122 results on '"Protocol testing"'
Search Results
2. Analysis of the OLSR Protocol by Using Formal Passive Testing
- Author
-
García Merayo, Mercedes, Andrés Sánchez, César, Maag, Stéphane, Cavalli, Ana, Nuñez García, Manuel, García Merayo, Mercedes, Andrés Sánchez, César, Maag, Stéphane, Cavalli, Ana, and Nuñez García, Manuel
- Abstract
16th Asia-Pacific Software Engineering Conference.DEC 01-03, 2009.Bat Ferringhi, MALAYSIA., In this paper we apply a passive testing methodology to the analysis of a non-trivial system. In our framework, so-called invariants provide us with a formal representation of the requirements of the system. In order to precisely express new properties in multi-node environments, in this paper we introduce a new kind of invariants. We apply the resulting framework to perform a complete study of a MANET routing protocol: The Optimized Link State Routing protocol., Sección Deptal. de Sistemas Informáticos y Computación, Fac. de Ciencias Matemáticas, TRUE, pub
- Published
- 2023
3. Protocol Testing and Performance Evaluation for MANETs with Non-uniform Node Density Distribution
- Author
-
Hiromori, Akihito, Umedu, Takaaki, Yamaguchi, Hirozumi, Higashino, Teruo, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Nielsen, Brian, editor, and Weise, Carsten, editor
- Published
- 2012
- Full Text
- View/download PDF
4. Testing Protocol Robustness
- Author
-
Rollet, Antoine, Fouchal, Hacène, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Böhme, Thomas, editor, Heyer, Gerhard, editor, and Unger, Herwig, editor
- Published
- 2003
- Full Text
- View/download PDF
5. Test Bed for Plain C/C++ Protocol Implementations
- Author
-
Haverinen, Henry, Lehtinen, Lassi, Martikainen, Olli, editor, Raatikainen, Kimmo, editor, and Hyvärinen, Jenni, editor
- Published
- 2002
- Full Text
- View/download PDF
6. Interoperability Test Generation for Communication Protocols Based on Multiple Stimuli Principle
- Author
-
Seol, Soonuk, Kim, Myungchul, Chanson, Samuel T., Schieferdecker, Ina, editor, König, Hartmut, editor, and Wolisz, Adam, editor
- Published
- 2002
- Full Text
- View/download PDF
7. Interoperability Test Suite Generation for the TCP Data Part Using Experimental Design Techniques
- Author
-
Ryu, Jiwon, Kim, Myungchul, Kang, Sungwon, Seol, Soonuk, Ural, Hasan, editor, Probert, Robert L., editor, and v. Bochmann, Gregor, editor
- Published
- 2000
- Full Text
- View/download PDF
8. Interoperability Test Suite Derivation for the TCP
- Author
-
Seol, Soonuk, Kim, Myungchul, Kang, Sungwon, Park, Yongbum, Choe, Younghan, Wu, Jianping, editor, Chanson, Samuel T., editor, and Gao, Qiang, editor
- Published
- 1999
- Full Text
- View/download PDF
9. Coverage Analysis for Embedded Testing and an Application
- Author
-
Zhu, Jinsong, Vuong, Son T., Wu, Jianping, editor, Chanson, Samuel T., editor, and Gao, Qiang, editor
- Published
- 1999
- Full Text
- View/download PDF
10. An enhanced model for testing asynchronous communicating systems
- Author
-
Kim, Myungchul, Shin, Jaehwi, Chanson, Samuel T., Kang, Sungwon, Wu, Jianping, editor, Chanson, Samuel T., editor, and Gao, Qiang, editor
- Published
- 1999
- Full Text
- View/download PDF
11. Time Simulation Methods for Testing Protocol Software Embedded in Communicating Systems
- Author
-
Latvakoski, J., Honka, H., Csopaki, Gyula, editor, Dibuz, Sarolta, editor, and Tarnay, Katalin, editor
- Published
- 1999
- Full Text
- View/download PDF
12. Automated Test Case Selection Based on Subpurposes
- Author
-
Csöndes, Tibor, Kotnyek, Balázs, Csopaki, Gyula, editor, Dibuz, Sarolta, editor, and Tarnay, Katalin, editor
- Published
- 1999
- Full Text
- View/download PDF
13. Evaluation of test coverage for embedded system testing
- Author
-
Zhu, Jinsong, Vuong, Son T., Chanson, Samuel T., Petrenko, Alexandre, editor, and Yevtushenko, Nina, editor
- Published
- 1998
- Full Text
- View/download PDF
14. Vertical Tooth Root Fracture Detection through Cone-beam Computed Tomography: An Umbrella Review Protocol Testing Four Hypotheses
- Author
-
Kelvin I Afrashtehfar and David MacDonald
- Subjects
Orthodontics ,Cone beam computed tomography ,business.industry ,Tooth Fracture ,030206 dentistry ,03 medical and health sciences ,0302 clinical medicine ,stomatognathic system ,Tooth root fracture ,Medical imaging ,Medicine ,030212 general & internal medicine ,business ,General Dentistry ,Protocol testing - Abstract
Detecting vertical root fractures represents an immense challenge for oral health professionals. One of the main tools used to detect this type of biological complication is the periapical radiograph. However, conventional radiography consists of two-dimensional imaging that is limited by the superimposition of bony structures that complicate the detection of root fractures. The alternative, a Cone-Beam Computed Tomography (CBCT) scan, cannot be prescribed in every case since radiation should be kept to a minimum as stipulated by the “As Low As Reasonably Achievable” (ALARA) principle. Therefore, to justify the use of a CBCT scan to detect a vertical tooth root fracture, the clinician must prove that it has significant benefits over traditional imaging. Since few systematic reviews have compared CBCT technology to traditional radiography for the diagnosis of vertical root fractures, it is of utmost importance in clinical practice, especially in endodontology and clinical dental medicine, where the available reviews are examined to generate a