CINXE.COM

Search results for: NIST test suite

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: NIST test suite</title> <meta name="description" content="Search results for: NIST test suite"> <meta name="keywords" content="NIST test suite"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="NIST test suite" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="NIST test suite"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 9335</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: NIST test suite</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9335</span> Statistical Randomness Testing of Some Second Round Candidate Algorithms of CAESAR Competition</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fatih%20Sulak">Fatih Sulak</a>, <a href="https://publications.waset.org/abstracts/search?q=Bet%C3%BCl%20A.%20%C3%96zdemir"> Betül A. Özdemir</a>, <a href="https://publications.waset.org/abstracts/search?q=Beyza%20Bozdemir"> Beyza Bozdemir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to improve symmetric key research, several competitions had been arranged by organizations like National Institute of Standards and Technology (NIST) and International Association for Cryptologic Research (IACR). In recent years, the importance of authenticated encryption has rapidly increased because of the necessity of simultaneously enabling integrity, confidentiality and authenticity. Therefore, at January 2013, IACR announced the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR Competition) which will select secure and efficient algorithms for authenticated encryption. Cryptographic algorithms are anticipated to behave like random mappings; hence, it is important to apply statistical randomness tests to the outputs of the algorithms. In this work, the statistical randomness tests in the NIST Test Suite and the other recently designed randomness tests are applied to six second round algorithms of the CAESAR Competition. It is observed that AEGIS achieves randomness after 3 rounds, Ascon permutation function achieves randomness after 1 round, Joltik encryption function achieves randomness after 9 rounds, Morus state update function achieves randomness after 3 rounds, Pi-cipher achieves randomness after 1 round, and Tiaoxin achieves randomness after 1 round. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authenticated%20encryption" title="authenticated encryption">authenticated encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=CAESAR%20competition" title=" CAESAR competition"> CAESAR competition</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite" title=" NIST test suite"> NIST test suite</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20randomness%20tests" title=" statistical randomness tests"> statistical randomness tests</a> </p> <a href="https://publications.waset.org/abstracts/63254/statistical-randomness-testing-of-some-second-round-candidate-algorithms-of-caesar-competition" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63254.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">315</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9334</span> Model-Based Software Regression Test Suite Reduction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shiwei%20Deng">Shiwei Deng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Bao"> Yang Bao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a model-based regression test suite reducing approach that uses EFSM model dependence analysis and probability-driven greedy algorithm to reduce software regression test suites. The approach automatically identifies the difference between the original model and the modified model as a set of elementary model modifications. The EFSM dependence analysis is performed for each elementary modification to reduce the regression test suite, and then the probability-driven greedy algorithm is adopted to select the minimum set of test cases from the reduced regression test suite that cover all interaction patterns. Our initial experience shows that the approach may significantly reduce the size of regression test suites. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dependence%20analysis" title="dependence analysis">dependence analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=EFSM%20model" title=" EFSM model"> EFSM model</a>, <a href="https://publications.waset.org/abstracts/search?q=greedy%20algorithm" title=" greedy algorithm"> greedy algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=regression%20test" title=" regression test"> regression test</a> </p> <a href="https://publications.waset.org/abstracts/31318/model-based-software-regression-test-suite-reduction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31318.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">427</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9333</span> Metric Suite for Schema Evolution of a Relational Database</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Ravichandra">S. Ravichandra</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20V.%20L.%20N.%20Somayajulu"> D. V. L. N. Somayajulu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Requirement of stakeholders for adding more details to the database is the main cause of the schema evolution in the relational database. Further, this schema evolution causes the instability to the database. Hence, it is aimed to define a metric suite for schema evolution of a relational database. The metric suite will calculate the metrics based on the features of the database, analyse the queries on the database and measures the coupling, cohesion and component dependencies of the schema for existing and evolved versions of the database. This metric suite will also provide an indicator for the problems related to the stability and usability of the evolved database. The degree of change in the schema of a database is presented in the forms of graphs that acts as an indicator and also provides the relations between various parameters (metrics) related to the database architecture. The acquired information is used to defend and improve the stability of database architecture. The challenges arise in incorporating these metrics with varying parameters for formulating a suitable metric suite are discussed. To validate the proposed metric suite, an experimentation has been performed on publicly available datasets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cohesion" title="cohesion">cohesion</a>, <a href="https://publications.waset.org/abstracts/search?q=coupling" title=" coupling"> coupling</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy" title=" entropy"> entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=metric%20suite" title=" metric suite"> metric suite</a>, <a href="https://publications.waset.org/abstracts/search?q=schema%20evolution" title=" schema evolution"> schema evolution</a> </p> <a href="https://publications.waset.org/abstracts/54754/metric-suite-for-schema-evolution-of-a-relational-database" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54754.