81818app手机版下载

Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

162,927 Full-Text Articles 193,239 Authors 56,080,941 Downloads 328 Institutions

All Articles in Engineering

Faceted Search

162,927 full-text articles. Page 3 of 4887.

Test Scenarios Generation Using Path Coverage, VIKAS PANTHI, D. P. MOHAPATRA 2020 Dept. of Computer science & Engineering, National Institute of Technology, Rourkela, Orissa, India 769008

Test Scenarios Generation Using Path Coverage, Vikas Panthi, D. P. Mohapatra

International Journal of Computer Science and Informatics

Testing is one of the very important component of software development process. Properly generated test sequences may not only locate the defects in software, but also help in reducing the high cost associated with software testing. It is often desired that test sequences should be automatically generated to achieve required test coverage. Automatic test sequence generation is a major problem in software testing. The aim of this study is to generate test sequences for source code using ModelJunit. ModelJUnit is a extended library of JUnit. We have generate automatic test sequences and some testing criterion coverage such as node coverage ...


Dynamic Slicing Of Aspect-Oriented Uml Communication Diagram, ALINA MISHRA, SUBHRAKANTA PANDA, DISHANT MUNJAL 2020 Department of Computer Science and Engineering, NIT Rourkela 81818app手机版下载

Dynamic Slicing Of Aspect-Oriented Uml Communication Diagram, Alina Mishra, Subhrakanta Panda, Dishant Munjal

International Journal of Computer Science and Informatics

81818app手机版下载Aspect-oriented Programming (AOP) is a recent programming paradigm that focuses on modular implementations of various crosscutting concerns. The typical features of AOP such as join-point, advice, introduction, aspects etc. make it difficult for applying slicing. Program slicing is a method to extort statements that are relevant to a particular variable. Program slicing, as initially defined by Weiser is based on static dataflow examination on the flow graph of the program. Program slicing has been applied in parallel processing, program debugging, program integration,program understanding , software testing and maintenance etc.In this paper, we proposed a technique for dynamic slicing of ...


Aspect Mining Using Uml Communication Diagram, SUBHRAKANTA PANDA, ALINA MISHRA, DISHANT MUNJAL 2020 Department of Computer Science and Engineering, NIT Rourkela

Aspect Mining Using Uml Communication Diagram, Subhrakanta Panda, Alina Mishra, Dishant Munjal

International Journal of Computer Science and Informatics

81818app手机版下载Aspect-Oriented Programming (AOP) focuses on precise constructs for modularization of the crosscutting concerns of a program. Crosscutting concerns can be defined as the functionalities that navigate the principal decomposition of software and therefore cannot be assigned to a single modular unit. Aspect mining attempts to find and isolate crosscutting concerns dwelling in legacy systems which in turn help in the adoption of an aspect-oriented design. Functionalities originally scattered across different modules and tangled with each other can be factored out into a distinct, separate unit, called an aspect. Identifying and refactoring the existing system into AOP considerably ease the debugging ...


Blackbox Testing Of Web Service, KAUSHIK RANA 2020 Computer Engineering Department, Government Engineering College Modasa, Gujarat, India 81818app手机版下载

Blackbox Testing Of Web Service, Kaushik Rana

International Journal of Computer Science and Informatics

Web Services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more Service-Oriented Softwares are built to-day testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, reusuable, discoverable, hides internal logic (Abstraction),minimize retaining information (Statelessness) and adhere to Service Level Aggrement (SLA).These inherent characterestics imposes great challenges to the tester.In this paper we try to impose hierarchical structure on Web Service Description Language(WSDL) in order to uncover more and more errors before its final ...


