首页 > 最新文献

International Journal of Computer Applications Technology and Research最新文献

英文 中文
Protocol Built by Chaotic Map and Elliptic Curve Cryptography for Key Exchange 基于混沌映射和椭圆曲线的密钥交换协议
Pub Date : 2023-05-01 DOI: 10.7753/ijcatr1205.1003
Dr. Abdul-Wahab Sami Ibrahim, Majed Ismael Sameer
The elliptical curve system has received great interest in the science of security systems, and this has a great number of advantages. When linked with chaotic systems, it gave a broad comprehensiveness in the science of finding common keys between the two parties or in a system as a server that distributes the common keys among the participants in the distress. The proposed algorithm reduces processor load, reduces power consumption, increases processing speed, enhances storage efficiency , requires smaller certificates, and is good at saving bandwidth. Where ECC gives high-level arithmetic operations ECC is an algebraic structure in wide areas for a large number of points and any point in the Cartesian coordinates, as well as for a number of prime numbers generated from the chaotic three-dimensional system using the multiplication and addition algorithm of the elliptical curved system. This paper suggested a new event in the implementation method: the inputs to the elements of the controlling parameters and the initial conditions of the symmetric chaotic functions produce an ECC by a secret shared key between two parties or a number of parties participating in the group, and all these points of the share keys lie on the points of the curve. and this key technology is available for authentication, confidentiality, and non-repudiation.
椭圆曲线系统在安全系统科学中引起了极大的兴趣,它具有许多优点。当与混沌系统联系在一起时,它在寻找双方之间的公共密钥的科学或在作为服务器的系统中提供了广泛的综合性,该系统将公共密钥分发给陷入困境的参与者。该算法减少了处理器负载,降低了功耗,提高了处理速度,提高了存储效率,需要的证书更少,并且善于节省带宽。在ECC给出高级算术运算的地方,ECC是一个广域的代数结构,适用于笛卡尔坐标中的大量点和任意点,也适用于使用椭圆曲线系统的乘法和加法算法从混沌三维系统生成的许多素数。本文在实现方法中提出了一种新的事件:控制参数元素的输入和对称混沌函数的初始条件通过参与群的两方或多方之间的秘密共享密钥产生ECC,并且共享密钥的所有点都位于曲线的点上。该关键技术可用于身份验证、机密性和不可否认性。
{"title":"Protocol Built by Chaotic Map and Elliptic Curve Cryptography for Key Exchange","authors":"Dr. Abdul-Wahab Sami Ibrahim, Majed Ismael Sameer","doi":"10.7753/ijcatr1205.1003","DOIUrl":"https://doi.org/10.7753/ijcatr1205.1003","url":null,"abstract":"The elliptical curve system has received great interest in the science of security systems, and this has a great number of advantages. When linked with chaotic systems, it gave a broad comprehensiveness in the science of finding common keys between the two parties or in a system as a server that distributes the common keys among the participants in the distress. The proposed algorithm reduces processor load, reduces power consumption, increases processing speed, enhances storage efficiency , requires smaller certificates, and is good at saving bandwidth. Where ECC gives high-level arithmetic operations ECC is an algebraic structure in wide areas for a large number of points and any point in the Cartesian coordinates, as well as for a number of prime numbers generated from the chaotic three-dimensional system using the multiplication and addition algorithm of the elliptical curved system. This paper suggested a new event in the implementation method: the inputs to the elements of the controlling parameters and the initial conditions of the symmetric chaotic functions produce an ECC by a secret shared key between two parties or a number of parties participating in the group, and all these points of the share keys lie on the points of the curve. and this key technology is available for authentication, confidentiality, and non-repudiation.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol Build by the Chaotic Map and Magic Square for Exchange Key Share 用混沌映射和魔方构建交换密钥共享协议
Pub Date : 2023-04-27 DOI: 10.7753/10.7753/ijcatr1205.1002
Dr. Abdul-Wahab Sami Ibrahim, Majed Ismael Sameer
In order to reach the level of security between the two parties or a group of parties in the communication channel, the inputs of the protocol algorithm must be characterized by the sensitivity of the initial parameters and conditions involved in the chaotic functions with great ability to change in any very slight manipulation of the inputs by the attacker or intruder because there will be Much of the fundamental change in the values of the shared keys of the two parties or participants in the system, as well as the prime numbers and primitive roots, is hidden rather than public. Use the magic square system algorithm to find the magic constant from the values of the Defy protocol algorithm with the chaotic values of three dimensions, and this magic constant will give us the long values of the shared keys between the parties participating in the group or the server used to distribute the shared keys to the parties, ensuring that this protocol is not attacked by a third party trying to enter the communication channel. The performance of the algorithm was analyzed by conducting and measuring the efficiency of protocol implementation, analyzing key length and sensitivity, and finding the speed of algorithm performance within the acceptable range of the number of participants in the system. A protocol algorithm in Matlab R2013b was used to implement the algorithm and perform the analyses.
