A New Comment on Reinforcement of Testing Criteria
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
This paper presents the formal aspects of testing criteria for Safety Critical Systems. A brief review of testing strategies i.e. white box and black box is given along with their various criteria’s. Z Notation; a formal specification language is used to sever the purpose of formalization. Initially, the schemas are formed for Statement Coverage (SC), Decision coverage (DC), Path Coverage (PC), Equivalence Partition Class (EPC), Boundary Value Analysis (BV) and Cause & Effect (C&F). The completeness and correctness of test schema are enriched by verifying these with Z/EVES; a Theorem Prover tool for Z specification.
Authors and Affiliations
Monika Singh, Vinod Kumar Jain
Comparison of Agile Method and Scrum Method with Software Quality Affecting Factors
The software industry used software development lifecycle (SDLC) to design, develop, produce high quality, reliable and cost-effective software products. To develop an application, project team used some methodology whic...
A New Viewpoint for Mining Frequent Patterns
According to the traditional viewpoint of Data mining, transactions are accumulated over a long period of time (in years) in order to find out the frequent patterns associated with a given threshold of support, and then...
Scientific Articles Exploration System Model based in Immersive Virtual Reality and Natural Language Processing Techniques
After having carried out a historical review and identifying the state of the art in relation to the interfaces for the exploration of scientific articles, the authors propose a model based in an immersive virtual enviro...
Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility
In this paper we propose an improvement to the GRPW algorithm for wireless sensor networks called GRPW-M , which collects data in a wireless sensor network (WSN) using a mobile nodes. Performance of GRPW algorithm algori...
Image Encryption Technique based on the Entropy Value of a Random Block
The use of digital images in most fields of information technology systems makes these images usually contain confidential information. When these images transmitted via the Internet especially in the Cloud, it becomes n...