Covering array generation (CAG) is the key research problem in combinatorial testing and is an NP-complete problem. With the increasing complexity of software under test and the need for higher interaction covering strength t, the techniques for constructing high-strength covering arrays are expected. This paper presents a hybrid heuristic memetic algorithm named QSSMA for high-strength CAG problem. The sub-optimal solution acceptance rate is introduced to generate multiple test cases after each iteration to improve the efficiency of constructing high-covering strength test suites. The QSSMA method could successfully build high-strength test suites for some instances where t up to 15 within one day cutoff time and report five new best test suite size records. Extensive experiments demonstrate that QSSMA is a competitive method compared to state-of-the-art methods.
{"title":"A memetic algorithm for high-strength covering array generation","authors":"Xu Guo, Xiaoyu Song, Jian-tao Zhou, Feiyu Wang, Kecheng Tang, Zhuowei Wang","doi":"10.1049/sfw2.12138","DOIUrl":"https://doi.org/10.1049/sfw2.12138","url":null,"abstract":"<p>Covering array generation (CAG) is the key research problem in combinatorial testing and is an NP-complete problem. With the increasing complexity of software under test and the need for higher interaction covering strength <i>t</i>, the techniques for constructing high-strength covering arrays are expected. This paper presents a hybrid heuristic memetic algorithm named QSSMA for high-strength CAG problem. The sub-optimal solution acceptance rate is introduced to generate multiple test cases after each iteration to improve the efficiency of constructing high-covering strength test suites. The QSSMA method could successfully build high-strength test suites for some instances where <i>t</i> up to 15 within one day cutoff time and report five new best test suite size records. Extensive experiments demonstrate that QSSMA is a competitive method compared to state-of-the-art methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"538-553"},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boyu Huang, Youyi Song, Zhihan Cui, Haowen Dou, Dazhi Jiang, Teng Zhou, Jing Qin
Corona Virus disease 2019 (COVID-19) has shattered people's daily lives and is spreading rapidly across the globe. Existing non-pharmaceutical intervention solutions often require timely and precise selection of small areas of people for containment or even isolation. Although such containment has been successful in stopping or mitigating the spread of COVID-19 in some countries, it has been criticized as inefficient or ineffective, because of the time-delayed and sophisticated nature of the statistics on determining cases. To address these concerns, we propose a GSA-ELM model based on a gravitational search algorithm to forecast the global number of active cases of COVID-19. The model employs the gravitational search algorithm, which utilises the gravitational law between two particles to guide the motion of each particle to optimise the search for the global optimal solution, and utilises an extreme learning machine to address the effects of nonlinearity in the number of active cases. Extensive experiments are conducted on the statistical COVID-19 dataset from Johns Hopkins University, the MAPE of the authors’ model is 7.79%, which corroborates the superiority of the model to state-of-the-art methods.
{"title":"Gravitational search algorithm-extreme learning machine for COVID-19 active cases forecasting","authors":"Boyu Huang, Youyi Song, Zhihan Cui, Haowen Dou, Dazhi Jiang, Teng Zhou, Jing Qin","doi":"10.1049/sfw2.12139","DOIUrl":"https://doi.org/10.1049/sfw2.12139","url":null,"abstract":"<p>Corona Virus disease 2019 (COVID-19) has shattered people's daily lives and is spreading rapidly across the globe. Existing non-pharmaceutical intervention solutions often require timely and precise selection of small areas of people for containment or even isolation. Although such containment has been successful in stopping or mitigating the spread of COVID-19 in some countries, it has been criticized as inefficient or ineffective, because of the time-delayed and sophisticated nature of the statistics on determining cases. To address these concerns, we propose a GSA-ELM model based on a gravitational search algorithm to forecast the global number of active cases of COVID-19. The model employs the gravitational search algorithm, which utilises the gravitational law between two particles to guide the motion of each particle to optimise the search for the global optimal solution, and utilises an extreme learning machine to address the effects of nonlinearity in the number of active cases. Extensive experiments are conducted on the statistical COVID-19 dataset from Johns Hopkins University, the MAPE of the authors’ model is 7.79%, which corroborates the superiority of the model to state-of-the-art methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"554-565"},"PeriodicalIF":1.6,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mario Cortes-Cornax, Paula Lago, Claudia Roncancio
Cyber Physical Systems (CPS) are becoming more ubiquitous, complex and powerful as well as more and more present in our daily life. The inherent benefit and comfort come with an environmental impact at every step of their life-cycle. This impact is significant and unfortunately often ignored today. As cyber-physical systems tend to be ‘invisible’, there is a need for awareness of the underlying infrastructure and required resources, early in the design phases. In this article, the environmental impact considerations in the early stages of the implementation and opportunities to improve design choices with a people-planet-system perspective are discussed. The authors discuss the aspects related to system configuration, data management and the overall goal and functionalities supported by the CPS. Through a specific smart home case, the potential of considering life-cycle assessment of both the devices and data management is illustrated. By explicitly considering different configurations, it will be possible to analyse the environmental impacts of the design decisions. Our research in progress targets a design approach to converge into an equilibrium between utility, performance, and minor environmental impact of smart systems.
