword Queries Over Database
281
Abstract
281
1 Introduction
281
2 Related Work
282
2.1 Post-retrieval Methods
283
2.2 Clarity Score Based
283
2.3 Popularity Based
283
2.4 Challenges in Information Retrieve in Structured Database with Keyword Query
283
3 Proposed System
284
3.1 Objective
284
4 Implementation and Discussion
288
5 Conclusion
289
References
290
28 Predicting and Accessing Security Features into Component-Based Software Development: A Critical Survey
291
Abstract
291
1 Introduction
292
2 Security Specification for Software Component
292
3 Architecture and Design for Secure Software Component
294
4 Proposed Framework for Security of Component-Based Software
296
5 Conclusion and Future Scope
297
References
297
29 Traditional Software Reliability Models Are Based on Brute Force and Reject Hoare’s Rule
299
Abstract
299
1 Introduction
300
2 Software Reliability Measurement
302
3 Brute Force Nature of Traditional Models
303
4 Perceiving Reliability with Hoare’s Logic
304
5 Proposed Model Framework
306
6 Conclusion
307
References
307
30 Object-Oriented Metrics for Defect Prediction
309
Abstract
309
1 Introduction
309
2 Literature Survey
310
3 Methodology
312
3.1 Performance Evaluation Parameters
313
4 Collection of Data
314
5 Results
316
6 Conclusion
320
References
321
31 A Comparative Analysis of Static and Dynamic Java Bytecode Watermarking Algorithms
323
Abstract
323
1 Introduction
323
2 Background
324
2.1 Difficulties Faced by Software Watermarking
325
2.2 Watermarking Techniques
325
2.3 Classification of Watermark
326
2.4 Types of Attacks to Watermarks [13]
326
3 The Empirical Evaluation
326
3.1 The Watermarker
327
3.1.1 Static Watermarking Algorithms Are as
327
3.1.2 Dynamic Watermarking Algorithms
328
3.2 The Transformation Attacks
328
3.3 The Test Case Jar Files
328
4 Results
328
4.1 Static Watermarking Algorithms
329
4.1.1 Watermarking
329
4.1.2 Obfuscation
329
4.1.3 Recognition
330
4.2 Dynamic Watermarking Algorithms
331
4.2.1 Watermarking
331
4.2.2 Obfuscation
332
4.2.3 Recognition
334
4.3 Comparative Analysis of Static and Dynamic Software Watermarking Algorithms
334
4.4 Analysis of Results
336
5 Conclusion
336
References
337
32 Software Architecture Evaluation in Agile Environment
339
Abstract
339
1 Introduction
339
1.1 Definition of Software Architecture
340
1.2 Software Architectonics and Software Architect
340
1.3 Agile Software Development
340
1.4 Agile Architecture Is a Paradox
341
2 Literature Survey
342
3 Problem Definition
344
4 Objectives
344
5 Experimental Design
345
5.1 Software Architecture Metrics
345
5.2 Agile Software Metrics
345
5.3 Eclipse
347
5.4 X-Ray
350
5.5 JArchitect
352
5.6 JFreeChart
352
6 Results and Discussion
353
7 Conclusion
359
8 Future Scope
359
References
359
33 Mutation Testing-Based Test Suite Reduction Inspired from Warshall’s Algorithm
361
Abstract
361
1 Introduction
361
2 Related Work
362
3 Methodology
363
3.1 Research Questions
363
3.2 Experimental Design
363
3.3 Procedure
364
3.3.1 Algorithm of Proposed Approach
364
3.3.2 Time Complexity of the Proposed Approach
366
4 Results
366
5 Conclusion and Future Work
367
References
367
34 Software Component Retrieval Using Rough Sets
369
Abstract
369
1 Introduction
369
2 Related Work
370
3 Decision Making Using Rough Sets
371
3.1 Rough Sets
371
3.2 Methodology for Component Extraction
371
4 Results and Analysis
374
5 Conclusion
377
References
377
35 Search-Based Secure Software Testing: A Survey
379
Abstract
379
1 Introduction
379
2 Key Points
380
3 Strategies of Research
381
3.1 Research Questions
381
4 Elucidation for Research Questions
381
4.1 RQ1: What Is Metaheuristic and Its Techniques?
381
4.2 RQ2: Why SBST Is Used to Tackle Security Vulnerabilities?
382
4.3 RQ3: What Is Meant by Software Security Testing?
383
5 Threats
383
6 Conclusion
384
References
384
36 Limitations of Function Point Analysis in Multimedia Software/Application Estimation
386
Abstract
386
1 Introduction
387
2 Function Point Analysis (FPA)
388
2.1 External Inputs (EIs)
388
2.2 External Outputs (EOs)
388
2.3 External Inquiries (EQs)
389
2.4 Internal Logical Files (ILFs)