Model Based Test Case Prioritization Using Uml Activity Diagram And Evolutionary Algorithm, PRATEEVA MAHALI, ARUP ABHINNA ACHARYA 2020 School of Computer Engineering, KIIT University, Bhubaneswar, India

Model Based Test Case Prioritization Using Uml Activity Diagram And Evolutionary Algorithm, Prateeva Mahali, Arup Abhinna Acharya

International Journal of Computer Science and Informatics

81818app手机版下载With the exponential growth in size and complexity of softwares, the testing activity is no more limited to testing phase of SDLC (Software Development Life Cycle). Testing process has been made iterative and incremental in Object Oriented development scenario. This leads to increase in effort and time required for testing as well as explosion in test case. But when it comes to regression testing, it has the additional issue of test case retesting which further increasing the effort and time. So a suitable prioritization technique should be used to address these issues. In this paper we had given a proposal ...


Download Bmp Trains 2020 Newest Version 4.2.3, Martin Wanielista 2020 University of Central Florida 81818app手机版下载

Download Bmp Trains 2020 Newest Version 4.2.3, Martin Wanielista

BMP Trains

This is version 4.2.3 BMP Trains 2020. It is a computer program used to assess the average annual removal effectiveness of nutrients. It is based on research from the State of Florida and uses design criteria in the State. It is accepted by regulatory agencies in the State. It was posted for use stating on September 15, 2020.

This version allows for greater flexibility in media selection.Noted is the choice of treatment rate to calculated service life. Treatment rate is usually decreased by 2 to incorporate a factor of safety. It also increases the reporting decimal places ...


User Manual - Bmp Trains 2020 Newest Version, Martin Wanielista 2020 University of Central Florida

User Manual - Bmp Trains 2020 Newest Version, Martin Wanielista

BMP Trains

81818app手机版下载This update is for version 4.2.3 completed on September 15, 2020. This is a user manual to accompany the computer program called BMP Trains 2020. The user manual provides example problems useful to understanding the program. The user manual is updated when there is a need to respond to user comments or to incorporate new research. The BMP Trains 2020 program is used to assess the average annual effectiveness of nutrient removal from combinations of stormwater BMPs. Fifteen (15) example problems are used to illustrate design options for BMPs in the State of Florida at the present time ...


College Of Engineering News, Georgia Southern University 2020 Georgia Southern University

College Of Engineering News, Georgia Southern University

Engineering & Computing, Allen E. Paulson College of - News

  • Georgia Southern ASCE Student Chapter Received Award


Uav-Enabled Measurement For Spatial Magnetic Field Of Smart Rocks In Bridge Scour Monitoring, Genda Chen 2020 Missouri University of Science and Technology 81818app手机版下载

Uav-Enabled Measurement For Spatial Magnetic Field Of Smart Rocks In Bridge Scour Monitoring, Genda Chen

INSPIRE Archived Webinars

81818app手机版下载This lecture will present an overview of the research, development, validation, and implementation of 'smart' rocks as in-situ agents to assist in remote monitoring of bridge scour in real time. It will start with a brief review of fundamental concepts such as magnet, polarization, magnetic field, and field measurement principle. It will then introduce the concept of ‘smart’ rocks, demonstrate it through small-scale laboratory tests, and design and fabricate gravity-controlled ‘smart’ rocks for field implementation based on river hydrodynamics and riverbed conditions. Next, a ‘smart’ rock localization optimization algorithm will be formulated analytically and validated experimentally in open fields. It ...


Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, MADHUMITA PANDA, PARTHA PRATIM SARANGI 2020 Department of MCA, Seemanta Engineering College, Mayurbhanj, Odisha, 757086

Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, Madhumita Panda, Partha Pratim Sarangi

International Journal of Computer Science and Informatics

This paper discusses an approach to generate test data for path coverage based testing using Genetic Algorithms, Differential Evolution and Artificial Bee Colony optimization algorithms. Control flow graph and cyclomatic complexity of the example program has been used to find out the number of feasible paths present in the program and it is compared with the actual no of paths covered by the evolved test cases using those meta-heuristic algorithms. Genetic Algorithms, Artificial Bee Colony optimization and Differential Evolution are acting here as meta-heuristic search paradisms for path coverage based test data generation. Finally the performance of the test data ...


