Results 21 to 30 of about 3,602,121 (180)

LSTM-based Fuzzy Test Case Generation Method for S7 Protocol [PDF]

open access: yesJisuanji gongcheng, 2021
The fuzzy test technology for S7 protocol based on the traditional fuzzy test framework is limited by the difficulty in construction and low code coverage,which has a great impact on the test efficiency and quality.Exploiting the strong learning and ...
JIANG Yaguang, CHEN Xi, LI Jianbin, YAN Jingchen, LIU Shuyuan, LI Kunchang
doaj   +1 more source

Effects of Light Conversion Film on the Growth of Leafy Vegetables in Facilities under Haze Weather

open access: yesAgronomy, 2022
The light intensity is low in haze weather, and the facility is in a weak light environment for a long time. As a functional film, light conversion film (LCF) can improve the light conversion performance and is conducive to regulating the environment in ...
Jingjing Li   +6 more
doaj   +1 more source

Modeling the Data Provenance of Relational Databases Supporting Full-Featured SQL and Procedural Languages

open access: yesApplied Sciences, 2022
Data provenance is information about where data come from (provenance data) and how they transform (provenance transformation). Data provenance is widely used to evaluate data quality, trace errors, audit data, and understand references among data ...
Deyou Tang   +4 more
doaj   +1 more source

Systematic Fuzz Testing Techniques on a Nanosatellite Flight Software for Agile Mission Development

open access: yesIEEE Access, 2021
The success of CubeSat space missions depends on the ability to perform properly in a harsh environment. A key component in space missions is the flight software, which manages all of the processes executed by the satellite on its onboard computer ...
Tamara Gutierrez   +4 more
doaj   +1 more source

Structural software testing techniques [PDF]

open access: yesAnali Ekonomskog fakulteta u Subotici, 2014
An effective test case is one that has a high probability of success in the identification of software defects. There are two well-known software testing methods of effective test case design - black-box and whitebox method.
Vuković Vuk
doaj  

Axiomatic Testing of Structure Metrics [PDF]

open access: yes, 1994
Axiomatic testing of software metrics is described, based on axioms from representational measurement theory. In a case study, the axioms are given for the formal relational structure and the empirical relational structure.
Berg, K.G. van den, Broek, P.M. van den
core   +4 more sources

Study on a Novel Fault Damage Degree Identification Method Using High-Order Differential Mathematical Morphology Gradient Spectrum Entropy

open access: yesEntropy, 2018
A damage degree identification method based on high-order difference mathematical morphology gradient spectrum entropy (HMGSEDI) is proposed in this paper to solve the problem that fault signal of rolling bearings are weak and difficult to be ...
Huimin Zhao   +5 more
doaj   +1 more source

Automated Reusable Tests for Mitigating Secure Pattern Interpretation Errors

open access: yesIEEE Access, 2023
The importance of software security has increased along with the number and severity of incidents in recent years. Security is a multidisciplinary aspect of the software development lifecycle, operation, and user utilization.
Carlos Cunha, Nuno Pombo
doaj   +1 more source

SoC Fusion Estimation Based on Neural Network Long and Short Time Series

open access: yesBatteries
Accurate prediction of state-of-charge (SoC) is critical to ensure battery performance, extend lifetime and ensure safety. Data-driven methods for SoC prediction are highly adaptable and generalizable.
Bosong Zou   +8 more
doaj   +1 more source

Field Testing of Software Applications

open access: yes, 2017
When interacting with their software systems, users may have to deal with problems like crashes, failures, and program instability. Faulty software running in the field is not only the consequence of ineffective in-house verification and validation ...
Gazzola, Luca
core   +1 more source

Home - About - Disclaimer - Privacy