Software Engineering -

Software Engineering (eBook)

Proceedings of CSI 2015
eBook Download: PDF
2018 | 1st ed. 2019
XVIII, 724 Seiten
Springer Singapore (Verlag)
978-981-10-8848-3 (ISBN)
Systemvoraussetzungen
85,59 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents selected proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. They cover diverse topics ranging from communications networks to big data analytics, and from system architecture to cyber security. This book focuses on Software Engineering, and informs readers about the state of the art in software engineering by gathering high-quality papers that represent the outcomes of consolidated research and innovations in Software Engineering and related areas. In addition to helping practitioners and researchers understand the chief issues involved in designing, developing, evolving and validating complex software systems, it provides comprehensive information on developing professional careers in Software Engineering. It also provides insights into various research issues such as software reliability, verification and validation, security and extensibility, as well as the latest concepts like component-based development, software process models, process-driven systems and human-computer collaborative systems.




Prof. M.N. Hoda is a Professor of Computer Science and Director of BVICAM, New Delhi. He has over 22 years of academic experience in different capacities. Prior to joining the academic world, he initially worked in the corporate sector as a Software Engineer. He is an expert member of several board-level committees of the DST, CSIR and MHRD, and various universities. His current areas of research are Information System Audits, Software Engineering, Computer Networks, Artificial Intelligence, ICTs and Innovative Pedagogies for 21st Century Teaching Learning Systems. He is a Senior Member of the IEEE, CSI, IE(I), ISTE, ISCA and ACM, and a fellow of the IETE.

Prof. Naresh Chauhan is a Professor and Chairman of the Department of Computer Engineering at YMCA University of Science & Technology, Faridabad (India). He received his Ph.D. (Computer Engineering) from MD University, Rohtak, his M.Tech. (Information Technology) from GGSIP University, New Delhi and his B.Tech. (Computer Engineering) from NIT Kurukshetra. He has 23 years of experience in education and the industry. Previously, he served at Bharat Electronics Ltd. and Motorola India Ltd. His research interests include Internet Technologies, Software Engineering, Software Testing and Real-time Systems. He has published two books on Software Testing and Operating Systems from Oxford University Press, India.

Prof. S.M.K. Quadri is a Professor and Head of the Department of Computer Science, University of Kashmir, Srinagar. He received his Masters degree from Aligarh Muslim University (AMU) and his M.Tech. in Computer Applications from the Indian School of Mines (ISM), Dhanbad. He completed his Doctorate in Computer Science at the University of Kashmir, Srinagar. He is a widely travelled researcher and a member of many prestigious national-level committees of India, e.g. the NAAC, AICTE and CSI. He has published many research papers in Elsevier and Emerald journals and for IEEE conferences. His main research interests are Software Testing and Reliability Engineering.

Dr. Praveen Ranjan Srivastava is an Assistant Professor and Head of the Department (Area Chair) in the Information Technology and Systems Group at the Indian Institute of Management (IIM), Rohtak, India. He is currently pursuing research in the area of software Engineering and Management using novel nature-inspired techniques. His primary research areas are Software Testing, Data Analytics, Quality Management, Expert Systems and Decision Science. He has published more than 120 research papers in various leading international journals.


This book presents selected proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. They cover diverse topics ranging from communications networks to big data analytics, and from system architecture to cyber security. This book focuses on Software Engineering, and informs readers about the state of the art in software engineering by gathering high-quality papers that represent the outcomes of consolidated research and innovations in Software Engineering and related areas. In addition to helping practitioners and researchers understand the chief issues involved in designing, developing, evolving and validating complex software systems, it provides comprehensive information on developing professional careers in Software Engineering. It also provides insights into various research issues such as software reliability, verification and validation, security and extensibility, as well as the latest concepts like component-based development, software process models, process-driven systems and human-computer collaborative systems.

