3,535 results on '"White-box testing"'
Search Results
2. White-Box Mutation Testing of Smart Contracts: A Quick Review
- Author
-
Jmal Maâlej, Afef, Lahami, Mariam, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ben Hedia, Belgacem, editor, Maleh, Yassine, editor, and Krichen, Moez, editor
- Published
- 2024
- Full Text
- View/download PDF
3. Multtestlib: A Parallel Approach to Unit Testing in Python
- Author
-
de Alvarenga, Ricardo Ribeiro, Dias, Luiz Alberto Vieira, da Cunha, Adilson Marques, Mialaret, Lineu Fernando Stege, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Latifi, Shahram, editor
- Published
- 2023
- Full Text
- View/download PDF
4. Testing of RESTful Web APIs
- Author
-
Martin-Lopez, Alberto, Alonso, Juan C., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Troya, Javier, editor, Mirandola, Raffaela, editor, Navarro, Elena, editor, Delgado, Andrea, editor, Segura, Sergio, editor, Ortiz, Guadalupe, editor, Pautasso, Cesare, editor, Zirpins, Christian, editor, Fernández, Pablo, editor, and Ruiz-Cortés, Antonio, editor
- Published
- 2023
- Full Text
- View/download PDF
5. Role of Artificial Intelligence in Software Quality Assurance
- Author
-
Ramchand, Sonam, Shaikh, Sarang, Alam, Irtija, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
6. BLACK AND WHITE-BOX UNIT TESTING FOR WEB APPLICATIONS
- Author
-
Nataliіa Golіan, Vira Golіan, and Iryna Afanasieva
- Subjects
manual testing ,automated testing ,black-box testing ,white-box testing ,enzyme library ,react testing library ,Technology - Abstract
The types of the testing methods were analyzed from the side of development. If changes are made to the code, even minor ones, bugs can appear anywhere in the system. The cost of fixing bugs increases with the time they are discovered. Using effective web testing can prevent unexpected costs. Modern web applications are indeed a place where all the type of the testing is vital for the high-quality product. At the moment, traditional front and back office applications are increasingly moving from desktop computers to web interfaces, so testing web applications is becoming extremely relevant. Thus, learning what to automate and how is an important component of successful web application testing. Web application testing is a software practice that is designed to ensure quality by verifying that the functionality of a particular web application works correctly or according to fixed requirements. Web testing makes it possible to find bugs at any point in time, before release or on a daily basis. On the one hand there are wide range of tools that could be used to pursue this goal by means of using best decisions present for now but on the other hand there are essential advantages and disadvantages present in these tools, which are all in the approach to it, so there are always cons and pros of using one or another. For now, despite on having the ability to test using both black and white box testing it looks like the second one is not the best choice. There are several points on each board for both of them, but black box approach that is being represented with react testing library is more successful and efficient way to cover and application with high- and low-level tests, that could be easily maintained and understood. But white box testing is now the most used decision due to the historic development of the industry. So, it also has some great features and could be chosen to be used on the project, but it should be precise choice with the understanding of all the consequences standing behind.
- Published
- 2022
- Full Text
- View/download PDF
7. A Software Architecture of Test Case Tools for Object-Oriented Programs
- Author
-
de Oliveira, Assunaueny Rodrigues, Sobrinho, Alvaro, de Sousa, Reudismam Rolim, e Silva, Lenardo Chaves, de Araujo Oliveira, Helder Fernando, Perkusich, Angelo, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Latifi, Shahram, editor
- Published
- 2020
- Full Text
- View/download PDF
8. White-Box Path Generation in Recursive Programs
- Author
-
Peña, Ricardo, Sánchez-Hernández, Jaime, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Byrski, Aleksander, editor, and Hughes, John, editor
- Published
- 2020
- Full Text
- View/download PDF
9. Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
- Author
-
Levshun, Dmitry, Chechulin, Andrey, and Kotenko, Igor
- Subjects
- *
SMARTPHONES , *INTELLIGENT transportation systems , *MOBILE apps , *SECURITY systems - Abstract
Nowadays, the whole driver monitoring system can be placed inside the vehicle driver's smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the security issues in such systems can be crucial, leading to threat to human life and health. Moreover, despite the large number of security and privacy issues discovered in smartphone applications on a daily basis, there is no general approach for their automated analysis that can work in conditions that lack data and take into account specifics of the application area. Thus, this paper describes an original approach for a security and privacy analysis of driver monitoring systems based on smartphone sensors. This analysis uses white-box testing principles and aims to help developers evaluate and improve their products. The novelty of the proposed approach lies in combining various security and privacy analysis algorithms into a single automated approach for a specific area of application. Moreover, the suggested approach is modular and extensible, takes into account specific features of smartphone-based driver monitoring systems and works in conditions of lack or inaccessibility of data. The practical significance of the approach lies in the suggestions that are provided based on the conducted analysis. Those suggestions contain detected security and privacy issues and ways of their mitigation, together with limitations of the analysis due to the absence of data. It is assumed that such an approach would help developers take into account important aspects of security and privacy, thus reducing related issues in the developed products. An experimental evaluation of the approach is conducted on a car driver monitoring use case. In addition, the advantages and disadvantages of the proposed approach as well as future work directions are indicated. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. White-Box Testing Framework for Object-Oriented Programming. An Approach Based on Message Sequence Specification and Aspect Oriented Programming
- Author
-
Larrea, Martín L., Silva, Juan Ignacio Rodríguez, Selzer, Matías N., Urribarri, Dana K., Barbosa, Simone Diniz Junqueira, Editorial Board Member, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Yuan, Junsong, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Pesado, Patricia, editor, and Aciti, Claudio, editor
- Published
- 2019
- Full Text
- View/download PDF
11. The design of electronic medical records for patients of continuous care
- Author
-
Xiaolan He, Lei Cai, Shiju Huang, Xiaoju Ma, and Xueling Zhou
- Subjects
Continuous care ,Electronic medical records ,Electronic medical record system ,Black-box testing ,White-box testing ,Infectious and parasitic diseases ,RC109-216 ,Public aspects of medicine ,RA1-1270 - Abstract
In order to meet the ever-increasing needs of health care, as well as helping patients who need continuous care after being discharged from the hospital and making modern medical technology better serve humans, the design of electronic medical records for continuous care patients, especially those with malignant tumors, is investigated. In the research process, the idea of Browser/Server (B/S) framework is adopted, and the corresponding electronic medical record system is designed based on the targets and the overall structure of the system; afterward, the black-box testing and white-box testing are carried out to test the functions, reliability, and stability of the designed electronic medical record system; in addition, combined with other research results, the feasibility of the design is proved. It can be seen that the electronic medical record system designed for patients who need continuous care in the study is absolutely feasible, which can be further researched and improved with the development of electronic medical records; therefore, it would make greater contributions to both patients and hospitals in the future.
