Software Engineering: Application of Enhanced Testing Methods to Equations
|
|
- Elaine Gibson
- 5 years ago
- Views:
Transcription
1 Volume-6, Issue-4, July-August 2016 International Journal of Engineering and Management Research Page Number: Software Engineering: Application of Enhanced Testing Methods to Equations Shirdi Wazeed Baba 1, K Nikhil Reddy 2 1 Bachelor of Technology (Computer Science) Final Year at Indian Institute of Information Technology Design and Manufacturing, Jabalpur, INDIA 2 Bachelor of Technology (Information Technology) Final Year at Manipal Institute of Technology, Manipal, INDIA ABSTRACT Software testing plays an important role in the Software Development Life Cycle. Model-based testing has gained a lot of prominence in recent times with organizations looking for automation of test case design and execution in lieu of a manual testing process. Modelbased testing techniques help generate numerous test artifacts such as test cases, test sequences, executable test scripts and requirement traceability matrix. In modelbased software engineering, models can broadly be classified into two categories: 1. Static models and 2. Dynamic models Static models represent the structural aspects of the system (e.g., class diagrams). On the other hand, dynamic models capture the behavioral aspects of the system (e.g., activity diagrams).this paper encompasses different black-box testing techniques like robustness, equivalence class testing,boundary value analysis etc.these techniques are implemented on cubic equation problem and evaluated test cases using these different techniques. Keywords--- Black-Box testing, testing, test cases, software engineering. I. INTRODUCTION Testing is the process of evaluating a system or its component(s) with the intent to find that whether it satisfies the specified requirements or not. This activity results in the actual, expected and difference between their results. In simple words testing is executing a system in order to identify any gaps, errors or missing requirements in contrary to the actual desire or requirements. According to ANSI/IEEE 1059 standard, Testing can be defined as A process of analyzing a software item to detect the differences between existing and required conditions (that is defects/errors/bugs) and to evaluate the features of the software item. Overview II. SOFTWARE TESTING Software testing is the process of evaluation a software item to detect differences between given input and expected output. Also to assess the feature of A software item. Testing assesses the quality of the product. Software testing is a process that should be done during the development process. In other words software testing is a verification and validation process. Black box Testing Black box testing is a testing technique that ignores the internal mechanism of the system and focuses on the output generated against any input and execution of the system. It is also called functional testing. White box Testing White box testing is a testing technique that takes into account the internal mechanism of a system. It is also called structural testing and glass box testing. Black box testing is often used for validation and white box testing is often used for verification. Black Box vs White Box Testing The basic difference between black-box and white-box testing is the areas of focus which they choose. We can simply say that black-box testing is focused on results. Where if an action is performed and the desired result is obtained then the process that has actually been used is irrelevant. White-box testing, on the other hand focuses on the internal working of an application and it is considered to be complete only when all the components are tested for proper functioning. Experiment: We evaluate number of test cases using different techniques for a cubic equation. Boundary Value Analysis The boundary points are not tested properly for many inputs which in turn leads to errors as most of the errors generally occur at boundaries of the input domain. Boundary Value Analysis (BVA) leads to selection of test cases that exercise boundary values. We have a cubic equation and we should evaluate the outputs that are generated based on the inputs given. Experience shows that test cases that are close to boundary 95 Copyright Vandana Publications. All Rights Reserved.
2 conditions have higher chances of detecting an error. Here boundary condition means an input value may be on the boundary or just above the boundary. Here we have input variables with in a limit of The boundary values are 0, 1, 50, 99, 100. In this total number of test cases would be (4n+1). For a cubic equation the n would be 4, so total number of test cases would be 4n+1= 4 4+1= 17 where n=4 Robustness Testing Robustness is defined as the degree to which a system operates correctly in the presence of exceptional inputs or stressful environmental conditions. We can say it as an extension of BVA. Here we see that what happens when the extreme values are exceeded with a valve slightly greater than maximum and the value slightly less than minimum. There would be total number of test cases are (6n+1). Here we have input variables with in a limit of The input variables are -1, 0, 1, 50, 99, 100, 101.For a cubic equation the n value 4, so total number of test cases would be 6n+1= 6 4+1= 25 where n=4 Equivalence Class Testing Equivalence class is a testing technique in which input data is divided into various partitions called as equivalence classes.test cases are designed for equivalence data class. The equivalence partitions are frequently derived from the requirements specification for input data that influence the processing of the test object. Time taken for testing a software can be reduced by using appropriate test cases. It is preferably used first level of software testing. From each partition only one condition is tested as in a given partition all the conditions are considered as same. i.e if any one condition fails in a class it is assumed that all the conditions will behave in a same way i.e they fail. In this paper we have a problem of Cubic Equation for which we have generated test cases using equivalence class testing technique. Here we have two domains: Input & output domain. n=4 (p,q,r,s) Input domain: Input 1 : p : p=0 Input2 : p: p<0 Input 3 : p:1<p<100 Input 4 : p: p>100 Input 5 : q: q<0 Input 6 : q:1<q<100 Input 7 : q:q>100 Input 8 : r: r<0 Input 9 : r:1<r<100 Input 10 : r: r>100 Input 11 : s: s<0 Input 12 : s:1<s<100 Input 13 : s: s>100 Output Domain: Output 1 : <p,q,r,s> : in case p=0 the equation is not cubic Output 2 : <p,q,r,s> : are real roots if h >0 96 Copyright Vandana Publications. All Rights Reserved.
