scholarly journals Concurrent Defects, Methodologies and Recommendations

Software testing is a major process in every software development cycle so as to produce superior quality products that can cater to the customer needs. In the beginning of the IT industry testing was a simple process since competition was not enough so as to produce good quality software. With the development of technology and fierce competition over recent years the needs to develop simultaneous methods of testing have been proposed. Reviewing the given application remains one of the major setbacks of concurrent code and the other being data flow in given request stack. Testing becomes really difficult when the function not returning the output to the caller function in requisite time but later on returns it via call-back functions, messages or other such processes. So this paper aims at viewing the tools and techniques available for better testing, removing bugs so as to make software good. Here the defects as well as directions need to remove it are also focussed.

2021 ◽  
Vol 23 (06) ◽  
pp. 919-922
Author(s):  
Arpita S.K ◽  
◽  
Amrathesh Amrathesh ◽  
Dr. Govinda Raju M ◽  
◽  
...  

Continuous Integration (CI) is the technique of integrating small changes made to the code more often rather than waiting till the end of the development cycle for integration. The software practice wherein the software deployment can be done anytime to the market is called Continuous Delivery (CD). With continuous integration and continuous delivery, the problem of taking time to find and resolve the bug can be reduced to a large extent. As the time to find the bugs and fix them gets reduced, many releases adhering to the given timeline can be made by an organization. Various software tools have been developed for the continuous integration process which includes Jenkins, Bitbucket, TeamCity. In this paper, a review on the standard practices, approaches, challenges faced while using the continuous integration/delivery in the software development, methods of solving them, and using Jenkins for the implantation of continuous integration/delivery is done.


Author(s):  
Balal Sohail Et. al.

Macro based Malware has taken a great rise is these recent years, Attackers are now using this malware for hacking purposes. This virus is embedded inside the macro of a word document and can be used to infect the victim’s machine. These infected files are usually sent through emails and all antivirus software are unable to detect the virus due to the format of the file. Due to the format being a rich text file and not an executable file, the infected file is able to bypass all security. Hence it is necessary to develop a detection system for such attacks to help reduce the threat. Technical research is carried out to identify the tools and techniques essential in the completion of this system. Research on methodology is done to finalise which development cycle will be used and how functions will be carried out at each phase of the development cycle. This paper outlines the problems that people face once they are attacked through macro malwares and the way it can be mitigated. Lastly, all information necessary to start the implementation has been gathered and analysed


Author(s):  
Mohammad Faraz Naim ◽  
Usha Lenka

The study examines the influence of social media on Gen Y employees' engagement. Hypotheses are developed to explain the influence of social media on Gen Y employees' engagement. A sample of 256 Indian Gen Y employees from IT industry participated in the survey. Structural equation modeling is used to test the research hypotheses. Findings reveal that social media has a significant positive effect on Gen Y employees' engagement. It is revealed that social media moderates the relationship of HR practices (communication, collaboration; knowledge sharing and recognition) and engagement in Gen Y employees. While the scope of this study is limited to IT industry and results may not generalize to different industries in different regions. Hence, future studies should test the given hypotheses in different industries of different regions. The findings suggest that organizations should incorporate social media into their HR strategy. The study is one of the first to date, to empirically test the effect of social media on Gen Y employee engagement.


2017 ◽  
Vol 97 (2) ◽  
pp. 19-45
Author(s):  
Marko Langovic ◽  
Sanja Manojlovic ◽  
Zoran Cvorovic

Zapadna Morava River basin covers a surface of 15850 km2, which is approximately 18% of the territory of the Republic of Serbia. In its basin, 38 active surface stations are registered. The goal of this paper is the trend analysis of the mean annual river discharges in the Zapadna Morava River basin and their noticing in a longer series of time, as well as determining their intensity. Fifty years period of time (1965 - 2014) is taken for a time series. Because there is no empirical data for mean annual discharge values for all stations for the given period, the number of the hydrological stations, which are processed in this paper, is reduced to 21. Mann-Kendall test has been used for noticing the trend, Sen test has been used for estimating the curves inclinations of the linear trend, while Pettitt?s test has been used for determining the turning point of change. Also, classification of the years by water richness has been performed in this paper in order to determine wet and dry periods. For the needs of identification of medium watery, wet and dry years, the combined method has been used on the data examples from representative stations in the basin. Based on the processed data and the obtained results, it has been established that the most rivers in the basin of the Zapadna Morava River have a slightly decreasing trend of the flow values, whereby the change of the trend is not significant. On the most rivers, the change period has begun in the early eighties of the past century. On a large number of profiles, the watery period was appearing in the beginning of eighties, while the dry season is characteristic for the period from 1990 to 1994.


2013 ◽  
Vol 8 (4) ◽  
Author(s):  
Irna Prisye Daleno ◽  
David Paul Elia Saerang ◽  
Inggriani Elim

Faced with the globalization era filled with fierce competition, companies must be able to improve the performance and adaptability to the existing environment to be able to continue to compete. The rivalry does not happen in manufacture industry environmentbut also in service industry, with increasing the competition in service industry especially in hotel, so Travello Hotel should create a competitive excellence. Therefore to create that excellence,  Travello Hotel should has efficiency with the way to manage the activity without cutdown the quality of service that give to customer. This method use to manage the activity, so that create this efficiency is calledActivity-Based Management.The research has done in room division of Manado Travello Hotel. The research is descriptive which analyze to all activity in room division of  Travello  Hotel and classify that activity to be value added activity and non value added activity. The value added activity will be eliminated or combined with the other activity that is similar, so that the value added non cost appear from this activity could reduced the amount. The data that used in this research is quantitative as cost report in room division in Travello Hotel tahun 2012 and the qualitative data is like tool from the Hotel.The conclusion this research is to apply the method of activity-basedManagement, Travello Hotel reduces the non value added cost so it can create afficiency without cutdown the quality of service the given from Travello Hotel to customer, with using the activity-based management,the totally of expense in room division are decreases as much as Rp. 176.226.624,08 from Rp. 3.576.508.933,00 to be Rp. 3.400.282.308,92.