- Published
- 2021
- Full Text
- View/download PDF
12. Analysis of Security Testing Techniques.
- Author
-
Tauqeer, Omer Bin, Jan, Sadeeq, Khadidos, Alaa Omar, Khadidos, Adil Omar, Khan, Fazal Qudus, and Khattak, Sana
- Subjects
COMMUNICATIONS software ,COMPUTER software testing ,TELECOMMUNICATION systems ,APPLICATION software ,CYBERTERRORISM - Abstract
In the past decades, a significant increase has been observed in cyberattacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing for software applications and communication systems. A comprehensive review and in-depth analysis of the existing literature testing approaches has been performed to analyze their effectiveness and applicability under various scenarios. Further, we discuss various techniques used for conducting various security assessments. We follow the widely used method by Kitchenham and Charters for conducting a comprehensive systematic literature review process. Also, we propose a taxonomy for security testing techniques consisting of three main categories (Identification, Testing, and Reporting) and 17 subcategories consisting of specific security testing techniques (e.g., Black-box testing, risk assessment). Further, we assign a distinctive category from our taxonomy to each published paper in the security testing area, based on the material presented/discussed in the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. Artificial Intelligence and Collusion: A Literature Overview
- Author
-
Van Uytsel, Steven, Kono, Toshiyuki, Series Editor, Vermeulen, Erik P. M., Editorial Board Member, Hill, Claire, Editorial Board Member, Kaal, Wulf, Editorial Board Member, Corrales, Marcelo, editor, Fenwick, Mark, editor, and Forgó, Nikolaus, editor
- Published
- 2018
- Full Text
- View/download PDF
14. Tactic Program-Based Testing and Bounded Verification in Isabelle/HOL
- Author
-
Keller, Chantal, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Dubois, Catherine, editor, and Wolff, Burkhart, editor
- Published
- 2018
- Full Text
- View/download PDF
15. Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer’s Point of View
- Author
-
Dmitry Levshun, Andrey Chechulin, and Igor Kotenko
- Subjects
information security ,intelligent transportation systems ,security analysis ,privacy analysis ,white-box testing ,driver monitoring systems ,Chemical technology ,TP1-1185 - Abstract
Nowadays, the whole driver monitoring system can be placed inside the vehicle driver’s smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the security issues in such systems can be crucial, leading to threat to human life and health. Moreover, despite the large number of security and privacy issues discovered in smartphone applications on a daily basis, there is no general approach for their automated analysis that can work in conditions that lack data and take into account specifics of the application area. Thus, this paper describes an original approach for a security and privacy analysis of driver monitoring systems based on smartphone sensors. This analysis uses white-box testing principles and aims to help developers evaluate and improve their products. The novelty of the proposed approach lies in combining various security and privacy analysis algorithms into a single automated approach for a specific area of application. Moreover, the suggested approach is modular and extensible, takes into account specific features of smartphone-based driver monitoring systems and works in conditions of lack or inaccessibility of data. The practical significance of the approach lies in the suggestions that are provided based on the conducted analysis. Those suggestions contain detected security and privacy issues and ways of their mitigation, together with limitations of the analysis due to the absence of data. It is assumed that such an approach would help developers take into account important aspects of security and privacy, thus reducing related issues in the developed products. An experimental evaluation of the approach is conducted on a car driver monitoring use case. In addition, the advantages and disadvantages of the proposed approach as well as future work directions are indicated.
- Published
- 2022
- Full Text
- View/download PDF
16. The design of electronic medical records for patients of continuous care.
- Author
-
He, Xiaolan, Cai, Lei, Huang, Shiju, Ma, Xiaoju, and Zhou, Xueling
- Abstract
In order to meet the ever-increasing needs of health care, as well as helping patients who need continuous care after being discharged from the hospital and making modern medical technology better serve humans, the design of electronic medical records for continuous care patients, especially those with malignant tumors, is investigated. In the research process, the idea of Browser/Server (B/S) framework is adopted, and the corresponding electronic medical record system is designed based on the targets and the overall structure of the system; afterward, the black-box testing and white-box testing are carried out to test the functions, reliability, and stability of the designed electronic medical record system; in addition, combined with other research results, the feasibility of the design is proved. It can be seen that the electronic medical record system designed for patients who need continuous care in the study is absolutely feasible, which can be further researched and improved with the development of electronic medical records; therefore, it would make greater contributions to both patients and hospitals in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
17. White-box software test generation with Microsoft Pex on open source C# projects: A dataset
- Author
-
Dávid Honfi and Zoltán Micskei
- Subjects
Software testing ,Test generation ,Symbolic execution ,Code coverage ,White-box testing ,Computer applications to medicine. Medical informatics ,R858-859.7 ,Science (General) ,Q1-390 - Abstract
The paper presents a dataset on software tests generated using the Microsoft Pex (IntelliTest) test generator tool for 10 open source projects. The projects were selected randomly from popular GitHub repositories written in C#. The selected projects contain 7187 methods from which Pex was able to generate tests for 2596 methods totaling 38,618 lines of code. Data collection was performed on a cloud virtual machine. The dataset presents metrics about the attributes of the selected projects (e.g., cyclomatic complexity or number of external method calls) and the test generation (e.g., statement and branch coverage, number of warnings). This data is compared to an automated isolation technique in the paper Automated Isolation for White-box Test Generation [1]. To the best of our knowledge, this is the largest public dataset about the test generation performance of Microsoft Pex on open source projects. The dataset highlights current practical challenges and can be used as a baseline for new test generation techniques.
- Published
- 2020
- Full Text
- View/download PDF
18. Improving the Solar Reliability Factor of a Dual-Axis Solar Tracking System Using Energy-Efficient Testing Solutions
- Author
-
Sorin Liviu Jurj, Raul Rotar, Flavius Opritoiu, and Mircea Vladutiu
- Subjects
white-box testing ,online built-in self-test ,flying probe in-circuit testing ,jtag boundary scan ,solar trackers ,solar reliability factor ,Technology - Abstract
This paper presents an improved mathematical model for calculating the solar test factor (STF) and solar reliability factor (SRF) of a photovoltaic (PV) automated equipment. By employing a unified metrics system and a combined testing suite encompassing various energy-efficient testing techniques, the aim of this paper is to determine a general fault coverage and improve the global SRF of a closed-loop dual-axis solar tracking system. Accelerated testing coupled with reliability analysis are essential tools for assessing the performance of modern solar tracking devices since PV system malfunctioning is directly connected to economic loss, which is an important aspect for the solar energy domain. The experimental results show that the unified metrics system is potentially suitable for assessing the reliability evaluation of many types of solar tracking systems. Additionally, the proposed combined testing platform proves efficient regarding fault coverage (overall coverage of 66.35% for all test scenarios), test time (an average of 275 min for 2864 test cycles), and power consumption (zero costs regarding electricity consumption for all considered test cases) points of view.