Critical Components Identification Using Mutation Based Components Impact Analysis, D. JEYAMALA, K. SABARI NATHAN, A. JALILA, S. BALAMURUGAN 2020 Department of Computer Applications, Thiagarajar College of Engineering, Tamilnadu – 625 015

Critical Components Identification Using Mutation Based Components Impact Analysis, D. Jeyamala, K. Sabari Nathan, A. Jalila, S. Balamurugan

International Journal of Computer Science and Informatics

High quality software can be obtained by means of resolving the complexity of the software. According to Pareto principle, 20% of components lead to 80% of the problems [1]. So, we need to identify those 20% of the components during testing. Therefore, this research work suggested an automated software testing framework to identify critical components using mutant based dynamic impact analysis for Software under Test (SUT). Mutants are automatically generated by injecting faults in the components using Offutt mutation operators and they are utilised to identify their impact level over other components of the system. The generated mutants and original ...


Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. JEYAMALA, S. BALAMURUGAN, A. JALILA, K. SABARI NATHAN 2020 Department of Computer Applications, Thiagarajar College of Engineering, Tamilnadu – 625 015

Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. Jeyamala, S. Balamurugan, A. Jalila, K. Sabari Nathan

International Journal of Computer Science and Informatics

Generally, complexity of Software affects the development and maintenance Cost. The Complexity of the software increases, when the number of Components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after coding to test them rigorously. In this paper, we presented a novel approach that helps to identify the critical components in the software based on Criticality Analysis. Criticality Analysis analyzes the critical value of each component based on their Sensitivity and Severity metrics.


Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, PRACHET BHUYAN, ABHISHEK KUMAR 2020 School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India

Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, Prachet Bhuyan, Abhishek Kumar

International Journal of Computer Science and Informatics

Service-Oriented Architecture(SOA) is an approach for designing, deploying and managing services that represent reusable business functionality. SOA removes the gap between software and business. Reliability and fault-free implementation are major concern for SOA based applications. Traditional testing are no more beneficial for verifying and validating the quality of services in SOA systems. Regression testing is inevitable that is undertaken every time to provide confidence that modification do not introduce new bugs into previously validated code. In this paper we addressed the UML based regression testing method using UML use case diagram and UML activity diagram to generate a test ...


Generation Of Test Cases Using Activity Diagram, RANJITA KUMARI SWAIN, VIKAS PANTHI, PRAFULLA KUMAR BEHERA 2020 Rourkela Institute of Mgt. Studies, Rourkela

Generation Of Test Cases Using Activity Diagram, Ranjita Kumari Swain, Vikas Panthi, Prafulla Kumar Behera

International Journal of Computer Science and Informatics

As Unified Modeling Language (UML) activity diagrams capture the key system behavior, the UML activity diagram is well suited for the system level testing of systems. In this paper, first an activity flow graph is derived from activity diagram. Then, all the required information is extracted from the activity flow graph (AFG). The activity flow graph (AFG) for the activity diagram is created by traversing the activity diagram from beginning to end, showing choices, conditions, concurrent executions, loop statements. From the graph different control flow sequence are identified by traversing the AFG by depth first traversal technique. Next, an algorithm ...


Mobile Devices Overview, M.ARJUN GOUD 2020 Satavahana University, Karimnagar Andhra Pradesh, INDIA

Mobile Devices Overview, M.Arjun Goud

International Journal of Computer Science and Informatics

Now a day's mobile devices are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. Personal Digital Assistants (PDA) and the ever-growing category of smart phones allow people to access the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more. This paper presents an overview of mobile devices and also the operating systems used in the devices.


