Search Word(s) in Title, Keywords, Authors, and Abstract: Testing

Optimization of Pipelined Discrete Wavelet Packet Transform Based on an Efficient Transpose Form and an Advanced Functional Sharing Technique
Hung-Ngoc Nguyen, Cheol-Hong Kim and Jong-Myon Kim
Page: 374~385, Vol. 15, No.2, 2019
Keywords: AFS Technique, CSDBE, Daubechies, DWPT, FIR Filter, FPGA, Pipelined Architecture
Show / Hide Abstract

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence
Humaira Arshad, Aman Bin Jantan and Oludare Isaac Abiodun
Page: 346~376, Vol. 14, No.2, 2018
Keywords: Criminal Investigation, Data, Digital Forensics, Electronic Evidence, Reliability, Validation, Verification
Show / Hide Abstract

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model
Jin-Wook Jang
Page: 607~620, Vol. 14, No.3, 2018
Keywords: Automobile Control Software, Risk-based Test, Software Testing Process, Test Design, Test Planning, Test Policy and Strategy, TMMi Assessment
Show / Hide Abstract

Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications
Ruchika Malhotra and Anjali Sharma
Page: 751~770, Vol. 14, No.3, 2018
Keywords: Empirical Validation, Fault prediction, Machine Learning, Object-Oriented Metrics, Web Application Quality
Show / Hide Abstract

Speaker Verification with the Constraint of Limited Data
Thyamagondlu Renukamurthy Jayanthi Kumari and Haradagere Siddaramaiah Jayanna
Page: 807~823, Vol. 14, No.4, 2018
Keywords: Gaussian Mixture Model (GMM), GMM-UBM, Multiple Frame Rate (MFR), Multiple Frame Size (MFS), MFSR, SFSR
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network
Sanjeev Kumar and Mahesh Chandra
Page: 703~715, Vol. 13, No.4, 2017
Keywords: Cascade-Forward Back Propagation Technique, Computer-Aided Diagnosis (CAD), Contrast Limited Adaptive Histogram Equalization (CLAHE), Gray-Level Co-Occurrence Matrix (GLCM), Mammographic Image Analysis Society (MIAS) Database, Modified Sigmoid Function
Show / Hide Abstract

Test Set Generation for Pairwise Testing Using Genetic Algorithms
Sangeeta Sabharwal and Manuj Aggarwal
Page: 1089~1102, Vol. 13, No.5, 2017
Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing
Show / Hide Abstract

Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris and Abdul Hanan Abdullah
Page: 104~115, Vol. 11, No.1, 2015
Keywords: Network attack, network auditing, network forensic
Show / Hide Abstract

The Construction and Viterbi Decoding of New (2k, k, l) Convolutional Codes
Wanquan Peng and Chengchang Zhang
Page: 69~80, Vol. 10, No.1, 2014
Keywords: Convolutional Codes, Block Codes, Double Loop Cyclic Codes, Matrix Decoding, Viterbi Algorithm
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

The Accuracy of the Non-continuous I Test for One- Dimensional Arrays with References Created by Induction Variables
Qing Zhang
Page: 523~542, Vol. 10, No.4, 2014
Keywords: Data Dependence Analysis, Loop Parallelization, Loop Vectorization, Parallelizing/Vectorizing Compilers
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance
Praveen Ranjan Srivastava
Page: 21~54, Vol. 8, No.1, 2012
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM)
Show / Hide Abstract

A Novel Approach for Deriving Test Scenarios and Test Cases from Events
Sandeep K. Singh, Sangeeta Sabharwal and J.P.Gupta
Page: 213~240, Vol. 8, No.2, 2012
Keywords: Events, Event Meta Model, Testing, Test cases, Test scenarios, Event Based Systems, Software Engineering
Show / Hide Abstract

The Use of MSVM and HMM for Sentence Alignment
Mohamed Abdel Fattah
Page: 301~314, Vol. 8, No.2, 2012
Keywords: Sentence Alignment, English/ Arabic Parallel Corpus, Parallel Corpora, Machine Translation, Multi-Class Support Vector Machine, Hidden Markov model
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim and Seng-Phil Hong
Page: 187~198, Vol. 7, No.1, 2011
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Show / Hide Abstract

An Adequacy Based Test Data Generation Technique Using Genetic Algorithms
Ruchika Malhotra and Mohit Garg
Page: 363~384, Vol. 7, No.2, 2011
Keywords: Software Testing, Adequacy Based Testing Criteria, Reliability Based Testing Criteria, Genetic Algorithms, Mutation Analysis
Show / Hide Abstract

Stream-based Biomedical Classification Algorithms for Analyzing Biosignals
Simon Fong, Yang Hang, Sabah Mohammed and Jinan Fiaidhi
Page: 717~732, Vol. 7, No.4, 2011
Keywords: Data Stream Mining, VFDT, OVFDT, C4.5 and Biomedical Domain
Show / Hide Abstract

A Hybrid Approach for Regression Testing in Interprocedural Program
Yogesh Singh, Arvinder Kaur and Bharti Suri
Page: 21~32, Vol. 6, No.1, 2010
Keywords: Regression Testing, Test Prioritization, Test Selection, Interprocedural
Show / Hide Abstract

Incremental Model-based Test Suite Reduction with Formal Concept Analysis
Pin Ng, Richard Y. K. Fung and Ray W. M. Kong
Page: 197~208, Vol. 6, No.2, 2010
Keywords: Test Suite Reduction, Model-based Testing, State Machine Model, Formal Concept Analysis
Show / Hide Abstract

A Regression Test Selection and Prioritization Technique
Ruchika Malhotra, Arvinder Kaur and Yogesh Singh
Page: 235~252, Vol. 6, No.2, 2010
Keywords: Regression Testing, Maintenance, Prioritization
Show / Hide Abstract

An Optimized Approach of Fault Distribution for Debugging in Parallel
Maneesha Srivasatav, Yogesh Singh and Durg Singh Chauhan
Page: 537~552, Vol. 6, No.4, 2010
Keywords: Clustering, Debugging, Fault Localization, Optimization, Software Testing
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

An Experiment of Traceability-Driven System Testing
Eun Man Choi and Kwang-Ik Seo
Page: 33~40, Vol. 4, No.1, 2008
Keywords: Software Engineering, Software Testing, Traceability, UML-based Testing
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract