143 research outputs found

    How effectively does metamorphic testing alleviate the oracle problem?

    Get PDF
    In software testing, something which can verify the correctness of test case execution results is called an oracle. The oracle problem occurs when either an oracle does not exist, or exists but is too expensive to be used. Metamorphic testing is a testing approach which uses metamorphic relations, properties of the software under test represented in the form of relations among inputs and outputs of multiple executions, to help verify the correctness of a program. This paper presents new empirical evidence to support this approach, which has been used to alleviate the oracle problem in various applications and to enhance several software analysis and testing techniques. It has been observed that identification of a sufficient number of appropriate metamorphic relations for testing, even by inexperienced testers, was possible with a very small amount of training. Furthermore, the cost-effectiveness of the approach could be enhanced through the use of more diverse metamorphic relations. The empirical studies presented in this paper clearly show that a small number of diverse metamorphic relations, even those identified in an ad hoc manner, had a similar fault-detection capability to a test oracle, and could thus effectively help alleviate the oracle problem

    Parkinson’s disease dyskinesias possibly relate to greater dopamine transporter losses in the putamen over time

    Get PDF
    The pathophysiology of levodopa-induced dyskinesias in Parkinson’s disease is incompletely understood. This study was designed to investigate in Parkinson’s patients, whether time-related changes in striatal dopamine transporter availability are associated to the appearance of dyskinesias. 15 Parkinson’s patients had dopamine transporter-specific SPECT imaging with 123I-FP-CIT twice: at baseline (when they were drug naïve) and at follow-up (6.31±2.29 years from baseline), and were followed up clinically every six months. At the end of the study, patients were divided in two groups according to whether they had developed dyskinesias or not. Semi-quantification of 123I-FP-CIT data was performed using the occipital cortex as the reference region. Specific binding ratios were calculated for the putamen and the caudate. During the clinical follow-up, all Parkinson’s patients were treated pharmaceutically. 8 patients developed dyskinesias, while 7 remained nondyskinetic. At baseline, the two groups had similar 123I-FP-CIT specific binding ratio values for the putamen and the caudate (p>0.05). Also, between-group differences in age, disease duration, and Hoehn & Yahr scores were not statistically significant. Over-time, the putaminal 123I-FP-CIT specific binding ratio values in the dyskinetic group decreased significantly (p<0.01). The nondyskinetic patients had smaller reductions (p<0.05) during the same period of time. At follow-up, the dyskinetic patients had significantly higher Hoehn & Yahr scores (p<0.01) and were taking higher levodopa equivalent doses (p<0.001), as compared to the nondyskinetic patients. The development of Parkinson’s dyskinesias is related to a faster progression rate, as reflected by marked putaminal dopamine transporter decreases

    Students as co-producers in a multidisciplinary software engineering project: addressing cultural distance and cross-cohort handover

    Get PDF
    This article reports on an undergraduate software engineering project in which, over a period of two years, four student teams from different cohorts developed a note-taking app for four academic clients at the students’ own university. We investigated how projects involving internal clients can give students the benefits of engaging in real software development while also giving them experience of a student-staff collaboration that has its own benefits for students, academics, and the university more broadly. As the university involved is a Sino-Foreign university located in China, where most students are Chinese and most teaching staff are not, this ‘student as co-producer’ approach interacts with another feature of the project: cultural distance. Based on analysis of notes, reports, interviews, and focus groups, we recommend that students should be provided with communicative strategies for dealing with academics as clients; universities should develop policies on ownership of student-staff collaborations; and projects should include a formalised handover process. This article can serve as guidance for educators considering a ‘students as co-producers’ approach for software development projects

    Enhancing supervised classifications with metamorphic relations

    Get PDF
    We report on a novel use of metamorphic relations (MRs) in machine learning: instead of conducting metamorphic testing, we use MRs for the augmentation of the machine learning algorithms themselves. In particular, we report on how MRs can enable enhancements to an image classification problem of images containing hidden visual markers ("Artcodes"). Working on an original classifier, and using the characteristics of two different categories of images, two MRs, based on separation and occlusion, were used to improve the performance of the classifier. Our experimental results show that the MR-augmented classifier achieves better performance than the original classifier, algorithms, and extending the use of MRs beyond the context of software testing

    Assisted Diagnosis of Parkinsonism Based on the Striatal Morphology

    Get PDF
    Parkinsonism is a clinical syndrome characterized by the progressive loss of striatal dopamine. Its diagnosis is usually corroborated by neuroimaging data such as DaTSCAN neuroimages that allow visualizing the possible dopamine deficiency. During the last decade, a number of computer systems have been proposed to automatically analyze DaTSCAN neuroimages, eliminating the subjectivity inherent to the visual examination of the data. In this work, we propose a computer system based on machine learning to separate Parkinsonian patients and control subjects using the size and shape of the striatal region, modeled from DaTSCAN data. First, an algorithm based on adaptative thresholding is used to parcel the striatum. This region is then divided into two according to the brain hemisphere division and characterized with 152 measures, extracted from the volume and its three possible 2-dimensional projections. Afterwards, the Bhattacharyya distance is used to discard the least discriminative measures and, finally, the neuroimage category is estimated by means of a Support Vector Machine classifier. This method was evaluated using a dataset with 189 DaTSCAN neuroimages, obtaining an accuracy rate over 94%. This rate outperforms those obtained by previous approaches that use the intensity of each striatal voxel as a feature.This work was supported by the MINECO/ FEDER under the TEC2015-64718-R project, the Ministry of Economy, Innovation, Science and Employment of the Junta de Andaluc´ıa under the P11-TIC-7103 Excellence Project and the Vicerectorate of Research and Knowledge Transfer of the University of Granada

    An empirical comparison of commercial and open‐source web vulnerability scanners

    Get PDF
    Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web services. Although both commercial and open-source WVSs exist, their vulnerability detection capability and performance vary. In this article, we report on a comparative study to determine the vulnerability detection capabilities of eight WVSs (both open and commercial) using two vulnerable web applications: WebGoat and Damn vulnerable web application. The eight WVSs studied were: Acunetix; HP WebInspect; IBM AppScan; OWASP ZAP; Skipfish; Arachni; Vega; and Iron WASP. The performance was evaluated using multiple evaluation metrics: precision; recall; Youden index; OWASP web benchmark evaluation; and the web application security scanner evaluation criteria. The experimental results show that, while the commercial scanners are effective in detecting security vulnerabilities, some open-source scanners (such as ZAP and Skipfish) can also be effective. In summary, this study recommends improving the vulnerability detection capabilities of both the open-source and commercial scanners to enhance code coverage and the detection rate, and to reduce the number of false-positives
    corecore