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9332</span> Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hongmin%20Deng">Hongmin Deng</a>, <a href="https://publications.waset.org/abstracts/search?q=Qionghua%20Wang"> Qionghua Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M<sub>0</sub> development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chaos%20encryption" title="chaos encryption">chaos encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20map" title=" logistic map"> logistic map</a>, <a href="https://publications.waset.org/abstracts/search?q=pseudo-random%20sequence" title=" pseudo-random sequence"> pseudo-random sequence</a>, <a href="https://publications.waset.org/abstracts/search?q=RFID" title=" RFID"> RFID</a> </p> <a href="https://publications.waset.org/abstracts/46725/radio-frequency-identification-encryption-via-modified-two-dimensional-logistic-map" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9331</span> Efficient Internal Generator Based on Random Selection of an Elliptic Curve</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mustapha%20Benssalah">Mustapha Benssalah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustapha%20Djeddou"> Mustapha Djeddou</a>, <a href="https://publications.waset.org/abstracts/search?q=Karim%20Drouiche"> Karim Drouiche</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=PRNG" title="PRNG">PRNG</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptosystem" title=" cryptosystem"> cryptosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=ECC" title=" ECC"> ECC</a> </p> <a href="https://publications.waset.org/abstracts/23607/efficient-internal-generator-based-on-random-selection-of-an-elliptic-curve" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23607.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">444</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9330</span> Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mardiyansyah%20Mardiyansyah">Mardiyansyah Mardiyansyah</a>, <a href="https://publications.waset.org/abstracts/search?q=Hendrik%20%20Maulana"> Hendrik Maulana</a>, <a href="https://publications.waset.org/abstracts/search?q=Eka%20Kurnia%20Sari"> Eka Kurnia Sari</a>, <a href="https://publications.waset.org/abstracts/search?q=Imam%20Baehaki"> Imam Baehaki</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Agus%20Prihandono"> Mohammad Agus Prihandono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20security" title="mobile security">mobile security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20security%20framework" title=" mobile security framework"> mobile security framework</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST%20SP%201800-4" title=" NIST SP 1800-4"> NIST SP 1800-4</a>, <a href="https://publications.waset.org/abstracts/search?q=regulations" title=" regulations"> regulations</a> </p> <a href="https://publications.waset.org/abstracts/118925/analysis-of-practical-guidelines-for-mobile-device-security-in-indonesia-based-on-nist-sp-1800-4" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118925.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9329</span> Security of Database Using Chaotic Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eman%20W.%20Boghdady">Eman W. Boghdady</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20R.%20Shehata"> A. R. Shehata</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Azem"> M. A. Azem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithms%20and%20data%20structure" title="algorithms and data structure">algorithms and data structure</a>, <a href="https://publications.waset.org/abstracts/search?q=DB%20security" title=" DB security"> DB security</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=chaotic%20algorithms" title=" chaotic algorithms"> chaotic algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=Matlab" title=" Matlab"> Matlab</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST" title=" NIST"> NIST</a> </p> <a href="https://publications.waset.org/abstracts/9108/security-of-database-using-chaotic-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9108.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9328</span> Prioritization of Mutation Test Generation with Centrality Measure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Supachai%20Supmak">Supachai Supmak</a>, <a href="https://publications.waset.org/abstracts/search?q=Yachai%20Limpiyakorn"> Yachai Limpiyakorn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mutation testing can be applied for the quality assessment of test cases. Prioritization of mutation test generation has been a critical element of the industry practice that would contribute to the evaluation of test cases. The industry generally delivers the product under the condition of time to the market and thus, inevitably sacrifices software testing tasks, even though many test cases are required for software verification. This paper presents an approach of applying a social network centrality measure, PageRank, to prioritize mutation test generation. The source code with the highest values of PageRank will be focused first when developing their test cases as these modules are vulnerable to defects or anomalies which may cause the consequent defects in many other associated modules. Moreover, the approach would help identify the reducible test cases in the test suite, still maintaining the same criteria as the original number of test cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20testing" title="software testing">software testing</a>, <a href="https://publications.waset.org/abstracts/search?q=mutation%20test" title=" mutation test"> mutation test</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20centrality%20measure" title=" network centrality measure"> network centrality measure</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20case%20prioritization" title=" test case prioritization"> test case prioritization</a> </p> <a href="https://publications.waset.org/abstracts/154408/prioritization-of-mutation-test-generation-with-centrality-measure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154408.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9327</span> The Analysis of Kru Luen Sun Tharawatin’s Tableau Vivant Singing Style</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pansak%20Vandee">Pansak Vandee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research aims to study the background and format of Tableau Vivant suite song and the singing style of Kru Luen SunTharawatin. The data is gained by content analysis and the in-depth interview from experts on Tableau Vivant suite song, as well as an analysis on singing style of Kru Luen SunTharawatin. The research results are as follows: (1) The Tableau Vivant suite song first appeared in the reign of King Rama V, composing by Prince Naris, for paralleling with the still picture presentation offered to Crown Prince Maha Vajirunahit, which was adapted from the French performance Tableau Vivant. The performance is assigned to perform by the Crown Prince’s younger brother and other young royal siblings. The 8 suite songs were played by archeological Thai orchestra (Piphat duek dam ban) and were restored once again in the reign of King Rama VII for the pleasure of the king, being sung by the Royal Entertainment Department Officers. (2) The format of Tableau Vivant suite song is a short series song, composing a double strand of 4 to 6 songs with 6 suite songs in 8 suites, in the form of a combination of suite lyric – Unnarut (the play narrated by King Rama I) and Phra Pen Chao (the homage to Brahman gods in Na Phat song); and suite song – Khom Dam Din with Khmer tone; the Three Kingdoms with Chinese tone; Rajadhirat with Burmese and Mon tone; Nitra Chakrit (the Arabian Night) with Arabian tone; Cinderella with Western tone; Phra Lor in Laotian tone. (3) The Tableau Vivant suite singing style of Kru Luen SunTharawatin is based on Phra-ya Sanor Duriyang (Cham SunTharawatin) style, which was newly created for Kru Luen, his daughter. The five suite songs Khom Dam Din, the Three Kingdoms, Rajadhirat, Nitra Chakrit (the Arabian Night), Cinderella, Phra Lor have their distinguish tones according to their language accents. The songs were recorded in the album of the Royal Institute of Thailand in 1931; but, unfortunately, the entire album was completely destroyed during the World War II in Germany. