• 제목/요약/키워드: Testing case

검색결과 1,692건 처리시간 0.026초

An Intelligent Framework for Test Case Prioritization Using Evolutionary Algorithm

  • Dobuneh, Mojtaba Raeisi Nejad;Jawawi, Dayang N.A.
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.89-95
    • /
    • 2016
  • In a software testing domain, test case prioritization techniques improve the performance of regression testing, and arrange test cases in such a way that maximum available faults be detected in a shorter time. User-sessions and cookies are unique features of web applications that are useful in regression testing because they have precious information about the application state before and after making changes to software code. This approach is in fact a user-session based technique. The user session will collect from the database on the server side, and test cases are released by the small change configuration of a user session data. The main challenges are the effectiveness of Average Percentage Fault Detection rate (APFD) and time constraint in the existing techniques, so in this paper developed an intelligent framework which has three new techniques use to manage and put test cases in group by applying useful criteria for test case prioritization in web application regression testing. In dynamic weighting approach the hybrid criteria which set the initial weight to each criterion determines optimal weight of combination criteria by evolutionary algorithms. The weight of each criterion is based on the effectiveness of finding faults in the application. In this research the priority is given to test cases that are performed based on most common http requests in pages, the length of http request chains, and the dependency of http requests. To verify the new technique some fault has been seeded in subject application, then applying the prioritization criteria on test cases for comparing the effectiveness of APFD rate with existing techniques.

XML 테스트 스트립트 기반의 내장형 시스템 소프트웨어 단위 테스트 도구 (A Software Unit Testing Tool based on The XML Test Script for Embedded Systems)

  • 곽동규;유재우;조용윤
    • 한국컴퓨터정보학회논문지
    • /
    • 제14권1호
    • /
    • pp.17-24
    • /
    • 2009
  • 내장형 시스템의 요구사항이 증가함에 따라 내장형 시스템 소프트웨어의 복잡도가 증가하고 있다. 그러므로 내장형 시스템 소프트웨어 테스팅의 필요성이 높아지고 있다. 본 논문은 내장형 시스템 소프트웨어의 테스트를 효과적으로 실행하기 위해 교차 개발 환경에 적합한 테스팅 도구를 제안한다. 본 도구는 호스트/타겟 구조로 이루어져있으며 호스트에서 작성한 테스트 케이스를 타겟에서 실행할 수 있는 직관적인 환경을 제공한다. 그리고 제안하는 도구의 테스트 케이스는 XML 기반의 테스트 스크립트를 이용한다. 또한, 직관적인 테스트 케이스를 작성하기 위해 트리와 테이블 기반의 테스트 스크립트 편집기를 갖는다. 제안하는 테스트 도구는 테스트 케이스 작성에서부터 결과확인까지 직관적인 GUI를 제공하여 테스트 케이스 작성에 대한 부담을 경감시키는 장점을 가진다.

위상배열 초음파 탐지검사의 신뢰성에 관한 연구: 풍력발전기 복합소재 블레이드 사례연구 (A Reliability Study of the Phased Array Ultrasonic Testing: Case Study for the Composite Blades of Wind Power Generation)

  • 강병권;임익성;구일섭
    • 한국신뢰성학회지:신뢰성응용연구
    • /
    • 제16권4호
    • /
    • pp.338-346
    • /
    • 2016
  • Purpose: The purpose of this research is to improve the reliability of the composite material blades used for the wind power generator, by applying the phased array ultrasonic testing technique out of the many nondestructive test into the blades. Method: The wind power generation composite blades are used, as a case study, in order to evaluate the reliability of the phased array ultrasonic testing technique. Defects that are most likely occurred in the field are injected into the different locations of the three different types of artificial test pieces and then phased array ultrasonic testing technique are applied to evaluate the reliability of its effectiveness. Result: As a result of the analysis of the defect signals by applying the A scan and B scan simultaneously, depth and width of the defect could be obtained. An area of defect was proportional to the amount of energy by color in B scan image. The larger amount of energy, reflected amount of energy was appeared in the order of red, orange, yellow, blue color. Conclusion: The most reliable testing method to detect the defect in composite blades for wind power generation is considered to be the combination of the other destructive testing technique with the phased array ultrasonic testing since the PAUT alone could not detect all range of the defects in the blades.

효과적인 오류 추적을 위한 수직적 시스템 시험 방법 (Vertical System Testing Method For Efficient Error Tracing)

  • 서광익;최은만
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권2호
    • /
    • pp.19-29
    • /
    • 2008
  • 단위 시험은 모듈의 소스 코드를 면밀히 검토하면서 논리적 오류나 문장 오류 등이 있는지 분석하는 화이트박스 시험이 가능하다. 반면 시스템 수준의 기능 시험은 규모가 크기 때문에 시험 데이터를 입력한 후 출력된 결과가 예상 결과와 같은지 비교하는 블랙박스 시험이 주를 이룬다. 이러한 시스템 시험 단계에서 사용하는 블랙박스시험은 오류를 발견하더라고 수정을 위해 소스 코드를 추적하기 어려운 문제점이 있다. 뿐만 아니라 시스템 시험 단계에 화이트박스 시험을 사용하는 것은 시험 대상의 추상 수준 달라 쉽지 않다. 이에 본 논문에서는 시스템의 기능처럼 높은 추상 수준을 시험 대상으로 하되 소스 코드 수준까지 화이트박스 스타일로 시험할 수 있는 현실적이고 통합된 시스템 수준의 수직적 시험에 대해 제안한다. 그리고 어떻게 수직적 시험을 적용하는지 UML명세 모델에서 소스코드까지 오류를 추적하는 방법을 사례를 통해 설명하고 더불어 오류 추적의 효과성을 보였다.