- Published
- 2021
- Full Text
- View/download PDF
19. A Method and Tool Support for Automated Data Flow Testing of Java Programs
- Author
-
Pham, Van-Cuong, Ngoc-Hung, Pham, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Coulson, Geoff, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Jia, Xiaohua, Series editor, Zomaya, Albert, Series editor, Vinh, Phan Cong, editor, Alagar, Vangalur, editor, Vassev, Emil, editor, and Khare, Ashish, editor
- Published
- 2014
- Full Text
- View/download PDF
20. Automatic white-box testing of first-order logic ontologies.
- Author
-
Álvez, Javier, Hermo, Montserrat, Lucio, Paqui, and Rigau, German
- Subjects
FIRST-order logic ,ONTOLOGIES (Information retrieval) ,AXIOMS ,TEST methods ,REDUNDANCY in engineering ,PROGRAMMABLE controllers - Abstract
Formal ontologies are axiomatizations in a logic-based formalism. The development of formal ontologies is generating considerable research on the use of automated reasoning techniques and tools that help in ontology engineering. One of the main aims is to refine and to improve axiomatizations for enabling automated reasoning tools to efficiently infer reliable information. Defects in the axiomatization cannot only cause wrong inferences, but can also hinder the inference of expected information, either by increasing the computational cost of or even preventing the inference. In this paper, we introduce a novel, fully automatic white-box testing framework for first-order logic (FOL) ontologies. Our methodology is based on the detection of inference-based redundancies in the given axiomatization. The application of the proposed testing method is fully automatic since (i) the automated generation of tests is guided only by the syntax of axioms and (ii) the evaluation of tests is performed by automated theorem provers (ATPs). Our proposal enables the detection of defects and serves to certify the grade of suitability—for reasoning purposes—of every axiom. We formally define the set of tests that are (automatically) generated from any axiom and prove that every test is logically related to redundancies in the axiom from which the test has been generated. We have implemented our method and used this implementation to automatically detect several non-trivial defects that were hidden in various FOL ontologies. Throughout the paper we provide illustrative examples of these defects, explain how they were found and how each proof—given by an ATP—provides useful hints on the nature of each defect. Additionally, by correcting all the detected defects, we have obtained an improved version of one of the tested ontologies: Adimen-SUMO. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
21. Code coverage differences of Java bytecode and source code instrumentation tools.
- Author
-
Horváth, Ferenc, Gergely, Tamás, Beszédes, Árpád, Tengeri, Dávid, Balogh, Gergő, and Gyimóthy, Tibor
- Subjects
PROGRAMMING languages ,COMPUTER software testing ,SOURCE code ,IMPACT testing ,CIPHERS - Abstract
Many software testing fields, like white-box testing, test case generation, test prioritization, and fault localization, depend on code coverage measurement. If used as an overall completeness measure, the minor inaccuracies of coverage data reported by a tool do not matter that much; however, in certain situations, they can lead to serious confusion. For example, a code element that is falsely reported as covered can introduce false confidence in the test. This work investigates code coverage measurement issues for the Java programming language. For Java, the prevalent approach to code coverage measurement is using bytecode instrumentation due to its various benefits over source code instrumentation. As we have experienced, bytecode instrumentation-based code coverage tools produce different results than source code instrumentation-based ones in terms of the reported items as covered. We report on an empirical study to compare the code coverage results provided by tools using the different instrumentation types for Java coverage measurement on the method level. In particular, we want to find out how much a bytecode instrumentation approach is inaccurate compared to a source code instrumentation method. The differences are systematically investigated both in quantitative (how much the outputs differ) and in qualitative terms (what the causes for the differences are). In addition, the impact on test prioritization and test suite reduction—a possible application of coverage measurement—is investigated in more detail as well. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
22. Aplikasi Monitoring Peralatan, Bahan Laboratorium Menggunakan Metode Sequential Search di Laboratorium Mikrobiologi dan Genetika UNAS
- Author
-
Chairil Rohadi, Iskandar Fitri, and Nurhayati Nurhayati
- Subjects
Software ,Multimedia ,business.industry ,Process (engineering) ,Interface (computing) ,White-box testing ,Practicum ,Android (operating system) ,business ,computer.software_genre ,computer ,Linear search ,Likert scale - Abstract
The Faculty of Biology at the National University has a Microbiology and Genetics laboratory which is used for practicum activities, research, and fieldwork lectures. At the analysis stage, problems were found, namely in recording the use of equipment and materials used by students for research activities still using conventional methods, this resulted in delays in managing and conveying information. Adequate lecture facilities are an important aspect in helping the teaching and learning process. Based on the background of the problem, the author aims to make the equipment monitoring process more efficient, using Android-based devices. The author uses the Sequential search method in the process of monitoring equipment in the laboratory. This research was tested using black-box testing and white box testing by distributing questionnaires conducted using a Likert scale with a value range of 5 to 25 student correspondents with an average value for software testing = 4.6; Interface = 4.44; Software features = 4.32; item search feature = 4.08; with the final mean = 4.09.
- Published
- 2022
23. Test-Case Generation for Maude Functional Modules
- Author
-
Riesco, Adrián, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Mossakowski, Till, editor, and Kreowski, Hans-Jörg, editor
- Published
- 2012
- Full Text
- View/download PDF
24. Implementasi business intelligence dashboard untuk visualisasi data pasien posbindu ptm binaan uptd puskesmas kecamatan
- Author
-
Dini Nurmalasari and Nurzikriah Nurzikriah
- Subjects
business.industry ,Acceptance testing ,Computer science ,White-box testing ,Community participation ,Distribution pattern ,Business intelligence ,Early detection ,Operations management ,Patient data ,business - Abstract
Salah satu program di Puskesmas Kecamatan Rokan adalah Posbindu PTM (Posko Terpadu Penyakit Tidak Menular Terpadu) yang merupakan bentuk partisipasi masyarakat dalam deteksi dini, pemantauan dan tindak lanjut dini faktor risiko PTM secara mandiri dan berkesinambungan. Sasaran program ini ditujukan kepada semua masyarakat sehat dan berisiko yang berusia 15 tahun ke atas. Kegiatan PTM Posbindu ini diadakan sebulan sekali. Untuk Kecamatan Rokan IV Koto ada 10 PTM Posbindu. Setelah melakukan survei, manajemen Puskesmas Rokan IV Koto telah mengelola data pasien dengan menggunakan excel sebagai sumber pelaporan kinerja tahunan. Yang diinginkan manajemen Puskesmas Rokan IV Koto adalah mengetahui pola persebaran PTM, pasien dan pasien berisiko PTM untuk memudahkan pengambilan keputusan terkait strategi program yang akan dilakukan dan menejemen prioritas untuk penanganan pasien resiko PTM. Sistem dibangun dengan pendekatan perancangan Kimball untuk menghasilkan pemodelan multidimensi yang dapat membantu mempermudah dalam melakukan analisis data sebaran pasien, serta teknologi Framework CodeIgniter, PHP sebagai bahasa pemrograman dan MySQL sebagai DBMS. Sistem ini diuji menggunakan pengujian black box dan user acceptance test (UAT). Berdasarkan user acceptance test (UAT) yang telah dilakukan menunjukkan bahwa 88% sistem yang dibangun telah diterima oleh pengguna dan pengujian black box menunjukkan bahwa fungsinya sudah berjalan 100%. Hasil dari pengujian tersebut menunjukan bahwa system yang dibangun telah dapat dimengerti cara kerjanya oleh calon pengguna di Puskesmas Kecamatan Rokan dan sesuai dengan kebutuhan bisnis proses Puskesmas Kecamatan Rokan.