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Krue%20Luen%20Sun%20Tharawatin" title="Krue Luen Sun Tharawatin">Krue Luen Sun Tharawatin</a>, <a href="https://publications.waset.org/abstracts/search?q=tableau%20vivant" title=" tableau vivant"> tableau vivant</a>, <a href="https://publications.waset.org/abstracts/search?q=singing%20style" title=" singing style"> singing style</a>, <a href="https://publications.waset.org/abstracts/search?q=suite%20song" title=" suite song"> suite song</a> </p> <a href="https://publications.waset.org/abstracts/10678/the-analysis-of-kru-luen-sun-tharawatins-tableau-vivant-singing-style" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10678.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9326</span> An Investigation on Organisation Cyber Resilience </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arniyati%20Ahmad">Arniyati Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Johnson"> Christopher Johnson</a>, <a href="https://publications.waset.org/abstracts/search?q=Timothy%20Storer"> Timothy Storer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates organisation cyber resilience (OCR) of participation sectors in cyber exercise called X Maya in Malaysia. This study used a principal based cyber resilience survey called C-Suite Executive checklist developed by World Economic Forum in 2012. To ensure suitability of the survey to investigate the OCR, the reliability test was conducted on C-Suite Executive checklist items. The research further investigates the differences of OCR in ten Critical National Infrastructure Information (CNII) sectors participated in the cyber exercise. The One Way ANOVA test result showed a statistically significant difference of OCR among ten CNII sectors participated in the cyber exercise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20information%20infrastructure" title="critical information infrastructure">critical information infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title=" cyber resilience"> cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=organisation%20cyber%20resilience" title=" organisation cyber resilience"> organisation cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20test" title=" reliability test"> reliability test</a> </p> <a href="https://publications.waset.org/abstracts/29946/an-investigation-on-organisation-cyber-resilience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9325</span> Assessing and Managing the Risk of Inland Acid Sulfate Soil Drainage via Column Leach Tests and 1D Modelling: A Case Study from South East Australia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicolaas%20Unland">Nicolaas Unland</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Webb"> John Webb</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The acidification and mobilisation of metals during the oxidation of acid sulfate soils exposed during lake bed drying is an increasingly common phenomenon under climate scenarios with reduced rainfall. In order to assess the risk of generating high concentrations of acidity and dissolved metals, chromium suite analysis are fundamental, but sometimes limited in characterising the potential risks they pose. This study combines such fundamental test work, along with incubation tests and 1D modelling to investigate the risks associated with the drying of Third Reedy Lake in South East Australia. Core samples were collected from a variable depth of 0.5 m below the lake bed, at 19 locations across the lake’s footprint, using a boat platform. Samples were subjected to a chromium suite of analysis, including titratable actual acidity, chromium reducible sulfur and acid neutralising capacity. Concentrations of reduced sulfur up to 0.08 %S and net acidities up to 0.15 %S indicate that acid sulfate soils have formed on the lake bed during permanent inundation over the last century. A further sub-set of samples were prepared in 7 columns and subject to accelerated heating, drying and wetting over a period of 64 days in laboratory. Results from the incubation trial indicate that while pyrite oxidation proceeded, minimal change to soil pH or the acidity of leachate occurred, suggesting that the internal buffering capacity of lake bed sediments was sufficient to neutralise a large proportion of the acidity produced. A 1D mass balance model was developed to assess potential changes in lake water quality during drying based on the results of chromium suite and incubation tests. Results from the above test work and modelling suggest that acid sulfate soils pose a moderate to low risk to the Third Reedy Lake system. Further, the risks can be effectively managed during the initial stages of lake drying via flushing with available mildly alkaline water. The study finds that while test work such as chromium suite analysis are fundamental in characterizing acid sulfate soil environments, they can the overestimate risks associated with the soils. Subsequent incubation test work may more accurately characterise such soils and lead to better-informed management strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acid%20sulfate%20soil" title="acid sulfate soil">acid sulfate soil</a>, <a href="https://publications.waset.org/abstracts/search?q=incubation" title=" incubation"> incubation</a>, <a href="https://publications.waset.org/abstracts/search?q=management" title=" management"> management</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a> </p> <a href="https://publications.waset.org/abstracts/84610/assessing-and-managing-the-risk-of-inland-acid-sulfate-soil-drainage-via-column-leach-tests-and-1d-modelling-a-case-study-from-south-east-australia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84610.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9324</span> Multi-Criteria Test Case Selection Using Ant Colony Optimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niranjana%20Devi%20N.">Niranjana Devi N.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Test case selection is to select the subset of only the fit test cases and remove the unfit, ambiguous, redundant, unnecessary test cases which in turn improve the quality and reduce the cost of software testing. Test cases optimization is the problem of finding the best subset of test cases from a pool of the test cases to be audited. It will meet all the objectives of testing concurrently. But most of the research have evaluated the fitness of test cases only on single parameter fault detecting capability and optimize the test cases using a single objective. In the proposed approach, nine parameters are considered for test case selection and the best subset of parameters for test case selection is obtained using Interval Type-2 Fuzzy Rough Set. Test case selection is done in two stages. The first stage is the fuzzy entropy-based filtration technique, used for estimating and reducing the ambiguity in test case fitness evaluation and selection. The second stage is the ant colony optimization-based wrapper technique with a forward search strategy, employed to select test cases from the reduced test suite of the first stage. The results are evaluated using the Coverage parameters, Precision, Recall, F-Measure, APSC, APDC, and SSR. The experimental evaluation demonstrates that by this approach considerable computational effort can be avoided. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ant%20colony%20optimization" title="ant colony optimization">ant colony optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20entropy" title=" fuzzy entropy"> fuzzy entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=interval%20type-2%20fuzzy%20rough%20set" title=" interval type-2 fuzzy rough set"> interval type-2 fuzzy rough set</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20case%20selection" title=" test case selection"> test case selection</a> </p> <a href="https://publications.waset.org/abstracts/30870/multi-criteria-test-case-selection-using-ant-colony-optimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30870.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">668</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9323</span> Challenges of Implementing Zero Trust Security Based on NIST SP 800-207</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mazhar%20Hamayun">Mazhar Hamayun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ZTNA" title="ZTNA">ZTNA</a>, <a href="https://publications.waset.org/abstracts/search?q=zerotrust%20architecture" title=" zerotrust architecture"> zerotrust architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=microsegmentation" title=" microsegmentation"> microsegmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST%20SP%20800-207" title=" NIST SP 800-207"> NIST SP 800-207</a> </p> <a href="https://publications.waset.org/abstracts/163771/challenges-of-implementing-zero-trust-security-based-on-nist-sp-800-207" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9322</span> Chemical Composition, Petrology and P-T Conditions of Ti-Mg-Biotites within Syenitic Rocks from the Lar Igneous Suite, East of Iran</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sasan%20Ghafaribijar">Sasan Ghafaribijar</a>, <a href="https://publications.waset.org/abstracts/search?q=Javad%20Hakimi"> Javad Hakimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohsen%20Arvin"> Mohsen Arvin</a>, <a href="https://publications.waset.org/abstracts/search?q=Peyman%20Tahernezhad"> Peyman Tahernezhad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Lar Igneous Suite (LIS), east of Iran, is part of post collisional alkaline magmatism related to Late Cretaceous- mid Eocene Sistan suture zone. The suite consists of a wide variety of igneous rocks, from volcanic to intrusive and hypabissal rocks such as tuffs, trachyte, monzonite, syenites and lamprophyres. Syenitic rocks which mainly occur in a giant ring dike and stocks, are shoshonitic to potassic-ultrapotassic (K<sub>2</sub>O/Na<sub>2</sub>O &gt; 2 wt.%; MgO &gt; 3 wt.%; K<sub>2</sub>O &gt; 3 wt.%) in composition and are also associated with Cu-Mo mineralization. In this study, chemical composition of biotites within the Lar syenites (LS) is determined by electron microprobe analysis. The results show that LS biotites are Ti-Mg-biotites (phlogopite) which contain relatively high Ti and Mg, and low Fe concentrations. The Mg/(Fe<sup>2+</sup>+ Mg) ratio in these biotites range between 0.56 and 0.73 that represent their transitionally chemical evolution. TiO<sub>2</sub> content in these biotites is high and in the range of 3.0-5.4 wt.%. These chemical characteristics indicate that the LS biotites are primary and have been crystallized directly from magma. The investigations also demonstrate that the LS biotites have crystallized from a magma of orogenic nature. Temperature and pressure are the most significant factors controlling Mg and Ti content in the LS biotites, respectively. The results show that the LS biotites crystallized at temperatures (T) between 800 to 842 &deg;C and pressures (P) between 0.99 to 1.44 kbar. These conditions are indicative of a crystallization depth of 3.26-4.74 km. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sistan%20suture%20zone" title="sistan suture zone">sistan suture zone</a>, <a href="https://publications.waset.org/abstracts/search?q=Lar%20Igneous%20Suite" title=" Lar Igneous Suite"> Lar Igneous Suite</a>, <a href="https://publications.waset.org/abstracts/search?q=zahedan" title=" zahedan"> zahedan</a>, <a href="https://publications.waset.org/abstracts/search?q=syenite" title=" syenite"> syenite</a>, <a href="https://publications.waset.org/abstracts/search?q=biotite" title=" biotite"> biotite</a> </p> <a href="https://publications.waset.org/abstracts/109121/chemical-composition-petrology-and-p-t-conditions-of-ti-mg-biotites-within-syenitic-rocks-from-the-lar-igneous-suite-east-of-iran" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109121.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9321</span> A Novel Approach towards Test Case Prioritization Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kamna%20Solanki">Kamna Solanki</a>, <a href="https://publications.waset.org/abstracts/search?q=Yudhvir%20Singh"> Yudhvir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandeep%20Dalal"> Sandeep Dalal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software testing is a time and cost intensive process. A scrutiny of the code and rigorous testing is required to identify and rectify the putative bugs. The process of bug identification and its consequent correction is continuous in nature and often some of the bugs are removed after the software has been launched in the market. This process of code validation of the altered software during the maintenance phase is termed as Regression testing. Regression testing ubiquitously considers resource constraints; therefore, the deduction of an appropriate set of test cases, from the ensemble of the entire gamut of test cases, is a critical issue for regression test planning. This paper presents a novel method for designing a suitable prioritization process to optimize fault detection rate and performance of regression test on predefined constraints. The proposed method for test case prioritization m-ACO alters the food source selection criteria of natural ants and is basically a modified version of Ant Colony Optimization (ACO). The proposed m-ACO approach has been coded in 'Perl' language and results are validated using three examples by computation of Average Percentage of Faults Detected (APFD) metric. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=regression%20testing" title="regression testing">regression testing</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20testing" title=" software testing"> software testing</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20case%20prioritization" title=" test case prioritization"> test case prioritization</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20suite%20optimization" title=" test suite optimization"> test suite optimization</a> </p> <a href="https://publications.waset.org/abstracts/25042/a-novel-approach-towards-test-case-prioritization-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25042.