203 research outputs found

    Towards semantic mutation testing of aspect-oriented programs

    Get PDF
    Aspect-oriented programs have received much attention from software testing researchers. Various testing techniques and approaches have been proposed to tackle issues and challenges when testing aspect-oriented programs including traditional mutation testing. In traditional mutation testing of aspect-oriented programs, mutants are generated by making small changes to the syntax of the aspect-oriented language. Recently, a new approach known as semantic mutation testing has been proposed. This approach mutates the semantics of the language in which the program is written. The mutants generated misunderstandings of the language which are different classes of faults. Aspect-oriented programming presents itself with different properties that can be further explored with respect to semantic mutation testing. This paper describes various possible scenarios that semantic mutation testing strategy might have particular value in testing aspect-oriented programs

    Architectural knowledge sharing approaches: a survey research

    Get PDF
    Research on software architecture from different perspectives has been done for several years. However, Architectural Knowledge (AK), a relatively new field, has gained its increasing interest among the community. On this regard, various topics devoted to architectural knowledge, such as reusing, sharing, managing, and communicating are being studied. Among them, AK sharing brings new effective challenges and issues not present when studying other topics in architectural knowledge. Therefore, this paper surveys the current researches on AK sharing (pertaining to software architecture), the approaches, models that are being proposed, and issues that arise when sharing different AKs by different parties. By making survey on AK sharing approaches, a better understanding of these approaches and issues related in this area is provided so that it can be a penetrative resource for a fast training and educating in this area of SE. In addition, conclusion about current state of research in this area and future trends for AK sharing is identified

    A new security model to prevent denial-of-service attacks and violation of availability in wireless networks

    Get PDF
    Wireless networks are deployed in many critical areas, such as health care centers, hospitals, police departments, and airports. In these areas, communication through the networks plays a vital role, and real-time connectivity along with constant availability of the networks is highly important. However, one of the most serious threats against the networks availability is the denial-of-service attacks. In wireless networks, clear text form of control frames is a security flaw that can be exploited by the attackers to bring the wireless networks to a complete halt. To prevent the denial-of-service attacks against the wireless networks, we propose two distinct security models. The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. The models are implemented and evaluated under various experiments and trials. The results have proved that the proposed models significantly improve the security performance of the wireless networks. This gives advantage of safe communication that can substantially enhance the network availability while maintaining the quality of the network performance

    Empirical evaluation of decomposition strategy for wavelet video compression.

    Get PDF
    The wavelet transform has become the most interesting new algorithm for video compression. Yet there are many parameters within a wavelet analysis andsynthesis which govern the quality of a decoded video. In this paper different wavelet decomposition strategies and their implications for the decoded videoare discussed. A pool of color video sequences has been wavelet-transformed atdifferent settings of the wavelet filter bank and quantization threshold and with decomposition of dyadic and packet wavelet transformation strategies. The empirical evaluation of the decomposition strategy is based on threebenchmarks: a first judgment regards the perceived quality of the decoded video.The compression rate is a second crucial factor, and finally the best parameter setting with regards to the Peak Signal to Noise Ratio (PSNR). The investigation proposes dyadic decomposition as the chosen decomposition strategy

    Adaptive routing in packet-switched networks using agents updating methods

    Get PDF
    This paper investigates a non-trivial, multi-objective and multi-constraint routing optimisation problem for dynamic packet-switched networks. The research adopts the application of the ant colony optimisation process into routing and congestion control in telecommunication networks. This paper suggests the use of epochal updating in conjunction with modified incremental updating to update the routing table in each switching node. The resulting new approach is called the For/Backward approach. Three updating methods (Forward, Backword, For/Backword) are simulated over a packet-switched network, representing Malaysian Backbone Network, using different combinations of traffic and geographical traffic patterns. The simulation results show a clear improvement on network performance (less average packet delay and greater throughput) using the For/Backward approach compared to the Forward and Backward methods. Furthermore, the behavior of the Forward and Backward methods is studied for inconsistency of behavior

    Hybrid LTE-802.11ac network: Qos optimality evaluation of the voip codecs techniques

    Get PDF
    In response to the growing demand for higher quality Voice over IP (VoIP) communication, there are multiple high-speed access links, including Wi-Fi and Long Term Evolution (LTE) for the mobile end-users. The combination of the access links provides a hybrid network environment in which the end-users can switch from one to another, whichever provides a higher level of VoIP quality of service (QoS). Apart from the type of the access link, the VoIP codecs are also another key factor that directly affects the overall QoS of the voice communication. Due to inherent characteristics, different networks have distinct limitations and requirements. Considering these differences, the visualizing and analysing the performance and behaviour of each codec on its underlying network will lead to a proper VoIP codec selection, which in turn will result in optimal voice QoS for the mobile end-users. This study proposes a method to quantify and analyse the performance of different VoIP codecs in a hybrid LTE-802.11ac network in which the mobile end-users have two corresponding network interface cards. The aim is to find the codecs that suit the most for LTE and 802.11ac networks and thereby optimize the QoS of the VoIP communication. The NS3 tool is used to develop and implement a variety of distinct scenarios within which different QoS performance metrics are precisely measured. The obtained results signify the extensive impact of the codecs on the QoS of the voice communication for both LTE and 802.11ac users and also the importance of the VoIP codec selection procedure for each network

    An attribute grammar approach to specifying Halstead's metrics

    Get PDF
    Attribute grammars have been used in defining programming languages and constructing compilers. Since these are concerned with the syntax and static semantics of the source code of the language, attribute grammars can be effectively used to define source code metrics on it. Most of the source code metrics are based on measuring models of the source code. However, there is no formal way of specifying the mapping of the source code onto the models. This paper attempts to provide an approach using an attribute grammar to demonstrate how Halstead's metrics may be specified in an unambiguous manner on the source code itself
    corecore