389
2.5 External Interface Files (EIFs)
389
2.6 Rating of Components
389
2.7 Calculation of Complexity Adjustment Factor (CAF)
390
3 Multimedia Systems Features Against FPA
392
3.1 Limitations of FPA
393
4 Conclusion
394
References
395
37 Maintainability Analysis of Component-Based Software Architecture
396
Abstract
396
1 Introduction
396
2 Maintainability Scenario and Graph
398
3 Maintainability Analysis and Scenario Evaluation
402
4 Conclusion
403
References
403
38 An Assessment of Vulnerable Detection Source Code Tools
405
Abstract
405
1 Introduction
405
2 Tools
407
2.1 Cppcheck 1.68 [7]
407
2.2 Flawfinder [8]
407
2.3 Visual Code Grepper (VCG) [9]
408
3 Comparison/Analysis of Tools
409
3.1 Conceptual Comparison
409
3.2 Empirical Comparison
410
4 Conclusion and Future Scope
413
References
413
39 Devising a New Method for Economic Dispatch Solution and Making Use of Soft Computing Techniques to Calculate Loss Function
415
Abstract
415
1 Introduction
415
2 New Approach for the Solution of Economic Dispatch Problem
416
2.1 Steps of the Deterministic Approach
416
2.2 Description of Fuzzy Sets Used in the New Approach
418
2.3 Usage of Genetic Algorithm in the Method
419
3 Illustrations and Result
419
3.1 Sample System Consisting of Two Generators
419
3.2 Conclusions
420
References
421
40 Trusted Operating System-Based Model-Driven Development of Secure Web Applications
422
Abstract
422
1 Introduction
423
2 Secure Web Application Modeling
425
3 Axes of Change in Round-trip Engineering
427
4 Conclusion
432
References
432
41 Navigational Complexity Metrics of a Website
434
Abstract
434
1 Introduction
434
2 Factors Affecting Navigational Complexity of the Website
435
2.1 Website Structural Complexity
435
2.2 Other Factors
436
2.2.1 Website Defects
436
2.2.2 Maximum Depth
437
2.2.3 Path Density
437
3 Methodology
437
4 Results and Discussion
439
5 Conclusions
440
References
440
42 Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems
442
Abstract
442
1 Introduction
442
2 Background and Related Work
443
3 Methodology
444
3.1 Metrics
444
3.2 Web Server Tests
445
4 Case Study—Results and Discussion
446
References
448
43 Component-Based Quality Prediction via Component Reliability Using Optimal Fuzzy Classifier and Evolutionary Algorithm
449
Abstract
449
1 Introduction
449
2 Related Work
450
3 Proposed Methodology for Software Quality Prediction
450
3.1 Steps Involved in the Software Quality Prediction
451
3.2 Software Cost and Reliability Measure to Estimate the Quality
451
3.2.1 Software Reliability Measure
451
Fuzzy Logic
452
Fuzzy Rule Optimization Using Evolutionary Programming (EP)
452
3.2.2 Software Cost Measure
454
4 Results and Discussion
454
5 Conclusion
455
References
456
44 Applying Statistical Usage Testing Along with White Box Testing Techniques
457
Abstract
457
1 Introduction
458
2 White Box Testing Techniques (WBTT)
459
2.1 Use of White Box Testing Techniques (WBTTs) with SUT
459
2.2 Types of White Box Testing Techniques
460
3 Testing ‘HTML to Text Converter Utility’ Using SUT
463
3.1 HTML to TEXT Utility
463
3.2 SUT for HTML to TEXT Converter
463
4 Applying SUT Along with WBTT
466
4.1 Control Flow Testing (CFT)
466
4.2 Data Flow Testing (DFT)
470
4.3 Mutation Testing
472
5 Findings and Conclusion
473
6 Limitations and Future Work
473
Acknowledgements
473
References
474
45 A Review on Application Security Management Using Web Application Security Standards
476
Abstract
476
1 Introduction
477
2 Objective
477
3 Scope
477
4 Types of Vulnerabilities
477
5 Methodology
479
5.1 Design
479
5.2 Coding
480
5.3 Security Testing
480
5.4 Delivery and Deployment
480
6 Management Practices
481
6.1 Requirements, Design, and Development
481
6.2 Testing
482
6.3 Audience
482
6.4 Verification Matrix
482
7 Conclusion
485
References
485
46 A Review of Software Testing Approaches in Object-Oriented and Aspect-Oriented Systems
486
Abstract
486
1 Introduction
486
2 Evaluation Criteria
487
3 Object-Oriented Testing
490
4 Aspect-Oriented Testing
491
5 Conclusion and Limitations
492
Acknowledgements
493
References
493