clinical recommendation. The four hypotheses of this protocol are that (1) CBCT is superior to traditional radiography for detecting vertical root fractures of vital teeth; (2) CBCT is superior to traditional radiography for detecting longitudinal root fractures of vital teeth with radiopaque restorations; (3) CBCT is superior to traditional radiography for detecting vertical root fractures of root-filled teeth without a radiopaque post that may cause artifacts; and (4) CBCT is superior to traditional radiography for detecting vertical root fractures of root-filled teeth with a radiopaque post regardless of its longitude. To test these hypotheses, all the current secondary resources related to the aim of this meta-review are evaluated. If there is sufficient evidence to support clinical decisions, then the appropriate recommendations will be formulated. PROSPERO ID: CRD42018067792
- Published
- 2019
15. Intelligent Protocol Analyzer with TCP Behavior Emulation for Interoperability Testing of TCP/IP Protocols
- Author
-
Kato, Toshihiko, Ogishi, Tomohiko, Idoue, Akira, Suzuki, Kenji, Mizuno, Tadanori, editor, Shiratori, Norio, editor, Higashino, Teruo, editor, and Togashi, Atsushi, editor
- Published
- 1997
- Full Text
- View/download PDF
16. Generalized metric based test selection and coverage measure for communication protocols
- Author
-
Zhu, Jinsong, Vuong, Son T., Mizuno, Tadanori, editor, Shiratori, Norio, editor, Higashino, Teruo, editor, and Togashi, Atsushi, editor
- Published
- 1997
- Full Text
- View/download PDF
17. A weighted random walk approach for conformance testing of a system specified as communicating finite state machines
- Author
-
Kang, Deukyoon, Kang, Sungwon, Kim, Myungchul, Yoo, Sangjo, Mizuno, Tadanori, editor, Shiratori, Norio, editor, Higashino, Teruo, editor, and Togashi, Atsushi, editor
- Published
- 1997
- Full Text
- View/download PDF
18. A conformance testing for communication protocols modeled as a set of DFSMs with common inputs
- Author
-
Fukada, Atsushi, Kaji, Tadashi, Higashino, Teruo, Taniguchi, Kenichi, Mori, Masaaki, Kim, Myungchul, editor, Kang, Sungwon, editor, and Hong, Keesoo, editor
- Published
- 1997
- Full Text
- View/download PDF
19. An approach to dynamic protocol testing
- Author
-
Yoo, Sangjo, Kim, Myungchul, Kang, Deukyoon, Kim, Myungchul, editor, Kang, Sungwon, editor, and Hong, Keesoo, editor
- Published
- 1997
- Full Text
- View/download PDF
20. Sensitivity analysis of the metric based test selection
- Author
-
Curgus, Jadranka A., Vuong, Son T., Zhu, Jinsong, Kim, Myungchul, editor, Kang, Sungwon, editor, and Hong, Keesoo, editor
- Published
- 1997
- Full Text
- View/download PDF
21. Future directions for protocol testing, learning the lessons from the past
- Author
-
Rayner, D., Kim, Myungchul, editor, Kang, Sungwon, editor, and Hong, Keesoo, editor
- Published
- 1997
- Full Text
- View/download PDF
22. An approach for testing asynchronous communicating systems
- Author
-
Kim, Myungchul, Kang, Sungwon, Shin, Jaehwi, Chanson, Samuel T., Baumgarten, Bernd, editor, Burkhardt, Heinz-Jürgen, editor, and Giessler, Alfred, editor
- Published
- 1996
- Full Text
- View/download PDF
23. Port-synchronizable test sequences for communication protocols
- Author
-
Tai, K. C., Young, Y. C., Cavalli, Ana, editor, and Budkowski, Stan, editor
- Published
- 1996
- Full Text
- View/download PDF
24. Fault-tolerant UIO Sequences in Finite State Machines
- Author
-
Naik, Kshirasagar, Cavalli, Ana, editor, and Budkowski, Stan, editor
- Published
- 1996
- Full Text
- View/download PDF
25. An Executable Protocol Test Sequence Generation Method for EFSM-specified Protocols
- Author
-
Huang, Chung-Ming, Lin, Yuan-Chuen, Jang, Ming-Yuhe, Cavalli, Ana, editor, and Budkowski, Stan, editor
- Published
- 1996
- Full Text
- View/download PDF
26. Feasibility, safety and acceptability of select outcome measures in a physiotherapy study protocol for boys with haemophilia
- Author
-
Eleanor Main, Sarah Rand, Nicola Thorpe, Nicola Hubert, Phillip Harniess, David Stephensen, Ri Liesner, and Melanie Bladen
- Subjects
Medicine (General) ,Haemophilia ,medicine.medical_specialty ,Population ,Medicine (miscellaneous) ,Outcomes ,030204 cardiovascular system & hematology ,iSTEP ,03 medical and health sciences ,R5-920 ,0302 clinical medicine ,Medicine ,030212 general & internal medicine ,Adverse effect ,education ,Children ,Protocol testing ,Protocol (science) ,Core set ,education.field_of_study ,Descriptive statistics ,business.industry ,Research ,Outcome measures ,Feasibility ,medicine.disease ,Physical therapy ,10-m ISWT ,business ,Myometry - Abstract
Background There is a lack of functional performance measures for children and young people with haemophilia (CYPwH) with associated control data from typically developing boys (TDB). The literature advocates development of a core set of outcome measures for different chronic conditions. As medical treatment improves, CYPwH are experiencing better outcomes; therefore, more challenging measures are required to monitor physical performance. Such testing is not performed routinely, due to practical and safety concerns. Aim Evaluate the feasibility, safety and acceptability of select outcome measures as part of a study protocol testing CYPwH; including myometry, 10 metre incremental shuttle walk test (10-m ISWT), iSTEP (an incremental step test, with data from TDB), and 1 week of accelerometry-wear at home. Methods Sixty-six boys