This paper present a distributed test suite execution in term of code coverage analysis for testing a t-way test suite data using tuple space technology with Map and Reduce mechanism. The generated t-way test suite da...
详细信息
This paper present a distributed test suite execution in term of code coverage analysis for testing a t-way test suite data using tuple space technology with Map and Reduce mechanism. The generated t-way test suite data and software under test (SUT) source code are preloaded into their respective partition using hash based routing algorithm. Each partition parsed each test case within the test suite into actual test data file. The code coverage of SUT source code is tested with each test case in actual test data and produces a test coverage result at their respective partition in term of class, method, block and line coverage. A case study of CGPA calculator as SUT is done to measure the test suite execution performance in term of test coverage with varying interaction strength on single and multiple machine environments. The scalability analysis of distributed test suite execution is also done in term of speedup gained while running on a multiple machine environments. An encouraging result is obtained on test coverage and speedup for multiple machine environments as compared to single machine environment. Higher test coverage and more speedup is obtained in higher machine environments.
The authors measured electroencephalograms (EEGs) from subjects looking at line drawings of body parts and recalling their names silently. The equivalent current dipole source localization (ECDL) method is applied to ...
详细信息
ISBN:
(纸本)9781479920747
The authors measured electroencephalograms (EEGs) from subjects looking at line drawings of body parts and recalling their names silently. The equivalent current dipole source localization (ECDL) method is applied to the event related potentials (ERPs): summed EEGs. ECDs are localized to the primary visual area V1, to the ventral pathway (ITG: Inferior Temporal Gyrus), to the parahippocampus (ParaHip), the right angular gyrus (AnG), to the right supramarginal gyrus (SMG) and to the Wernike's area. Then ECDs are localized to the Broca's area, to the postcentral gyrus (PstCG) and to the fusiform gyrus (FuG), and again to the Broca's area. These areas are related to the integrated process of visual recognition of pictures and the retrieval of words. Some of these areas are also related to image recognition and word generation. And process of search and preservation in the memory is done from the result of some ECDs to the paraHip.
This paper proposes a robust zero-watermarking algorithm based on Complex Zernike moment to resist various signal processing operations and geometric transformations. Zero watermarking algorithm changes the operation ...
详细信息
This paper proposes a robust zero-watermarking algorithm based on Complex Zernike moment to resist various signal processing operations and geometric transformations. Zero watermarking algorithm changes the operation method of embedding watermark in the original data. Instead, it employs the significant characteristics of the original data to construct watermarking information to successfully avoid the contradiction between robustness and invisibility and increase the robustness of the watermarking. First, perform displacement and scaling standardization process for the tested image, then calculate the Complex Zernike Moment argument of the standardized image to get an argument value; after binarization of the argument value, construct the feature image regarded as watermarking. Experimental results show that the proposed method has strong robustness to various attacks specially geometric attacks.
In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognised a substantive number of security loopholes in information technology systems and devised relevant soluti...
详细信息
In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognised a substantive number of security loopholes in information technology systems and devised relevant solutions for such problems. As an outcome, exchanging the main point that contains all the information originating from heterogeneous sources that oversee the physiological methodologies of a city could have devastating effects because cloud security would be influenced at diverse levels and clients would be influenced at distinctive administrations. In addition, if these innovations are utilised more extensively, cyber terrorism could, with a solitary machine ambush, hinder significant number's urban areas worldwide. This paper summarises some major issues in cloud computing, which caused us to reconsider the type of information that can be stored safely in cloud computing.
With easy and quick data distribution over the Internet, copyright protection and authentication become important applications of digital watermarking. The image watermarking schemes that are useful to serve these app...
详细信息
With easy and quick data distribution over the Internet, copyright protection and authentication become important applications of digital watermarking. The image watermarking schemes that are useful to serve these applications should perform well in some of challenging applications such as print-scan and print-cam (PSPC) applications. This challenge provides an impetus for research in the digital watermarking field. In this paper, the performance and the efficiency of several proposed hybrid SVD-based digital image watermarking schemes are evaluated and studied for PSPC as well as for copyright protection and authentication.