Prof. M.N. Hoda is a Professor of Computer Science and Director of BVICAM, New Delhi. He has over 22 years of academic experience in different capacities. Prior to joining the academic world, he initially worked in the corporate sector as a Software Engineer. He is an expert member of several board-level committees of the DST, CSIR and MHRD, and various universities. His current areas of research are Information System Audits, Software Engineering, Computer Networks, Artificial Intelligence, ICTs and Innovative Pedagogies for 21st Century Teaching Learning Systems. He is a Senior Member of the IEEE, CSI, IE(I), ISTE, ISCA and ACM, and a fellow of the IETE. Prof. Naresh Chauhan is a Professor and Chairman of the Department of Computer Engineering at YMCA University of Science & Technology, Faridabad (India). He received his Ph.D. (Computer Engineering) from MD University, Rohtak, his M.Tech. (Information Technology) from GGSIP University, New Delhi and his B.Tech. (Computer Engineering) from NIT Kurukshetra. He has 23 years of experience in education and the industry. Previously, he served at Bharat Electronics Ltd. and Motorola India Ltd. His research interests include Internet Technologies, Software Engineering, Software Testing and Real-time Systems. He has published two books on Software Testing and Operating Systems from Oxford University Press, India. Prof. S.M.K. Quadri is a Professor and Head of the Department of Computer Science, University of Kashmir, Srinagar. He received his Masters degree from Aligarh Muslim University (AMU) and his M.Tech. in Computer Applications from the Indian School of Mines (ISM), Dhanbad. He completed his Doctorate in Computer Science at the University of Kashmir, Srinagar. He is a widely travelled researcher and a member of many prestigious national-level committees of India, e.g. the NAAC, AICTE and CSI. He has published many research papers in Elsevier and Emerald journals and for IEEE conferences. His main research interests are Software Testing and Reliability Engineering. Dr. Praveen Ranjan Srivastava is an Assistant Professor and Head of the Department (Area Chair) in the Information Technology and Systems Group at the Indian Institute of Management (IIM), Rohtak, India. He is currently pursuing research in the area of software Engineering and Management using novel nature-inspired techniques. His primary research areas are Software Testing, Data Analytics, Quality Management, Expert Systems and Decision Science. He has published more than 120 research papers in various leading international journals.

Preface 6
The Organization of CSI-2015 9
Chief Patron 9
Patrons 9
Chair, Programme Committee 9
Secretary, Programme Committee 9
Advisory Committee 9
Editorial Board 10
Contents 11
About the Editors 17
1 A Multi-agent Framework for Context-Aware Dynamic User Profiling for Web Personalization 19
Abstract 19
1 Introduction 19
2 User Modeling Techniques 20
2.1 Information Gathering 21
2.2 User Profile Representation 21
2.3 User Profile Construction 22
3 Related Work 22
4 Proposed Framework for Multi-agent-Based Dynamic User Profiling 24
5 Detailed Description of Framework 26
5.1 Client-Side Agents 27
5.2 Server-Side Agents 27
6 Flow Diagram of the Proposed Work 31
7 Conclusion and Future Work 32
References 33
2 Implementation of Equivalence of Deterministic Finite-State Automation and Non-deterministic Finite-State Automaton in Acceptance of Type 3 Languages Using Programming Code 35
Abstract 35
1 Introduction 36
2 Finite Acceptors 36
3 Algorithm to Implement DFA 37
4 Programming Code to Implement DFA and NFA 38
5 Regular Languages or Type 3 Grammars 39
6 Equivalence of NFA to DFA on Acceptance of Regular Language 40
7 Example of NFA to DFA with Test Cases 41
8 Algorithm for Conversion of NFA to DFA 41
8.1 Test Case 1 for NFA and Its Equivalent DFA 42
9 Result and Conclusion 42
References 43
3 A Multi-factored Cost- and Code Coverage-Based Test Case Prioritization Technique for Object-Oriented Software 44
Abstract 44
1 Introduction 44
2 Related Work 45
3 Proposed Work 46
3.1 Considered Factors for Prioritized Test Cases 48
4 Result and Analysis 48
4.1 Faults Detected by Test Cases in Non-Prioritized Order 48
4.2 Faults Detected by Test Cases in Prioritized Order 50
4.3 Comparison of APFD Graphs Prioritized and Non-prioritized Order of Test Cases for Three Programs 50