aged 6–15 years with mild, moderate or severe haemophilia A or B (including inhibitors) attending routine clinics at Great Ormond Street Hospital were approached to participate. Descriptive statistics and content analysis were used to assess outcomes of feasibility, safety and acceptability, which included recruitment/retention rates, protocol completion within routine appointment timeframes, performance testing without serious adverse events/reactions (SAE/SARs), and acceptability to CYPwH of high-level performance measures. Results Outcomes were met: 43 boys completed testing at clinic review (Jan–Nov 2018) within a 10-month timeframe, retention was 95% at completion of protocol and no SAE/SARs were reported throughout testing. Conclusion Feasibility, safety and acceptability of the study protocol have been established in this population. Both high-level performance tests, iSTEP and 10-m ISWT, were an acceptable addition to boys’ routine clinic appointments and could be safe, acceptable choices of outcome measure as part of a core set of tests for CYPwH. Further investigation of the psychometric properties for the iSTEP is now justified, in order for it to be used as a standardised, validated, reliable outcome measure in clinical or research settings. Trial registration Retrospectively registered on September 3, 2019, on ClinicalTrials.gov (ID: NCT04076306).
- Published
- 2021
27. Improving eDNA yield and inhibitor reduction through increased water volumes and multi-filter isolation techniques
- Author
-
Margaret E. Hunter, Jason A. Ferrante, Gaia Meigs-Friend, and Amelia Ulmer
- Subjects
0301 basic medicine ,lcsh:Medicine ,Polymerase Chain Reaction ,Article ,03 medical and health sciences ,0302 clinical medicine ,Isolation techniques ,Environmental DNA ,lcsh:Science ,Volume concentration ,Protocol testing ,Ecosystem ,Multidisciplinary ,Chromatography ,Chemistry ,lcsh:R ,Water ,DNA, Environmental ,Filter (aquarium) ,030104 developmental biology ,Linear relationship ,Yield (chemistry) ,lcsh:Q ,Water volume ,030217 neurology & neurosurgery ,Environmental Monitoring - Abstract
To inform management and conservation decisions, environmental DNA (eDNA) methods are used to detect genetic material shed into the water by imperiled and invasive species. Methodological enhancements are needed to reduce filter clogging, PCR inhibition, and false-negative detections when eDNA is at low concentrations. In the first of three simple experiments, we sought to ameliorate filter clogging from particulates and organic material through a scaled-up, multi-filter protocol. We combined four filters in a 5 mL Phenol-Chloroform-Isoamyl (PCI) procedure to allow for larger volumes of water (~1 L) to be filtered rapidly. Increasing the filtered water volume by four times resulted in 4.4X the yield of target DNA. Next, inhibition from organic material can reduce or block eDNA detections in PCR-based assays. To remove inhibitory compounds retained during eDNA isolation, we tested three methods to chemically strip inhibitors from eDNA molecules. The use of CTAB as a short-term (5–8 day) storage buffer, followed by a PCI isolation, resulted in the highest eDNA yields. Finally, as opposed to a linear relationship among increasing concentrations of filtered genomic eDNA, we observed a sharp change between the lower (70–280 ng) and higher (420–560 ng) amounts. This may be important for effectively precipitating eDNA during protocol testing.
- Published
- 2019
28. A three tier rapid mass programming method
- Author
-
Tyler Nicholas Edward Steane, PJ Radcliffe, Christopher Rogash, and Michael Trifilo
- Subjects
Ethernet ,IoT ,Protocol testing ,Computer science ,Distributed computing ,Controller (computing) ,Clinical Biochemistry ,010501 environmental sciences ,01 natural sciences ,Domain (software engineering) ,Networking ,03 medical and health sciences ,Engineering ,Tier 2 network ,Code (cryptography) ,lcsh:Science ,ComputingMethodologies_COMPUTERGRAPHICS ,030304 developmental biology ,0105 earth and related environmental sciences ,0303 health sciences ,Testbed ,WSN ,Tier 1 network ,Medical Laboratory Technology ,lcsh:Q ,Tower - Abstract
Graphical abstract, Various research activities require the programming of a large numbers of devices. This programming can be difficult to co-ordinate and organise, and requires considerable labour time. These issues often mean that testing on real hardware is abandoned or taken only to small scale implementation thus limiting the real-world findings. The method described in this paper adopts a three-tiered approach to programming large numbers of devices. Tier 1 is comprised of a single Master Controller which is networked to individual tower modules, these towers form the final 2 tiers with the Local Controller as tier 2 and up-to 15 target devices forming tier 3. The Master Controller co-ordinates and distributes the code for each device to the Local Controller which then programs the target devices. In the domain of networking this allows for: • Large networks of varied protocols to be programmed quickly, since towers are programmed in parallel, additional towers don’t extend programming times. • Distributed networks are possible since towers are controlled over Ethernet. • Dramatically reduced labour time and defect rates due to human error in setting up devices. • This paper presents the implementation of this method for IoT Networking research with ESP-01 Target devices.