为了在通信通道中达到双方或一组当事人之间的安全级别,协议算法的输入必须具有初始参数和条件的敏感性,这些参数和条件在攻击者或入侵者对输入的任何非常轻微的操作中都有很大的改变能力,因为系统中双方或参与者的共享密钥以及素数和原始根的值的基本变化是隐藏的而不是公开的。使用魔方系统算法从具有三维混沌值的Defy协议算法的值中找到魔常数,该魔常数将给出参与组的各方或用于向各方分发共享密钥的服务器之间的共享密钥的长值,从而确保该协议不被试图进入通信通道的第三方攻击。通过对协议实现效率进行测量,对密钥长度和灵敏度进行分析,在系统参与者数量可接受的范围内找到算法的执行速度,对算法的性能进行分析。使用Matlab R2013b中的协议算法实现该算法并进行分析。
{"title":"Protocol Build by the Chaotic Map and Magic Square for Exchange Key Share","authors":"Dr. Abdul-Wahab Sami Ibrahim, Majed Ismael Sameer","doi":"10.7753/10.7753/ijcatr1205.1002","DOIUrl":"https://doi.org/10.7753/10.7753/ijcatr1205.1002","url":null,"abstract":"In order to reach the level of security between the two parties or a group of parties in the communication channel, the inputs of the protocol algorithm must be characterized by the sensitivity of the initial parameters and conditions involved in the chaotic functions with great ability to change in any very slight manipulation of the inputs by the attacker or intruder because there will be Much of the fundamental change in the values of the shared keys of the two parties or participants in the system, as well as the prime numbers and primitive roots, is hidden rather than public. Use the magic square system algorithm to find the magic constant from the values of the Defy protocol algorithm with the chaotic values of three dimensions, and this magic constant will give us the long values of the shared keys between the parties participating in the group or the server used to distribute the shared keys to the parties, ensuring that this protocol is not attacked by a third party trying to enter the communication channel. The performance of the algorithm was analyzed by conducting and measuring the efficiency of protocol implementation, analyzing key length and sensitivity, and finding the speed of algorithm performance within the acceptable range of the number of participants in the system. A protocol algorithm in Matlab R2013b was used to implement the algorithm and perform the analyses.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125884353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Bit Width Converter Based on PCIE4.0 基于PCIE4.0的位宽转换器设计
Pub Date : 2023-04-26 DOI: 10.7753/ijcatr1205.1001
Linjun Liu, Hai Nie, Weiwei Ling
Aiming at the data bit width conversion module used in PCIE4.0 physical coding layer, this paper designs a backwards compatibility-capable implementation method, which combines the version below backwards compatibility 4.0. According to the data bit width selection signal BusWidth of MAC layer in PCIE protocol, the current running speed of PCIE is selected. So as to select the form of bit width conversion. The designed PCIE internal strobe signal is 32 bits wide, and the correctness of its coding operation mode is verified by using the description language of Verilog hardware and the joint simulation form of Verdi and VCS.