3 Output 3 : <p,q,r,s> : are equal roots if h= 0 Output 4 : <p,q,r,s> : are imaginary roots if h<0 Result tables In this section we have summarized the results in the following tables. Here general cubic equation has the form px 3 +qx 2 +rx+s the coefficients p,q,r,s the following cases need to be considered: If h> 0, then the equation has three distinct real roots. If h = 0, then the equation has a multiple root and all its roots are real. If h< 0, then the equation has imaginary roots. Table 1. Bounded Value Analysis Result Test Case p q r s Output Not Cubic equation Table 1. Bounded Value Analysis Result (Contd ) Imaginary roots Imaginary roots Imaginary roots Imaginary roots `50 0 Imaginary roots Equal roots Note: Total no of test cases= 4n+1 where n =4 Table 2. Robustness Test cases Result Test p q r s Output Input invalid Not Cubic equation 97 Copyright Vandana Publications. All Rights Reserved.
4 Input invalid Input invalid Imaginary roots Imaginary roots input Input invalid Imaginary roots Imaginary roots Input invalid Input invalid Imaginary roots Imaginary roots Table 2. Robustness Test cases Result (Contd ) Invalid input 98 Copyright Vandana Publications. All Rights Reserved.
5 Note: Total no of test cases= 6n+1 where n =4 Table 3. Equivalence class Testing Results p q r s Expected o/p Not cubic Equation Imaginary root Real root Real root Real root Real root Real root Imaginary root Imaginary root Imaginary root Real root Real root Imaginary root Imaginary root Imaginary root Imaginary root Imaginary root Real root Real root Real root 99 Copyright Vandana Publications. All Rights Reserved.
6 III. RESULTS OF EXPERIMENTS Type of Testing Test Case Performance Boundary value 17 Good Robustness Testing 25 Fair Worst Testing 625 Worst IV. CONCLUSION Testing is an important technique for the improvement and measurement of a software system s quality. To make the problem statement clear it is always better to use black box testing method to test the program as you write it instead of fixing it later. This paper has investigated the problem of cubic equation in order to detect domain faults. We have shown a purely geometric basis for test generation. In this we investigate various possible inputs and generate the desired outputs with the help of various black box testing methodologies. CODE #include<stdio.h> #include<math.h> int main() char say; double E; int j=0,a=1,b=1; double n = 12; double p,q,r,s; double gx,gpx,m,x; printf("enter the value of p, q, r and s: "); scanf("%lf %lf %lf %lf",&p,&q,&r,&s); if(p>0) printf("enter your initial guess value of x ): "); scanf("%lf",&m); printf("enter the value of convergence limit: "); scanf("%lf",&e); while(say!='q') x= m; gx = p*x*x*x +q*x*x +r*x +s; j=0; while(j<n) j=j+1; gx = p*x*x*x +q*x*x +r*x +s; 100 Copyright Vandana Publications. All Rights Reserved.