4.4 Effectiveness of the Proposed Approach 51
5 Conclusion 52
References 53
4 A Novel Page Ranking Mechanism Based on User Browsing Patterns 54
Abstract 54
1 Introduction 54
2 Related Work 55
2.1 PageRank 56
2.2 Page Ranking Algorithm Based on Link Visits (PRLV) 57
3 Proposed Page Ranking Mechanism 59
3.1 Search Engine Interface 59
3.2 PPF Calculator 60
3.3 DB Builder 62
3.4 Query Processor 64
4 Example 64
5 Conclusion 64
References 65
5 Indexing of Semantic Web for Efficient Question Answering System 67
Abstract 67
1 Introduction 68
2 Related Work 68
3 Proposed Architecture 70
3.1 Query Interface Module 70
3.2 Query Processing Module 70
3.3 Question Categorization Module 71
3.4 Question Analysis Module 71
3.5 Question Categorization 71
3.6 Semantic Mapping in Question Answering System 72
3.7 Indexing Module 73
3.8 Result Processing Module 73
4 Experimental Evaluation 74
5 Conclusions and Future Scope 76
References 76
6 A Sprint Point Based Tool for Agile Estimation 78
Abstract 78
1 Introduction 78
1.1 Estimation 79
2 Sprint-point based Estimation Framework in SPBE Tool 79
2.1 Sprint Estimation 79
2.2 User Story-Based Prioritization Algorithm 80
2.3 Managing Uncertainty in Estimating User Stories 81
2.4 Sprint-Point Based Estimation Using Delay-Related Factors 81
2.5 Sprint-Point Based Estimation Tool 82
2.5.1 Contents of SPBE Tool 83
2.6 Case Study 83
2.7 Results 84
3 Conclusion 86
References 86
7 Improving Search Results Based on Users’ Browsing Behavior Using Apriori Algorithm 88
Abstract 88
1 Introduction 88
1.1 Introduction to Apriori Algorithm 89
2 Related Work 89
3 Working Methodology 91
4 Example 92
5 Conclusion 96
References 96
8 Performance Efficiency Assessment for Software Systems 98
Abstract 98
1 Introduction 99
2 Related Work 99
3 Proposed Performance Efficiency Model 101
3.1 Performance Efficiency in Quality Models 101
4 Assessment of the Proposed Performance Efficiency Model 102
5 Case Study 104
6 Conclusion and Future Scope 106
References 107
9 Impact of Programming Languages on Energy Consumption for Sorting Algorithms 108
Abstract 108
1 Introduction 108
2 Related Works 109
3 Role of Programming Language in Energy Efficiency 109
4 Sorting Algorithms 110
4.1 Bubble Sort 110
4.2 Selection Sort 111
4.3 Insertion Sort 111
4.4 Quick Sort 111
5 Programming Language 111
5.1 Java [18] 111
5.2 Visual Basic 6.0 112
5.3 C#.Net 112
6 Experimental Setup 112
7 Experimental Run 113
8 Experimental Result and Analysis 113
9 Conclusion 115
References 116
10 Crawling Social Web with Cluster Coverage Sampling 117
Abstract 117
1 Introduction 117
2 Related Work 118
3 Problem Description 119
4 Cluster Coverage Sampling (CCS) Methodology 120
5 Experiments and Result Analysis 124
6 Conclusion and Future Scope 128
References 128
11 Efficient Management of Web Data by Applying Web Mining Pre-processing Methodologies 129
Abstract 129
1 Introduction 129
2 Literature Review 130
3 Data Pre-processing on Web Log File 130
3.1 Field Extraction 131
3.2 Significant Attributes Selection 132
3.3 Data Selection 132
3.4 Data Cleaning 132
3.4.1 Remove Duplicacy 133
3.4.2 Missing Value 133
3.4.3 Noise 133
4 Results and Interpretation 133
5 Conclusion 135
References 135
12 A Soft Computing Approach to Identify Multiple Paths in a Network 137
Abstract 137
1 Introduction 137
2 Related Work 138
3 AntNet Routing Algorithm 139
4 Proposed AntNet Modifications 140
5 Conclusion 143
References 143
13 An Efficient Focused Web Crawling Approach 144
Abstract 144
1 Introduction 144
2 Related Work 146
3 Proposed Method 149
4 Conclusion 151
References 151
14 A New Log Kernel-Based Possibilistic Clustering 152
Abstract 152
1 Introduction 152
2 Literature Work 154
2.1 Fuzzy C-Means Clustering (FCM) 154
2.2 Possibilistic C-Means Clustering (PCM) 155
2.3 Unsupervised Possibilistic C-Means Clustering (UPC) 156
3 Kernel-Based Algorithm 156
3.1 Kernel-Based Approach 156
4 Proposed kernelized UPC-Log Algorithm 157
5 Experimental Results 159
5.1 Synthetic Datasets 159
5.2 High-Dimensional Real Datasets 161
6 Conclusions 164
References 165
15 Fuzzy c-Means Clustering Strategies: A Review of Distance Measures 166
Abstract 166
1 Introduction 167
2 Related Work 167
2.1 Fuzzy c-Means Algorithm 167
2.2 Distance Measures 168
2.2.1 Euclidean Distance 168
2.2.2 Standard Euclidean Distance 169
2.2.3 Mahalanobis Distance 169
2.2.4 Standard Mahalanobis Distance 169