针对PCIE4.0物理编码层中使用的数据位宽转换模块,本文设计了一种能够向后兼容的实现方法,结合了向后兼容4.0以下的版本。根据PCIE协议中MAC层的数据位宽选择信号BusWidth,选择PCIE当前的运行速度。从而选择位宽转换的形式。所设计的PCIE内部频闪信号为32位宽,利用Verilog硬件的描述语言和Verdi与VCS的联合仿真形式验证了其编码操作方式的正确性。
{"title":"Design of Bit Width Converter Based on PCIE4.0","authors":"Linjun Liu, Hai Nie, Weiwei Ling","doi":"10.7753/ijcatr1205.1001","DOIUrl":"https://doi.org/10.7753/ijcatr1205.1001","url":null,"abstract":"Aiming at the data bit width conversion module used in PCIE4.0 physical coding layer, this paper designs a backwards compatibility-capable implementation method, which combines the version below backwards compatibility 4.0. According to the data bit width selection signal BusWidth of MAC layer in PCIE protocol, the current running speed of PCIE is selected. So as to select the form of bit width conversion. The designed PCIE internal strobe signal is 32 bits wide, and the correctness of its coding operation mode is verified by using the description language of Verilog hardware and the joint simulation form of Verdi and VCS.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Military Networks by Disruption Tolerant Network Technology 中断容忍网络技术的军事网络
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0405.1007
K. Srikanth
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertextpolicy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose secure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network. Keyworsds: DTNDisruption tolerant network, CP-ABECipher text-Policy Attribute-Based Encryption, IBEIdentity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets , DBDHDecision Bilinear Diffie Hellman assumption, KGC-Key Generative Center. International Journal of Computer Applications Technology and Research Volume 4– Issue 5, 368 373, 2015, ISSN:2319–8656 www.ijcat.com 369 I.INTRODUCTION In several military network troopers is briefly disconnected by jam,environmental. Disruptiontolerant network (DTN) technologies have become successful solutions that enable nodes to speak with one another in these extreme networking access services specified knowledge access policies are outlined over user attributes or roles that are managed by disruption-tolerant military network, a commander might store a counseling at a 1” United Nations agency are taking part in “Region two.” during this case, it's an inexpensive assumption that multiple key authorities are possible to manage their own dynamic attributes for troopers in their deployed regions or echelons, (ABE) [11]–[14] could be a promising approach that fulfills the wants forsecure knowledge retrieval in DTNs. ABE options a mechanism that allows associate degree access management over encrypted knowledge exploitation access policies and ascribed attributes among personal keys and ciphertexts. Especially, ciphertext-policy ABE (CPABE) provides a scalable method of encrypting knowledge specified the encryptor defines the attribute set that the decryptor must possess so as to de-crypt the ciphertext [13].. However, the matter of applying the ABE to DTNs introduces many security their associated attributes at some pu
战场或敌对地区等军事环境中的移动节点似乎受到间歇性网络特性和频繁分区的影响。干扰容忍网络(DTN)技术已经成为杰出的解决方案,它使士兵携带的无线设备能够相互通信,并通过利用二级存储节点忠实地访问指导或命令。在这种情况下,一些最重要的难题是授权策略的社会控制和安全信息检索的策略更新。基于密文策略属性的秘密写入(CP-ABE)是解决访问管理问题的一种有前途的密码学解决方案。然而,在郊区DTNs中应用CP-ABE的问题引入了许多安全和隐私方面的挑战,这些挑战来自完全不同的权威机构。在本文中,我们倾向于提出安全信息检索主题受害CP-ABE,用于城郊ddn,其中多个密钥机构分别管理其属性。我们倾向于展示一种应用预期机制的方法,并有效地管理在可容忍干扰的军事网络中分发的机密信息。关键词:ddn容忍中断网络,cp - cipher文本-策略属性加密,ibe_identity加密,PC-Protocol -Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets, DBDHDecision双线性Diffie Hellman假设,KGC-Key generation Center国际计算机应用技术与研究第4卷-第5期,368 373,2015,ISSN: 2319-8656 www.ijcat.com 369 1 .引言在一些军事网络中,部队因堵塞而短暂断开,环境。容错网络(DTN)技术已经成为成功的解决方案,使节点能够在这些极端网络访问服务中相互交谈,指定的知识访问策略概述了由容错军事网络管理的用户属性或角色,指挥官可能会在1“联合国机构正在参与”区域2中存储咨询。“在这种情况下,假设多个关键机构可以管理其部署区域或梯队中的士兵自己的动态属性,这是一个廉价的假设,(ABE)[11] -[14]可能是一种有前途的方法,可以满足ddn中安全知识检索的需求。”ABE选择了一种机制,该机制允许对加密知识开发访问策略和个人密钥和密文之间的属性进行副学士学位访问管理。特别是,密文策略ABE (cabe)提供了一种可扩展的加密知识方法,指定加密方定义解密方必须拥有的属性集,以便解密密文[13]。但是,将ABE应用于ddn会在某些目的(例如,移动它们的区域)上引入许多与它们相关的属性的安全性,或者可能危及某些个人密钥,属性集群中任何单个用户的每个属性的密钥撤销(或更新)将对集群中的相反用户产生影响。例如,如果用户加入或离开关联和分散到同一集群内的所有或任何相反的成员以进行向后或重新密钥验证过程,或者如果先前的属性密钥不存在,则由于漏洞窗口而导致安全性降低
