The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Boundary scan test technology with its unique “virtual probe” characteristic provides a powerful means to solve the difficult problem of high density integrated test system components. It introduces the development of a more general boundary scan test system based on EDIF (Electronic Design Interchange Format). The hardware of the system is based on USB bus, including the PC, USB driver interface,...
For most of the first 100 years of existence of electrical power distribution systems, circuit breakers used either air- or oil-media interrupters. In the 1970's, the application of vacuum interrupter (VI) circuit breakers changed that but also left a void for how to predict remaining service life of the necessarily sealed VI. This paper reports the results of use of alternate testing technology employing...
Debugging is an indispensable yet frustrating activity in software development and maintenance. Thus, numerous techniques have been proposed to aid this task. Despite the demonstrated effectiveness and future potential of these techniques, many of them have the unrealistic single-fault failure assumption. To alleviate this problem, we propose a technique that can be used to distinguish failing tests...
When enterprises outsource maintenance of IT systems to service providers, thorough knowledge acquisition is critical to the success of the engagement. Program comprehension contributes significantly to acquiring knowledge of the IT systems. It is a common practice to execute test scripts to identify critical scenarios in the system and then trace these as flows in the programs. Instead of executing...
Software code review is a well-established software quality practice. Recently, Modern Code Review (MCR) has been widely adopted in both open source and proprietary projects. To evaluate the impact that characteristics of MCR practices have on software quality, this paper comparatively studies MCR practices in defective and clean source code files. We investigate defective files along two perspectives:...
Component-based software development (CBSD)has proved to be a highly useful way of developing software using re-usable components, especially within a short time frame. The biggest challenge faced during development (specially testing) of component-based software is that the source-code of components is not available. Due to this, the traditional testing techniques cannot be applied directly while...
Regression testing is a selective retesting of software whenever software gets modified or some new functionality is added to it. In this paper a regression test case selection technique is proposed. This technique is based on identification of affected paths, affected functions and dynamic slicing which can be used to reduce the number of test cases for regression testing. This paper considers all...
Ever smaller nanotechnologies introduce new types of defects and fault mechanisms with negative influence on system on-chips (SoCs) reliability and operational life. This paper presents a fault diagnosis and repair procedure which is implemented into generic built-in self-repair architecture. The procedure utilizes on-line fault detection whereas repair is performed during off-line mode. Experimental...
We propose a regression test selection technique that is based on analysis of source code of an object-oriented program. First we construct a System dependency graph model of the original program from the source code. When some modification is executed in a program, the constructed model is updated to reflect the changes. Our approach in addition to capturing control and data dependencies represents...
In this paper we present the results of an empirical case study performed at the European Space Agency (ESA). In this major project, the various challenges for testing were tackled using a model-based approach for test design and the generation of executable test automation scripts. An evaluation of this approach''s efficiency identified significant cost savings and quality improvements.
The main reason for the fragility of web test cases is the inability of web element locators to work correctly when the web page DOM evolves. Web elements locators are used in web test cases to identify all the GUI objects to operate upon and eventually to retrieve web page content that is compared against some oracle in order to decide whether the test case has passed or not. Hence, web element locators...
Software systems are becoming more complex, not least in their Graphical User Interfaces (GUIs), which presents challenges for existing testing practices. Pressure to reduce time to market leaves less time for manual testing and increases the importance of test automation. Previous research has identified several generations of automated GUI-based test approaches with different cost-benefit tradeoffs...
In today's world, customer expectations have increased rapidly especially on technological products. Satisfying the related standards and tests has become a major role in marketing. As solar energy continues to develop, the necessity of quality PV (photovoltaic) modules become more crucial. In order to assure high quality, testing of PV modules and certification process is a critical step. If testing...
The U.S. Geological Survey (USGS) Hydrologic Instrumentation Facility (HIF) is nationally responsible for the design, testing, evaluation, repair, calibration, warehousing, and distribution of hydrologic instrumentation in use within the USGS Water Mission Area (WMA). The HIF's Hydraulic Laboratory has begun routine quality assurance (QA) testing and documenting the performance of every USGS WMA acoustic...
Process bus uses distributed merging units to sample analog measurements such as currents and voltages. The use of redundant merging units allows relays to continuously monitor the performance of the merging units by comparing the values from each. This continuous monitoring meets NERC PRC-005-2 Condition Based Maintenance requirements, and eliminates the need for routine testing of protective relay...
Agile software development has been prevalent in IT industry since more than two decades now. Conceptually, Agile was introduced as an iterative, incremental and adaptive methodology for software development. There are quite a few studies that discuss the success of agile development projects on account of multiple factors like cost, time, quality and productivity. Owing to its popular virtues like...
Zakat is the fourth pillar of Islam which is obligatory and must be implemented for those who can afford. Zakat maal is an obligation for those who have excess wealth of basic needs. Many Muslims are less so understand the charity and lack of socialization would be charity. This research aims to develop multi-platform zakat maal mobile web application using jQuery framework. It is built to deliver...
The activities of copy and paste fragments of code from a source code into the other source code, with or without modification, are known as the code cloning. The process is often done by software developers because it's easier than generate code manually. In the other hand, this behavior leads to the increasing of effort to maintenance the code. Research on detecting the presence of cloning has been...
With the deepening of classified protection for information security, strengthen the classification testing and evaluation of information system and rectification have been the main parts of classified protection. Base on author's related experience obtained from classified protection, this paper analyzes some problems found during the classified protection implementation of safety management testing...
Passive Optical Networks (PONs) are widely regarded as the best suited technology for deploying broadband access networks. As new services emerge, the dependability of PONs has become critical as end users expect access networks to be highly reliable. Although PONs dependability regarding hardware failures has been extensively studied, very little attention has been drawn to software failures in PONs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.