Smartphone ownership is fast becoming a birth-right in the world of today. For developers, this opens up a whole new world of business opportunities where applications are being purchased every single day. Besides the...
详细信息
Smartphone ownership is fast becoming a birth-right in the world of today. For developers, this opens up a whole new world of business opportunities where applications are being purchased every single day. Besides the multi billions of dollars spent each year on application purchases alone, consumers nowadays are facing an even newer trend, In-App Purchasing. In-App purchasing refers to a scenario where the initial applications are downloadable for free, however some additional functions or elements of the applications may be acquired within the applications for a small (or not so small) fee. This paper aims to review this trend and the guidelines that is applied to this phenomenon by the three main smartphone operating systems, iOS, Android and Windows. This would be done by highlighting the major strengths and weaknesses that each platform has to offer, as well as the common policies that are enforced across all three platforms.
作者:
Yousra AbudaqqaAhmed PatelaSchool of Computer Science
Centre of Software Technology and Management (SOFTAM) Faculty of Information Science and Technology (FTSM) Universiti Kebangsaan Malaysia 43600 UKM Bangi Selangor Malaysia bSchool of Computer Science
Centre of Software Technology and Management (SOFTAM) Faculty of Information Science and Technology (FTSM) Universiti Kebangsaan Malaysia 43600 UKM Bangi Selangor Malaysia cVisiting Professor School of Computing and Information Systems
Faculty of Science Engineering and Computing Kingston University Kingston upon Thames KT1 2EE United Kingdom
Indisputably, search engines (SEs) abound. The monumental growth of users performing online searches on the Web is a contending issue in the contemporary world nowadays. For example, there are tens of billions of sear...
Indisputably, search engines (SEs) abound. The monumental growth of users performing online searches on the Web is a contending issue in the contemporary world nowadays. For example, there are tens of billions of searches performed everyday, which typically offer the users many irrelevant results which are time consuming and costly to the user. Based on the afore-going problem it has become a herculean task for existing Web SEs to provide complete, relevant and up-to-date information response to users’ search queries. To overcome this problem, we developed the Distributed Search Engine Architecture (DSEA), which is a new means of smart information query and retrieval of the World Wide Web (WWW). In DSEAs, multiple autonomous search engines, owned by different organizations or individuals, cooperate and act as a single search engine. This paper includes the work reported in this research focusing on development of DSEA, based on topic-specific specialised search engines. In DSEA, the results to specific queries could be provided by any of the participating search engines, for which the user is unaware of. The important design goal of using topic-specific search engines in the research is to build systems that can effectively be used by larger number of users simultaneously. Efficient and effective usage with good response is important, because it involves leveraging the vast amount of searched data from the World Wide Web, by categorising it into condensed focused topic -specific results that meet the user’s queries. This design model and the development of the DSEA adopt a Service Directory (SD) to route queries towards topic-specific document hosting SEs. It displays the most acceptable performance which is consistent with the requirements of the users. The evaluation results of the model return a very high priority score which is associated with each frequency of a keyword.
Information systems supporting flexible business in small-to-medium enterprises must be easily modifiable under the supervision of their users. The users (business people) must take active part in agile system develop...
详细信息
Information systems supporting flexible business in small-to-medium enterprises must be easily modifiable under the supervision of their users. The users (business people) must take active part in agile system development and maintenance. The systems must be able to integrate large legacy systems and to communicate with the systems of independent business partners. Business processes need not be executed by a single ERR We discuss a variant of SOA able to meet these requirements. The discussed SOA uses communication protocols based on problem-oriented languages. We propose a concept of organizational (architectural) services generalizing the concept of connectors and routers. The power and usefulness of the proposal is demonstrated on the examples of service composition, business-oriented interfaces, agile business processes, portals, and gateways. The proposal is based on experience from practical SOA projects.
Various methods, models and standards for software process improvement have been adopted by organizations to improve their software processes. However, despite these efforts they still encounter difficulties in their ...
详细信息
Context: Model-driven code generation is being increasingly applied to enhance software development from perspectives of maintainability, extensibility and reusability. However, aspect-oriented code generation from mo...
详细信息
暂无评论