{"title":"Military Networks by Disruption Tolerant Network Technology","authors":"K. Srikanth","doi":"10.7753/ijcatr0405.1007","DOIUrl":"https://doi.org/10.7753/ijcatr0405.1007","url":null,"abstract":"Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertextpolicy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose secure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network. Keyworsds: DTNDisruption tolerant network, CP-ABECipher text-Policy Attribute-Based Encryption, IBEIdentity Based Encryption2 PC-Protocol To Protocol, PKI-Public Key Infrastructure, ACG-Access Control Gadgets , DBDHDecision Bilinear Diffie Hellman assumption, KGC-Key Generative Center. International Journal of Computer Applications Technology and Research Volume 4– Issue 5, 368 373, 2015, ISSN:2319–8656 www.ijcat.com 369 I.INTRODUCTION In several military network troopers is briefly disconnected by jam,environmental. Disruptiontolerant network (DTN) technologies have become successful solutions that enable nodes to speak with one another in these extreme networking access services specified knowledge access policies are outlined over user attributes or roles that are managed by disruption-tolerant military network, a commander might store a counseling at a 1” United Nations agency are taking part in “Region two.” during this case, it's an inexpensive assumption that multiple key authorities are possible to manage their own dynamic attributes for troopers in their deployed regions or echelons, (ABE) [11]–[14] could be a promising approach that fulfills the wants forsecure knowledge retrieval in DTNs. ABE options a mechanism that allows associate degree access management over encrypted knowledge exploitation access policies and ascribed attributes among personal keys and ciphertexts. Especially, ciphertext-policy ABE (CPABE) provides a scalable method of encrypting knowledge specified the encryptor defines the attribute set that the decryptor must possess so as to de-crypt the ciphertext [13].. However, the matter of applying the ABE to DTNs introduces many security their associated attributes at some pu","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classification Method for Diabetes Mellitus Diagnosis 模糊Knn、C4.5算法与Naïve贝叶斯分类方法在糖尿病诊断中的比较分析
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0708.1010
{"title":"Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classification Method for Diabetes Mellitus Diagnosis","authors":"","doi":"10.7753/ijcatr0708.1010","DOIUrl":"https://doi.org/10.7753/ijcatr0708.1010","url":null,"abstract":"","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115471641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the Efficiency of Customer Order Management System: A Case Study of Sambajo General Enterprises Jigawa State, Nigeria 客户订单管理系统效率评估——以尼日利亚吉加瓦州Sambajo通用企业为例
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0708.1004
{"title":"Assessment of the Efficiency of Customer Order Management System: A Case Study of Sambajo General Enterprises Jigawa State, Nigeria","authors":"","doi":"10.7753/ijcatr0708.1004","DOIUrl":"https://doi.org/10.7753/ijcatr0708.1004","url":null,"abstract":"","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123235490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moore’s Law Effect on Transistors Evolution 摩尔定律对晶体管发展的影响
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0507.1014
