SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Short Paper
                                                      ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013



         Systematic Model based Testing with Coverage
                           Analysis
                                             Divyesh Divakar1 and Ashwini K G2
                             1, 2
                                Assistant Professor, Dept. of Electrical and Electronics Engineering
                                         Canara Engineering College, Mangalore, India
                               divyesh_divakar@rediffmail.com, ashwini_shenoy@rediffmail.com


Abstract— Aviation safety has come a long way in over one                on target boards and the outputs checked to ensure that
hundred years of implementation. In aeronautics, commonly,               they match the simulated model output [3]. Extensive testing
requirements are Simulink Models. Considering this, many                 is required for any safety critical system [4]. But failures still
conventional low level testing methods are adapted by various
                                                                         happen in flight controls.
test engineers. This paper is to propose a method to undertake
Low Level testing/ debugging in comparatively easier and
                                                                             This paper intends to change the thought from
faster way. As a first step, an attempt is made to simulate              correctness-by-construction to construction-for-correctness.
developed safety critical control blocks within a specified              Any design related to safety critical application tends to be
simulation time. For this, the blocks developed will be utilized         the safest thereby ensuring Correctness-by-construction. For
to test in Simulink environment. What we propose here is                 this, once the system model is built, rigorous validation and
Processor in loop test method using RTDX. The idea is to                 verification procedures are to be followed. Instead an
simulate model (requirement) in parallel with handwritten                application can be assured to be the safest by following
code (not a generated one) running on a specified target,                certain verification process throughout the construction.
subjected to same inputs (test cases). Comparing the results
                                                                             In order to define tests capable of detecting errors and
of model and target, fidelity can be assured. This paper suggests
a development workflow starting with a model created in
                                                                         producing confidence in the software, test scenarios should
Simulink and proceeding through generating verified and                  be designed which are systematically based on the software
profiled code for the processor.                                         requirements. However, requirement-based, i.e. logical, test
                                                                         scenarios are abstract and not executable [5]. This means
Index Terms — Coverage analysis, Embedded software,                      that they cannot be used directly for test execution. Therefore,
MATLAB, Safety critical system, Software, Software safety.               additional executable test scenarios are needed, which can
                                                                         stimulate the interface of the respective test object.
                       I. NOMENCLATURE                                        The test coverage is a function of software design
  CCS                        - Code Composer Studio                      assurance level. For a safety assured software system, test
  RTDX                       - Real Time Data Exchange                   coverage of software requirements as a function of software
  PIL                        - Processor in loop                         design assurance level is nothing short of essentiality.
                                                                         Coverage refers to the extent to which a given verification
                         I. INTRODUCTION                                 activity has satisfied its objectives. Coverage is a measure,
                                                                         not a method or a test and is usually expressed as percentage
    Modern electronic systems increasingly make use of                   of an activity that is accomplished. Appropriate coverage
embedded computer systems to add functionality, increase                 measures give verification activities a sense of the adequacy
flexibility, controllability and performance. This can lead to           of the verification accomplished.
new and different failure modes which cannot be addressed
with traditional fault tolerance techniques [1]. This is                                     III. PROCESSOR IN LOOP
especially significant in Life/Safety critical system.
    Safety critical systems are those systems whose failure                 Processor in Loop (PIL) testing environment serve as a
could result in loss of life, significant property damage, or            data exchange interface between the host simulation and the
damage to the environment. Safety-critical systems are                   object code executing on the target. PIL simulation
increasingly computer-based and their development has
traditionally been pioneered within the avionics and
automotive industries.
    The avionics industry has succeeded in producing
standard methods for producing life-critical avionics software.
The standard approach is to carefully code, inspect,
document, test, verify and analyse the system [2].
    In model based verification process, the models are
manually transformed into code or with the use of autocode
generators. The code is compiled and executed on the PC or                                       Fig. 1. Proposed Tool