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9320</span> Test Suite Optimization Using an Effective Meta-Heuristic BAT Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anuradha%20Chug">Anuradha Chug</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunali%20Gandhi"> Sunali Gandhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Regression Testing is a very expensive and time-consuming process carried out to ensure the validity of modified software. Due to the availability of insufficient resources to re-execute all the test cases in time constrained environment, efforts are going on to generate test data automatically without human efforts. Many search based techniques have been proposed to generate efficient, effective as well as optimized test data, so that the overall cost of the software testing can be minimized. The generated test data should be able to uncover all potential lapses that exist in the software or product. Inspired from the natural behavior of bat for searching her food sources, current study employed a meta-heuristic, search-based bat algorithm for optimizing the test data on the basis certain parameters without compromising their effectiveness. Mathematical functions are also applied that can effectively filter out the redundant test data. As many as 50 Java programs are used to check the effectiveness of proposed test data generation and it has been found that 86% saving in testing efforts can be achieved using bat algorithm while covering 100% of the software code for testing. Bat algorithm was found to be more efficient in terms of simplicity and flexibility when the results were compared with another nature inspired algorithms such as Firefly Algorithm (FA), Hill Climbing Algorithm (HC) and Ant Colony Optimization (ACO). The output of this study would be useful to testers as they can achieve 100% path coverage for testing with minimum number of test cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=regression%20testing" title="regression testing">regression testing</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20case%20selection" title=" test case selection"> test case selection</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20case%20prioritization" title=" test case prioritization"> test case prioritization</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20algorithm" title=" genetic algorithm"> genetic algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=bat%20algorithm" title=" bat algorithm"> bat algorithm</a> </p> <a href="https://publications.waset.org/abstracts/55510/test-suite-optimization-using-an-effective-meta-heuristic-bat-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9319</span> Mastering Test Automation: Bridging Gaps for Seamless QA</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rohit%20Khankhoje">Rohit Khankhoje</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid evolution of software development practices has given rise to an increasing demand for efficient and effective test automation. The paper titled "Mastering Test Automation: Bridging Gaps for Seamless QA" delves into the crucial aspects of test automation, addressing the obstacles faced by organizations in achieving flawless quality assurance. The paper highlights the importance of bridging knowledge gaps within organizations, emphasizing the necessity for management to acquire a deeper comprehension of test automation scenarios, coverage, report trends, and the importance of communication. To tackle these challenges, this paper introduces innovative solutions, including the development of an automation framework that seamlessly integrates with test cases and reporting tools like TestRail and Jira. This integration facilitates the automatic recording of bugs in Jira, enhancing bug reporting and communication between manual QA and automation teams as well as TestRail have all newly added automated testcases as soon as it is part of the automation suite. The paper demonstrates how this framework empowers management by providing clear insights into ongoing automation activities, bug origins, trend analysis, and test case specifics. "Mastering Test Automation" serves as a comprehensive guide for organizations aiming to enhance their quality assurance processes through effective test automation. It not only identifies the common pitfalls and challenges but also offers practical solutions to bridge the gaps, resulting in a more streamlined and efficient QA process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automation%20framework" title="automation framework">automation framework</a>, <a href="https://publications.waset.org/abstracts/search?q=API%20integration" title=" API integration"> API integration</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20automation" title=" test automation"> test automation</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20management%20tools" title=" test management tools"> test management tools</a> </p> <a href="https://publications.waset.org/abstracts/174500/mastering-test-automation-bridging-gaps-for-seamless-qa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174500.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9318</span> Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Ahanj%20Sofia%20Ahanj">Sofia Ahanj Sofia Ahanj</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahsa%20Rahmani%20Mahsa%20Rahmani"> Mahsa Rahmani Mahsa Rahmani</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Sadeghigol"> Zahra Sadeghigol</a>, <a href="https://publications.waset.org/abstracts/search?q=Vida%20Nobakht%20Vida%20Nobakht"> Vida Nobakht Vida Nobakht</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security%20standards" title="security standards">security standards</a>, <a href="https://publications.waset.org/abstracts/search?q=ISO%2FIEC%2015408" title=" ISO/IEC 15408"> ISO/IEC 15408</a>, <a href="https://publications.waset.org/abstracts/search?q=ISA%2FIEC%20%2062443%20series" title=" ISA/IEC 62443 series"> ISA/IEC 62443 series</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST%20SP%20800-53" title=" NIST SP 800-53"> NIST SP 800-53</a>, <a href="https://publications.waset.org/abstracts/search?q=NISTIR%207628" title=" NISTIR 7628"> NISTIR 7628</a> </p> <a href="https://publications.waset.org/abstracts/128747/determining-the-appropriate-methodology-for-the-security-evaluation-of-equipment-related-to-information-and-communication-technology-in-the-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128747.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9317</span> Design and Implementation of Pseudorandom Number Generator Using Android Sensors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mochamad%20Beta%20Auditama">Mochamad Beta Auditama</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusuf%20Kurniawan"> Yusuf Kurniawan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Android%20hardware-based%20sensor" title="Android hardware-based sensor">Android hardware-based sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=deterministic%20process" title=" deterministic process"> deterministic process</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy%20source" title=" entropy source"> entropy source</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20number%20generation%2Fgenerators" title=" random number generation/generators"> random number generation/generators</a> </p> <a href="https://publications.waset.org/abstracts/64995/design-and-implementation-of-pseudorandom-number-generator-using-android-sensors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64995.