- Published
- 2021
25. SISTEM PAKAR DIAGNOSA KERUSAKAN MOTOR KAWASAKI KLX150 MENGGUNAKAN METODE CASE-BASED REASONING DENGAN ALGORITMA 3W-JACCARD
- Author
-
Mohammad Reza Faisal, Fatma Indriani, and Akhmad Rezki Purnajaya
- Subjects
Phrase ,Voice search ,Computer science ,business.industry ,media_common.quotation_subject ,White-box testing ,Regional language ,computer.software_genre ,Literacy ,language.human_language ,Indonesian ,Statistical inference ,language ,Conversation ,Artificial intelligence ,business ,computer ,Natural language processing ,media_common - Abstract
Banjar language used in conversation and daily life around the area. So foreigners who come to the regions of South Kalimantan will have difficulty in communicating. Besides, most local residents in the backwoods of South Kalimantan can not use Indonesian language properly, they would be more convenient to use regional language to interact. For that reason we need an Android application can help users to find the translation of a word or phrase whenever and wherever. With the help of Google Voice Search, this application can also listen to the voice of the user to be converted into text and insert into the input translation. Speech recognition of Banjar language required a literacy training data by using the method of statistical inference to make results appropriated. Testing using method of Black Box Testing to measure the percentage of suitability of the results of translation, speech recognition for Indonesian language and speech recognition Banjar language using method of Statistical inference. So the results of translation accuracy 100% and accuracy of speech recognition Indonesian language and Banjar language by 97.85% and 82.74%.
- Published
- 2021
26. IMPLEMENTASI GAME PERMAINAN TIMUN EMAS BERBASIS ANDROID
- Author
-
Agung Setiadi
- Subjects
Positive response ,Folklore ,White-box testing ,Media studies ,Sociology ,Interview methods ,Indigenous culture ,Android (operating system) ,Theme (narrative) - Abstract
This research was conducted on the basis of helping children to get to know about folklore in Indonesia. In addition, this study was conducted to help children in learning the moral values that exist in folklore. This research was conducted by creating an android-based game application with the theme of Gold Cucumber folklore. Children in Indonesia today have begun to forget the cultures that exist in their own country. One of the causes is the influx of foreign cultures that are becoming increasingly popular and starting to erode the indigenous culture of Indonesia. Therefore, the author created an android-based folklore-themed game application so that children can be interested in one of Indonesia's existing cultures. The app was tested using the black box method and the benefits of the application were studied using questionnaire and interview methods. After the application passed in black box testing, the application was tested and received a positive response from existing questionnaires and interviews. With the results of existing research, it can be concluded that this application can carry out its duties to help children in introducing folklore culture and educating moral values well.
- Published
- 2021
27. Mengenal Aksara Bali: Balinese Script game education based on mobile application
- Author
-
Christina Purnama Yanti, Gede Indrawan, Daniel Eka Saputra, and I Gede Andika
- Subjects
Computer science ,White-box testing ,Screenwriting ,Governor ,Construct (philosophy) ,Visual arts - Abstract
Balinese Scriptwriting, as one of Balinese cultural richness, is going to extinct because of its decreasing use. Governor of Bali, I Wayan Koster, expressed concern about the increasingly diminishing interest of the community, especially among the younger generation using it. This research focused on the development of a Balinese Script game education based on a mobile application called Mengenal Aksara Bali. In this research area, Mengenal Aksara Bali offered a solution as an application that is not only for playing,but also provided features for learning Balinese Script glyphs (Aksara Wresastraand numbers). Mengenal Aksara Bali was implemented by using Construct2(a powerful game creator designed especially for 2D games). Through Black Box testing, its functions in the application wasrunning as expected
- Published
- 2021
28. Sistem Pengelolaan Data Pesanan dan Servis Jok Berbasis Web Menggunakan Metode RAD
- Author
-
Aris Tri Jaka Harjanta, Rahmat Robi Waliyansyah, and Edi Dwi Supratiyan
- Subjects
Service (systems architecture) ,Service system ,Database ,business.industry ,Computer science ,Data management ,Interface (computing) ,White-box testing ,computer.software_genre ,Rapid application development ,Software ,White box ,business ,computer - Abstract
Toko Romeo Jok adalah toko mebel yang menjual berbagai jenis mebel dan menyediakan jasa servis segala jenis mebel yang berada di Kabupaten Pati. Toko Romeo Jok masih menggunakan pendataan data pesanan dan servis secara manual maka terjadi masalah kurang terorganisirnya data pesanan dan servis, dan data mudah untuk hilang. Sehingga diperlukan sebuah sistem pengelolaan data yang dapat menyimpan dan menyajikan data pesanan dan servis secara akurat, efektif, dan efisien. Pembangunan sistem pengelolaan data pesanan dan servis berbasis web ini bisa digunakan Toko Romeo Jok untuk mengelola data pesanan dan servis secara cepat, mudah, dan akurat. Pada tahap perancangan sistem ini memgunakan metode pengembangan Rapid Application Development (RAD), yaitu metode yang menyediakan pengembangan yang cepat dan mendapatkan hasil yang bagus . Sistem pengelolaan data pesanan dan servis jok berbasis web ini di buat menggunakan bahasa pemograman PHP dan mengunakan software xampp dan text editor seperti sublime text, pembuatan desain sistem menggunkan draw.io, basis data nya menggunakan MySQL. Berdasarkan Hasil UAT dari aspek penilaian antar muka mendapat persentase 82% dari aspek penilaian kemudahan pengoperasional mendapatkan presentase 84% dan dari aspek kemanfaatan isi sistem ini mendapat persentase 83%. Sistem ini terbukti layak digunakan karena pada hasil pengujian white box dan black box keduanya mendapat hasil persentase 100%.
- Published
- 2021
29. PENGEMBANGAN SISTEM INFORMASI DIRECT DEBIT DONOR PROGRAMME (DDDP) DENGAN PENDEKATAN INCREMENTAL LIFE CYCLE MODEL (STUDI KASUS LEMBAGA KONSERVASI LINGKUNGAN DI JAKARTA)
- Author
-
Achmad Hindasyah, Tukiyat Tukiyat, and Suwarjono Bausir
- Subjects
Direct debit ,Data collection ,Process management ,business.industry ,Computer science ,Data management ,White-box testing ,Unified Modeling Language ,Donation ,Information system ,Incremental build model ,business ,computer ,computer.programming_language - Abstract
Direct Debit Donor Programme (DDDP) is a donation program for individuals who are interested in taking part in social activities by direct debit of donations through bank accounts or credit cards which are commonly referred to as supporters or donors. Management of a structured and integrated information system with a good database concept will support a more effective and efficient performance. This study aims to analyze and develop the DDDP information system as a solution for supporter donation data management in increasing time efficiency. Information system development is carried out in stages starting from the need for basic functions in accordance with the development stages with the Incremental model, namely Requirements, Specifications, Architecture Design, Code and Test. modeling system development using the Unified Modeling Language (UML). Data collection was carried out through observation, direct interviews with related parties, viewing documents that were related to the research being carried out and conducting literature reviews. Functional testing on the system uses the black box testing method with the test results not found any errors in the system. The result of this research is a supporter donation data management information system which is named DDDP Application System.
- Published
- 2021
30. Takuan: A Tool for WS-BPEL Composition Testing Using Dynamic Invariant Generation
- Author
-
Palomo-Duarte, Manuel, García-Domínguez, Antonio, Medina-Bulo, Inmaculada, Alvarez-Ayllón, Alejandro, Santacruz, Javier, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Benatallah, Boualem, editor, Casati, Fabio, editor, Kappel, Gerti, editor, and Rossi, Gustavo, editor
- Published
- 2010
- Full Text
- View/download PDF
31. An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method
- Author
-
Shao, Danhua, Khurshid, Sarfraz, Perry, Dewayne E., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Cavalcanti, Ana, editor, and Dams, Dennis R., editor
- Published
- 2009
- Full Text
- View/download PDF
32. Enhancing WS-BPEL Dynamic Invariant Generation Using XML Schema and XPath Information
- Author
-
Palomo-Duarte, Manuel, García-Domínguez, Antonio, Medina-Bulo, Inmaculada, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Gaedke, Martin, editor, Grossniklaus, Michael, editor, and Díaz, Oscar, editor
- Published
- 2009
- Full Text
- View/download PDF
33. Sistem Informasi Cargo Documentation Gudang Finished Goods Divisi Wafer PT.Mayora Indah Tbk
- Author
-
Giandari Maulani, Era Era Hia, and Geri Yansyah
- Subjects
Data collection ,Documentation ,Database ,Unified Modeling Language ,Mobile phone ,Process (engineering) ,Computer science ,White-box testing ,Control (management) ,Information system ,computer.software_genre ,computer ,computer.programming_language - Abstract
PT. Mayora Indah Tbk is a company engaged in the industry that produces food and beverage products, warehouse wafer division which is one of the places to store, or arrange stock of goods from the production, or activities for the management of incoming and outgoing goods needed control in its movement activities. The current process on the documentation of goods cargo often occurs input errors no. police or truck containers, the use of mobile phone memory storage for photo files, convoluted processes, prone to loss of photo evidence files, difficulty finding data evidence files if there are complaints from the expedition, as well as on employees checkers and helpers do not know the history of the data report. Therefore, a web-based application system is needed to facilitate the search of photo data if there are complaints from the expedition, neat and regular storage of photo data, and for all employees to know the history and report of the photo data. To build this application using data collection methods namely observation, interviews and library studies, analysis methods using PIECES, system design using UML (Unified Modeling Language), and testing using Black Box Testing, while the programming language used is PHP with sublime text editor, as well as for databases using MySQL. With this system for the photo documentation process facilitates the ongoing process, and the management of data reports more regularly.
- Published
- 2021
34. Early Warning System and Monitoring of River Water Quality Based on Internet of Things
- Author
-
Purnomo Yustianto, Vito Hafizh Cahaya Putra, and Mokhamad Hendayun
- Subjects
Transport engineering ,Officer ,business.industry ,Computer science ,White-box testing ,Waterfall model ,Early warning system ,Social media ,The Internet ,business ,Test (assessment) ,Likert scale - Abstract
River conditions in Bandung City are currently in critical condition. This study aims to create an early warning system and monitoring of river water quality based on the Internet of Things in the hope that early warnings sent through the telegram application belonging to the Bandung City DLHK officer and the Twitter social media website, can inform the Bandung City DLHK officer that a river is in a polluted condition and the officer can immediately go to the location of river water to carry out mitigation, and give warnings to the community. The research method used using the waterfall method which consists of: needs analysis, system design, implementation, testing, and maintenance with sequential implementation. Data collection methods were carried out in several ways, namely: interviews, giving questionnaires, and literature studies used in this study sourced from books, journals, seminar presentations, and the internet as references in the research conducted. Based on the research that has been carried out, the following test results are obtained: black box testing is carried out in accordance with those contained in the test plan with the results of each test having valid results. The results obtained from the user acceptance test which are calculated using the Likert scale have an average value of 86.94% which fall into the category of strongly agree, and there are three guidelines which are a follow-up to the output of the early warning system that can be carried out either by the Environmental Service. and Cleanliness (DLHK) of Bandung City and the community.
- Published
- 2021
35. Implementasi Sistem Informasi Berbasis QR Code Guna Mencegah Kerumunan dalam Antrian Wisuda
- Author
-
Sejati Waluyo, Dani Anggoro, and Dolly Virgian Shaka Yudha Sakti
- Subjects
Crowds ,Multimedia ,Event (computing) ,Computer science ,White-box testing ,Code (cryptography) ,Information system ,Adaptation (computer science) ,computer.software_genre ,computer ,Graduation ,Test (assessment) - Abstract
Graduation is an inauguration event for students who have completed their studies at university. This event was attended by many people in the room. The Covid-19 pandemic requires us to adapt to being new normal, as well as graduation events. Events cannot be held as usual because everyone must follow health protocols, such as maintaining distance between people and not gathering indoors. Online graduation can be a solution, but in-person graduation is more expected by students and parents. The purpose of this study is to implement a QR Code-based information system to prevent indoor crowds and manage graduation queues. The method used in building the system is a prototype model with stages, namely analyzing data, designing the system using UML diagrams, coding using the PHP Native programming language and testing using Black Box Testing. The result of this research is a web-based application that can read QR Code from students. The test results show that the application created can be a solution in holding graduation directly during the adaptation period of new habits during the Covid-19 pandemic.
- Published
- 2021
36. Aplikasi Sistem Pelayanan Administrasi Persuratan Masyarakat di Kantor Desa Cihampelas Kab. Bandung Barat
- Author
-
Meilani Anggraeni, Mamay Syani, and Ade Yuliana
- Subjects
laravel framework ,Service (systems architecture) ,Database ,business.industry ,Process (engineering) ,Computer science ,White-box testing ,correspondence administration services ,Usability ,Information technology ,QA75.5-76.95 ,T58.5-58.64 ,computer.software_genre ,Software ,Unified Modeling Language ,Acceptance testing ,Electronic computers. Computer science ,user acceptance test ,Needs analysis ,prototype ,business ,computer ,mysql ,computer.programming_language - Abstract
Correspondence administration service activities in the Cihampelas Village Office, West Bandung Regency are still manual with submission forms, approval processes and data recapitulation that have not been stored properly. Time and location constraints and services that often cannot be resolved in one day are problems for people who need fast services. These problems need to be handled quickly to improve excellent service for the local community, so based on the results of interviews with the manager, an application is needed to simplify the letter-making process. The system development method used to make this software uses the Prototype method with stages arranged starting from the requirements collection which contains the stages in the needs analysis, followed by design to testing with the black box testing method. The application is made based on a website using the Laravel framework, MySQL as the database. Based on the results of testing the satisfaction level of application usability through the User Acceptance Test (UAT), the percentage results were 87% of the total 25 user respondents and 3 admin respondents, which concluded that the application built had fulfilled system functionality and was running according to the requirements of the user
- Published
- 2021
37. Implementasi Blackbox Testing Pada Aplikasi Real-Time Thermal Video Detection (Studi Kasus Deteksi Demam/Covid-19)
- Author
-
Aditya Hidayat Pratama, Aditya Galih Sulaksono, and Kukuh Yudhistiro
- Subjects
Thermal sensors ,Software ,Coronavirus disease 2019 (COVID-19) ,business.industry ,Computer science ,Video detection ,Histogram ,White-box testing ,Real-time computing ,Tracing ,business - Abstract
Seiring munculnya pandemi Covid-19 yang vaksinnya belum tersebar secara merata, seluruh negara di dunia khususnya Indonesia telah melakukan beberapa langkah preventif guna menghambat penyebaran virus tersebut. Salah satu tindakan awal adalah melakukan deteksi setiap orang yang keluar masuk ke dalam negeri melalui bandara maupun transportasi darat. Tindakan dini tersebut dilakukan dengan mendeteksi suhu tubuh dari warga yang melalui lokasi-lokasi keluar masuk seperti bandara udara, dan stasiun kereta api. Deteksi pada umumnya dilakukan menggunakan thermal gun berbentuk alat tembak infrared yang diarahkan ke individu yang melewati pemeriksaan. Pada riset ini dibahas rangkaian alat yang terdiri dari kamera dengan sensor thermal dimana data hasil capture akan diolah melalui perangkat lunak yang menampilkan histogram suhu bagian dada hingga kepala seseorang secara realtime. Setiap hasil capture digunakan sebagai dataset yang dapat digunakan untuk kebutuhan tracing pengunjung tempat publik. Pada riset ini akan membahas pengujian fungsional (blackbox) dari aplikasi thermal video detection pada studi kasus deteksi demam.
