Many software companies use the popular method of layered architecture to develop their software products resulting in code to be more generic. This generalization introduces a lot of unnecessary elements which make t...
详细信息
Many software companies use the popular method of layered architecture to develop their software products resulting in code to be more generic. This generalization introduces a lot of unnecessary elements which make the system architecture to be heavy and less elegant. To overcome this challenge, a concept of feature oriented software development (FOSD) is introduced. That way, the software system will be delivered as a set of features and the feature set could be decoupled at any time, according to the latest set of requirements without harming to any existing functionality. In this research the final outcome has been a feature oriented domain specific language (DSL). The objective of this developed feature oriented DSL is to make it effective even for business analysts to introduce new features without getting help from the development team of the project. A code generator and a core controller have been developed as part of this research exhibiting the above mentioned FOSD & DSL principles. The evaluation results indicate the generated feature oriented code identically behaves as its manually written counterpart code.
In this paper, we analyze the effect of reducing object redundancy in random testing, by comparing the Randoop random testing tool with a version of the tool that disregards tests that only produce objects that have b...
详细信息
In this paper, we analyze the effect of reducing object redundancy in random testing, by comparing the Randoop random testing tool with a version of the tool that disregards tests that only produce objects that have been previously generated by other tests. As a side effect, this variant also identifies methods in the software under test that never participate in state changes, and uses these more heavily when building assertions. Our evaluation of this strategy concentrates on collection classes, since in this context of object-oriented implementations that de- scribe stateful objects obbeying complex invariants, object variabil- ity is highly relevant. Our experimental comparison takes the main data structures in ***, and shows that our object redun- dancy reduction strategy has an important impact in testing collec- tions, measured in terms of code coverage and mutation killing.
The characteristics and shortcomings of dynamic source routing protocol(DSR) in mobile Ad hoc network are analyzed in detail. For the DSR protocol did not consider the network load, node energy and optimal path proble...
详细信息
The characteristics and shortcomings of dynamic source routing protocol(DSR) in mobile Ad hoc network are analyzed in detail. For the DSR protocol did not consider the network load, node energy and optimal path problems etc. proposed a new and improved DSR protocol, LEBDSR(Load and Energy Balanced Dynamic Source Routing) protocol, it increased the node congestion factor and energy coefficient based on the original protocol, and improved routing strategy under the new constraint parameters. By comparative analysis of NS-2 simulation, performance of the proposed DSR protocol such as the delivery rate, routing load, network minimum survival time were improved in the same network environment.
In specification-based test generation, sometimes having a formal specification is not sufficient, since the specification may be in a different formalism from that required by the generation approach being used. In t...
详细信息
In specification-based test generation, sometimes having a formal specification is not sufficient, since the specification may be in a different formalism from that required by the generation approach being used. In this paper, we deal with this problem specifically in the context in which, while having a formal specification in the form of an operational invariant written in a sequential programming language, one needs, for test generation, a declarative invariant in a logical formalism. We propose a genetic algorithm that given a catalog of common properties of invariants, such as acyclicity, sortedness and balance, attempts to evolve a conjunction of these that most accurately approximates an original operational specification. We present some details of the algorithm, and an experimental evaluation based on a benchmark of data structures, for which we evolve declarative logical invariants from operational ones.
Many machine learning (ML) applications rely on large amounts of personal data for training and inference. Among the most intimate exploited data sources is electroencephalogram (EEG) data. The emergence of consumer-g...
详细信息
Wearable apps are becoming increasingly popular in recent years. However, to date, very few studies examined the issues that wearable apps face. Prior studies showed that user reviews contain a plethora of insights th...
详细信息
Many studies undertaken in the field of education have revealed that m-learning is emerging more and more as an effective learning method with the use of smartphones. Always turned on and easily transported, smartphon...
详细信息
ISBN:
(纸本)9789899887572
Many studies undertaken in the field of education have revealed that m-learning is emerging more and more as an effective learning method with the use of smartphones. Always turned on and easily transported, smartphones can be used anywhere, at any given time and in any context. Considering the potential of m-learning, we seek to understand this novelty as a support in the learning process, especially in computerscience education. To reach this end, we asked a group of students their opinion in the form of a survey, in order to know the most beneficial aspects of a mobile application in education. The outcome of this survey helped us to develop a mobile application from which students could access course news, work timing, frequently asked questions and results. After using this application, a second survey highlights students' interest. We thus show that, especially for courses such as programming courses, mlearning plays a full role as it offers accessibility to valuable information which comes in a continuous flow to support the learning process and as it offers an environment where interaction with the learning tool can be adapted and adjusted to the learner's style and needs.
This paper describes performance evaluation of Real-time system using Petri net. Two types of Petri nets Stochastic Petri net (SPN) and Generalized Stochastic Petri net(GSPN) are discussed and a comparative study the ...
详细信息
ISBN:
(纸本)9781538677100
This paper describes performance evaluation of Real-time system using Petri net. Two types of Petri nets Stochastic Petri net (SPN) and Generalized Stochastic Petri net(GSPN) are discussed and a comparative study the two variants of Petri net has been proposed. This comparison will give an insight on the use of Generalized Stochastic Petri net over Stochastic Petri net. An example of a parallel system modelled using SPN and GSPN is used to analyze the comparison between SPN and GSPN. A case study from manufacturing industry that belongs to the class of pull strategies Just-in-Time is considered to explore the flexibility of GSPN in modeling and analysis of a Real-time system. Open source software PIPE is used to model and analyze SPN and GSPN for performance evaluation of Real-Time system.
Localization in indoor spaces has to rely on sensing devices (e.g., Radio Frequency Identification (RFID) readers, WiFi routers, bluetooth beacons) rather than GPS devices. On the other side, we could build a smart in...
详细信息
A log statement is used to record important runtime behavior of software systems for diverse reasons, which is inevitable to develop most of the software systems. However, developers do not tend to deeply consider an ...
详细信息
ISBN:
(纸本)9781728119717;9781728119700
A log statement is used to record important runtime behavior of software systems for diverse reasons, which is inevitable to develop most of the software systems. However, developers do not tend to deeply consider an appropriate log level in their source code. In order to address the issues, this paper proposes an automatic approach to validating log levels in Java in consideration of the syntactic as well as semantic features. We first build up the Word2Vec model and generate semantic and syntactic log feature vectors, then train the machine learning classifiers to automatically validate the log levels. For the evaluation, we collected six open source projects of the message-oriented middleware domain, and obtained the 88% precision and the 87% recall respectively.
暂无评论