- Published
- 2019
29. ART Initiation for Infants Diagnosed With HIV Through Point of Care and Conventional Polymerase Chain Reaction Testing in Kenya: A Case Series
- Author
-
Nicodemus Maosa, Sarah Finocchario-Kessler, Brad Gautney, Kathy Goggin, Elizabeth Muchoki, Melinda Brown, Catherine Wexler, May Maloba, and Shadrack Babu Kale
- Subjects
Microbiology (medical) ,Male ,Pediatrics ,medicine.medical_specialty ,Art initiation ,Human immunodeficiency virus (HIV) ,MEDLINE ,HIV Infections ,Pilot Projects ,medicine.disease_cause ,Delayed diagnosis ,Polymerase Chain Reaction ,Article ,Late presentation ,03 medical and health sciences ,0302 clinical medicine ,030225 pediatrics ,Antiretroviral Therapy, Highly Active ,Medicine ,Humans ,030212 general & internal medicine ,Disengagement theory ,Protocol testing ,Point of care ,business.industry ,Infant, Newborn ,HIV ,Infant ,Kenya ,Infectious Diseases ,Early Diagnosis ,Point-of-Care Testing ,Pediatrics, Perinatology and Child Health ,Female ,business - Abstract
We sought to understand the sequence of testing and treatment among nine infants offered both conventional and point-of-care testing and diagnosed as HIV-positive by 6 months of age in Kenya. One infant received per protocol testing and treatment. Patient-level (late presentation and disengagement), provider-level (reluctance and error/oversight) and system-level (stock outs, errors) challenges delayed diagnosis and treatment. Early point-of-care testing can streamline testing; however, challenges mitigate benefits.
- Published
- 2021
30. Security and Robustness by Protocol Testing.
- Author
-
Fu, Yulong and Kone, Ousmane
- Abstract
Network protocols are the basis of network communication, and security concerns about protocol aspects are always important and useful in network systems. For the past two decades, the methods of protocol testing have been used to verify the functional conformance between the network specifications and the implementations. In this paper, we extend protocol testing methods by considering the robustness of the network protocols. We suggest a method for modeling network systems with concurrent components and propose a robustness testing approach to evaluate the system security. A new definition of Glued_IOLTS is used to define this kind of system, and an algorithm for robustness test case generation is given. A case study with the RADIUS protocol is presented. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
31. GigaSpaceWire Communication Protocol SystemC Simulation
- Author
-
V. L. Olenev and D. A. Kuznetsov
- Subjects
business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Simulation modeling ,Process (computing) ,Model description ,SystemC ,Protocol specification ,Embedded system ,business ,Communications protocol ,computer ,Protocol (object-oriented programming) ,Protocol testing ,computer.programming_language - Abstract
The paper describes implementation process of GigaSpaceWire protocol simulation System-C model. At current point there are no available or implemented simulation models of this protocol. Implementation of the GigaSpaceWire model will offer the possibility of protocol testing and validation. After the model description, the paper provides results of the GigaSpaceWire protocol specification validation, obtained during protocol simulation.
- Published
- 2020
32. Electrical Circuit Modeling of a 18650 Lithium-Ion Cell for Charging Protocol Testing for Transportation Electrification Applications
- Author
-
Vinicius Albanas Marcis, Apoorva Kelkar, and Sheldon S. Williamson
- Subjects
Battery (electricity) ,Computer science ,chemistry.chemical_element ,Automotive engineering ,law.invention ,Ion ,Power (physics) ,Electrification ,chemistry ,law ,Electrical network ,Lithium ,Protocol testing ,Electronic circuit - Abstract
Modeling gives the opportunity to the user to test new platforms, techniques, and technology, with lower cost, high safety and in a fast pace, when compared with the experimental approach. A precise battery model is required to specify their appropriateness for different applications and to study their dynamic behavior. In addition, it is important to design an efficient battery system for power applications. This paper describes the modeling of a Nickel Manganese Cobalt (NMC) 18650 lithium-ion cell intended for testing new charging methods testing. An electric circuit model with 2RC network is used, and the elements parameterization are performed for charge and discharge. The data is collected experimentally using an automated battery system to run the hybrid pulse test (HPT). A detailed analysis of the parameters identified will be done, along the performance results of the proposed ECM with the standard constant–current constant–voltage (CC–CV) and constant–temperature constant–voltage (CT–CV) current profiles.