{"title":"Moore’s Law Effect on Transistors Evolution","authors":"","doi":"10.7753/ijcatr0507.1014","DOIUrl":"https://doi.org/10.7753/ijcatr0507.1014","url":null,"abstract":"","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object Oriented Software Testability (OOST) Metrics Analysis 面向对象软件可测试性(OOST)度量分析
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0405.1006
P. Suri
One of the core quality assurance feature which combines fault prevention and fault detection, is often known as testability approach also. There are many assessment techniques and quantification method evolved for software testability prediction which actually identifies testability weakness or factors to further help reduce test effort. This paper examines all those measurement techniques that are being proposed for software testability assessment at various phases of object oriented software development life cycle. The aim is to find the best metrics suit for software quality improvisation through software testability support. The ultimate objective is to establish the ground work for finding ways reduce the testing effort by improvising software testability and its assessment using well planned guidelines for object-oriented software development with the help of suitable metrics.
质量保证的核心特征之一是故障预防和故障检测相结合,通常也被称为可测试性方法。有许多评估技术和量化方法是为了软件可测试性预测而发展起来的,它们实际上识别了可测试性的弱点或因素,以进一步帮助减少测试工作。本文研究了在面向对象的软件开发生命周期的各个阶段,为软件可测试性评估所提出的所有测量技术。其目的是通过软件可测试性支持找到适合软件质量即兴发挥的最佳度量。最终的目标是在合适的度量标准的帮助下,利用面向对象软件开发的良好规划的指导方针,通过即兴创作软件可测试性及其评估,为寻找减少测试工作的方法奠定基础。
{"title":"Object Oriented Software Testability (OOST) Metrics Analysis","authors":"P. Suri","doi":"10.7753/ijcatr0405.1006","DOIUrl":"https://doi.org/10.7753/ijcatr0405.1006","url":null,"abstract":"One of the core quality assurance feature which combines fault prevention and fault detection, is often known as testability approach also. There are many assessment techniques and quantification method evolved for software testability prediction which actually identifies testability weakness or factors to further help reduce test effort. This paper examines all those measurement techniques that are being proposed for software testability assessment at various phases of object oriented software development life cycle. The aim is to find the best metrics suit for software quality improvisation through software testability support. The ultimate objective is to establish the ground work for finding ways reduce the testing effort by improvising software testability and its assessment using well planned guidelines for object-oriented software development with the help of suitable metrics.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test-Case Optimization Using Genetic and Tabu Search Algorithm in Structural Testing 基于遗传和禁忌搜索算法的结构测试用例优化
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0405.1005
T. B. Miranda, M. Dhivya, K. Sathyamoorthy
Software test-case generation is the process of identifying a set of test cases. It is necessary to generate the test sequence that satisfies the testing criteria. For solving this kind of difficult problem there were a lot of research works, which have been done in the past. The length of the test sequence plays an important role in software testing. The length of test sequence decides whether the sufficient testing is carried or not. Many existing test sequence generation techniques uses genetic algorithm for test-case generation in software testing. The Genetic Algorithm (GA) is an optimization heuristic technique that is implemented through evolution and fitness function. It generates new test cases from the existing test sequence. Further to improve the existing techniques, a new technique is proposed in this paper which combines the tabu search algorithm and the genetic algorithm. The hybrid technique combines the strength of the two meta-heuristic methods and produces efficient testcase sequence.