2.2.5 Minkowski Distance 169
2.2.6 Chebyshev Distance 170
3 Experiments’ Results 170
3.1 Synthetic Datasets 170
3.1.1 X_{12} Dataset 170
3.2 High-Dimensional DataSets 173
4 Conclusions 175
References 175
16 Noise Reduction from ECG Signal Using Error Normalized Step Size Least Mean Square Algorithm (ENSS) with Wavelet Transform 176
Abstract 176
1 Introduction 176
2 Proposed Implementation 177
2.1 ENSS Algorithm-Based ANC System 177
2.2 1-D Wavelet Transform (Haar Wavelet Transform) 178
2.3 ENSS-LMS Algorithm 179
2.4 Implementation Steps 179
3 Simulation Results 180
4 Conclusion 183
References 183
17 A Novel Approach for Extracting Pertinent Keywords for Web Image Annotation Using Semantic Distance and Euclidean Distance 185
Abstract 185
1 Introduction 186
2 Related Work 186
3 Proposed Architecture 187
3.1 Crawl Manager 187
3.2 URL Queue 188
3.3 Parser 188
3.4 Visual Web Page Segmenter 189
3.5 Block Analyzer 189
3.6 Nearest Text Block Detector 189
3.7 Tag Text Extractor 190
3.8 Keyword Extractor 190
3.9 Semantic Distance Calculator 190
3.10 Text Extractor 191
3.11 Keyword Determiner 192
3.12 Image Annotation 192
4 Algorithm 192
5 Conclusion 193
References 194
18 Classification of Breast Tissue Density Patterns Using SVM-Based Hierarchical Classifier 196
Abstract 196
1 Introduction 196
2 Methodology 197
2.1 Description of Dataset 197
2.2 Selecting Regions of Interest 197
2.3 Proposed Method 198
3 Results 199
3.1 Classification Performance of Laws’ Texture Features Using Hierarchical Classifier 199
4 Conclusion 201
References 201
19 Advances in EDM: A State of the Art 203
Abstract 203
1 Introduction 203
2 Materials and Methods 204
2.1 Dataset and Its Features 204
2.2 Feature Measurement 205
3 Methodology 205
3.1 AdaBoost Algorithm 206
3.2 Feature Importance Using AdaBoost Algorithm 206
3.3 Machine Learning Methods 207
4 Model Evaluation 208
5 Experimental Result 208
6 Conclusion and Future Scope 210
References 211
20 Proposing Pattern Growth Methods for Frequent Pattern Mining on Account of Its Comparison Made with the Candidate Generation and Test Approach for a Given Data Set 212
Abstract 212
1 Introduction 213
1.1 Association Rule Mining 213
2 Literature Survey 214
3 Experiment 214
4 Result and Discussion 215
5 Conclusion 216
References 217
21 A Study on Initial Centroids Selection for Partitional Clustering Algorithms 219
Abstract 219
1 Introduction 220
2 Study on Initial Centroid Selection for Clustering Algorithms 220
3 Developed Farthest Distributed Centroid Clustering Algorithm 223
3.1 Basic Concept 223
3.2 Farthest Distributed Centroid Clustering Algorithm 223
4 Experimental Study 224
5 Conclusion 226
References 226
22 A Novel Rare Itemset Mining Algorithm Based on Recursive Elimination 229
Abstract 229
1 Introduction 229
1.1 Rare Itemset Mining 230
2 Related Work 231
3 Proposed Rare Itemset Mining Algorithm 232
3.1 Illustration 233
4 Proof of Correctness 237
5 Simulation Results and Discussion 237
6 Conclusion 240
References 240
23 Computation of Various Entropy Measures for Anticipating Bugs in Open-Source Software 242
Abstract 242
1 Introduction 242
2 Literature Review 243
3 Information Theoretic Approach 244
4 Basic Model for Entropy Measurement 245
5 Data Collection and Preprocessing 246
6 Calculation of Arimoto, Havrda–Charvat, and Renyi Entropy 248
7 Analysis and Bug Prediction Approach 249
8 Result and Discussion 251
9 Conclusion 252
References 253
24 Design of Cyber Warfare Testbed 255
Abstract 255
1 Introduction 255
2 Testbed Requirements 256
3 Testbed Design 256
3.1 Design of Cluster 257
3.2 Composing Attack System 257
3.3 Composing Defence System 258
3.4 Data Logger and Report Generation 258
4 Operational Configuration 259
4.1 Scenarios 259
4.2 Attack Emulation 259
5 Analysis 260
5.1 Identification of Measures of Effectiveness (MOEs) 260
5.2 Vulnerability Analysis 260
5.3 Development of Strategy and Tactics 260
6 Conclusion 261
7 Future Scope 261
References 262
25 Performance Evaluation of Features Extracted from DWT Domain 263
Abstract 263
1 Introduction 263
2 Steganography Algorithms 264
3 Proposed DWT Feature Extraction 265
3.1 Histogram 265
3.2 Markov 265
3.3 Existing DWT Farid Features 266
4 Neural Network Classifier 266
5 Experimental Results 267
6 Analysis 267
7 Conclusion 269
References 270
26 Control Flow Graph Matching for Detecting Obfuscated Programs 272
Abstract 272