© 2013 ACEEE                                                        42
DOI: 01.IJEPE.4.1.1079
Short Paper
                                                      ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013


capability functionally verifies models with the algorithm             in output. However, when the input changes direction, an
deployed on target platform without having to manually create          initial change in input has no effect on the output. The amount
an embedded test harness. The proposed tool using this                 of side-to-side play in the system is referred to as the
capability is shown in fig.1.                                          deadband. The deadband is centered about the output.
    PIL tests are close to real time but do not run in real time,
as Simulink controls the execution of the PIL code on the
target processor. The simulation halts during each sample
period while data is transferred to the target processor. Once
the object code completes executing on the processor, the
data is transferred back to the host to resume host simulation.                         Fig. 3 Initial state of Backlash
Through this approach, the functional difference between                   The fig. 3 shows the block’s initial state, with the default
the model and compiled object code can be checked, to                  deadband width of 1 and initial output of 0 and fig. 4 shows
identify any potential deviations in the performance                   the complete behaviour of backlash.
introduced by compilation process.                                     A system with play can be in one of three modes:
                                                                            ď‚· Disengaged - In this mode, the input does not drive
 A. Model (Can be Requirement)
                                                                                the output and the output remains constant.
     For an example, we developed a safety critical control                 ď‚· Engaged in a positive direction - In this mode, the
block, (to be precise- Backlash) as per the requirements and                    input is increasing (has a positive slope) and the
is shown in fig.2. The functionality and behaviour of this                      output is equal to the input minus half the deadband
block was thoroughly studied before getting into the testing.                   width.
                                                                            ď‚· Engaged in a negative direction - In this mode ,the
                                                                                input is decreasing (has a negative slope) and the
                                                                                output is equal to the input plus half the deadband
                                                                                width.




                                                                                     Fig. 4 Simulated behaviour of Backlash

                                                                       B. C Code
               Fig. 2 Simulink Model for Backlash                           For high quality software, it is important to choose the
Experience has shown that aircraft structures are generally            programming language and compiler to be used. There are
affected by structural nonlinearities. The form of the                 likely to be a large number of different factors to take into
nonlinearity encountered on actual aircraft structures is in           account when making this choice, such as the past experience
general not very well known and is an area worthy of further           of the programmers; the re-use of existing modules; the
research. In absence of more definite information, two                 compilers available, including the speed of execution of their
relatively simple characteristic types of structural                   generated code; and the portability of the programs [6]. One
nonlinearities are: backlash and centrally symmetric                   of the languages most commonly used in safety related
hysteresis loop.                                                       applications and, therefore, the most often evaluated one in
    The amount by which the width of a tooth space exceeds             this respect is C [7]. Matlab share handles easily with CCS,
the thickness of the engaging tooth on the pitch circles is its        thus developed code for the PIL environment is in C language.
measure.   As  actually  indicated  by  measuring  devices,                 A segment of developed C code indicating the
backlash may be determined variously in the transverse,                functionality of the model is given below:
normal, or axial planes, and wither in the direction of the pitch      void bckfn(int init, double inp, state *a)
circles or on the line of action. Such measurements should             {
be converted to corresponding values on transverse pitch                  double Out;
circles for general comparison. The Backlash block implements             Out = a->Out;
a system in which a change in input causes an equal change              if (init == 1)
© 2013 ACEEE                                                      43
DOI: 01.IJEPE.4.1.1079
Short Paper
                                                    ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013


    Out = ic;
 else
 {
if (inp > (Out + deadband/2))
     Out = inp - (deadband/2);

else if (inp < (Out - deadband/2))
    Out = inp + (deadband/2);
 }
a->Out = Out;

}
    Now, the model is in Matlab/Simulink and C code in CCS.
This necessitates establishing all the handles to start with
PIL simulation. A function can be executed by calling it by
means of the function handle.
    Many such blocks where designed and each block is
identified and determined to have separate functionality and                        Fig. 5 RTDX initialisation in CCS
its use is limited to the right system.