47 A Literature Survey of Applications of Meta-heuristic Techniques in Software Testing
496
Abstract
496
1 Introduction
496
2 Meta-heuristic Techniques
497
2.1 Ant Colony Optimization
497
2.2 Genetic Algorithm
497
3 Benchmark for Evaluation
498
4 Analysis of ACO and GA
500
4.1 Genetic Algorithm
500
4.2 Aco
501
5 Conclusion
502
References
503
48 A Review of Test Case Prioritization and Optimization Techniques
505
Abstract
505
1 Introduction
505
1.1 Regression Testing
506
1.2 Test Case Prioritization
506
1.3 Techniques of Test Case Prioritization and Optimization
506
2 Literature Survey
507
2.1 Research Questions
507
3 Analysis of Papers
507
4 Conclusion
512
References
512
49 Software Development Activities Metric to Improve Maintainability of Application Software
515
Abstract
515
1 Introduction
515
2 Software Development Activities Metric to Improve the Maintainability
516
3 Analysis of SDA Metric
517
4 Conclusion
521
References
521
50 Label Count Algorithm for Web Crawler-Label Count
522
Abstract
522
1 Introduction
522
2 Preliminaries
523
2.1 Crawling Strategy
523
2.2 Architecture
524
3 Schemes for Web Crawling
525
3.1 Genetic Algorithm
525
3.2 Breadth-First Search Algorithm
525
3.3 Page Rank Algorithm
526
3.4 Depth-First Search Algorithm
526
4 Conclusion and Future Work
528
References
528
51 Vulnerability Discovery in Open- and Closed-Source Software: A New Paradigm
529
Abstract
529
1 Introduction
529
2 Proposed Approach
531
3 Parameter Estimations
533
4 Prediction Capabilities of Models
533
5 Conclusion
534
References
534
52 Complexity Assessment for Autonomic Systems by Using Neuro-Fuzzy Approach
536
Abstract
536
1 Introduction
536
2 Autonomic Computing-Enabled Systems
537
2.1 Architecture of Autonomic System
538
3 Literature Review
539
4 Proposed Model
541
4.1 Implementation of the Proposed Approach
542
4.2 Empirical Evaluation
542
5 Conclusion and Future Work
543
References
543
53 Proposal for Measurement of Agent-Based Systems
545
Abstract
545
1 Introduction
545
2 Existing Metrics
547
3 The Necessity for New Metrics
548
4 Advancement in Metrics
549
5 Conclusion
554
References
554
54 Optimal Software Warranty Under Fuzzy Environment
557
Abstract
557
1 Introduction
558
2 The Cost Model
559
3 Problem Formulation
560
4 Numerical Example
561
5 Conclusion
562
References
563
55 Automation Framework for Test Script Generation for Android Mobile
564
Abstract
564
1 Introduction
564
2 Related Work
565
3 Architecture of Proposed Framework
566
3.1 Overview of the proposed framework
566
3.2 Architecture of the Virtual Test Engineer
566
3.3 Mobile side architecture
569
4 Case Study
571
5 Experimental Results
573
5.1 Horizontal deployment
573
5.2 Bug fixing/Enhancement
575
6 Comparison with Other Methods
575
7 Conclusions
576
References
576
56 Optimizing the Defect Prioritization in Enterprise Application Integration
578
Abstract
578
1 Introduction
578
2 Literature Review
579
3 Genetic Algorithm
581
4 Proposed Approach and Experimental Set-up
581
5 Outcomes and Discussions
584
6 Conclusions
589
References
589
57 Desktop Virtualization—Desktop as a Service and Formulation of TCO with Return on Investment
591
Abstract
591
1 Introduction
591
2 Components of DaaS
593
3 Comparison of DaaS Providers
595
4 Obstacles in Adoption of DaaS
596
5 Formulation of TCO/ROI
597
6 Conclusion
599
References
599
58 An Assessment of Some Entropy Measures in Predicting Bugs of Open-Source Software
601
Abstract
601
1 Introduction
602
2 Literature Review
603
3 Entropy Measures and Code Change Process
603
4 Methodology
605
4.1 Data Collection and Preprocessing
605
4.2 Evaluation of Shannon, Renyi, and Tsallis Entropies
605
5 Bug Prediction Modeling
606
6 Assessment of Entropy Measures
609
6.1 One-Way ANOVA
610
6.2 Tukey’s HSD Test
610
7 Conclusion and Future Scope
612
References
613
59 A Path Coverage-Based Reduction of Test Cases and Execution Time Using Parallel Execution
614
Abstract
614
1 Introduction
614
2 Problem Description
616
3 Proposed Technique
616
3.1 Algorithm
616
4 Parallel Test Case Executor
618
5 Result and Analysis
619
6 Conclusion
620
References
620