7 gpx = 3*p*x*x +2*q*x +r; x= x - (gx/gpx); printf("after iteration %d, root = %f\n", b++, x); printf("to continue enter c to quit enter q :"); scanf("%c", & say); if(say=='c') printf("please put the values p, q, r and s (separated by space): "); scanf("%lf %lf %lf %lf",&p,&q,&r,&s); V. FUTURE ASPECTS The future approach would be in implementing code to calculate roots of any cubic equation based on the inputs given to it and then use white box testing to test the code. REFERENCES [1] A Code-Based Input Partitioning Method for Equivalence Class Testing Lwin Khin Shar; Hee Beng Kuan Tan; Hui Lui Software Engineering (WCSE), 2010 Second World Congress on Year: 2010, Volume: 2 Pages: , DOI: /WCSE IEEE Conference Publications [2] Reusing black box test paths for white box testing of websites Rajiv Chopra; Sushila Madan Advance Computing Conference (IACC), 2013 IEEE 3rd International Year: 2013 Pages: , DOI: /IAdCC IEEE Conference Publications [3] Test Data Generation from UML State Machine Diagrams using Gas Chartchai Doungsa-ard; Keshav Dahal; Alamgir Hossain; Taratip Suwannasart International Conference on Software Engineering Advances (ICSEA 2007) Year: 2007 Pages: 47-47, DOI: /ICSEA Cited by: Papers (7) IEEE Conference Publications [4] How to solve a cubic equation. Part 1. The shape of the discriminant J. F. Blinn IEEE Computer Graphics and Applications Year: 2006, Volume: 26, Issue: 3 Pages: 84-93, DOI: /MCG Cited by: Papers (2) IEEE Journals & Magazines [5] Mining Frequent Patterns from Software Defect Repositories for Black-Box Testing Ning Li; Zhanhuai Li; Lijun Zhang Intelligent Systems and Applications (ISA), nd International Workshop on Year: 2010 Pages: 1-4, DOI: /IWISA Cited by: Papers (1) IEEE Conference Publication [6] Ostrand, T.J., and Balcer, M. J. The Category- Partition Method for Specifying and Generating Functional Tests. Communications of ACM, 31, 3(June 1988), [7] Poston, R.M. Automating Specification-based Software Testing, IEEE, [8] Perry, W. Effective Methods for Software Testing, Wiley, [9] Clarke, L. A., Hassell, J., and Richardson, D. J A close look at domain testing. IEEE Transactions on Software Engineering 8, 4, Copyright Vandana Publications. All Rights Reserved.
CS 451 Software Engineering Winter 2009
CS 451 Software Engineering Winter 2009 Yuanfang Cai Room 104, University Crossings 215.895.0298 yfcai@cs.drexel.edu 1 Software Testing Techniques FUNDAMENTALS The goal of testing is to find errors. A
More informationSoftware Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Software Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 07 Special Value Testing Welcome to this session. So far we had looked
More informationSoftware Testing. 1. Testing is the process of demonstrating that errors are not present.
What is Testing? Software Testing Many people understand many definitions of testing :. Testing is the process of demonstrating that errors are not present.. The purpose of testing is to show that a program
More informationAn automatic test data generation from UML state diagram using genetic algorithm.
An automatic test data generation from UML state diagram using genetic algorithm. Item Type Conference paper Authors Doungsa-ard, Chartchai; Dahal, Keshav P.; Hossain, M. Alamgir; Suwannasart, T. Citation
More informationSoftware Testing for Developer Development Testing. Duvan Luong, Ph.D. Operational Excellence Networks
Software Testing for Developer Development Testing Duvan Luong, Ph.D. Operational Excellence Networks Contents R&D Testing Approaches Static Analysis White Box Testing Black Box Testing 4/2/2012 2 Development
More informationTopic: Software Verification, Validation and Testing Software Engineering. Faculty of Computing Universiti Teknologi Malaysia
Topic: Software Verification, Validation and Testing Software Engineering Faculty of Computing Universiti Teknologi Malaysia 2016 Software Engineering 2 Recap on SDLC Phases & Artefacts Domain Analysis
More informationSoftware Testing. Software Testing. in the textbook. Chapter 8. Verification and Validation. Verification Techniques
Software Testing in the textbook Software Testing Chapter 8 Introduction (Verification and Validation) 8.1 Development testing 8.2 Test-driven development 8.3 Release testing 8.4 User testing 1 2 Verification
More informationTesting Process and Methods. CS 490MT/5555, Spring 2017, Yongjie Zheng