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">374</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9316</span> Machine Learning Approach for Mutation Testing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Stewart">Michael Stewart</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated-testing" title="automated-testing">automated-testing</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mutation%20testing" title=" mutation testing"> mutation testing</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20processing" title=" parallel processing"> parallel processing</a>, <a href="https://publications.waset.org/abstracts/search?q=reinforcement%20learning" title=" reinforcement learning"> reinforcement learning</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20testing" title=" software testing"> software testing</a> </p> <a href="https://publications.waset.org/abstracts/141195/machine-learning-approach-for-mutation-testing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141195.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9315</span> Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Atma%20Sahu">Atma Sahu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20engineering" title=" cybersecurity engineering"> cybersecurity engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=systems%20engineering" title=" systems engineering"> systems engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=NIST%20standards" title=" NIST standards"> NIST standards</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20systems" title=" physical systems"> physical systems</a> </p> <a href="https://publications.waset.org/abstracts/160838/cybersecurity-engineering-bs-degree-curricula-design-framework-and-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160838.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9314</span> Automating Test Activities: Test Cases Creation, Test Execution, and Test Reporting with Multiple Test Automation Tools</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Loke%20Mun%20Sei">Loke Mun Sei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software testing has become a mandatory process in assuring the software product quality. Hence, test management is needed in order to manage the test activities conducted in the software test life cycle. This paper discusses on the challenges faced in the software test life cycle, and how the test processes and test activities, mainly on test cases creation, test execution, and test reporting is being managed and automated using several test automation tools, i.e. Jira, Robot Framework, and Jenkins. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=test%20automation%20tools" title="test automation tools">test automation tools</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20case" title=" test case"> test case</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20execution" title=" test execution"> test execution</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20reporting" title=" test reporting"> test reporting</a> </p> <a href="https://publications.waset.org/abstracts/31605/automating-test-activities-test-cases-creation-test-execution-and-test-reporting-with-multiple-test-automation-tools" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31605.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">583</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9313</span> Use of Numerical Tools Dedicated to Fire Safety Engineering for the Rolling Stock</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guillaume%20Craveur">Guillaume Craveur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study shows the opportunity to use numerical tools dedicated to Fire Safety Engineering for the Rolling Stock. Indeed, some lawful requirements can now be demonstrated by using numerical tools. The first part of this study presents the use of modelling evacuation tool to satisfy the criteria of evacuation time for the rolling stock. The buildingEXODUS software is used to model and simulate the evacuation of rolling stock. Firstly, in order to demonstrate the reliability of this tool to calculate the complete evacuation time, a comparative study was achieved between a real test and simulations done with buildingEXODUS. Multiple simulations are performed to capture the stochastic variations in egress times. Then, a new study is done to calculate the complete evacuation time of a train with the same geometry but with a different interior architecture. The second part of this study shows some applications of Computational Fluid Dynamics. This work presents the approach of a multi scales validation of numerical simulations of standardized tests with Fire Dynamics Simulations software developed by the National Institute of Standards and Technology (NIST). This work highlights in first the cone calorimeter test, described in the standard ISO 5660, in order to characterize the fire reaction of materials. The aim of this process is to readjust measurement results from the cone calorimeter test in order to create a data set usable at the seat scale. In the second step, the modelisation concerns the fire seat test described in the standard EN 45545-2. The data set obtained thanks to the validation of the cone calorimeter test was set up in the fire seat test. To conclude with the third step, after controlled the data obtained for the seat from the cone calorimeter test, a larger scale simulation with a real part of train is achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fire%20safety%20engineering" title="fire safety engineering">fire safety engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=numerical%20tools" title=" numerical tools"> numerical tools</a>, <a href="https://publications.waset.org/abstracts/search?q=rolling%20stock" title=" rolling stock"> rolling stock</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-scales%20validation" title=" multi-scales validation"> multi-scales validation</a> </p> <a href="https://publications.waset.org/abstracts/72044/use-of-numerical-tools-dedicated-to-fire-safety-engineering-for-the-rolling-stock" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">303</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9312</span> A Numerical Computational Method of MRI Static Magnetic Field for an Ergonomic Facility Design Guidelines</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sherine%20Farrag">Sherine Farrag</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Magnetic resonance imaging (MRI) presents safety hazards, with the general physical environment. The principal hazard of the MRI is the presence of static magnetic fields. Proper architectural design of MRI’s room ensure environment and health care staff safety. This research paper presents an easy approach for numerical computation of fringe static magnetic fields. Iso-gauss line of different MR intensities (0.3, 0.5, 1, 1.5 Tesla) was mapped and a polynomial function of the 7th degree was generated and tested. Matlab script was successfully applied for MRI SMF mapping. This method can be valid for any kind of commercial scanner because it requires only the knowledge of the MR scanner room map with iso-gauss lines. Results help to develop guidelines to guide healthcare architects to design of a safer Magnetic resonance imaging suite. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=designing%20MRI%20suite" title="designing MRI suite">designing MRI suite</a>, <a href="https://publications.waset.org/abstracts/search?q=MRI%20safety" title=" MRI safety"> MRI safety</a>, <a href="https://publications.waset.org/abstracts/search?q=radiology%20occupational%20exposure" title=" radiology occupational exposure"> radiology occupational exposure</a>, <a href="https://publications.waset.org/abstracts/search?q=static%20magnetic%20fields" title=" static magnetic fields "> static magnetic fields </a> </p> <a href="https://publications.waset.org/abstracts/12933/a-numerical-computational-method-of-mri-static-magnetic-field-for-an-ergonomic-facility-design-guidelines" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12933.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">485</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9311</span> Virtual 3D Environments for Image-Based Navigation Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20B.%20Bastos">V. B. Bastos</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20P.%20Lima"> M. P. Lima</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20R.%20G.%20Kurka"> P. R. G. Kurka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper applies to the creation of virtual 3D environments for the study and development of mobile robot image based navigation algorithms and techniques, which need to operate robustly and efficiently. The test of these algorithms can be performed in a physical way, from conducting experiments on a prototype, or by numerical simulations. Current simulation platforms for robotic applications do not have flexible and updated models for image rendering, being unable to reproduce complex light effects and materials. Thus, it is necessary to create a test platform that integrates sophisticated simulated applications of real environments for navigation, with data and image processing. This work proposes the development of a high-level platform for building 3D model&rsquo;s environments and the test of image-based navigation algorithms for mobile robots. Techniques were used for applying texture and lighting effects in order to accurately represent the generation of rendered images regarding the real world version. The application will integrate image processing scripts, trajectory control, dynamic modeling and simulation techniques for physics representation and picture rendering with the open source 3D creation suite - Blender. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=simulation" title="simulation">simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20navigation" title=" visual navigation"> visual navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20robot" title=" mobile robot"> mobile robot</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20visualization" title=" data visualization"> data visualization</a> </p> <a href="https://publications.waset.org/abstracts/61824/virtual-3d-environments-for-image-based-navigation-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61824.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">255</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9310</span> Minimizing Mutant Sets by Equivalence and Subsumption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samia%20Alblwi">Samia Alblwi</a>, <a href="https://publications.waset.org/abstracts/search?q=Amani%20Ayad"> Amani Ayad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mutation testing is the art of generating syntactic variations of a base program and checking whether a candidate test suite can identify all the mutants that are not semantically equivalent to the base: this technique is widely used by researchers to select quality test suites. One of the main obstacles to the widespread use of mutation testing is cost: even small pro-grams (a few dozen lines of code) can give rise to a large number of mutants (up to hundreds): this has created an incentive to seek to reduce the number of mutants while preserving their collective effectiveness. Two criteria have been used to reduce the size of mutant sets: equiva-lence, which aims to partition the set of mutants into equivalence classes modulo semantic equivalence, and selecting one representative per class; subsumption, which aims to define a partial ordering among mutants that ranks mutants by effectiveness and seeks to select maximal elements in this ordering. In this paper we analyze these two policies using analytical and em-pirical criteria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mutation%20testing" title="mutation testing">mutation testing</a>, <a href="https://publications.waset.org/abstracts/search?q=mutant%20sets" title=" mutant sets"> mutant sets</a>, <a href="https://publications.waset.org/abstracts/search?q=mutant%20equivalence" title=" mutant equivalence"> mutant equivalence</a>, <a href="https://publications.waset.org/abstracts/search?q=mutant%20subsumption" title=" mutant subsumption"> mutant subsumption</a>, <a href="https://publications.waset.org/abstracts/search?q=mutant%20set%20minimization" title=" mutant set minimization"> mutant set minimization</a> </p> <a href="https://publications.waset.org/abstracts/156274/minimizing-mutant-sets-by-equivalence-and-subsumption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156274.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9309</span> Design and Implementation of a Geodatabase and WebGIS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sajid%20Ali">Sajid Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Dietrich%20Schr%C3%B6der"> Dietrich Schröder</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The merging of internet and Web has created many disciplines and Web GIS is one these disciplines which is effectively dealing with the geospatial data in a proficient way. Web GIS technologies have provided an easy accessing and sharing of geospatial data over the internet. However, there is a single platform for easy and multiple accesses of the data lacks for the European Caribbean Association (Europaische Karibische Gesselschaft - EKG) to assist their members and other research community. The technique presented in this paper deals with designing of a geodatabase using PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS) for competent dissemination and management of spatial data and Web GIS by using OpenGeo Suite for the fast sharing and distribution of the data over the internet. The characteristics of the required design for the geodatabase have been studied and a specific methodology is given for the purpose of designing the Web GIS. At the end, validation of this Web based geodatabase has been performed over two Desktop GIS software and a web map application and it is also discussed that the contribution has all the desired modules to expedite further research in the area as per the requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=desktop%20GISSoftware" title="desktop GISSoftware">desktop GISSoftware</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20Caribbean%20association" title=" European Caribbean association"> European Caribbean association</a>, <a href="https://publications.waset.org/abstracts/search?q=geodatabase" title=" geodatabase"> geodatabase</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenGeo%20suite" title=" OpenGeo suite"> OpenGeo suite</a>, <a href="https://publications.waset.org/abstracts/search?q=postgreSQL%2FPostGIS" title=" postgreSQL/PostGIS"> postgreSQL/PostGIS</a>, <a href="https://publications.waset.org/abstracts/search?q=webGIS" title=" webGIS"> webGIS</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20map%20application" title=" web map application"> web map application</a> </p> <a href="https://publications.waset.org/abstracts/44197/design-and-implementation-of-a-geodatabase-and-webgis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44197.