                 IV. WORKING WITH RTDX
    RTDX offers continuous bi-directional data exchange in
real time with minimal perturbation on the application.
Basically its Texas Instrument’s DSP analysis technology.
RTDX provides continuous visibility into the way target
applications operate in the real world. This helps us to get a
realistic view of how the system will work.
    RTDX establishes across the connection between
MATLAB software and CCS, by which we can:
     ď‚· Send and retrieve data from memory on the processor.
     ď‚· Change the operating characteristics of the program.
     ď‚· Make changes to algorithms as needed without
         stopping the program or setting breakpoints in the
         code (fig.5).
    RTDX and Embedded IDE link CC provide a
communication channel that enables to exchange data in real
time or close to real time between Matlab and target simulator
while target application is running (fig.6). System level test
benches can be used to compare performance and results of                             Fig. 6 Simulation with RTDX
code with the original reference model.
                                                                    the simulation and target implementation with RTDX can be
    Embedded IDE link CC utilizes the in process
                                                                    easily adapted with proper understanding of the concept.
communication and data transfer technology in CCS. As a
                                                                    Many improvements are to be made to our approach to
result, application can read and write large data sets faster
                                                                    standardize the same.
and quickly from and to the target. It supports PIL simulation
with various processors using the same Matlab and Simulink          A. Coverage Analysis
test vectors for system design and verification.
                                                                        Coverage is a form of testing that inspects the code
                                                                    directly and is a form of white box testing. Increasing the
                       V. VERIFICATION
                                                                    coverage increases the confidence in the design’s
    Tests on PIL level are important because they can reveal        correctness.
faults that are caused by the target compiler or by the                 Code coverage describes the degree to which the source
processor architecture. It is the last integration level which      code of a program as been tested. One or more coverage
allows debugging during tests in a cheap and manageable             criteria are used to measure how well the program is exercised
way. The model and target implementation is randomly                by collection of test cases. The entire program was run with
simulated to check any functional difference between them.          some test suites. Following is a bit of code developed for the
Fig.7 shows the obtained results. Looking into the results          system.
obtained, it can be concluded that this approach of comparing
© 2013 ACEEE                                                   44
DOI: 01.IJEPE.4.1.1079
Short Paper
                                                     ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013




                     Fig. 7 Simulation Result
index = find(input>= (deadband));
                                                                                              Fig. 8 Code coverage

if isempty(index)                                                       and evaluation. A modeling and testing framework is proposed
.                                                                       which successfully does a regular random testing to generate
.                                                                       optimized test sets giving complete system coverage. In
index = find(input <= -(deadband/2));                                   future, the PIL test method has to be extended for a processor
if isempty(index)                                                       board taking into consideration the real world inputs and
       cov(2,1) = max((deadband/2 -                                     noise in quantization.
input(index)).^2);
        cov(2,2) = 0;                                                                             REFERENCES
else                                                                    [1] Embedded software design for safety critical systems,
       cov(2,1) = max((deadband/2 -                                         Knowledge transfer network electronics, Nov. 2009.
input(index)).^2);                                                      [2] Divyesh Divakar, Hariram Selvamurugan, Yogananda Jeppu,
.                                                                           Nagaraj Murthy, Manjunath L, Shreesha Chokkadi,
.                                                                           “Randomized Testing to Describe the Behaviour of Safety
                                                                            Critical Control Blocks”, National Conference on Information
.
                                                                            Systems, 2011. “unpublished”
end                                                                     [3] Divyesh Divakar, K. Samatha, A. V. Veena Rani, Hariram
    Statement coverage is simplest form of coverage, which                  Selvamurugan, Yogananda Jeppu, Nagaraj Murthy and
indicates that each and every statement is executed at least                Shreesha Chokkadi, “Optimization of Test case and Coverage
once. Functional coverage refers directly to the computation                Analysis for Model Based Design”, 34 TH National systems
performed by the system. During simulation, each function                   conference on System Solutions for Global Challenges: Energy,
                                                                            Environment and Security,10-12 December 2010.
call is exercised (here max).
                                                                            “unpublished”
    Execution of blocks which act as a decision point is to be          [4] Johnson, C. W.; Holloway, C. M. “The Dangers of Failure
analyzed for decision coverage. To obtain full decision                     Masking in Fault-Tolerant Software: Aspects of a Recent In-
coverage, all the conditions in if statement is to be satisfied.            Flight Upset”, Event NASA Center: Langley Research Center
    The complete code coverage analysis was performed by                    Publication Year 2007, Document ID: 20070034017.
considering optimized test cases. The obtained simulation               [5] Mirko Conrad, Ines Fey, Sadegh Sadeghipour. “Systematic
result is shown in fig. 8.                                                  Model Based Testing of Embedded Automative Software”,
                                                                            Science Direct Electronic Notes in Theoretical Computer
                         CONCLUSION                                         Science 111 Publication Year 2005, page 13–26.
                                                                        [6] C.J.Burgess, “Software quality issues when choosing a
    The basic control blocks of any safety critical system/                 programming language”, university of Bristol, England, 1995
test specimen was developed and tested using random test                [7] Wolfgang A. Halang, Janusz Zalewski, “Programming
cases. A C code was developed for the control blocks.                       languages for use in safety-related applications”, Annual
Improvement and measurement of system quality involves                      Reviews in Control, 2003
the stages of test case specification, generation, execution