2018 ◽  
Vol 4 (1) ◽  
pp. 146-154
Author(s):  
Rena Alasgarova

The given action research is aimed at investigating the impact the implementation of CLIL techniques may have on understanding and comprehension of the content in the teaching/learning environment where English is used as a medium of education. The research was conducted in Cambridge department of one of the private schools in Baku, Azerbaijan with two groups of 11-12-year-old learners. CLIL methodology was utilized in History of Azerbaijan classes to check whether the approach can facilitate the understanding of the content matter for the students who are proficient English users. The distinctive feature of this action research is that it allows for viewing CLIL approach from a perspective opposite to the common perspective where the focus is shifted from learning the language through content to learning content through CLIL tools and techniques.


Author(s):  
I.V. Chechushkov ◽  
A.V. Epimakhov

By means of the Bayesian analysis of radiocarbon dates, a comparison of chronologies of the Kamennyi Ambar settlement and the cemetery of Kamennyi Ambar-5 of the Late Bronze Age Syntashta-Petrovka period has been carried out. Both sites are situated in the valley of the Karagaily-Ayat River in Kartalinsky district of Chelyab-insk Region (Russia). Comparison of the pottery assemblages of the settlement and the cemetery demonstrates their similarity, which suggests existence of a genetic link between the sites. The purpose of this work is devel-opment of a generalized chronological model of the two monuments. This is achieved by comparison of uncali-brated intervals of radiocarbon dates and calculation of chronological boundaries of the existence of the settle-ment and cemetery by means of Bayesian modeling of the calibrated dates. The method consists in that, in the beginning, the stratigraphic position of each date is determined, and then the dates suitable for the analysis are arranged in the chronological order and calibrated, while the algorithm of the OxCal 4.4 calibration program is queried for calculation of the boundaries of the given periods and their duration. Also, the paper reports complete sets of the radiocarbon dates: 61 dates have been obtained from the materials of the settlement of Kamennyi Ambar, while 19 measurements originate from the Kamennyi Ambar-5 cemetery. Correlation of the radiocarbon dates and development of the Bayesian chronological models have demonstrated contemporaneousness of the settlement and the cemetery with slightly later beginning of the activity at the latter. This observation is in agree-ment with the concept of the genetic link between the sites and, arguably, can be extended onto other pairs of fortified settlement — kurgan cemetery attributed to the Sintashta-Petrovka period. Our conclusion is also consis-tent with the concept of building the complex of monuments by a newly-arrived population, who founded a settle-ment, occupied the new territory for some time, while the first deaths occurred some time afterwards. That said, the settlement of Kamennyi Ambar existed for no longer than a century in the 1950s — 1860s BC, while the cemetery of Kamennyi Ambar-5 was used for 70–80 years within the same chronological interval.


2017 ◽  
Vol 82 (1) ◽  
pp. 325-346 ◽  
Author(s):  
BARBARA F. CSIMA ◽  
MATTHEW HARRISON-TRAINOR

AbstractWe investigate the complexity of isomorphisms of computable structures on cones in the Turing degrees. We show that, on a cone, every structure has a strong degree of categoricity, and that degree of categoricity is${\rm{\Delta }}_\alpha ^0 $-complete for someα. To prove this, we extend Montalbán’sη-system framework to deal with limit ordinals in a more general way. We also show that, for any fixed computable structure, there is an ordinalαand a cone in the Turing degrees such that the exact complexity of computing an isomorphism between the given structure and another copy${\cal B}$in the cone is a c.e. degree in${\rm{\Delta }}_\alpha ^0\left( {\cal B} \right)$. In each of our theorems the cone in question is clearly described in the beginning of the proof, so it is easy to see how the theorems can be viewed as general theorems with certain effectiveness conditions.


Software testing is a major process in every software development cycle, which is a very expensive procedure. Throughout this phase software testers as well as development companies are eager to verify the software from various viewpoints for repeated testing. But detailed testing requires code execution along with all valid inputs in the form of test cases which is not possible because of resource limitations. The test cases are automatically generated in many of the software. One of the important concerns for any coder during the maintenance phase is the selection of successful test cases for code execution. This paper includes an algorithm that is designed to figure out the statement coverage of a code with proper inputs by executing the priority based approach which involves sorting the inputs in ascending order so as to have an appropriate method to test the code for maximum statement coverage.


2017 ◽  
Vol 39 (1) ◽  
Author(s):  
Hans Julius Schneider

AbstractThe paper develops a perspective on religion that is inspired by William James’ concept of religious experience and by the philosophy of language of the later Ludwig Wittgenstein. It proceeds by naming basic steps leading to the proposed conception and by showing that none of them must be a hindrance for a substantial understanding of religion. Among the steps discussed are the acceptance of non-theistic religions, an existential version of functionalism, and the acceptance of the possibility of non-literal truths about the human condition. Furthermore, it proposes a way to interpret the expression ‘the sacred’ in the given framework. Finally it points out two contradictory necessities that make interreligious dialogue difficult: In the beginning one has to use an abstract vocabulary in order not to exclude any positions, but on the other hand one has to avoid robbing the participants of the means for articulating their specific religious views.


Sign in / Sign up

Export Citation Format

Share Document