软件测试用例生成是识别一组测试用例的过程。生成满足测试标准的测试序列是必要的。为了解决这类难题,过去已经做了大量的研究工作。测试序列的长度在软件测试中起着重要的作用。测试序列的长度决定了是否进行了充分的测试。在软件测试中,许多现有的测试序列生成技术使用遗传算法生成测试用例。遗传算法是一种通过进化和适应度函数实现的优化启发式算法。它从现有的测试序列中生成新的测试用例。在现有技术的基础上,提出了一种将禁忌搜索算法与遗传算法相结合的新技术。混合技术结合了两种元启发式方法的优点,产生了高效的测试用例序列。
{"title":"Test-Case Optimization Using Genetic and Tabu Search Algorithm in Structural Testing","authors":"T. B. Miranda, M. Dhivya, K. Sathyamoorthy","doi":"10.7753/ijcatr0405.1005","DOIUrl":"https://doi.org/10.7753/ijcatr0405.1005","url":null,"abstract":"Software test-case generation is the process of identifying a set of test cases. It is necessary to generate the test sequence that satisfies the testing criteria. For solving this kind of difficult problem there were a lot of research works, which have been done in the past. The length of the test sequence plays an important role in software testing. The length of test sequence decides whether the sufficient testing is carried or not. Many existing test sequence generation techniques uses genetic algorithm for test-case generation in software testing. The Genetic Algorithm (GA) is an optimization heuristic technique that is implemented through evolution and fitness function. It generates new test cases from the existing test sequence. Further to improve the existing techniques, a new technique is proposed in this paper which combines the tabu search algorithm and the genetic algorithm. The hybrid technique combines the strength of the two meta-heuristic methods and produces efficient testcase sequence.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study of RISC AND CISC Architectures RISC和CISC体系结构的比较研究
Pub Date : 2023-04-22 DOI: 10.7753/ijcatr0507.1015
Shahzeb, Naveed Hussain, Amanulllah, Furqan Ahmad, Salman Khan
Comparison between RISC and CISC in the language of computer architecture for research is not very simple because a lot of researcher worked on RISC and CISC Architectures. Both these architecture differ substantially in terms of their underlying platforms and hardware architectures. The type of chips used differs a lot and there exists too many variants as well. This paper gives us the architectural comparison between RISC and CISC architectures. Also, we provide their advantages performance point of view and share our idea to the new researchers.
RISC和CISC在计算机体系结构研究语言上的比较不是很简单,因为很多研究人员都从事于RISC和CISC体系结构的研究。这两种体系结构在底层平台和硬件体系结构方面有很大的不同。所用芯片的类型差别很大,而且存在太多的变体。本文给出了RISC和CISC体系结构的比较。同时,我们也提供了他们的优势性能的观点,并分享我们的想法给新的研究人员。
{"title":"Comparative Study of RISC AND CISC Architectures","authors":"Shahzeb, Naveed Hussain, Amanulllah, Furqan Ahmad, Salman Khan","doi":"10.7753/ijcatr0507.1015","DOIUrl":"https://doi.org/10.7753/ijcatr0507.1015","url":null,"abstract":"Comparison between RISC and CISC in the language of computer architecture for research is not very simple because a lot of researcher worked on RISC and CISC Architectures. Both these architecture differ substantially in terms of their underlying platforms and hardware architectures. The type of chips used differs a lot and there exists too many variants as well. This paper gives us the architectural comparison between RISC and CISC architectures. Also, we provide their advantages performance point of view and share our idea to the new researchers.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Applications Technology and Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1