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9308</span> Fouling Mitigation Using Helical Baffle Heat Exchangers and Comparative Analysis Using HTRI Xchanger Suite® Educational Software </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kiran%20P.%20Chadayamuri">Kiran P. Chadayamuri</a>, <a href="https://publications.waset.org/abstracts/search?q=Saransh%20Bagdi"> Saransh Bagdi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Heat exchangers are devices used to transfer heat from one fluid to another via convection and conduction. The need for effective heat transfer has made their presence vital in hundreds of industries including petroleum refineries, petrochemical plants, fertiliser plants and pharmaceutical companies. Fouling has been one of the major problems hindering efficient transfer of thermal energy in heat exchangers. Several design changes have been coined for fighting fouling. A recent development involves using helical baffles in place of conventional segmented baffles in shell and tube heat exchangers. The aim of this paper is to understand the advantages of helical baffle exchangers, how they aid in fouling mitigation and its corresponding limitations. A comparative analysis was conducted between a helical baffle heat exchanger and a conventional segmented baffle heat exchanger using HTRI Xchanger Suite® Educational software and conclusions were drawn to study how the heat transfer process differs in the two cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heat%20transfer" title="heat transfer">heat transfer</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20exchangers" title=" heat exchangers"> heat exchangers</a>, <a href="https://publications.waset.org/abstracts/search?q=fouling%20mitigation" title=" fouling mitigation"> fouling mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=helical%20baffles" title=" helical baffles"> helical baffles</a> </p> <a href="https://publications.waset.org/abstracts/49858/fouling-mitigation-using-helical-baffle-heat-exchangers-and-comparative-analysis-using-htri-xchanger-suite-educational-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49858.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9307</span> Biotransformation of Monoterpenes by Whole Cells of Eleven Praxelis clematidea-Derived Endophytic Fungi</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daomao%20Yang">Daomao Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qizhi%20Wang"> Qizhi Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Monoterpenoids are mainly found in plant essential oils and they are ideal substrates for biotransformation into oxygen-containing derivatives with important commercial value due to their low price and simple structure. In this paper, eleven strains of endophytic fungi from <em>Praxelis clematidea</em> were used as test strains to conduct the whole cell biotransformation of the monoterpenoids: (+)-limonene, (-)-limonene and myrcene. The fungi were inoculated in 50 ml Sabouraud medium and incubated at 30 ℃ with the agitation of 150 r/min for 6 d, and then 0.5% (v/v) substrates were added into the medium and biotransformed for further 3 d. Afterwards the cultures were filtered, and extracted using equal volume of ethyl acetate. The metabolites were analyzed by GC-MS technique with NIST database. The Total Ion Chromatogram of the extractions from the eleven strains showed that the main product of (+)- and (-)-limonene biotransformation was limonene-1,2-diol, while it is limonene and linalool oxide for biotransformation of myrcene. This work will help screen the microorganisms to biotransform the monoterpenes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=endophytic%20fungi" title="endophytic fungi">endophytic fungi</a>, <a href="https://publications.waset.org/abstracts/search?q=%28%2B%29%E2%80%93limonene" title=" (+)–limonene"> (+)–limonene</a>, <a href="https://publications.waset.org/abstracts/search?q=%28-%29%E2%80%93limonene" title=" (-)–limonene"> (-)–limonene</a>, <a href="https://publications.waset.org/abstracts/search?q=myrcene" title=" myrcene"> myrcene</a> </p> <a href="https://publications.waset.org/abstracts/132414/biotransformation-of-monoterpenes-by-whole-cells-of-eleven-praxelis-clematidea-derived-endophytic-fungi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132414.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9306</span> Load Forecasting in Microgrid Systems with R and Cortana Intelligence Suite </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Lazzeri">F. Lazzeri</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Reiter"> I. Reiter </a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p class="Abstract"><span lang="EN-US">Energy production optimization has been traditionally very important for utilities in order to improve resource consumption. However, load forecasting is a challenging task, as there are a large number of relevant variables that must be considered, and several strategies have been used to deal with this complex problem. This is especially true also in microgrids where many elements have to adjust their performance depending on the future generation and consumption conditions. The goal of this paper is to present a solution for short-term load forecasting in microgrids, based on three machine learning experiments developed in R and web services built and deployed with different components of Cortana Intelligence Suite: Azure Machine Learning, a fully managed cloud service that enables to easily build, deploy, and share predictive analytics solutions; SQL database, a Microsoft database service for app developers; and PowerBI, a suite of business analytics tools to analyze data and share insights. Our results show that Boosted Decision Tree and Fast Forest Quantile regression methods can be very useful to predict hourly short-term consumption in microgrids; moreover, we found that for these types of forecasting models, weather data (temperature, wind, humidity and dew point) can play a crucial role in improving the accuracy of the forecasting solution. Data cleaning and feature engineering methods performed in R and different types of machine learning algorithms (Boosted Decision Tree, Fast Forest Quantile and ARIMA) will be presented, and results and performance metrics discussed.<o:p></o:p></span> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=time-series" title="time-series">time-series</a>, <a href="https://publications.waset.org/abstracts/search?q=features%20engineering%20methods%20for%20forecasting" title=" features engineering methods for forecasting"> features engineering methods for forecasting</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20demand%20forecasting" title=" energy demand forecasting"> energy demand forecasting</a>, <a href="https://publications.waset.org/abstracts/search?q=Azure%20Machine%20Learning" title=" Azure Machine Learning"> Azure Machine Learning</a> </p> <a href="https://publications.waset.org/abstracts/64137/load-forecasting-in-microgrid-systems-with-r-and-cortana-intelligence-suite" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=311">311</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=312">312</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=NIST%20test%20suite&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10