60 iCop: A System for Mitigation of Felonious Encroachment Using GCM Push Notification
622
Abstract
622
1 Introduction
623
2 Feasibility Study
623
3 A Brief About Arduino Platform
624
4 Methodology
625
5 iCop System
625
5.1 Testing Results
626
5.2 Risk Analysis
627
6 Conclusion
628
References
629
61 Clustering the Patent Data Using K-Means Approach
630
Abstract
630
1 Introduction
630
2 Background Study
631
2.1 Processing of Algorithm
632
3 Methodology
633
4 Experiments and Results
633
5 Conclusion
635
References
636
62 Success and Failure Factors that Impact on Project Implementation Using Agile Software Development Methodology
637
Abstract
637
1 Introduction
637
2 Literature Review
638
3 Different Factors in the Agile Development
639
4 Strategies for Mitigating Factors Affecting Agile and Distributed Agile Development
640
5 Case Study
641
6 Findings
642
6.1 Outcomes
642
7 Conclusion
644
References
644
63 Fuzzy Software Release Problem with Learning Functions for Fault Detection and Correction Processes
645
Abstract
645
1 Introduction
645
2 Formulation of Problem
646
2.1 Software Reliability Growth Models
646
2.2 The Cost Model
648
2.3 Problem Formulation
648
3 Problem Solution and Numerical Example
649
3.1 Problem Solution
649
3.2 Numerical Example
649
4 Conclusion
651
References
651
64 Reliability Assessment of Component-Based Software System Using Fuzzy-AHP
652
Abstract
652
1 Introduction
652
2 Methodology
653
2.1 Identification of Factors
653
2.1.1 The Deployment Context
653
2.1.2 Human Factor
654
2.1.3 Analysis and Design Factor
654
2.1.4 Testing Factor
654
2.2 Evaluation of Reliability Using Analytical Hierarchy Process
654
2.2.1 Building the Hierarchy
654
2.2.2 Pair-Wise Comparisons
654
2.2.3 Relative Weight Estimation
655
2.3 Fuzzy Comprehensive Evaluation
656
2.3.1 Create Sets of Grade Factors and Elements
656
2.3.2 Derive a Single-Factor Evaluation Matrix R from U to V
656
2.3.3 Find Results of Comprehensive Evaluation
657
2.3.4 Comprehensive Multi-level Fuzzy Evaluation
658
2.3.5 Conclude Evaluation
658
3 Conclusion
658
References
658
65 Ranking Usability Metrics Using Intuitionistic Preference Relations and Group Decision Making
660
Abstract
660
1 Introduction
660
2 Literature Survey
661
3 Basics of Group Decision Making
662
4 Application of Group Decision Making to Rank Usability Metrics
663
5 Illustrative Example
665
6 Conclusion
666
Appendix 1
667
Appendix 2
667
References
668
66 Research Challenges of Web Service Composition
669
Abstract
669
1 Introduction
669
2 Semantic-Based Composition Techniques
671
3 Composition Research Challenges
673
3.1 Semantic Web Services Languages, Discovery, and Selection Challenges
673
3.2 Composition Challenges
674
3.3 Scalability, Adaptation, and Management
675
4 Conclusions and Future Work
675
References
676
67 Automation Software Testing on Web-Based Application
678
Abstract
678
1 Introduction
678
2 Literature Review
679
3 Automated Testing
679
4 Proposed Method
680
4.1 Experimental Work
682
4.2 Comparison and Result Between Traditional and Agile Automated Testing Model
683
5 Conclusion
684
References
684
68 Automated Test Data Generation Applying Heuristic Approaches—A Survey
686
Abstract
686
1 Introduction
686
2 Literature Survey
688
2.1 Software Testing
688
2.2 Test Data Generation
689
2.3 Heuristic Approaches
689
2.4 Applying Heuristics in Test Data Generation
690
3 Heuristic Approaches Applied in Test Data Generation
692
4 Conclusion
694
69 Comparison of Optimization Strategies for Numerical Optimization
696
Abstract
696
1 Introduction
696
2 Related Work
697
3 Proposed Work
698
3.1 Particle Swarm Optimization
698
3.2 Artificial Bee Colony
698
3.3 Teacher–Learner-Based Optimization
699
3.4 Differential Evolution
700
3.5 Benchmark Functions
701
4 Experimental Results and Analysis
702
5 Conclusion
703
References
703
70 Sentiment Analysis on Tweets
704
Abstract
704
1 Introduction
705
2 Literature Survey
706
3 Proposed System
707
4 Implementation
707
4.1 Tweets Extraction
707
4.2 Stop Words Removal
709
4.3 Split Keywords
709
4.4 Bag of Words
709
4.5 Polarity Comparison
710
4.6 Calculating Polarity
710
5 Conclusion
710