- Published
- 2021
38. Application Design For Office Stationary Inventory Management Based On Vb.Net At PT. Hunu Osias Padmada Eara Karawang
- Author
-
Indaryono Indaryono, Yeny Rostiani, and Ratna Furi Handayani
- Subjects
Software ,business.industry ,Computer science ,White-box testing ,Waterfall model ,Information system ,Data dictionary ,Software engineering ,business ,User requirements document ,Microsoft Visual Studio ,Coding (social sciences) - Abstract
The availability of office stationery is very important to make the required work smooth. In order for ATK management to be handled properly, an application is needed to manage ATK inventory data using a technology-based information system so that it becomes a complete information system. The method used by the author in conducting this research is the Waterfall model system development method starting from the specification of user requirements, planning, modeling, and coding. The method of specification of user requirements includes interviews, observations, literature studies, and documentation studies. The planning method includes the tasks to be carried out including the risks that may occur and the work schedule. Modeling methods include the design of flow documents, DFD, data dictionary, and ERD. The coding includes a program designer with the VB.Net programming language with SQL Server 2008 database and application testing using black box testing, namely this test is intended to determine whether the functions, inputs and outputs of the software are in accordance with the required specifications. To simplify reporting and recording so that errors do not occur, it is necessary to design and implement a system that can facilitate inter-related functions within the company by using Microsoft Visual Studio 2010 (VB.Net) and Microsoft SQL Server 2008. With the implementation of this system, it is expected will be useful for the company in its operations in the future.
- Published
- 2021
39. Generating Unit Tests from Formal Proofs
- Author
-
Engel, Christian, Hähnle, Reiner, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Gurevich, Yuri, editor, and Meyer, Bertrand, editor
- Published
- 2007
- Full Text
- View/download PDF
40. МОДУЛЬНЕ ТЕСТУВАННЯ БІЛОЇ ТА ЧОРНОЇ СКРИНЬКИ ДЛЯ ВЕБ ЗАСТОСУВАНЬ
- Subjects
бібліотека enzyme ,метод чорної скриньки ,ручне тестування ,метод білої скриньки ,react testing library ,enzyme library ,бібліотека тестування react ,white-box testing ,автоматизоване тестування ,automated testing ,manual testing ,black-box testing - Abstract
The types of the testing methods were analyzed from the side of development. If changes are made to the code, even minor ones, bugs can appear anywhere in the system. The cost of fixing bugs increases with the time they are discovered. Using effective web testing can prevent unexpected costs. Modern web applications are indeed a place where all the type of the testing is vital for the high-quality product. At the moment, traditional front and back office applications are increasingly moving from desktop computers to web interfaces, so testing web applications is becoming extremely relevant. Thus, learning what to automate and how is an important component of successful web application testing. Web application testing is a software practice that is designed to ensure quality by verifying that the functionality of a particular web application works correctly or according to fixed requirements. Web testing makes it possible to find bugs at any point in time, before release or on a daily basis. On the one hand there are wide range of tools that could be used to pursue this goal by means of using best decisions present for now but on the other hand there are essential advantages and disadvantages present in these tools, which are all in the approach to it, so there are always cons and pros of using one or another. For now, despite on having the ability to test using both black and white box testing it looks like the second one is not the best choice. There are several points on each board for both of them, but black box approach that is being represented with react testing library is more successful and efficient way to cover and application with high- and low-level tests, that could be easily maintained and understood. But white box testing is now the most used decision due to the historic development of the industry. So, it also has some great features and could be chosen to be used on the project, but it should be precise choice with the understanding of all the consequences standing behind., Види методів тестування були проаналізовані з боку розробки. Якщо в код вносяться зміни, навіть незначні, помилки можуть виникнути будь-де системі. Вартість виправлення помилок зростає з часом їх виявлення. Використання ефективного веб тестування може запобігти непередбаченим витратам. Сучасні веб застосування дійсно є місцем, де весь тип тестування є життєво важливим для якісного продукту. На даний момент традиційні фронт та бек-офісні програми все частіше переходять з настільних комп’ютерів на веб інтерфейси, тому тестування веб застосувань стає вкрай актуальним. Таким чином, вивчення того, що і як автоматизувати, є важливим компонентом успішного тестування веб застосувань. Тестування веб застосувань є практикою програмного забезпечення, яка призначена для забезпечення якості за рахунок перевірки того, що функціональні можливості певного веб програми працюють правильним чином або відповідно до зафіксованих вимог. Веб тестування дає можливість знаходити помилки в будь-який час, до релізу або щодня. З одного боку, є широкий спектр інструментів, які можна було б використовувати для досягнення цієї мети за допомогою використання найкращих рішень, присутніх на даний момент, але з іншого боку, є суттєві переваги і недоліки, присутні в цих інструментах, які всі в підході до нього, тому завжди є мінуси і плюси використання того чи іншого. Поки що, незважаючи на можливість тестування з використанням як чорної, так і білої скриньки, останній метод має багато недоліків та не рекомендується до використання. Ці два методи мають місце бути у окремих проєктах, але підхід чорної скриньки, який представлений бібліотекою тестування React є найбільш успішним і ефективним способом покрити і застосування з високими і низькими тестами, які можна легко підтримувати і розуміти. Але тестування білої скриньки в даний час є найбільш вживаним рішенням у зв’язку з історичним розвитком галузі. Отже, воно також має деякі позитивні риси і може бути обрано, щоб бути використаним на проєкті, але повинно бути точним вибором з розумінням всіх наслідків, що за ним слідують.