Domain Bounded English To Indian Sign Language Translation Model, SYED FARAZ ALI, GOURI SANKAR MISHRA, ASHOK KUMAR SAHOO 2020 Computer Science and Engineering, Sharda University, Greater Noida, India

Domain Bounded English To Indian Sign Language Translation Model, Syed Faraz Ali, Gouri Sankar Mishra, Ashok Kumar Sahoo

International Journal of Computer Science and Informatics

81818app手机版下载This is a proposal for the English text to Indian Sign Language translation model wherein the system will accept the input text and then translates the given words in sequence by making an avatar to display signs of each word. The translation here is corpus based. There is direct mapping between the English and ISL text. Since it is very inefficient to make signs for each word our domain is bounded by certain criteria for which the translator translates the given text. Like, the system which we propose is for railway reservation counters for enquiry.


Nlp Challenges For Machine Translation From English To Indian Languages, MALLAMMA V REDDY, DR. M. HANUMANTHAPPA 2020 Department of Computer Science and Applications, Jnanabharathi Campus, Bangalore University, Bangalore, INDIA 81818app手机版下载

Nlp Challenges For Machine Translation From English To Indian Languages, Mallamma V Reddy, Dr. M. Hanumanthappa

International Journal of Computer Science and Informatics

81818app手机版下载This Natural Langauge processing is carried particularly on English-Kannada/Telugu. Kannada is a language of India. The Kannada language has a classification of Dravidian, Southern, Tamil-Kannada, and Kannada. Regions Spoken: Kannada is also spoken in Karnataka, Andhra Pradesh, Tamil Nadu, and Maharashtra. Population: The total population of people who speak Kannada is 35,346,000, as of 1997. Alternate Name: Other names for Kannada are Kanarese, Canarese, Banglori, and Madrassi. Dialects: Some dialects of Kannada are Bijapur, Jeinu Kuruba, and Aine Kuruba. There are about 20 dialects and Badaga may be one. Kannada is the state language of Karnataka. About ...


A Comparative Study Of Protein Tertiary Structure Prediction Methods, CHANDRAYANI N.ROKDE, DR.MANALI KSHIRSAGAR 2020 Department of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India-441110 81818app手机版下载

A Comparative Study Of Protein Tertiary Structure Prediction Methods, Chandrayani N.Rokde, Dr.Manali Kshirsagar

International Journal of Computer Science and Informatics

81818app手机版下载Protein structure prediction (PSP) from amino acid sequence is one of the high focus problems in bioinformatics today. This is due to the fact that the biological function of the protein is determined by its three dimensional structure. The understanding of protein structures is vital to determine the function of a protein and its interaction with DNA, RNA and enzyme. Thus, protein structure is a fundamental area of computational biology. Its importance is intensed by large amounts of sequence data coming from PDB (Protein Data Bank) and the fact that experimentally methods such as X-ray crystallography or Nuclear Magnetic Resonance ...


Theoretical Concepts & Applications Of Independent Component Analysis, SONALI MISHRA, NITISH BHARDWAJ, DR. RITA JAIN 2020 LNCT, Bhopal, M.P. India

Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain

International Journal of Computer Science and Informatics

This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is used to extract set of source signal from set of their mixed source signals. The various techniques which are used for implementing Blind Source Separation totally depends upon the properties and the characteristics of original sources. Also there are many fields nowadays in which Independent Component Analysis is widely used. This paper deals with the theoretical concepts of Independent Component Analysis, its principles and ...


A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, AMANPREET KAUR, VIKAS GOYAL 2020 CSE deptt., BSSTC, Ferozepur-INDIA

A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, Amanpreet Kaur, Vikas Goyal

International Journal of Computer Science and Informatics

81818app手机版下载Elliptic curve Cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focus on generation of elliptic curve and shows why finite fields are introduced. But for accurate observation we do analysis on category of cryptographic primitives used to solve given security problem. RSA & ECDSA both have basic criteria of production of keys and method of encryption and decryption in basic application as per security and other properties which are authentication ...