1 Introduction 272
2 Disassembly of Executables 273
3 Obfuscation Techniques 273
4 Control Flow Graph 274
4.1 Control Flow Graph Reduction 274
4.2 Control Flow Graph Matching 275
5 Proposed Framework 275
5.1 Explanation 275
6 Conclusion 279
References 280
27 A Novel Framework for Predicting Performance of Keyword Queries Over Database 281
Abstract 281
1 Introduction 281
2 Related Work 282
2.1 Post-retrieval Methods 283
2.2 Clarity Score Based 283
2.3 Popularity Based 283
2.4 Challenges in Information Retrieve in Structured Database with Keyword Query 283
3 Proposed System 284
3.1 Objective 284
4 Implementation and Discussion 288
5 Conclusion 289
References 290
28 Predicting and Accessing Security Features into Component-Based Software Development: A Critical Survey 291
Abstract 291
1 Introduction 292
2 Security Specification for Software Component 292
3 Architecture and Design for Secure Software Component 294
4 Proposed Framework for Security of Component-Based Software 296
5 Conclusion and Future Scope 297
References 297
29 Traditional Software Reliability Models Are Based on Brute Force and Reject Hoare’s Rule 299
Abstract 299
1 Introduction 300
2 Software Reliability Measurement 302
3 Brute Force Nature of Traditional Models 303
4 Perceiving Reliability with Hoare’s Logic 304
5 Proposed Model Framework 306
6 Conclusion 307
References 307
30 Object-Oriented Metrics for Defect Prediction 309
Abstract 309
1 Introduction 309
2 Literature Survey 310
3 Methodology 312
3.1 Performance Evaluation Parameters 313
4 Collection of Data 314
5 Results 316
6 Conclusion 320
References 321
31 A Comparative Analysis of Static and Dynamic Java Bytecode Watermarking Algorithms 323
Abstract 323
1 Introduction 323
2 Background 324
2.1 Difficulties Faced by Software Watermarking 325
2.2 Watermarking Techniques 325
2.3 Classification of Watermark 326
2.4 Types of Attacks to Watermarks [13] 326
3 The Empirical Evaluation 326
3.1 The Watermarker 327
3.1.1 Static Watermarking Algorithms Are as 327
3.1.2 Dynamic Watermarking Algorithms 328
3.2 The Transformation Attacks 328
3.3 The Test Case Jar Files 328
4 Results 328
4.1 Static Watermarking Algorithms 329
4.1.1 Watermarking 329
4.1.2 Obfuscation 329
4.1.3 Recognition 330
4.2 Dynamic Watermarking Algorithms 331
4.2.1 Watermarking 331
4.2.2 Obfuscation 332
4.2.3 Recognition 334
4.3 Comparative Analysis of Static and Dynamic Software Watermarking Algorithms 334
4.4 Analysis of Results 336
5 Conclusion 336
References 337
32 Software Architecture Evaluation in Agile Environment 339
Abstract 339
1 Introduction 339
1.1 Definition of Software Architecture 340
1.2 Software Architectonics and Software Architect 340
1.3 Agile Software Development 340
1.4 Agile Architecture Is a Paradox 341
2 Literature Survey 342
3 Problem Definition 344
4 Objectives 344
5 Experimental Design 345
5.1 Software Architecture Metrics 345
5.2 Agile Software Metrics 345
5.3 Eclipse 347
5.4 X-Ray 350
5.5 JArchitect 352
5.6 JFreeChart 352
6 Results and Discussion 353
7 Conclusion 359
8 Future Scope 359
References 359
33 Mutation Testing-Based Test Suite Reduction Inspired from Warshall’s Algorithm 361
Abstract 361
1 Introduction 361
2 Related Work 362
3 Methodology 363
3.1 Research Questions 363
3.2 Experimental Design 363
3.3 Procedure 364
3.3.1 Algorithm of Proposed Approach 364
3.3.2 Time Complexity of the Proposed Approach 366
4 Results 366
5 Conclusion and Future Work 367
References 367
34 Software Component Retrieval Using Rough Sets 369
Abstract 369
1 Introduction 369
2 Related Work 370
3 Decision Making Using Rough Sets 371
3.1 Rough Sets 371
3.2 Methodology for Component Extraction 371
4 Results and Analysis 374
5 Conclusion 377
References 377
35 Search-Based Secure Software Testing: A Survey 379
Abstract 379
1 Introduction 379
2 Key Points 380
3 Strategies of Research 381
3.1 Research Questions 381
4 Elucidation for Research Questions 381
4.1 RQ1: What Is Metaheuristic and Its Techniques? 381
4.2 RQ2: Why SBST Is Used to Tackle Security Vulnerabilities? 382
4.3 RQ3: What Is Meant by Software Security Testing? 383
5 Threats 383
6 Conclusion 384
References 384
36 Limitations of Function Point Analysis in Multimedia Software/Application Estimation 386
Abstract 386
1 Introduction 387
2 Function Point Analysis (FPA) 388
2.1 External Inputs (EIs) 388
2.2 External Outputs (EOs) 388
2.3 External Inquiries (EQs) 389
