scholarly journals Classifying Obstructive and Nonobstructive Code Clones of Type I Using Simplified Classification Scheme: A Case Study

2015 ◽  
Vol 2015 ◽  
pp. 1-18 ◽  
Author(s):  
Miroslaw Staron ◽  
Wilhelm Meding ◽  
Peter Eriksson ◽  
Jimmy Nilsson ◽  
Nils Lövgren ◽  
...  

Code cloning is a part of many commercial and open source development products. Multiple methods for detecting code clones have been developed and finding the clones is often used in modern quality assurance tools in industry. There is no consensus whether the detected clones are negative for the product and therefore the detected clones are often left unmanaged in the product code base. In this paper we investigate how obstructive code clones of Type I (duplicated exact code fragments) are in large software systems from the perspective of the quality of the product after the release. We conduct a case study at Ericsson and three of its large products, which handle mobile data traffic. We show how to use automated analogy-based classification to decrease the classification effort required to determine whether a clone pair should be refactored or remain untouched. The automated method allows classifying 96% of Type I clones (both algorithms and data declarations) leaving the remaining 4% for the manual classification. The results show that cloning is common in the studied commercial software, but that only 1% of these clones are potentially obstructive and can jeopardize the quality of the product if left unmanaged.

Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


2014 ◽  
pp. 2072-2098
Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


2011 ◽  
Vol 399-401 ◽  
pp. 1852-1855 ◽  
Author(s):  
Lian Wen ◽  
David Tuffley

Optimizing manufacturing process modeling is critical to improving the efficiency and quality of manufacturing. However, manufacturing processes in general can be very complicated. A manufacturing process may involve (a) transforming a material into a new form, (b) combining different materials to form a new object, and (c) retrieving a certain part from a material as a new entity. All those activities could be confusing because many intermediate objects that exist only for a short period during the manufacturing process may have no formal names. To solve this problem, this paper proposes that composition trees (CT) can be successfully used to model manufacturing processes. Composition trees are parts of the formal notation in behavior engineering (BE), which is an innovative approach to the development of large software systems. For a composition tree, its characteristics of being intuitive, expressive and formal give it many advantages over other formal and informal modeling languages in software engineering. This paper uses a cooking case study to demonstrate how to use a composition tree model manufacturing processes. It is argued that the method could be applied to process engineering to good effect.


2018 ◽  
Vol 7 (3.4) ◽  
pp. 235
Author(s):  
Abhishek Anurag ◽  
R Kamatchi

Usage and nature of software systems have changed significantly. Due to this complexity of software systems has also grown exponentially. In these ever-changing requirements and environment in which software system is being used, maintaining quality of software system is very challenging and difficult. If user requirements are not met as expected, it’s called defect. To improve quality, it’s critical to understand and analyze these defects. In this study root cause analysis technique is used to analyze defects and their attributes, root cause of defects and corrective actions of defects. A quality model is designed based on defects, root cause of defects and tests. A quality algorithm is designed in this study depending on existing quality model, defects, tests and their attributes. This quality algorithm is executed on a software system to validate quality model. The results obtained are analyzed to understand the quality of the software system and how it’s different than existing quality model. 


Author(s):  
Imad H. Hasan ◽  
Bestoun S. Ahmed ◽  
Moayad Y. Potrus ◽  
Kamal Z. Zamli

To ensure the quality of current highly configurable software systems, intensive testing is needed to test all the configuration combinations and detect all the possible faults. This task becomes more challenging for most modern software systems when constraints are given for the configurations. Here, intensive testing is almost impossible, especially considering the additional computation required to resolve the constraints during the test generation process. In addition, this testing process is exhaustive and time-consuming. Combinatorial interaction strategies can systematically reduce the number of test cases to construct a minimal test suite without affecting the effectiveness of the tests. This paper presents a new efficient search-based strategy to generate constrained interaction test suites to cover all possible combinations. The paper also shows a new application of constrained interaction testing in software fault searches. The proposed strategy initially generates the set of all possible [Formula: see text]-[Formula: see text] combinations; then, it filters out the set by removing the forbidden [Formula: see text]-[Formula: see text] using the Base Forbidden Tuple (BFT) approach. The strategy also utilizes a mixed neighborhood tabu search (TS) to construct optimal or near-optimal constrained test suites. The efficiency of the proposed method is evaluated through a comparison against two well-known state-of-the-art tools. The evaluation consists of three sets of experiments for 35 standard benchmarks. Additionally, the effectiveness and quality of the results are assessed using a real-world case study. Experimental results show that the proposed strategy outperforms one of the competitive strategies, ACTS, for approximately 83% of the benchmarks and achieves similar results to CASA for 65% of the benchmarks when the interaction strength is 2. For an interaction strength of 3, the proposed method outperforms other competitive strategies for approximately 60% and 42% of the benchmarks. The proposed strategy can also generate constrained interaction test suites for an interaction strength of 4, which is not possible for many strategies. The real-world case study shows that the generated test suites can effectively detect injected faults using mutation testing.


2015 ◽  
Vol 77 (22) ◽  
Author(s):  
Nur Cahyono Kushardianto ◽  
Yudhi Kusnanto ◽  
Elvian Syafrurizal ◽  
Ahmad Hamim Tohari

Quality of Service for data traffic is an important facet of a network, which in the case of a wireless network can easily be disrupted by applying a device to broadcast signals.  The authors believe that the increased of the energy consumption, when a jamming attack occurs, can be used as a guiding indicator in order to mitigate the attack. The authors show that when a reactive jamming attack occurs on a wireless network unmitigated, it can easily block the entire data traffic to the point there is no data can be delivered. The authors also show that, using NS3 simulation, in an event where a reactive jamming attack to the network happened, the source of the attack can be identified through the increased of energy consumption , and successfully mitigated by avoiding sending data traffic through the same channel used by the attacker, by executing channel hopping.  


2020 ◽  
Vol 29 (4) ◽  
pp. 685-690
Author(s):  
C. S. Vanaja ◽  
Miriam Soni Abigail

Purpose Misophonia is a sound tolerance disorder condition in certain sounds that trigger intense emotional or physiological responses. While some persons may experience misophonia, a few patients suffer from misophonia. However, there is a dearth of literature on audiological assessment and management of persons with misophonia. The purpose of this report is to discuss the assessment of misophonia and highlight the management option that helped a patient with misophonia. Method A case study of a 26-year-old woman with the complaint of decreased tolerance to specific sounds affecting quality of life is reported. Audiological assessment differentiated misophonia from hyperacusis. Management included retraining counseling as well as desensitization and habituation therapy based on the principles described by P. J. Jastreboff and Jastreboff (2014). A misophonia questionnaire was administered at regular intervals to monitor the effectiveness of therapy. Results A detailed case history and audiological evaluations including pure-tone audiogram and Johnson Hyperacusis Index revealed the presence of misophonia. The patient benefitted from intervention, and the scores of the misophonia questionnaire indicated a decrease in the severity of the problem. Conclusions It is important to differentially diagnose misophonia and hyperacusis in persons with sound tolerance disorders. Retraining counseling as well as desensitization and habituation therapy can help patients who suffer from misophonia.


2017 ◽  
Vol 2 (3) ◽  
pp. 57-62
Author(s):  
Anna Maria Siciliano

This paper presents a successful behavioral case study in treatment of chronic refractory cough in a 60-year-old adult female. The efficacy for speech-language pathology treating chronic cough is discussed along with description of treatment regime. Discussion focuses on therapy approaches used and the patient's report of changes in quality of life and frequency, duration, and severity reduction of her cough after treatment.


Sign in / Sign up

Export Citation Format

Share Document