- Published
- 2020
33. Implementing a Web Application for W3C WebAuthn Protocol Testing
- Author
-
José M. Vázquez-Naya, Marcos Gestal, and Martiño Rivera Dourado
- Subjects
Password ,Authentication ,business.industry ,Computer science ,media_common.quotation_subject ,Testing ,lcsh:A ,WebAuthn ,Computer security ,computer.software_genre ,testing ,Alliance ,Debugging ,Web application ,authentication ,Use case ,lcsh:General Works ,business ,computer ,Protocol testing ,Physical security ,media_common - Abstract
[Abstract] During the last few years, the FIDO Alliance and the W3C have been working on a new standard called WebAuthn that aims to substitute the obsolete password as an authentication method by using physical security keys instead. Due to its recent design, the standard is still changing and so are the needs for protocol testing. This research has driven the development of a web application that supports the standard and gives extensive information to the user. This tool can be used by WebAuthn developers and researchers, helping them to debug concrete use cases with no need for an ad hoc implementation. Xunta de Galicia; ED431C 2018/49
- Published
- 2020
34. 9 A postoperative protocol reduces opioids prescribed after pediatric orthopaedic surgery
- Author
-
Joseph T Gibian, Megan Johnson, David P. Johnson, Kirsten E. Ross, and Jeffrey E. Martus
- Subjects
Protocol (science) ,medicine.medical_specialty ,business.industry ,Baseline data ,Surgical procedures ,Opioid ,Orthopedic surgery ,Emergency medicine ,medicine ,Dosing ,Medical prescription ,business ,Protocol testing ,medicine.drug - Abstract
Background Wide variability exists in opioid doses prescribed after pediatric orthopaedic surgery. Increasing opioid prescriptions by a single day increases the risk of aberrant opioid behavior by almost 10% in the pediatric population. Objectives The goal of this study is to increase the percentage of patients prescribed opioids based on a standard dosing protocol after pediatric orthopaedic surgery from 0 to 90%. Methods A multidisciplinary team developed a key driver diagram (figure 1). A prescribing protocol was developed based on the surgery severity. Baseline data began in October 2017 with initial protocol testing starting in November 2017. The primary measure was the weekly percent of patients correctly dosed by the protocol. The secondary measure was the average number of opioids prescribed at discharge each week for all children undergoing orthopaedic surgery between October 2017 and September 2018. Statistical process control charts were used for data analysis with Nelson rules used to determine special cause. Results 1645 patient records were prospectively reviewed during the study time period. Adherence to the dosing protocol increased from 0% at baseline to 97% for all categories of surgery (figure 2). Mean prescribed opioid doses following surgical procedures were reduced from 21.9 to 17.8 doses (figure 3), achieving special cause variation. Conclusions Implementation of a standardized opioid dosing protocol for pediatric patients undergoing orthopaedic surgery improved protocol-based adherence to over 90% and was associated with reduced opioid doses prescribed at discharge. Future work will investigate whether this may lead to a decrease in aberrant opioid behaviors in pediatric patients.
- Published
- 2019
35. Clinical Lifestyle Medicine Strategies for Preventing and Reversing Memory Loss in Alzheimer’s
- Author
-
Paulina Shetty and Wes Youngberg
- Subjects
0301 basic medicine ,medicine.medical_specialty ,Analytic Reviews ,business.industry ,Health Policy ,Disease progression ,Public Health, Environmental and Occupational Health ,Medicine (miscellaneous) ,Disease ,medicine.disease ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,medicine ,Lifestyle medicine ,Dementia ,Cognitive decline ,Intensive care medicine ,business ,Cognitive impairment ,030217 neurology & neurosurgery ,Protocol testing - Abstract
Alzheimer’s disease (AD) is the most common form of dementia and currently affects over 5 million Americans and 30 million individuals worldwide. Unfortunately, the current approach to treating AD provides nothing more than a marginal, unsustained, symptomatic effect, with little or no effect on disease progression itself. To attain effective improvements in AD, one must determine risk factors, address the underlying causes, and focus on a combination of functional and lifestyle medicine strategies that provide a comprehensive, programmatic, and network-based approach that is sufficient to achieve epigenetic transformation and neurologic healing through its multiple and necessary synergistic components. Rather than normalizing metabolic parameters, the focus is on optimization of each metabolic parameter. Papers published by research neurologist, Dr Dale Bredesen have documented that symptoms of mild cognitive impairment and early AD may often be reversed within 6 months after initiating a comprehensive, functional and lifestyle medicine-focused program. The purpose of this article are as follows: 1. Shed light on a promising clinical protocol that focuses on a comprehensive functional and lifestyle medicine approach to treating mild cognitive decline and Alzheimer’s disease; 2. Identify the Bredesen Protocol testing, diagnostic and treatment guidelines; 3. Review several case studies and discuss the promising results of the program. Although published case studies such as those reported here are relatively few, clinicians applying these comprehensive strategies have reason to expect improvement in their patients. Lifestyle medicine can be a source of greatly needed hope for those suffering with cognitive decline.
- Published
- 2018
36. A formal approach to robustness testing of network protocol with time constraints.
- Author
-
Xia Yin, Zhiliang Wang, Chuanming Jing, and Jianping Wu
- Subjects
ROBUST control ,COMPUTER network protocols ,THEORY of constraints ,COMPUTER security ,INFORMATION networks - Abstract
Network protocols often have time constraints. Robustness testing of network protocol with time constraints aims to detect vulnerabilities of its implementation. However, related theory is not well developed. This paper proposes a novel Timed NPEFSM model containing sufficient inputs with various time values and their processing rules to formalize complex protocol with time constraints. In order to test delay transitions, Grid Timed NPEFSM is proposed and it can be generated by state characterization of Timed NPEFSM based on time sampling. Thus, these two models jointly guide robustness testing of protocol with time constraints. For test generation, we propose timed anomalous test case in which only state under test is characterized by time sampling and this method can simplify test sequences largely without compromising test coverage. We also propose several strategies to construct test sequences for timed transitions. To inject test data efficiently and effectively, three types of timed compound anomalous test cases are proposed and the algorithm of generating timed compound anomalous test cases considering both single-field and multi-field mutations is then presented. Standard test specification language TTCN-3 is extended to describe timed compound anomalous test case. We illustrate our test method using an intra-domain routing protocol OSPFv2. Copyright © 2010 John Wiley & Sons, Ltd. This paper presents a formal approach to robustness testing of network protocol with time constraints. We propose a novel Timed NPEFSM model to formalize complex protocol with time constraints and then timed compound anomalous test cases considering both single-field and multi-field mutations can be generated from the formal model. Standard test specification language TTCN-3 is extended to describe timed compound anomalous test cases. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