© 2013 ACEEE                                                       45
DOI: 01.IJEPE.4.1.1079

Weitere ähnliche Inhalte

Was ist angesagt?

OS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGES
OS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGESOS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGES
OS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGESIJCSES Journal
 
Midterm Exam Solutions Fall02
Midterm Exam Solutions Fall02Midterm Exam Solutions Fall02
Midterm Exam Solutions Fall02Radu_Negulescu
 
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...IJECEIAES
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...VLSICS Design
 
Effective and pragmatic test driven development by Andrew Rendell, Principal ...
Effective and pragmatic test driven development by Andrew Rendell, Principal ...Effective and pragmatic test driven development by Andrew Rendell, Principal ...
Effective and pragmatic test driven development by Andrew Rendell, Principal ...Valtech UK
 
Friedenthal.sandford
Friedenthal.sandfordFriedenthal.sandford
Friedenthal.sandfordNASAPMC
 
Advanced Verification Methodology for Complex System on Chip Verification
Advanced Verification Methodology for Complex System on Chip VerificationAdvanced Verification Methodology for Complex System on Chip Verification
Advanced Verification Methodology for Complex System on Chip VerificationVLSICS Design
 
Software reliability prediction
Software reliability predictionSoftware reliability prediction
Software reliability predictionMirza Mohymen
 
Improvement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming codeImprovement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming codeIJMTST Journal
 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmeSAT Journals
 
Practical Guide To Software System Testing
Practical Guide To Software System TestingPractical Guide To Software System Testing
Practical Guide To Software System Testingvladimir zaremba
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware ReliabilitySandeep Patalay
 
Testing survey by_directions
Testing survey by_directionsTesting survey by_directions
Testing survey by_directionsTao He
 
Multi objective genetic algorithm for regression
Multi objective genetic algorithm for regressionMulti objective genetic algorithm for regression
Multi objective genetic algorithm for regressioneSAT Publishing House
 

Was ist angesagt? (17)

OS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGES
OS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGESOS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGES
OS VERIFICATION- A SURVEY AS A SOURCE OF FUTURE CHALLENGES
 
Midterm Exam Solutions Fall02
Midterm Exam Solutions Fall02Midterm Exam Solutions Fall02
Midterm Exam Solutions Fall02
 
Design For Reliability
Design For ReliabilityDesign For Reliability
Design For Reliability
 
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
 
Effective and pragmatic test driven development by Andrew Rendell, Principal ...
Effective and pragmatic test driven development by Andrew Rendell, Principal ...Effective and pragmatic test driven development by Andrew Rendell, Principal ...
Effective and pragmatic test driven development by Andrew Rendell, Principal ...
 