- Published
- 2022
41. Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer’s Point of View
- Author
-
Igor Kotenko, Dmitry Levshun, and Andrey Chechulin
- Subjects
Computer Systems ,Privacy ,Humans ,information security ,intelligent transportation systems ,security analysis ,privacy analysis ,white-box testing ,driver monitoring systems ,smartphone sensors ,Smartphone ,Electrical and Electronic Engineering ,Mobile Applications ,Biochemistry ,Instrumentation ,Computer Security ,Atomic and Molecular Physics, and Optics ,Analytical Chemistry - Abstract
Nowadays, the whole driver monitoring system can be placed inside the vehicle driver’s smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the security issues in such systems can be crucial, leading to threat to human life and health. Moreover, despite the large number of security and privacy issues discovered in smartphone applications on a daily basis, there is no general approach for their automated analysis that can work in conditions that lack data and take into account specifics of the application area. Thus, this paper describes an original approach for a security and privacy analysis of driver monitoring systems based on smartphone sensors. This analysis uses white-box testing principles and aims to help developers evaluate and improve their products. The novelty of the proposed approach lies in combining various security and privacy analysis algorithms into a single automated approach for a specific area of application. Moreover, the suggested approach is modular and extensible, takes into account specific features of smartphone-based driver monitoring systems and works in conditions of lack or inaccessibility of data. The practical significance of the approach lies in the suggestions that are provided based on the conducted analysis. Those suggestions contain detected security and privacy issues and ways of their mitigation, together with limitations of the analysis due to the absence of data. It is assumed that such an approach would help developers take into account important aspects of security and privacy, thus reducing related issues in the developed products. An experimental evaluation of the approach is conducted on a car driver monitoring use case. In addition, the advantages and disadvantages of the proposed approach as well as future work directions are indicated.
- Published
- 2022
- Full Text
- View/download PDF
42. Decision-Making Optimization Design of Enterprise Standardization Management Planning Based on Mobile Network System
- Author
-
Jianjun Wang, Qiao Wang, and Shenlin Ye
- Subjects
Online and offline ,Technology ,Article Subject ,Standardization ,Computer Networks and Communications ,Computer science ,020209 energy ,White-box testing ,System testing ,020206 networking & telecommunications ,TK5101-6720 ,02 engineering and technology ,Industrial engineering ,Data flow diagram ,Product life-cycle management ,Telecommunication ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Electrical and Electronic Engineering ,Cluster analysis ,Information Systems - Abstract
With the continuous deepening of enterprise management and market competition, the pressure of production and operation of enterprises is increasing, and it is urgent to improve the management level of enterprises. This paper mainly studies the decision optimization design of enterprise standardization management planning based on mobile network system. In this paper, the idea of clustering is used to integrate the customers into a customer clustering mode, which will greatly reduce the number of customers studied in the model and simplify the optimization process of the model. Through online and offline processes, these can achieve dynamic and rapid processing of data flow and can well meet the needs of users for data flow analysis. In the construction of enterprise standardization strategic performance evaluation index system, it is necessary to decompose, combine, and converge the index system. According to the construction principles and methods discussed above, the influencing factors of standardized strategic performance evaluation indicators of construction enterprises are preliminarily stratified by using the expert survey method and cluster analysis method, so as to construct the initial evaluation system. For the mobile network system testing, we use the black box test and white box test. The test content mainly includes two modules: area calculation and label calculation. Experimental data show that when the time threshold Ts is set to 1 hour, the prediction accuracy of TBM increases from 46.9% to 47.7%. The results show that the mobile network system realizes the whole life cycle management of enterprise standards and improves the management level of enterprise standardization work.
- Published
- 2021
43. Pengembangan Aplikasi Pembelajaran dengan Menerapkan Model Pembelajaran Teams-Games-Tournament (TGT)
- Author
-
Anita Rizky Agustina, Fitra A. Bachtiar, and Fajar Pradana
- Subjects
Class (computer programming) ,Computer science ,Process (engineering) ,White-box testing ,k-means ,Functional requirement ,Black-box testing ,Engineering (General). Civil engineering (General) ,model pembelajaran ,teams-games-tournament ,Waterfall model ,Mathematics education ,TA1-2040 ,Cluster analysis ,Requirements analysis ,waterfall ,clustering - Abstract
UPT SMP Negeri 6 Gresik adalah salah satu lembaga pendidikan yang menerapkan model pembelajaran Teams-Games-Tournament (TGT) dalam kegiatan belajar-mengajar di kelas. Model pembelajaran TGT dapat membantu siswa dalam memahami materi pelajaran dengan mengandalkan teman sebagai tutor sebaya dan memanfaatkan unsur permainan di dalamnya. Model pembelajaran yang diterapkan saat ini memiliki beberapa kendala, di antaranya guru membentuk kelompok secara konvensional, yang dapat mengurangi jam belajar-mengajar di kelas. Pembentukan kelompok secara konvensional memungkinkan pembagian kelompok yang tidak merata, yaitu terdapat kelompok yang terdiri atas siswa yang memiliki nilai unggul saja atau rendah saja. Selain itu, guru membuat papan permainan berupa Teka-Teki Silang (TTS) secara konvensional. Papan permainan dibuat sebelum penyampaian materi diberikan dan dibuat juga sejumlah materi dan kelompok yang ada. Fitur pengelompokan dikembangkan dengan menerapkan algoritme k-means clustering. Proses pengembangan sistem ini menerapkan model pengembangan waterfall dan framework CodeIgniter. Analisis kebutuhan yang dilakukan untuk aplikasi ini menghasilkan empat aktor, 37 kebutuhan fungsional, dan satu kebutuhan nonfungsional. Pengujian dilakukan dengan menggunakan teknik blackbox testing dan whitebox testing.
- Published
- 2021
44. Automated Black- and White-Box Testing of RESTful APIs With EvoMaster
- Author
-
Andrea Arcuri
- Subjects
Representational state transfer ,Application programming interface ,business.industry ,Computer science ,computer.internet_protocol ,White-box testing ,RESTful APIs ,Testing ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Test case ,Software bug ,Programming interfaces ,Test cases ,Computer bugs ,Software testing ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Web service ,Software engineering ,business ,computer ,Software - Abstract
RESTful APIs are very popular in industry, especially when developing enterprise systems using a microservice architecture. Testing such APIs is challenging, as tests will be composed of not only HTTP calls, but also settings of the environment, like databases. Different blackbox testing techniques have been shown to easily find real faults in many RESTful APIs, with very little human effort from software engineers. However, whitebox techniques could lead to much better results, although having an up-front cost for the engineers. In this paper, we report on the use of the open-source tool EvoMaster, on eight RESTful APIs. We show how EvoMaster can be used to automatically generate test cases that can find several bugs, even when using a naive blackbox approach. When enhancing the search with whitebox information, significantly better results are achieved. However, there are several challenges that need to be taken into account when an engineer wants to use a tool such as EvoMaster to test their projects. This work is funded by the Research Council of Norway (project on Evolutionary Enterprise Testing, grant agreement No 274385).
- Published
- 2021
45. Rancang Bangun Sistem Informasi Geografis Pemetaan lokasi dan spesifikasi Hotel di Kota Palopo Berbasis Website
- Author
-
Hardiana Hardiana and Akramunisa Akramunisa
- Subjects
World Wide Web ,Geographic information system ,Data collection ,business.industry ,Interface (Java) ,White-box testing ,Waterfall model ,business ,Host (network) ,Tourism ,Field (geography) - Abstract
Palopo as one of the cities in South Sulawesi Province that is developing, especially in the field of tourism as conveyed by Andi Enceng as the Tourism Cadre of Palopo City, then Palopo was also appointed as the host of national activities such as national seminars of universities and international conference ICONSS. This makes many tourists who visit not only want to enjoy the beauty of nature, culture and so on but also to attend national activities carried out in palopo city, so that facilities and infrastructure related to lodging is needed in palopo city such as one of them is a hotel. However, information about the location of the inn is still not widely known. The information they get is less accurate in terms of geography, of course the limitations of information will be an obstacle for people who want to travel, especially for those who live outside palopo city to find information on the location of a nearby hotel location. The purpose of this research is to create a design of geographic information system mapping location and specifications of hotels in palopo city basedwebsite design interface and database system, make the system in accordance with the design that has been created and implement the system that has been created and conduct tests on the system. In data collection, the authors used methods of literature studies, observations and interviews. Meanwhile, in the development of the author's system using research and development method refers to the waterfall model. The software used is sublime text as text editor, PHP as programming language, MySQL for database management and xampp as its server. Testing techniques used in this system is black box testing techniques, Based on the tests that have been done that the design of geographic information system mapping location and specifications of hotels in the city of Palopo based website is feasible and in accordance with the required functions. The expected results in this study design this website provides all the data related to hotels in palopo city and has been adjusted in advance so as to facilitate parties in operating the system.