Testing Process and Methods CS 490MT/5555, Spring 2017, Yongjie Zheng Context of Software Testing Verification & Validation Verification: checking that the software conforms to its specification. Validation:
More informationAerospace Software Engineering
16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated
More informationLECTURE 8 TEST DESIGN TECHNIQUES - I
LECTURE 8 TEST DESIGN TECHNIQUES - I EQUIVALENCE CLASS PARTITIONING: Equivalence Class Partitioning is a test case design techniques in black box testing. Equivalence partitioning is a Test Case Design
More informationDarshan Institute of Engineering & Technology for Diploma Studies
CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations
More informationOBJECT SORTING IN MANUFACTURING INDUSTRIES USING IMAGE PROCESSING
OBJECT SORTING IN MANUFACTURING INDUSTRIES USING IMAGE PROCESSING Manoj Sabnis 1, Vinita Thakur 2, Rujuta Thorat 2, Gayatri Yeole 2, Chirag Tank 2 1 Assistant Professor, 2 Student, Department of Information
More informationOptical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 91-95 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network Raghuraj
More informationTEST AUTOMATION EFFORT ESTIMATION - Lesson Learnt & Recommendations. Babu Narayanan
TEST AUTOMATION EFFORT ESTIMATION - Lesson Learnt & Recommendations Babu Narayanan 1. Candidates for test automation. One of the classical mistakes of the test automation team is: NOT choosing right test
More information7.0 Test Design Techniques & Dynamic Testing
7.0 Test Design Techniques & Dynamic Testing Test Design Techniques 7.1 The Test Development Process 7.2 Categories of Test Design Techniques 7.3 Specification based or Black Box Techniques 7.4 Structure
More informationVerification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process
Verification and Validation Assuring that a software system meets a user s needs Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 19,20 Slide 1
More informationSoftware Testing Fundamentals. Software Testing Techniques. Information Flow in Testing. Testing Objectives
Software Testing Fundamentals Software Testing Techniques Peter Lo Software Testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding.
More informationLearn Well Technocraft
-This course includes Manual Testing aspects plus basic automation testing tools. The content included in the syllabus is sufficient for clearing the ISTQB certification. Note: We have combo course and
More informationPESIT Bangalore South Campus
USN 1 P E PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Information Science & Engineering INTERNAL ASSESSMENT TEST 1 Date : 23/02/2016 Max Marks: 50
More informationFunctional Testing (Black Box Testing)
Functional Testing (Black Box Testing) In black box testing, program is treated as a black box. Implementation details do not matter. Takes a user point of view. Functional testing verifies that each function
More informationA NOVEL APPROACH FOR TEST SUITE PRIORITIZATION
Journal of Computer Science 10 (1): 138-142, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.138.142 Published Online 10 (1) 2014 (http://www.thescipub.com/jcs.toc) A NOVEL APPROACH FOR TEST SUITE PRIORITIZATION
More informationAn Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data
An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University
More informationEquivalence Class Partitioning and Boundary Value Analysis -Black Box Testing Techniques
Equivalence Class Partitioning and Boundary Value Analysis -Black Box Testing Techniques In this tutorial, we will discuss the approach to design the test cases and also how to apply the boundary value
More informationSoftware Testing MANUAL TESTING. Introduction to Testing. Software Quality Software Testing Definition. Different Life Cycle Models Waterfall Model
Software Testing MANUAL TESTING Introduction to Testing 1. Brief History of Testing 2. Testing Opportunities 3. Testing Principles Software Quality Software Testing Definition 1. Verification 2. Validation
More informationChapter 11, Testing. Using UML, Patterns, and Java. Object-Oriented Software Engineering
Chapter 11, Testing Using UML, Patterns, and Java Object-Oriented Software Engineering Outline Terminology Types of errors Dealing with errors Quality assurance vs Testing Component Testing! Unit testing!