Friedenthal.sandford
Friedenthal.sandfordFriedenthal.sandford
Friedenthal.sandford
 
Advanced Verification Methodology for Complex System on Chip Verification
Advanced Verification Methodology for Complex System on Chip VerificationAdvanced Verification Methodology for Complex System on Chip Verification
Advanced Verification Methodology for Complex System on Chip Verification
 
Software reliability prediction
Software reliability predictionSoftware reliability prediction
Software reliability prediction
 
Improvement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming codeImprovement in Error Resilience in BIST using hamming code
Improvement in Error Resilience in BIST using hamming code
 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
 
Practical Guide To Software System Testing
Practical Guide To Software System TestingPractical Guide To Software System Testing
Practical Guide To Software System Testing
 
MTV15
MTV15MTV15
MTV15
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware Reliability
 
Testing survey by_directions
Testing survey by_directionsTesting survey by_directions
Testing survey by_directions
 
Multi objective genetic algorithm for regression
Multi objective genetic algorithm for regressionMulti objective genetic algorithm for regression
Multi objective genetic algorithm for regression
 

Andere mochten auch

MPC partners of Legal Passport
MPC partners of Legal PassportMPC partners of Legal Passport
MPC partners of Legal PassportYssa Villanda
 
How to Manage Your Company's Data as it Walks out the Door
How to Manage Your Company's Data as it Walks out the DoorHow to Manage Your Company's Data as it Walks out the Door
How to Manage Your Company's Data as it Walks out the Door_michellgrp10
 
Hurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster RecoveryHurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster Recovery_michellgrp10
 
Legal Passport at Rancho Mirage, CA
Legal Passport at Rancho Mirage, CALegal Passport at Rancho Mirage, CA
Legal Passport at Rancho Mirage, CAYssa Villanda
 
Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -Experitest
 
Resum T4
Resum T4Resum T4
Resum T4Carles
 
ResoluciĂłn y pixeles
ResoluciĂłn y pixelesResoluciĂłn y pixeles
ResoluciĂłn y pixelesLuis MejĂ­a
 
Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...
Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...
Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...Shewta shetty
 
Master programs
Master programsMaster programs
Master programsakshay wal
 
Stroit legko 2'2013 from lindab buildings
Stroit legko 2'2013 from lindab buildingsStroit legko 2'2013 from lindab buildings
Stroit legko 2'2013 from lindab buildingsSteelBuildings.com.ua
 
Meet.js promises
Meet.js promisesMeet.js promises
Meet.js promisesKrzysztof Kula
 
Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...
Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...
Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...IDES Editor
 
Case study on Banking Software Testing - FINACLE : UAT
Case study on Banking Software Testing - FINACLE : UATCase study on Banking Software Testing - FINACLE : UAT
Case study on Banking Software Testing - FINACLE : UATOAK Systems Pvt Ltd
 
Tema 9. quattrocento
Tema 9. quattrocentoTema 9. quattrocento
Tema 9. quattrocentoMusaClio1985
 
An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...
An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...
An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...IDES Editor
 

Andere mochten auch (20)

Ta3s - Testing Banking and Finance Applications
Ta3s - Testing Banking and Finance ApplicationsTa3s - Testing Banking and Finance Applications
Ta3s - Testing Banking and Finance Applications
 
MPC partners of Legal Passport
MPC partners of Legal PassportMPC partners of Legal Passport
MPC partners of Legal Passport
 
How to Manage Your Company's Data as it Walks out the Door
How to Manage Your Company's Data as it Walks out the DoorHow to Manage Your Company's Data as it Walks out the Door
How to Manage Your Company's Data as it Walks out the Door
 
Hurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster RecoveryHurricane Preparedness and Disaster Recovery
Hurricane Preparedness and Disaster Recovery
 
Legal Passport at Rancho Mirage, CA
Legal Passport at Rancho Mirage, CALegal Passport at Rancho Mirage, CA
Legal Passport at Rancho Mirage, CA
 
Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -Experitest & Cigniti Co-Webinar -
Experitest & Cigniti Co-Webinar -
 
Testing banking apps
Testing banking appsTesting banking apps
Testing banking apps
 
Resum T4
Resum T4Resum T4
Resum T4
 
ResoluciĂłn y pixeles
ResoluciĂłn y pixelesResoluciĂłn y pixeles
ResoluciĂłn y pixeles
 
Manzetoveknofliky.cz - SK
Manzetoveknofliky.cz - SKManzetoveknofliky.cz - SK
Manzetoveknofliky.cz - SK
 
Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...
Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...
Effective treatment for epilepsy in Mindheal Homeopathy clinic ,Chembur, Mumb...
 