37. A TTCN-3-based protocol testing system and its extension.
- Author
-
Yin, Xia, Wang, ZhiLiang, Jing, ChuanMing, and Shi, XinGang
- Abstract
The protocol testing technology used in the next generation Internet should satisfy some new challenges and requirements. This paper focuses on the test suite description and test implementation techniques. TTCN-3 is chosen as the test suite description language and extended in both syntax and semantics to satisfy the requirements of protocol robustness testing. PITSv3, a protocol integrated testing system based on TTCN-3, is developed, and the extensions for robustness testing are implemented. Finally, two practical test applications are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
38. A formal method to real-time protocol interoperability testing.
- Author
-
Wang, ZhiLiang, Yin, Xia, and Jing, ChuanMing
- Abstract
Interoperability testing is an important technique to ensure the quality of implementations of network communication protocol. In the next generation Internet protocol, real-time applications should be supported effectively. However, time constraints were not considered in the related studies of protocol interoperability testing, so existing interoperability testing methods are difficult to be applied in real-time protocol interoperability testing. In this paper, a formal method to real-time protocol interoperability testing is proposed. Firstly, a formal model CMpTIOA (communicating multi-port timed input output automata) is defined to specify the system under test (SUT) in real-time protocol interoperability testing; based on this model, timed interoperability relation is then defined. In order to check this relation, a test generation method is presented to generate a parameterized test behavior tree from SUT model; a mechanism of executability pre-determination is also integrated in the test generation method to alleviate state space explosion problem to some extent. The proposed theory and method are then applied in interoperability testing of IPv6 neighbor discovery protocol to show the feasibility of this method. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
39. Main issues in protocol testing.
- Author
-
Hogrefe, Dieter
- Subjects
- *
COMPUTER software , *COMPUTER systems , *TELECOMMUNICATION systems , *TELECOMMUNICATION , *COMPUTER science , *TESTING - Abstract
The community of software testing and that of protocol testing are traditionally disjoint. It is seldom the case that protocol testing experts present papers at the large software testing conferences and vice versa. This raises the question about the peculiarities of protocol testing with respect to general software testing. Here we will examine those peculiarities and the consequences in terms of specific methodology developed for protocol testing. [ABSTRACT FROM AUTHOR]
- Published
- 2003
- Full Text
- View/download PDF
40. Simulation-based Testing of Communication Protocols for Dependable Embedded Systems.
- Author
-
Alvarez, Guillermo and Cristian, Flaviu
- Abstract
We present a novel approach to testing fault-tolerant and real-time protocol implementations. Cesium, our testing environment, executes the protocols in a centralized simulator of the distributed system. It simulates the occurrence of inputs and the failure scenarios the protocols are designed to tolerate, while automatically verifying that the required safety and timeliness properties hold at all times during test experiments. Within this framework, the human tester can define failure operations that simulate every failure class studied in the literature. We apply our approach to two fault-tolerant protocols typical in embedded systems. The results show that Cesium can pinpoint implementation errors that would be very difficult to identify in a real system, and can also compute accurate performance predictions that would be problematic to measure in the real embedded platform without ad hoc hardware instrumentation. [ABSTRACT FROM AUTHOR]
- Published
- 2000
- Full Text
- View/download PDF
41. Combining Lean and Applied Research methods to improve rigor and efficiency in acute care outcomes research: A case study
- Author
-
Edwin Pena, Maximilian Schoen, Andrea McCall, Marguerite Bacon, Andrew McWilliams, Jason Roberge, Justin Bilancia, Constance Krull, and Daniel Howard
- Subjects
medicine.medical_specialty ,Quality management ,Computer science ,Lean manufacturing ,Article ,law.invention ,03 medical and health sciences ,0302 clinical medicine ,Randomized controlled trial ,law ,Acute care ,medicine ,Applied research ,Operations management ,030212 general & internal medicine ,Quality improvement ,Protocol testing ,Pharmacology ,lcsh:R5-920 ,General Medicine ,Value-based care ,Lean ,Outcomes research ,Pragmatic research ,lcsh:Medicine (General) ,030217 neurology & neurosurgery ,Healthcare system - Abstract
Hospital care is the single, largest contributor to health spending, yet evidence to guide value transformation is lacking. The large, real-world studies required to fill this void are challenging to conduct in the complex and fast-paced acute care environment. To address these challenges, we created a framework that combines Lean manufacturing methodology and Applied Research principles. We deployed this framework to design, pilot, and iteratively improve a study protocol testing the effectiveness of an innovative care pathway for patients hospitalized with acute exacerbations of Chronic Obstructive Pulmonary Disease. Over a three month period, the protocol was successfully piloted and refined at a single site, subsequently becoming the basis for a large system-wide randomized controlled trial. This framework combining Lean and Applied Research methods resulted in synergies that neither method could accomplish alone and may serve as a template for learning healthcare systems to efficiently generate real-world evidence in the acute care setting. Keywords: Applied research, Pragmatic research, Value-based care, Lean, Quality improvement
- Published
- 2019
42. A distributed test-cases dependencies framework : application to the SIP protocol
- Author
-
Jose Solares, Alberto Marroquin, Stephane Maag, Vencent Martinez, Research Lab in Information & Communication Technologies (GALILEO University) (RLICT), Codevoz S.A. (.), Méthodes et modèles pour les réseaux (METHODES-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Département Réseaux et Services Multimédia Mobiles (RS2M), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), and Centre National de la Recherche Scientifique (CNRS)
- Subjects
Session Initiation Protocol ,Voice over IP ,business.industry ,computer.internet_protocol ,Computer science ,Protocol testing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Signaling protocol ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Test case ,SIP ,Virtual machining ,The Internet ,Internet users ,business ,Conformance testing ,computer ,Distributed testing ,Computer network - Abstract
International audience; Technology trends, consumer and business tendencies are to drop single PSTN lines in favor of VoIP technology. The kernel of VoIp technology is its signaling protocol, where the Session Initiation Protocol (SIP) has been considered the most widespread signaling protocol overall. Within this context, and by considering the huge amount of Internet users and communications that take place over VoIP technology, our work focuses on conducting conformance tests of distributed complex scenarios of SIP in a black box environment. Experimental results have been successfully obtained and discussed