More informationDevelopment of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods
Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods IKUO TANABE Department of Mechanical Engineering, Nagaoka University
More informationThe Hibernate Framework Query Mechanisms Comparison
The Hibernate Framework Query Mechanisms Comparison Tisinee Surapunt and Chartchai Doungsa-Ard Abstract The Hibernate Framework is an Object/Relational Mapping technique which can handle the data for applications
More informationET-based Test Data Generation for Multiple-path Testing
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 ET-based Test Data Generation for Multiple-path Testing Qingjie Wei* College of Computer
More informationG 2 Interpolation for Polar Surfaces
1 G 2 Interpolation for Polar Surfaces Jianzhong Wang 1, Fuhua Cheng 2,3 1 University of Kentucky, jwangf@uky.edu 2 University of Kentucky, cheng@cs.uky.edu 3 National Tsinhua University ABSTRACT In this
More informationLecture 15 Software Testing
Lecture 15 Software Testing Includes slides from the companion website for Sommerville, Software Engineering, 10/e. Pearson Higher Education, 2016. All rights reserved. Used with permission. Topics covered
More informationAn Efficient Character Segmentation Based on VNP Algorithm
Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:
More informationSOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur
SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur School of Computing, Department of IT 1 School of Computing, Department 2 SOFTWARE TESTING
More informationLecture 20: SW Testing Presented by: Mohammad El-Ramly, PhD
Cairo University Faculty of Computers and Information CS251 Software Engineering Lecture 20: SW Testing Presented by: Mohammad El-Ramly, PhD http://www.acadox.com/join/75udwt Outline Definition of Software
More informationSection 5.4 Properties of Rational Functions
Rational Function A rational function is a function of the form R(xx) = P(xx), where P(xx)and Q(xx) are polynomial Q(xx) functions and Q(xx) 0. Domain is the set of all real numbers xx except the value(s)
More informationSoftware Testing part II (white box) Lecturer: Giuseppe Santucci
Software Testing part II (white box) Lecturer: Giuseppe Santucci 4. White box testing White-box (or Glass-box) testing: general characteristics Statement coverage Decision coverage Condition coverage Decision
More informationAutomated Software Testing Using Metahurestic Technique Based on An Ant Colony Optimization
Automated Software Testing Using Metahurestic Technique Based on An Ant Colony Optimization Praveen Ranjan Srivastava Computer Science and Information System Group Birla Institute of Technology and Science,(BITS),
More informationMainline Functional Testing Techniques
Mainline Functional Testing Techniques (4 flavors) Equivalence Partitions (another 4 flavors) Special Value Testing Output Domain (Range) Checking Decision Table Based Testing (aka Cause and Effect Graphs
More informationChapter 9. Software Testing
Chapter 9. Software Testing Table of Contents Objectives... 1 Introduction to software testing... 1 The testers... 2 The developers... 2 An independent testing team... 2 The customer... 2 Principles of
More informationQUIZ #5 - Solutions (5pts each)
CS 435 Spring 2014 SOFTWARE ENGINEERING Department of Computer Science Name QUIZ #5 - Solutions (5pts each) 1. The best reason for using Independent software test teams is that a. software developers do
More informationASTQB Advance Test Analyst Sample Exam Answer Key and Rationale
ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale Total number points = 120 points Total number points to pass = 78 points Question Answer Explanation / Rationale Learning 1 A A is correct.
More information340 Review Fall Midterm 1 Review
340 Review Fall 2016 Midterm 1 Review Concepts A. UML Class Diagrams 1. Components: Class, Association (including association name), Multiplicity Constraints, General Constraints, Generalization/Specialization,
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should
More informationSoftware Testing. Testing: Our Experiences
Software Testing Testing: Our Experiences Test Case Software to be tested Output 1 Test Case Generation When to Stop? Test Case Software to be tested Verification Output No Enough? Test Coverage Yes A
More informationSample Question Paper. Software Testing (ETIT 414)
Sample Question Paper Software Testing (ETIT 414) Q 1 i) What is functional testing? This type of testing ignores the internal parts and focus on the output is as per requirement or not. Black-box type
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationIntroduction to Dynamic Analysis
Introduction to Dynamic Analysis Reading assignment Gary T. Leavens, Yoonsik Cheon, "Design by Contract with JML," draft paper, http://www.eecs.ucf.edu/~leavens/jml//jmldbc.pdf G. Kudrjavets, N. Nagappan,
More informationMACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS
MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS N. Kannadhasan and B. Uma Maheswari Department of Master of Computer Applications St. Joseph s College of Engineering, Chennai,
More informationCS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning
CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning Justin Chen Stanford University justinkchen@stanford.edu Abstract This paper focuses on experimenting with
More informationChapter 8 The C 4.5*stat algorithm