  • PDF

가전제품 화재 메커니즘 재현 및 분석을 위한 인프라 구축 (The Infrastructure Case for Reproduction or Analysis of The Mechanism on The Fire of The Electrical Appliances)

  • 장인혁;이창훈;이영주;임홍우
    • 한국신뢰성학회지:신뢰성응용연구
    • /
    • 제15권1호
    • /
    • pp.60-66
    • /
    • 2015
  • In this paper, The infrastructure case for reproduction or analysis of the mechanism on the fire or the electrics shock of the electrical appliances is proposed. The various electrical appliances(Washing machine, Ballast, Electric heaters, Electronic switches, Mobile phone chargers) used in the home can be tested on the high voltage and over current test through the implementation of the infrastructure. The electrical tests of fire and electric shock consists of the high voltage of maximum 5000 V and over current test of 3 steps(90 A, 60 A, 40 A) and noise test. The mechanism of the fire and the electric shock tests reproduced are analyzed through the monitoring system and the oscilloscope. The electronics manufacturers can prevent accidents through the tests of the electronics factor reproduced and the analysis of the infrastructure designed.

테스트 및 운영중 소프트웨어의 오류 원인 분석 (Software Cause Analysis during Testing and Operation Stages)

  • 최규식
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2006년도 춘계 종합학술대회 논문집
    • /
    • pp.455-458
    • /
    • 2006
  • H/W와 달리 S/W는 개발당시부터 그 속에 오류로 존재하고 있다가 어떤 특수한 기능을 필요로 할 때 드디어 검출되게 된다. 이로 인하여 소프트웨어의 고장이 발생할 수 있다. 본 논문에서는 소프트웨어의 테스트 단계 및 운영단계에서 검출되는 오류 및 이로 인한 고장 원인을 분석한다. 테스트 단계와 운영단계중 어느 쪽이 어떤 오류가 더 많이 발생하는가를 현장 경험을 통한 오류데이타 수집에 의하여 분석한다.

  • PDF

경계요소법을 이용한 축대칭 결함을 갖는 도체관에 대한 와전류탐상 수치해석 (Numerical Analysis of Eddy Current Testing for Tube with Axi-symmetric Defect using Boundary Element Method)

  • 서장원;이향범;윤만식;임의수;정태언
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 하계학술대회 논문집 B
    • /
    • pp.748-750
    • /
    • 2001
  • This paper describes numerical analysis of eddy current testing for tube with axi-symmetric defect using boundary element method. In this ECT(Eddy Current Testing) numerical analysis. BEM and FEM are used to compare their characteristics and results of ECT, respectively BEM is easier than FEM to design geometrically complex domain because in case of BEM, domain is divided into segments or elements, but in case of FEM, domain is divided into small finite triangular or quadrilateral elements. For this reason asymmetry defect is used for this BE numerical analysis. As a result, the similar result can be obtained through both numerical analyses, and BEM can be applied to the numerical analysis of ECT.

  • PDF

효율적인 프로토콜 적합성 시험을 위한 변칙성 제거 (Anomaly Removal for Efficient Conformance Test)

  • 이현철;허기택
    • 한국정보처리학회논문지
    • /
    • 제6권3호
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

A rare, likely pathogenic GCK variant related to maturity-onset diabetes of the young type 2: A case report

  • So, Min-Kyung;Huh, Jungwon;Kim, Hae Soon
    • Journal of Genetic Medicine
    • /
    • 제18권2호
    • /
    • pp.132-136
    • /
    • 2021
  • Maturity-onset diabetes of the young (MODY) is caused by autosomal dominant pathogenic variants in one of 14 currently known monogenic genes. Characteristics of patients with MODY include early-onset clinical disease with a family history of diabetes and negative autoantibodies and may present with heterogeneous phenotypes according to the different subtypes. Here, we report a patient with early-onset diabetes who presented asymptomatic mild fasting hyperglycemia with the absence of autoantibodies. She was diagnosed with glucokinase (GCK)-MODY caused by a GCK variant, c.1289T>C (p.L430P), identified by targeted gene-panel testing, and the affected father had the same variant. We interpreted this rare missense variant as a likely pathogenic variant and then she stopped taking oral medication. This case highlights the usefulness of gene-panel testing for accurate diagnosis and appropriate management of MODY. We also note the importance of familial genetic testing and genetic counseling for the proper interpretation of MODY variants.

Analysis of Blockchain Network and Cryptocurrency Safety Issues

  • Taegyu Lee
    • International journal of advanced smart convergence
    • /
    • 제12권3호
    • /
    • pp.40-50
    • /
    • 2023
  • Blockchain is a technology designed to prevent tampering with digital documents or information, safeguarding transaction data and managing it in a structured manner. This proves beneficial in addressing issues of trust and data protection in B2B, B2C, and C2B transactions. Blockchain finds utility not only in financial transactions but also across diverse industrial sectors. This study outlines significant cases and responses that jeopardize the security of blockchain networks and cryptocurrency technology. Additionally, it analyzes safety and risk factors related to blockchain and proposes effective testing methods to preemptively counter these challenges. Furthermore, this study presents key security evaluation metrics for blockchain to ensure a balanced assessment. Additionally, it provides evaluation methods and various test case models for validating the security of blockchain and cryptocurrency transaction services, making them easily applicable to the testing process.