- Published
- 2018
43. Trace Analysis for Conformance and Arbitration Testing.
- Author
-
Bochmann, Gregor V., Dssouli, Rachida, and Zhao, J. R.
- Subjects
- *
COMPUTER network protocols , *SYSTEMS engineering , *SYSTEM analysis , *TELECOMMUNICATION , *TESTING , *DISTRIBUTED computing - Abstract
There are two aspects to testing: 1) the selection of appropriate test inputs and 2) the analysis of the observed interactions of the implementation under test (IUT) in order to determine whether the observed input/output trace conforms to the IUT's specification. The paper analyzes the second aspect with particular attention to testing of communication protocol implementations. Various distributed test architectures are used for this purpose, where partial input/output traces are observable by "local observers" at different interfaces. The error detection power of different test configurations is determined, based on the partial trace visible to each local observer and their global knowledge about the applied test case. The automated construction of trace analysis modules from the formal specification of the protocol is also discussed. Different transformations of the protocol specification may be necessary to obtain the "reference specification" which can be used by a local or global observer for checking the observed trace. This checking possibly involves the "nondeterministic execution" of the reference specification. Experience with the construction of an arbiter for the OSI Transport protocol is described. [ABSTRACT FROM AUTHOR]
- Published
- 1989
- Full Text
- View/download PDF
44. Investigation & Mitigation of the Energy Efficiency Impact of Node Resets in RPL.
- Author
-
Kulau, Ulf, Müller, Silas, Schildt, Sebastian, Büsching, Felix, and Wolf, Lars
- Subjects
ENERGY consumption ,WIRELESS sensor networks ,POWER resources ,INTERNET of things - Abstract
Dependability is a keyword within the recent discussion about the operation of Wireless Sensor Network (WSN) as a vital part of the ever-growing Internet of Things (IoT). However, while focusing on, e.g., reliable routing it is often neglected that the energy supply is an important factor to enable dependable WSN, and thus IoT operation. Using the example of the Routing Protocol for Low power and Lossy Networks (RPL) we will show that a high operational capability is often at the expense of energy resources. Nevertheless, we will also show that this issue can be mitigated. While the resilience of RPL has been verified in a plethora of existing evaluations, the impact of simple node resets on the energy efficiency has not been investigated so far. However, resets may happen for a variety of reasons which are stated in this work as well. Thus, in the first part of this paper we examine the energy costs of resets in a RPL network. We show that such temporary node failures can have a serious impact on the network's total energy usage depending on failure location and topology. As resets are common in real WSNs this work reveals an important weakness of RPL which can even be exploited for attacks. To mitigate this issue, in the second part of this paper we propose a hardening of RPL by maintaining a backup of the RPL state information in a non-volatile memory. Improvements as well as limitations of this approach and a mechanism for a seamless recovery are discussed and described in detail. Finally, the effectiveness and the characteristics of the proposed approach to harden RPL are evaluated extensively. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
45. Panel on Some Issues on Testing Theory and its Applications
- Author
-
Cavalli, Ana, Mizuno, Tadanori, editor, Higashino, Teruo, editor, and Shiratori, Norio, editor
- Published
- 1995
- Full Text
- View/download PDF
46. Trends and Characteristics in Early Glomerular Filtration Rate Decline After Posttransplantation Alloantibody Appearance
- Author
-
Paul I. Terasaki, C. Morgan, Kimberly P. Briley, Scott A. Kendrick, Carl E. Haisch, Pingping Wu, Matthew J Everly, Paul Bolin, W. Kendrick, Lorita M. Rebellato, and Robert C. Harland
- Subjects
Adult ,Graft Rejection ,Male ,medicine.medical_specialty ,Longitudinal study ,Renal function ,Human leukocyte antigen ,Egfr decline ,HLA Antigens ,Isoantibodies ,Internal medicine ,Epidemiology ,Humans ,Transplantation, Homologous ,Medicine ,Protocol testing ,Retrospective Studies ,Transplantation ,business.industry ,Histocompatibility Testing ,Graft Survival ,Middle Aged ,Kidney Transplantation ,Tissue Donors ,body regions ,Cohort ,Cardiology ,Female ,business ,Follow-Up Studies ,Glomerular Filtration Rate - Abstract
Approximately 7% to 9% of patients with donor-specific anti-human leukocyte antigen (HLA) antibodies (DSA) fail within 1 year post-DSA onset. However, little is known as to how this DSA-associated failure temporally progresses. This longitudinal study investigates DSA's temporal relationship to allograft dysfunction and identifies predictors of allograft function's progressive deterioration post-DSA.A cohort of 175 non-HLA identical patients receiving their first transplant between March 1999 and March 2006 were analyzed. Protocol testing for DSA via single antigen beads was done before transplantation and at 1, 3, 6, 9, and 12 months after transplantation then annually. Estimated glomerular filtration rate (eGFR) was analyzed before and after DSA onset.Forty-two patients developed DSA and had adequate eGFR information for analysis. Before DSA onset, the 42 patients had stable eGFR. By 1 year post-DSA, the cohort's eGFR was significantly lower (P0.001); however, 30 of 42 had stable function. Twelve patients had failure or early allograft dysfunction (eGFR decline25% from DSA onset). Those who failed early (by 1 year post-DSA) had more antibody-mediated rejection than stable patients (P=0.03). Late failures (after 1 year post-DSA) were predictable with evidence of early allograft dysfunction (eGFR decline25% by 1 year post-DSA; P0.001). Early allograft dysfunction preceded late failure by nearly 1 year.DSA is temporally related to allograft function deterioration. However, in many cases, late allograft failures are preceded by early allograft dysfunction. Therefore, monitoring for early allograft dysfunction provides treating physicians with a window of opportunity for treatment or continued monitoring.