{"title":"A case study of environmental considerations and opportunities in cyber physical systems","authors":"Mario Cortes-Cornax, Paula Lago, Claudia Roncancio","doi":"10.1049/sfw2.12130","DOIUrl":"https://doi.org/10.1049/sfw2.12130","url":null,"abstract":"<p>Cyber Physical Systems (CPS) are becoming more ubiquitous, complex and powerful as well as more and more present in our daily life. The inherent benefit and comfort come with an environmental impact at every step of their life-cycle. This impact is significant and unfortunately often ignored today. As cyber-physical systems tend to be ‘invisible’, there is a need for awareness of the underlying infrastructure and required resources, early in the design phases. In this article, the environmental impact considerations in the early stages of the implementation and opportunities to improve design choices with a people-planet-system perspective are discussed. The authors discuss the aspects related to system configuration, data management and the overall goal and functionalities supported by the CPS. Through a specific smart home case, the potential of considering life-cycle assessment of both the devices and data management is illustrated. By explicitly considering different configurations, it will be possible to analyse the environmental impacts of the design decisions. Our research in progress targets a design approach to converge into an equilibrium between utility, performance, and minor environmental impact of smart systems.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"424-434"},"PeriodicalIF":1.6,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50125208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao
Recent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. Specifically, there is an increasing number of malicious software (Malware) on IoT systems. Nowadays, researchers have made many efforts concerning supervised machine learning methods to identify malicious attacks. High-quality labels are of great importance for supervised machine learning, but noises widely exist due to the non-deterministic production environment. Therefore, learning from noisy labels is significant for machine learning-enabled Malware identification. In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface function names. Here, considering the numerous unlabelled samples in real-world intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, Word2Vec. In the experiments, the proposed method is compared with several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of their proposed method, especially that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.
{"title":"Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning","authors":"Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao","doi":"10.1049/sfw2.12137","DOIUrl":"https://doi.org/10.1049/sfw2.12137","url":null,"abstract":"<p>Recent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. Specifically, there is an increasing number of malicious software (Malware) on IoT systems. Nowadays, researchers have made many efforts concerning supervised machine learning methods to identify malicious attacks. High-quality labels are of great importance for supervised machine learning, but noises widely exist due to the non-deterministic production environment. Therefore, learning from noisy labels is significant for machine learning-enabled Malware identification. In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface function names. Here, considering the numerous unlabelled samples in real-world intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, Word2Vec. In the experiments, the proposed method is compared with several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of their proposed method, especially that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"392-404"},"PeriodicalIF":1.6,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12137","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50123778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seblewongel E. Biable, Nuno M. Garcia, Dida Midekso
Requirements engineering is a fundamental process in software development phases. At the same time, it is a difficult phase and exposed many ethical violations. The main purpose is proposing an ethical framework for software requirements engineering that addresses the identified concerns. These concerns include problems associated with a knowledge gap, requirements identification, quality-related concerns, unwillingness to give requirements, and practicing forbidden activities. These concerns are grouped into a category as the proposed framework components. Each of the categories encompasses more than one problem domain. The proposed framework suggests resolving mechanisms as collections of clauses for each of those concerns. An expert evaluation technique is used to validate the proposed framework. The experts are purposefully selected from software industries and institutions. Questionnaires and focus group discussions were used as data-gathering tools for the validation of the proposed framework. The validity (face validity, content validity, and construct validity) and the reliability of the proposed framework were checked. The evaluation results show that the proposed framework has an acceptable range of validity and reliability. The proposed framework can be used as a guideline for software engineers to minimise the occurrence of those identified concerns during the requirements engineering process.
{"title":"Proposed ethical framework for software requirements engineering","authors":"Seblewongel E. Biable, Nuno M. Garcia, Dida Midekso","doi":"10.1049/sfw2.12136","DOIUrl":"https://doi.org/10.1049/sfw2.12136","url":null,"abstract":"<p>Requirements engineering is a fundamental process in software development phases. At the same time, it is a difficult phase and exposed many ethical violations. The main purpose is proposing an ethical framework for software requirements engineering that addresses the identified concerns. These concerns include problems associated with a knowledge gap, requirements identification, quality-related concerns, unwillingness to give requirements, and practicing forbidden activities. These concerns are grouped into a category as the proposed framework components. Each of the categories encompasses more than one problem domain. The proposed framework suggests resolving mechanisms as collections of clauses for each of those concerns. An expert evaluation technique is used to validate the proposed framework. The experts are purposefully selected from software industries and institutions. Questionnaires and focus group discussions were used as data-gathering tools for the validation of the proposed framework. The validity (face validity, content validity, and construct validity) and the reliability of the proposed framework were checked. The evaluation results show that the proposed framework has an acceptable range of validity and reliability. The proposed framework can be used as a guideline for software engineers to minimise the occurrence of those identified concerns during the requirements engineering process.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"526-537"},"PeriodicalIF":1.6,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50122748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}