109 The C 4.5*stat algorithm This chapter explains a new algorithm namely C 4.5*stat for numeric data sets. It is a variant of the C 4.5 algorithm and it uses variance instead of information gain for the
More informationFull Custom Layout Optimization Using Minimum distance rule, Jogs and Depletion sharing
Full Custom Layout Optimization Using Minimum distance rule, Jogs and Depletion sharing Umadevi.S #1, Vigneswaran.T #2 # Assistant Professor [Sr], School of Electronics Engineering, VIT University, Vandalur-
More informationSoftware Engineering (CSC 4350/6350) Rao Casturi
Software Engineering (CSC 4350/6350) Rao Casturi Testing Software Engineering -CSC4350/6350 - Rao Casturi 2 Testing What is testing? Process of finding the divergence between the expected behavior of the
More informationEnhancing K-means Clustering Algorithm with Improved Initial Center
Enhancing K-means Clustering Algorithm with Improved Initial Center Madhu Yedla #1, Srinivasa Rao Pathakota #2, T M Srinivasa #3 # Department of Computer Science and Engineering, National Institute of
More informationEngineering 12 - Spring, 1999
Engineering 12 - Spring, 1999 1. (18 points) A portion of a C program is given below. Fill in the missing code to calculate and display a table of n vs n 3, as shown below: 1 1 2 8 3 27 4 64 5 125 6 216
More informationAnalyzing Outlier Detection Techniques with Hybrid Method
Analyzing Outlier Detection Techniques with Hybrid Method Shruti Aggarwal Assistant Professor Department of Computer Science and Engineering Sri Guru Granth Sahib World University. (SGGSWU) Fatehgarh Sahib,
More informationWeb Structure Mining using Link Analysis Algorithms
Web Structure Mining using Link Analysis Algorithms Ronak Jain Aditya Chavan Sindhu Nair Assistant Professor Abstract- The World Wide Web is a huge repository of data which includes audio, text and video.
More informationScheduling in Multiprocessor System Using Genetic Algorithms
Scheduling in Multiprocessor System Using Genetic Algorithms Keshav Dahal 1, Alamgir Hossain 1, Benzy Varghese 1, Ajith Abraham 2, Fatos Xhafa 3, Atanasi Daradoumis 4 1 University of Bradford, UK, {k.p.dahal;
More informationDeliver robust products at reduced cost by linking model-driven software testing to quality management.
Quality management White paper September 2009 Deliver robust products at reduced cost by linking model-driven software testing to quality management. Page 2 Contents 2 Closing the productivity gap between
More informationSoftware Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 11/10/2015
Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 11/10/2015 http://cs.gsu.edu/~ncasturi1 Class announcements Final Exam date - Dec 1 st. Final Presentations Dec 3 rd. And
More information3.3 Optimizing Functions of Several Variables 3.4 Lagrange Multipliers
3.3 Optimizing Functions of Several Variables 3.4 Lagrange Multipliers Prof. Tesler Math 20C Fall 2018 Prof. Tesler 3.3 3.4 Optimization Math 20C / Fall 2018 1 / 56 Optimizing y = f (x) In Math 20A, we
More information6. Dicretization methods 6.1 The purpose of discretization
6. Dicretization methods 6.1 The purpose of discretization Often data are given in the form of continuous values. If their number is huge, model building for such data can be difficult. Moreover, many
More informationA Data-Mining Approach for Wind Turbine Power Generation Performance Monitoring Based on Power Curve
, pp.456-46 http://dx.doi.org/1.1457/astl.16. A Data-Mining Approach for Wind Turbine Power Generation Performance Monitoring Based on Power Curve Jianlou Lou 1,1, Heng Lu 1, Jia Xu and Zhaoyang Qu 1,
More informationRay tracing based fast refraction method for an object seen through a cylindrical glass
20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Ray tracing based fast refraction method for an object seen through a cylindrical
More informationChapter 8 Software Testing. Chapter 8 Software testing
Chapter 8 Software Testing 1 Topics covered Introduction to testing Stages for testing software system are: Development testing Release testing User testing Test-driven development as interleave approach.
More informationAN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE
AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3
More informationPanoramic Image Stitching
Mcgill University Panoramic Image Stitching by Kai Wang Pengbo Li A report submitted in fulfillment for the COMP 558 Final project in the Faculty of Computer Science April 2013 Mcgill University Abstract
More informationDetection of Infeasible Paths in Software Testing using UML Application to Gold Vending Machine
I.J. Education and Management Engineering, 2017, 4, 21-28 Published Online July 2017 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2017.04.03 Available online at http://www.mecs-press.net/ijeme
More informationSoftware Engineering Fall 2014
Software Engineering Fall 2014 (CSC 4350/6350) Mon.- Wed. 5:30 pm 7:15 pm ALC : 107 Rao Casturi 11/10/2014 Final Exam date - Dec 10 th? Class announcements Final Presentations Dec 3 rd. And Dec 8 th. Ability
More informationSoftware Engineering: Theory and Practice. Verification by Testing. Test Case Design. Tom Verhoeff
Software Engineering: Theory and Practice Verification by Testing Test Case Design Tom Verhoeff Eindhoven University of Technology Department of Mathematics & Computer Science Software Engineering & Technology
More informationTesting is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not.