- Published
- 2013
47. FSM-based conformance testing methods: A survey annotated with experimental evaluation
- Author
-
Khaled El-Fakih, Nina Yevtushenko, Stephane Maag, Ana Cavalli, Rita Dorofeeva, Tomsk State University, Tomsk State University [Tomsk], Department of Computer Science - College of Engineering, American University of Sharjah, Département Logiciels et Réseaux (LOR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), and Centre National de la Recherche Scientifique (CNRS)
- Subjects
Conformance testing ,Model-based testing ,Protocol testing ,Computer science ,020207 software engineering ,Manual testing ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,02 engineering and technology ,Finite state machines ,Computer Science Applications ,Reliability engineering ,Keyword-driven testing ,Test case ,Model based testing ,Formal specification ,0202 electrical engineering, electronic engineering, information engineering ,Test suite ,020201 artificial intelligence & image processing ,Software ,Information Systems ,Real-time testing - Abstract
International audience; The development of test cases is an important issue for testing software, communication protocols and other reactive systems. A number of methods are known for the development of a test suite based on a formal specification given in the form of a finite state machine. In this paper, we overview and experiment with these methods to assess their complexity, applicability, completeness, fault detection capability, length and derivation time of their test suites. The experiments are conducted on randomly generated specifications and on two realistic protocols called the Simple Connection Protocol and the ITU-T V.76 Recommendation.
- Published
- 2010
48. On the Complexity of Generating Optimal Test Sequences.
- Author
-
Boyd, Sylvia C. and Ural, Hasan
- Subjects
- *
SOFTWARE engineering , *TESTING , *ALGORITHMS , *COMPUTER software , *TECHNICAL specifications , *ENGINEERING - Abstract
As communications protocols are becoming more and more complex, efficient algorithms are needed for the problem of generating minimum-length test sequences. Existing algorithms generate test sequences based on one or more state-identification sequences for every state in a given finite-state machine. Some of these algorithms make an attempt to minimize the length of the test sequence to some prescribed extent. The optimal test sequence generation (OTSG) problem is concerned with finding the optimal (shortest in length) test sequence for a given finite-state machine using some state identification sequences. We prove that the OTSG problem is NP-complete. Therefore an efficient solution to the problem should not be expected in the general case. [ABSTRACT FROM AUTHOR]
- Published
- 1991
- Full Text
- View/download PDF
49. Extended state identification and verification using a model checker
- Author
-
Ursula Goltz, Christopher Robinson-Mallett, Tilo Mücke, Peter Liggesmeyer, and Publica
- Subjects
protocol testing ,Model checking ,Model-based testing ,Computer science ,Integration testing ,White-box testing ,software testing ,Abstraction model checking ,automated testing ,model checking ,Data-driven testing ,Computer Science Applications ,conformance testing ,Non-regression testing ,Test Management Approach ,Algorithm ,Software ,Information Systems - Abstract
This article presents a method for the application of model checking, i.e., verifying a finite state system against a given temporal specification, on the problem of generating test inputs. The generated test inputs allow state characterization, i.e., the identification of internal states of the software under test by observation of the input/output behavior only. A test model is derived semi-automatically from a given state-based specification and the testing goal is specified in terms of temporal logic. On the basis of these inputs, a model checking tool performs the testing input generation automatically. In consequence, the complexity of our approach is strongly depending on the input model, the testing goal, and the model checking algorithm, which is implemented in the used tool. The presented approach can be adapted with small changes to other model checking tools. It is a capable test generation method, whenever a finite state model of the software under test exists. Furthermore, it provides a descriptive view on state-based testing, which may be beneficial in other contexts, e.g., education and program comprehension.
- Published
- 2006
50. Main issues in protocol testing
- Author
-
Dieter Hogrefe
- Subjects
Computer science ,TTCN ,business.industry ,Disjoint sets ,IPv6 ,Software testing ,Embedded system ,Theory of computation ,Transmission protocol ,business ,computer ,Software ,Protocol testing ,Information Systems ,computer.programming_language ,Real-time testing - Abstract
The community of software testing and that of protocol testing are traditionally disjoint. It is seldom the case that protocol testing experts present papers at the large software testing conferences and vice versa. This raises the question about the peculiarities of protocol testing with respect to general software testing. Here we will examine those peculiarities and the consequences in terms of specific methodology developed for protocol testing.
- Published
- 2003
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.