- Published
- 2021
46. RANCANG BANGUN SISTEM INFORMASI KONSULTASI DAN PENJADWALAN FISIOTERAPI PENYAKIT BELL’S PALSY (STUDI KASUS KLINIK GRIYA FISIOTERAPIS)
- Author
-
Rejalana Bayu Kurniawan Kurniawan
- Subjects
Computer science ,business.industry ,White-box testing ,Operations management ,Usability ,Permanent disability ,Score interpretation ,business ,Test (assessment) ,Rational Unified Process - Abstract
Bell's palsy is an acute paralysis of the prifer facial nerve of unknown cause and results in permanent disability ifnot treated properly. In this study, Development of Consultation Information System Scheduling Bell’s Palsy Diseasewas designed and built which can help in overcoming physiotherapy scheduling as well as recording medicalrecords, so that they can be well controlled and coordinated. The development method in information systems isdesigned using the RUP (Rational Unified Process) method, where testing using the RUP method is carried out usingblack box testing and using usability (questionnaires). In black box testing, the result is 1, which means that allfeatures are running correctly. In the usability test, the results obtained were 92.30% which was stated relativelyfeasible because the test was carried out on a physiotherapist, and 87.03% which was carried out with 30respondents who met the usability standard referred to in table I, namely the table of score interpretation criteriaor declared "Very Feasible", so the RUP method is a good method for system development.Kata Kunci: Metode Rational Unified Process, RUP, Sistem Informasi, Website, Klink Griya Fisioterapis
- Published
- 2021
47. Sistem Informasi Keuangan Pada Pt Total Lintas Samudera
- Author
-
Ayu Gede Willdahlia
- Subjects
Transport engineering ,Schedule (workplace) ,Work (electrical) ,Computer science ,White-box testing ,Information system ,Customer service ,Systems design ,Scenario testing ,Test (assessment) - Abstract
PT Total Lintas Samudera is a company engaged in Logistics & domestic and international shipping services. At PT Total Lintas Samudera, reports are still made separately between the customer service and accounting divisions with a single entry or made per division and are not connected in one system. Between expenditure data and financial reports have not been connected in one system, which causes it to be unable to generate reports automatically. This makes the company work less effectively and efficiently, which results in the slow preparation of reports. For this reason, an information system is designed and built to manage web-based financial reports to make it easier to present reports more efficiently—design and Build of Financial Information System PT. Total Ocean Crossing begins with collecting data, and then from that data, functional and non-functional analysis can be carried out. After that, do the design, prepare black box testing test scenarios, determine the schedule of activities, implement the system, and finally do system testing—financial Information System PT. Total Lintas Samudera has two user levels, namely admin and leadership. The test results found that the test was by the system design, and everything could work as expected.
- Published
- 2021
48. Design of Information System For SPP Payment In Politeknik Hasnur Using Framework Codeigniter 3
- Author
-
Abdullah Ardi and Ainun Jariah
- Subjects
business.industry ,Computer science ,Interface (Java) ,media_common.quotation_subject ,White-box testing ,Payment system ,Tuition payments ,Payment ,Data flow diagram ,Information system ,Systems design ,Software engineering ,business ,media_common - Abstract
The tuition fee payment system is a mechanism for transferring funds charged to students for educational institutions to expedite the lecture process in terms of learning and teaching. Design of an SPP Payment Information System at Hasnur Polytechnic Using the Codeigniter 3 Framework was created using the programming language PHP, codeigniter framework 3 and database MySQL. This application was made in order to facilitate the financial section for managing payment data and students can find out the tuition payments they have made and will be paid. The research method uses a waterfall from the analysis stage to application testing. Then the system design is carried out using DFD (Data Flow Diagram) and design is interface also done at this stage. Furthermore, writing the program code is done using the PHP programming language and the codeigniter framework. Then the results of the study were tested using the method black box testing. The test results state that the program is in accordance with the described functional require.
- Published
- 2021
49. Can computer forensic tools be trusted in digital investigations?
- Author
-
Ali Alzahrani, Mohamad Ahtisham Wani, and Wasim Ahmad Bhat
- Subjects
File system ,Exploit ,Computers ,Computer science ,White-box testing ,Forensic Sciences ,010401 analytical chemistry ,Computer forensics ,Forensic Medicine ,Computer security ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Pathology and Forensic Medicine ,Task (project management) ,03 medical and health sciences ,0302 clinical medicine ,Digital evidence ,Humans ,Crime scene ,Crime ,030216 legal & forensic medicine ,computer - Abstract
This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs.
- Published
- 2021
50. Sistem Pendukung Keputusan Kelayakan Klaim Asuransi Menggunakan Metode AHP
- Author
-
Abdullah Izzul Islam, Nono Heryana, and Asep Jamaludin
- Subjects
Business Process Model and Notation ,Software development process ,Decision support system ,Process management ,Computer science ,business.industry ,White-box testing ,Analytic hierarchy process ,General Medicine ,Business process modeling ,business ,Financial services ,Rapid application development - Abstract
Insurance growth in Indonesia has recently experienced a pretty good increase, this is evidenced by the statistics of IKNB (Non-Bank Financial Industry) issued by the OJK (Financial Services Authority) in February 2020. In December 2018 the number of IKNB actors was 1260 and then increased every month until December 2019 IKNB actors totaled 1330. From these data IKNB actors experienced a pretty good increase, where insurance is included in the industry. With so many IKNB actors PT. SICO Andalan Utama, which is one of the companies engaged in the industry, is feeling the improvement. However, with this increase, insurance management, specifically claims management, is needed because caution is needed when deciding on a claim worthiness decision. So to overcome these problems this is what underlies the authors to propose the development of a Decision Support System for Insurance Claim Feasibility which will later be expected to avoid or at least reduce inaccuracies in determining the eligibility of a claim. This Decision System for Claims Feasibility Decision Support System was developed using the Rapid Application Development (RAD) system development methodology as a path for developing the system. Whereas the DSS modeling uses the Analytical Hierarchy Process (AHP) model. And also uses several Unified Modeling Language (UML), Business Process Modeling Nation (BPMN), and Entity Relationship Diagram (ERD) tools for analysis and design. In implementing the system the author uses PHP as a programming language and MySQL as a Database. The testing method uses White Box Testing, Black Box Testing and Usability Testing approaches. By implementing this system, it is expected to provide the right claim eligibility decisions.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.