2.4 Internal Logical Files (ILFs) 389
2.5 External Interface Files (EIFs) 389
2.6 Rating of Components 389
2.7 Calculation of Complexity Adjustment Factor (CAF) 390
3 Multimedia Systems Features Against FPA 392
3.1 Limitations of FPA 393
4 Conclusion 394
References 395
37 Maintainability Analysis of Component-Based Software Architecture 396
Abstract 396
1 Introduction 396
2 Maintainability Scenario and Graph 398
3 Maintainability Analysis and Scenario Evaluation 402
4 Conclusion 403
References 403
38 An Assessment of Vulnerable Detection Source Code Tools 405
Abstract 405
1 Introduction 405
2 Tools 407
2.1 Cppcheck 1.68 [7] 407
2.2 Flawfinder [8] 407
2.3 Visual Code Grepper (VCG) [9] 408
3 Comparison/Analysis of Tools 409
3.1 Conceptual Comparison 409
3.2 Empirical Comparison 410
4 Conclusion and Future Scope 413
References 413
39 Devising a New Method for Economic Dispatch Solution and Making Use of Soft Computing Techniques to Calculate Loss Function 415
Abstract 415
1 Introduction 415
2 New Approach for the Solution of Economic Dispatch Problem 416
2.1 Steps of the Deterministic Approach 416
2.2 Description of Fuzzy Sets Used in the New Approach 418
2.3 Usage of Genetic Algorithm in the Method 419
3 Illustrations and Result 419
3.1 Sample System Consisting of Two Generators 419
3.2 Conclusions 420
References 421
40 Trusted Operating System-Based Model-Driven Development of Secure Web Applications 422
Abstract 422
1 Introduction 423
2 Secure Web Application Modeling 425
3 Axes of Change in Round-trip Engineering 427
4 Conclusion 432
References 432
41 Navigational Complexity Metrics of a Website 434
Abstract 434
1 Introduction 434
2 Factors Affecting Navigational Complexity of the Website 435
2.1 Website Structural Complexity 435
2.2 Other Factors 436
2.2.1 Website Defects 436
2.2.2 Maximum Depth 437
2.2.3 Path Density 437
3 Methodology 437
4 Results and Discussion 439
5 Conclusions 440
References 440
42 Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems 442
Abstract 442
1 Introduction 442
2 Background and Related Work 443
3 Methodology 444
3.1 Metrics 444
3.2 Web Server Tests 445
4 Case Study—Results and Discussion 446
References 448
43 Component-Based Quality Prediction via Component Reliability Using Optimal Fuzzy Classifier and Evolutionary Algorithm 449
Abstract 449
1 Introduction 449
2 Related Work 450
3 Proposed Methodology for Software Quality Prediction 450
3.1 Steps Involved in the Software Quality Prediction 451
3.2 Software Cost and Reliability Measure to Estimate the Quality 451
3.2.1 Software Reliability Measure 451
Fuzzy Logic 452
Fuzzy Rule Optimization Using Evolutionary Programming (EP) 452
3.2.2 Software Cost Measure 454
4 Results and Discussion 454
5 Conclusion 455
References 456
44 Applying Statistical Usage Testing Along with White Box Testing Techniques 457
Abstract 457
1 Introduction 458
2 White Box Testing Techniques (WBTT) 459
2.1 Use of White Box Testing Techniques (WBTTs) with SUT 459
2.2 Types of White Box Testing Techniques 460
3 Testing ‘HTML to Text Converter Utility’ Using SUT 463
3.1 HTML to TEXT Utility 463
3.2 SUT for HTML to TEXT Converter 463
4 Applying SUT Along with WBTT 466
4.1 Control Flow Testing (CFT) 466
4.2 Data Flow Testing (DFT) 470
4.3 Mutation Testing 472
5 Findings and Conclusion 473
6 Limitations and Future Work 473
Acknowledgements 473
References 474
45 A Review on Application Security Management Using Web Application Security Standards 476
Abstract 476
1 Introduction 477
2 Objective 477
3 Scope 477
4 Types of Vulnerabilities 477
5 Methodology 479
5.1 Design 479
5.2 Coding 480
5.3 Security Testing 480
5.4 Delivery and Deployment 480
6 Management Practices 481
6.1 Requirements, Design, and Development 481
6.2 Testing 482
6.3 Audience 482
6.4 Verification Matrix 482
7 Conclusion 485
References 485
46 A Review of Software Testing Approaches in Object-Oriented and Aspect-Oriented Systems 486
Abstract 486
1 Introduction 486
2 Evaluation Criteria 487
3 Object-Oriented Testing 490
4 Aspect-Oriented Testing 491
5 Conclusion and Limitations 492
Acknowledgements 493
References 493
47 A Literature Survey of Applications of Meta-heuristic Techniques in Software Testing 496
Abstract 496
1 Introduction 496
2 Meta-heuristic Techniques 497
2.1 Ant Colony Optimization 497
2.2 Genetic Algorithm 497
3 Benchmark for Evaluation 498
4 Analysis of ACO and GA 500
