EVOTLBO: A TLBO based Method for Automatic Test Data Generation in EvoSuite
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Now-a-days software has a great impact on different aspects of human life. Software systems are responsible for safety of major critical tasks. To prevent catastrophic malfunctions, promising quality testing techniques should be used during software development. Software testing is an effective technique to catch defects, but it significantly increases the development cost. Therefore, automated testing is a major issue in software engineering. Search-Based Software Testing (SBST), specifically genetic algorithm, is the most popular technique in automated testing for achieving appropriate degree of software quality. In this paper TLBO, a swarm intelligence technique, is proposed for automatic test data generation as well as for evaluation of test results. The algorithm is implemented in EvoSuite, which is a reference tool for search-based software testing. Empirical studies have been carried out on the SF110 dataset which contains 110 java projects from the online code repository SourceForge and the results show that the TLBO provides competitive results in comparison with major genetic based methods.
Authors and Affiliations
Mohammad Mehdi Dejam Shahabi, S. Parsa Badiei, S. Ehsan Beheshtian, Reza Akbari, S. Mohammad Reza Moosavi
Triangle Hyper Hexa-cell Interconnection Network A Novel Interconnection Network
The interconnection networks play the main role in many applications, because it has a direct influence on it. Nowadays; the challenge is to find suitable topology that can deal with fewer requirements and min-cost. One...
Mobile Web Services: State of the Art and Challenges
For many years mobile devices were commonly recognized as Web consumers. However, the advancements in mobile device manufacturing, coupled with the latest achievements in wireless communication developments are both key...
Towards Efficient Graph Traversal using a Multi-GPU Cluster
Graph processing has always been a challenge, as there are inherent complexities in it. These include scalability to larger data sets and clusters, dependencies between vertices in the graph, irregular memory accesses du...
On Attack-Relevant Ranking of Network Features
An Intrusion Detection System (IDS) is an important component of the defense-in-depth security mechanism in any computer network system. For assuring timely detection of intrusions from millions of connection records, it...
Finger Vein Recognition using Straight Line Approximation based on Ensemble Learning
Human identity recognition and protection of information security are current global concerns in this age of increasing information growth. Biometrics approach of defining identity is considered as one of the highly pote...