i About the Tutorial Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. Testing is executing a system in order
More informationChapter 11, Testing, Part 2: Integration and System Testing
Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11, Testing, Part 2: Integration and System Testing Overview Integration testing Big bang Bottom up Top down Sandwich System testing
More informationSoftware Testing. Lecturer: Sebastian Coope Ashton Building, Room G.18
Lecturer: Sebastian Coope Ashton Building, Room G.18 E-mail: coopes@liverpool.ac.uk COMP 201 web-page: http://www.csc.liv.ac.uk/~coopes/comp201 Software Testing 1 Defect Testing Defect testing involves
More informationComputer Science and Software Engineering University of Wisconsin - Platteville 9-Software Testing, Verification and Validation
Computer Science and Software Engineering University of Wisconsin - Platteville 9-Software Testing, Verification and Validation Yan Shi SE 2730 Lecture Notes Verification and Validation Verification: Are
More informationChapter 3: Dynamic Testing Techniques
Chapter 3: Dynamic Testing Techniques " The system was not fully tested to a satisfactory level of quality and resilience before full implementation on 26 October 1992." Extract from the main conclusions
More informationThe University of Bradford Institutional Repository
The University of Bradford Institutional Repository http://bradscholars.brad.ac.uk This work is made available online in accordance with publisher policies. Please refer to the repository record for this
More informationDynamic Clustering of Data with Modified K-Means Algorithm
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq
More informationPES INSTITUTE OF TECHNOLOGY- BANGALORE SOUTH CAMPUS
Sixth Semester B.E. IA Test I, Feb, 2015 USN 1 P E I S PES INSTITUTE OF TECHNOLOGY- BANGALORE SOUTH CAMPUS (Hosur Road, Electronic City, Bangalore-560 100) Date & Time: 25-02-2015, 8:30 AM - 11:00 AM Max
More informationA Patent Retrieval Method Using a Hierarchy of Clusters at TUT
A Patent Retrieval Method Using a Hierarchy of Clusters at TUT Hironori Doi Yohei Seki Masaki Aono Toyohashi University of Technology 1-1 Hibarigaoka, Tenpaku-cho, Toyohashi-shi, Aichi 441-8580, Japan
More informationSoftware Testing and Maintenance
Software Testing and Maintenance Testing Strategies Black Box Testing, also known as Behavioral Testing, is a software testing method in which the internal structure/ design/ implementation of the item
More informationComparative Study Of Different Data Mining Techniques : A Review
Volume II, Issue IV, APRIL 13 IJLTEMAS ISSN 7-5 Comparative Study Of Different Data Mining Techniques : A Review Sudhir Singh Deptt of Computer Science & Applications M.D. University Rohtak, Haryana sudhirsingh@yahoo.com
More informationPatterns and Testing
and Lecture # 7 Department of Computer Science and Technology University of Bedfordshire Written by David Goodwin, based on the lectures of Marc Conrad and Dayou Li and on the book Applying UML and (3
More informationRestoring Warped Document Image Based on Text Line Correction
Restoring Warped Document Image Based on Text Line Correction * Dep. of Electrical Engineering Tamkang University, New Taipei, Taiwan, R.O.C *Correspondending Author: hsieh@ee.tku.edu.tw Abstract Document
More informationA Self-Adaptive Insert Strategy for Content-Based Multidimensional Database Storage
A Self-Adaptive Insert Strategy for Content-Based Multidimensional Database Storage Sebastian Leuoth, Wolfgang Benn Department of Computer Science Chemnitz University of Technology 09107 Chemnitz, Germany
More informationGeometric Accuracy Evaluation, DEM Generation and Validation for SPOT-5 Level 1B Stereo Scene
Geometric Accuracy Evaluation, DEM Generation and Validation for SPOT-5 Level 1B Stereo Scene Buyuksalih, G.*, Oruc, M.*, Topan, H.*,.*, Jacobsen, K.** * Karaelmas University Zonguldak, Turkey **University
More informationLecture 26: Testing. Software Engineering ITCS 3155 Fall Dr. Jamie Payton
Lecture 26: Testing Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte Dec. 9, 2008 Verification vs validation Verification:
More informationIntroduction to Software Engineering
Introduction to Software Engineering (CS350) Lecture 17 Jongmoon Baik Testing Conventional Applications 2 Testability Operability it operates cleanly Observability the results of each test case are readily