4.1 Genetic Algorithm 500
4.2 Aco 501
5 Conclusion 502
References 503
48 A Review of Test Case Prioritization and Optimization Techniques 505
Abstract 505
1 Introduction 505
1.1 Regression Testing 506
1.2 Test Case Prioritization 506
1.3 Techniques of Test Case Prioritization and Optimization 506
2 Literature Survey 507
2.1 Research Questions 507
3 Analysis of Papers 507
4 Conclusion 512
References 512
49 Software Development Activities Metric to Improve Maintainability of Application Software 515
Abstract 515
1 Introduction 515
2 Software Development Activities Metric to Improve the Maintainability 516
3 Analysis of SDA Metric 517
4 Conclusion 521
References 521
50 Label Count Algorithm for Web Crawler-Label Count 522
Abstract 522
1 Introduction 522
2 Preliminaries 523
2.1 Crawling Strategy 523
2.2 Architecture 524
3 Schemes for Web Crawling 525
3.1 Genetic Algorithm 525
3.2 Breadth-First Search Algorithm 525
3.3 Page Rank Algorithm 526
3.4 Depth-First Search Algorithm 526
4 Conclusion and Future Work 528
References 528
51 Vulnerability Discovery in Open- and Closed-Source Software: A New Paradigm 529
Abstract 529
1 Introduction 529
2 Proposed Approach 531
3 Parameter Estimations 533
4 Prediction Capabilities of Models 533
5 Conclusion 534
References 534
52 Complexity Assessment for Autonomic Systems by Using Neuro-Fuzzy Approach 536
Abstract 536
1 Introduction 536
2 Autonomic Computing-Enabled Systems 537
2.1 Architecture of Autonomic System 538
3 Literature Review 539
4 Proposed Model 541
4.1 Implementation of the Proposed Approach 542
4.2 Empirical Evaluation 542
5 Conclusion and Future Work 543
References 543
53 Proposal for Measurement of Agent-Based Systems 545
Abstract 545
1 Introduction 545
2 Existing Metrics 547
3 The Necessity for New Metrics 548
4 Advancement in Metrics 549
5 Conclusion 554
References 554
54 Optimal Software Warranty Under Fuzzy Environment 557
Abstract 557
1 Introduction 558
2 The Cost Model 559
3 Problem Formulation 560
4 Numerical Example 561
5 Conclusion 562
References 563
55 Automation Framework for Test Script Generation for Android Mobile 564
Abstract 564
1 Introduction 564
2 Related Work 565
3 Architecture of Proposed Framework 566
3.1 Overview of the proposed framework 566
3.2 Architecture of the Virtual Test Engineer 566
3.3 Mobile side architecture 569
4 Case Study 571
5 Experimental Results 573
5.1 Horizontal deployment 573
5.2 Bug fixing/Enhancement 575
6 Comparison with Other Methods 575
7 Conclusions 576
References 576
56 Optimizing the Defect Prioritization in Enterprise Application Integration 578
Abstract 578
1 Introduction 578
2 Literature Review 579
3 Genetic Algorithm 581
4 Proposed Approach and Experimental Set-up 581
5 Outcomes and Discussions 584
6 Conclusions 589
References 589
57 Desktop Virtualization—Desktop as a Service and Formulation of TCO with Return on Investment 591
Abstract 591
1 Introduction 591
2 Components of DaaS 593
3 Comparison of DaaS Providers 595
4 Obstacles in Adoption of DaaS 596
5 Formulation of TCO/ROI 597
6 Conclusion 599
References 599
58 An Assessment of Some Entropy Measures in Predicting Bugs of Open-Source Software 601
Abstract 601
1 Introduction 602
2 Literature Review 603
3 Entropy Measures and Code Change Process 603
4 Methodology 605
4.1 Data Collection and Preprocessing 605
4.2 Evaluation of Shannon, Renyi, and Tsallis Entropies 605
5 Bug Prediction Modeling 606
6 Assessment of Entropy Measures 609
6.1 One-Way ANOVA 610
6.2 Tukey’s HSD Test 610
7 Conclusion and Future Scope 612
References 613
59 A Path Coverage-Based Reduction of Test Cases and Execution Time Using Parallel Execution 614
Abstract 614
1 Introduction 614
2 Problem Description 616
3 Proposed Technique 616
3.1 Algorithm 616
4 Parallel Test Case Executor 618
5 Result and Analysis 619
6 Conclusion 620
References 620
60 iCop: A System for Mitigation of Felonious Encroachment Using GCM Push Notification 622
Abstract 622
1 Introduction 623
2 Feasibility Study 623
3 A Brief About Arduino Platform 624
4 Methodology 625
5 iCop System 625
5.1 Testing Results 626
5.2 Risk Analysis 627
6 Conclusion 628
References 629
61 Clustering the Patent Data Using K-Means Approach 630
Abstract 630
1 Introduction 630
2 Background Study 631
2.1 Processing of Algorithm 632
3 Methodology 633
4 Experiments and Results 633
5 Conclusion 635
References 636
