The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most servo control algorithm implementations have been realized using digital signal processors (DSPs) due to large amount of digital signal processing. Nowadays, parallel programmable logic devices, such as the field programmable gate array (FPGA), have become powerful hardware options, offering low cost, high execution speed, reconfigurability and parallelism. This work intends to exploit the current...
Multiple faults in a program may interact with each other in a variety of ways. A test case that fails due to a fault may not fail when another fault is added, because the second fault may mask the failure-causing effect of the first fault. Multiple faults may also collectively cause failure on a test case that does not fail due to any single fault alone. Many studies try to perform fault localization...
Test set size in terms of the number of test cases is an important consideration when testing software systems. Using too few test cases might result in poor fault detection and using too many might be very expensive and suffer from redundancy. For a given fault, the ratio of the number of failure causing inputs to the number of possible inputs is referred to as the failure rate. Assuming a test set...
Visualization techniques have been widely used in representing software artifacts. They play a central role in conveying program information to software developers. While numerous tools have been developed to visualize information such as static software architectures, dynamic program behaviors, and debugging processes, little attention has been paid to visualizing correlations and variations among...
With the rapid growth of the wireless market and the development of various mobile devices, innovative methods and technologies to produce high-quality mobile applications and reduce time to market have been emerging. Mobile applications are often characterized by an array of limitations such as the short development lifecycle to gain a competitive advantage and difficulties to update once released...
In this paper, an improved method of super block method (SBM) is presented for software testing. The primary idea of the method, called virtual node method (VNM), is to add virtual nodes to the control flow before the SBM is used. The same with the SBM, the VNM can help testers use minimal test cases to cover 100% blocks or achieve a desired coverage. Moreover, it can be used to reduce the overhead...
In real-time embedded systems, due to race conditions, synchronization order between events may be different from one execution to another. This behavior is permissible as in concurrent systems, but should be fully analyzed to ensure the correctness of the system. In this paper, a new intelligent method is presented to analyze event synchronization sequence in embedded systems. Our goal is to identify...
An integrative servo analysis platform is used to carry out simulations for a commercial drive using patterned media technology. Servo performance is compared between the conventional linear control and some advanced servo control algorithms. In addition, the effects on the PES quality due to the timing jitter on the sampling time, quantization of PES signal, and quantization of control signal are...
An aspect-oriented design model is composed of a primary design model and an aspect model, each of which has a different origin and pursues different goals. How to ensure the correctness of the composition of a primary design model and an aspect model has become an important issue. In this paper, we validate an aspect-oriented design model using the UML profile extension mechanism. With this mechanism,...
There are race conditions in concurrent programs if the accesses to a sharing resource are not properly synchronized. Because the races can cause the program to behave in unexpected ways, detecting them is an important aspect of debugging and program verification. Many approaches have been used to detect race conditions, but there still is no effective formal model to visualize the race conditions...
We propose an RBF (radial basis function) neural network-based fault localization method to help programmers locate bugs in a more effective way. An RBF neural network with a three-layer feed-forward structure is employed to learn the relationship between the statement coverage of a test case and its corresponding execution result. The trained network is then given as input a set of virtual test cases,...
Software testing is a core activity in quality assurance. To improve the test process, we can use best practice models which describe in detail what to do in organizational test processes. The improvement activities using best practice models are performed as follows: checking the current status of test processes, suggesting and planning new actions, and implementing the actions. However, it is difficult...
Random testing (RT) is a fundamental software testing technique. Motivated by the rationale that neighbouring test cases tend to cause similar execution behaviours, adaptive random testing (ART) was proposed as an enhancement of RT, which enforces random test cases evenly spread over the input domain. ART has always been compared with RT from the perspective of the failure-detection capability. Previous...
As software systems are encompassing a wide range of fields and applications, software reliability becomes a crucial step. The need for safety analysis and test cases that have high probability to uncover plausible faults are necessities in proving software quality. System models that represent only the operational behavioral of a system are incomplete sources for deriving test cases and performing...
The application of specification-based program verification techniques (e.g., black-box testing, formal proof) faces strong challenges in practice when the gap between the structure of a specification and that of its program is large. This paper describes a method combining program review and testing to address these challenges. The essential idea of the combination is first to use a view-based program...
Fault localization is the most expensive activity in program debugging. Traditional ad-hoc methods can be time-consuming and ineffective because they rely on programmers' intuitive guesswork, which may neither be accurate nor reliable. A better solution is to utilize a systematic and statistically well-defined method to automatically identify suspicious code that should be examined for possible fault...
Localizing a bug in a program can be a complex and time- consuming process. In this paper we propose a code coverage-based fault localization method to prioritize suspicious code in terms of its likelihood of containing program bugs. Code with a higher risk should be examined before that with a lower risk, as the former is more suspicious (i.e., more likely to contain program bugs) than the latter...
In data stream management systems (DSMSs), request handling has to meet various QoS requirements. Traditional open-loop DSMS ignores system status information and run-time history in decision making and is unable to achieve stable QoS performance over run-time as the workload or environment changes. This paper discusses the design of a close-loop DSMS that applies adaptive control in control theory...
During the construction of a software metric model, incomplete data often appear in the data sample used for the construction. Moreover, the decision on whether a particular predictor metric should be included is most likely based on an intuitive or experience-based assumption that the predictor metric has an impact on the target metric with a statistical significance. However, this assumption is...
In this paper, a novel reset nonlinear PI-lead filters control scheme in parallel structure is proposed. The uniformly bounded-input and bounded-state (UBIBS) stability is proved and the proposed scheme also can achieve asymptotic tracking of the constant reference signals and rejections to constant output disturbances. The scheme is applied in the hard disk drives in the tracking-seeking and track-following...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.