More informationSchema Matching with Inter-Attribute Dependencies Using VF2 Approach
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 3, June 2014, PP 14-20 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Schema Matching with Inter-Attribute Dependencies
More informationModel-based segmentation and recognition from range data
Model-based segmentation and recognition from range data Jan Boehm Institute for Photogrammetry Universität Stuttgart Germany Keywords: range image, segmentation, object recognition, CAD ABSTRACT This
More informationQuality Assurance in Software Development
Quality Assurance in Software Development Qualitätssicherung in der Softwareentwicklung A.o.Univ.-Prof. Dipl.-Ing. Dr. Bernhard Aichernig Graz University of Technology Austria Summer Term 2017 1 / 47 Agenda
More informationPearson Education 2005 Chapter 9 (Maciaszek - RASD 2/e) 2
MACIASZEK, L.A. (2005): Requirements Analysis and System Design, 2 nd ed. Addison Wesley, Harlow England, 504p. ISBN 0 321 20464 6 Chapter 9 Testing and Change Management Pearson Education Limited 2005
More informationStructural Optimizations of a 12/8 Switched Reluctance Motor using a Genetic Algorithm
International Journal of Sustainable Transportation Technology Vol. 1, No. 1, April 2018, 30-34 30 Structural Optimizations of a 12/8 Switched Reluctance using a Genetic Algorithm Umar Sholahuddin 1*,
More informationManual Testing. Software Development Life Cycle. Verification. Mobile Testing
10 Weeks (Weekday Batches) or 12 Weekends (Weekend batches) To become a Professional Software Tester To enable the students to become Employable Manual Testing Fundamental of Testing What is software testing?
More informationDefect Classes, the Defect Repository, and Test Design
Defect Classes, the Defect Repository, and Test Design Defects can be classified in many ways. The defect types and frequency of occurrence should be used to guide test planning, and test design. Execution-based
More informationAn Efficient Image Sharpening Filter for Enhancing Edge Detection Techniques for 2D, High Definition and Linearly Blurred Images
International Journal of Scientific Research in Computer Science and Engineering Research Paper Vol-2, Issue-1 ISSN: 2320-7639 An Efficient Image Sharpening Filter for Enhancing Edge Detection Techniques
More informationChapter 9 Quality and Change Management
MACIASZEK, L.A. (2007): Requirements Analysis and System Design, 3 rd ed. Addison Wesley, Harlow England ISBN 978-0-321-44036-5 Chapter 9 Quality and Change Management Pearson Education Limited 2007 Topics
More informationNo Source Code. EEC 521: Software Engineering. Specification-Based Testing. Advantages
No Source Code : Software Testing Black-Box Testing Test-Driven Development No access to source code So test cases don t worry about structure Emphasis is only on ensuring that the contract is met Specification-Based
More informationChapter Fourteen Bonus Lessons: Algorithms and Efficiency
: Algorithms and Efficiency The following lessons take a deeper look at Chapter 14 topics regarding algorithms, efficiency, and Big O measurements. They can be completed by AP students after Chapter 14.
More informationPearson Education 2007 Chapter 9 (RASD 3/e)
MACIASZEK, L.A. (2007): Requirements Analysis and System Design, 3 rd ed. Addison Wesley, Harlow England ISBN 978-0-321-44036-5 Chapter 9 Quality and Change Management Pearson Education Limited 2007 Topics
More informationDarshan Institute of Engineering & Technology Unit : 9
1) Explain software testing strategy for conventional software architecture. Draw the spiral diagram showing testing strategies with phases of software development. Software Testing: Once source code has
More informationAn explicit feature control approach in structural topology optimization
th World Congress on Structural and Multidisciplinary Optimisation 07 th -2 th, June 205, Sydney Australia An explicit feature control approach in structural topology optimization Weisheng Zhang, Xu Guo
More informationPARALLELIZATION OF THE NELDER-MEAD SIMPLEX ALGORITHM
PARALLELIZATION OF THE NELDER-MEAD SIMPLEX ALGORITHM Scott Wu Montgomery Blair High School Silver Spring, Maryland Paul Kienzle Center for Neutron Research, National Institute of Standards and Technology
More information