62 Success and Failure Factors that Impact on Project Implementation Using Agile Software Development Methodology 637
Abstract 637
1 Introduction 637
2 Literature Review 638
3 Different Factors in the Agile Development 639
4 Strategies for Mitigating Factors Affecting Agile and Distributed Agile Development 640
5 Case Study 641
6 Findings 642
6.1 Outcomes 642
7 Conclusion 644
References 644
63 Fuzzy Software Release Problem with Learning Functions for Fault Detection and Correction Processes 645
Abstract 645
1 Introduction 645
2 Formulation of Problem 646
2.1 Software Reliability Growth Models 646
2.2 The Cost Model 648
2.3 Problem Formulation 648
3 Problem Solution and Numerical Example 649
3.1 Problem Solution 649
3.2 Numerical Example 649
4 Conclusion 651
References 651
64 Reliability Assessment of Component-Based Software System Using Fuzzy-AHP 652
Abstract 652
1 Introduction 652
2 Methodology 653
2.1 Identification of Factors 653
2.1.1 The Deployment Context 653
2.1.2 Human Factor 654
2.1.3 Analysis and Design Factor 654
2.1.4 Testing Factor 654
2.2 Evaluation of Reliability Using Analytical Hierarchy Process 654
2.2.1 Building the Hierarchy 654
2.2.2 Pair-Wise Comparisons 654
2.2.3 Relative Weight Estimation 655
2.3 Fuzzy Comprehensive Evaluation 656
2.3.1 Create Sets of Grade Factors and Elements 656
2.3.2 Derive a Single-Factor Evaluation Matrix R from U to V 656
2.3.3 Find Results of Comprehensive Evaluation 657
2.3.4 Comprehensive Multi-level Fuzzy Evaluation 658
2.3.5 Conclude Evaluation 658
3 Conclusion 658
References 658
65 Ranking Usability Metrics Using Intuitionistic Preference Relations and Group Decision Making 660
Abstract 660
1 Introduction 660
2 Literature Survey 661
3 Basics of Group Decision Making 662
4 Application of Group Decision Making to Rank Usability Metrics 663
5 Illustrative Example 665
6 Conclusion 666
Appendix 1 667
Appendix 2 667
References 668
66 Research Challenges of Web Service Composition 669
Abstract 669
1 Introduction 669
2 Semantic-Based Composition Techniques 671
3 Composition Research Challenges 673
3.1 Semantic Web Services Languages, Discovery, and Selection Challenges 673
3.2 Composition Challenges 674
3.3 Scalability, Adaptation, and Management 675
4 Conclusions and Future Work 675
References 676
67 Automation Software Testing on Web-Based Application 678
Abstract 678
1 Introduction 678
2 Literature Review 679
3 Automated Testing 679
4 Proposed Method 680
4.1 Experimental Work 682
4.2 Comparison and Result Between Traditional and Agile Automated Testing Model 683
5 Conclusion 684
References 684
68 Automated Test Data Generation Applying Heuristic Approaches—A Survey 686
Abstract 686
1 Introduction 686
2 Literature Survey 688
2.1 Software Testing 688
2.2 Test Data Generation 689
2.3 Heuristic Approaches 689
2.4 Applying Heuristics in Test Data Generation 690
3 Heuristic Approaches Applied in Test Data Generation 692
4 Conclusion 694
69 Comparison of Optimization Strategies for Numerical Optimization 696
Abstract 696
1 Introduction 696
2 Related Work 697
3 Proposed Work 698
3.1 Particle Swarm Optimization 698
3.2 Artificial Bee Colony 698
3.3 Teacher–Learner-Based Optimization 699
3.4 Differential Evolution 700
3.5 Benchmark Functions 701
4 Experimental Results and Analysis 702
5 Conclusion 703
References 703
70 Sentiment Analysis on Tweets 704
Abstract 704
1 Introduction 705
2 Literature Survey 706
3 Proposed System 707
4 Implementation 707
4.1 Tweets Extraction 707
4.2 Stop Words Removal 709
4.3 Split Keywords 709
4.4 Bag of Words 709
4.5 Polarity Comparison 710
4.6 Calculating Polarity 710
5 Conclusion 710

Erscheint lt. Verlag 12.6.2018
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XVIII, 724 p. 212 illus., 129 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Mathematik / Informatik Informatik Software Entwicklung
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Wirtschaft
Schlagworte CSI 2015 • Digital Life • Software Security • Software Testing • system implementation
ISBN-10 981-10-8848-9 / 9811088489
ISBN-13 978-981-10-8848-3 / 9789811088483
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 19,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Handbuch für Webentwickler

von Philip Ackermann

eBook Download (2023)
Rheinwerk Computing (Verlag)
49,90
Das umfassende Handbuch

von Johannes Ernesti; Peter Kaiser

eBook Download (2023)
Rheinwerk Computing (Verlag)
44,90