Master programs
Master programsMaster programs
Master programs
 
Stroit legko 2'2013 from lindab buildings
Stroit legko 2'2013 from lindab buildingsStroit legko 2'2013 from lindab buildings
Stroit legko 2'2013 from lindab buildings
 
Meet.js promises
Meet.js promisesMeet.js promises
Meet.js promises
 
Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...
Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...
Analysis and Control of Wind Driven Self-Excited Induction Generator for Isol...
 
Spring over je eigen valkuilen
Spring over je eigen valkuilenSpring over je eigen valkuilen
Spring over je eigen valkuilen
 
Ecologia
EcologiaEcologia
Ecologia
 
Case study on Banking Software Testing - FINACLE : UAT
Case study on Banking Software Testing - FINACLE : UATCase study on Banking Software Testing - FINACLE : UAT
Case study on Banking Software Testing - FINACLE : UAT
 
Tema 9. quattrocento
Tema 9. quattrocentoTema 9. quattrocento
Tema 9. quattrocento
 
An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...
An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...
An Intelligent Pressure Measurement Technique by Capacitance Pressure Sensor ...
 

Ă„hnlich wie Systematic Model based Testing with Coverage Analysis

A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip IJECEIAES
 
safety assurence in process control
safety assurence in process controlsafety assurence in process control
safety assurence in process controlNathiya Vaithi
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...ijccmsjournal
 
Microcontroller Based Testing of Digital IP-Core
Microcontroller Based Testing of Digital IP-CoreMicrocontroller Based Testing of Digital IP-Core
Microcontroller Based Testing of Digital IP-CoreVLSICS Design
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...VLSICS Design
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...VLSICS Design
 
High-Performance Timing Simulation of Embedded Software
High-Performance Timing Simulation of Embedded SoftwareHigh-Performance Timing Simulation of Embedded Software
High-Performance Timing Simulation of Embedded SoftwareMr. Chanuwan
 
Formal Verification Of An Intellectual Property In a Field Programmable Gate ...
Formal Verification Of An Intellectual Property In a Field Programmable Gate ...Formal Verification Of An Intellectual Property In a Field Programmable Gate ...
Formal Verification Of An Intellectual Property In a Field Programmable Gate ...IRJET Journal
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
Microkontroler
MicrokontrolerMicrokontroler
MicrokontrolerFeira Project
 
UVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATIONUVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATIONIAEME Publication
 
Deployment of Debug and Trace for features in RISC-V Core
Deployment of Debug and Trace for features in RISC-V CoreDeployment of Debug and Trace for features in RISC-V Core
Deployment of Debug and Trace for features in RISC-V CoreIRJET Journal
 
Verilog Ams Used In Top Down Methodology For Wireless Integrated Circuits
Verilog Ams Used In Top Down Methodology For Wireless Integrated CircuitsVerilog Ams Used In Top Down Methodology For Wireless Integrated Circuits
Verilog Ams Used In Top Down Methodology For Wireless Integrated CircuitsRĂ©gis SANTONJA
 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareAdaCore
 
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks IJECEIAES
 
IRJET- Design of Fault Injection Technique for Digital HDL Models
IRJET-  	  Design of Fault Injection Technique for Digital HDL ModelsIRJET-  	  Design of Fault Injection Technique for Digital HDL Models
IRJET- Design of Fault Injection Technique for Digital HDL ModelsIRJET Journal
 
Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...
Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...
Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...NNfamily
 
Performance testing based on time complexity analysis for embedded software
Performance testing based on time complexity analysis for embedded softwarePerformance testing based on time complexity analysis for embedded software
Performance testing based on time complexity analysis for embedded softwareMr. Chanuwan
 

Ă„hnlich wie Systematic Model based Testing with Coverage Analysis (20)

A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip
 
safety assurence in process control
safety assurence in process controlsafety assurence in process control
safety assurence in process control
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
 
Microcontroller Based Testing of Digital IP-Core
Microcontroller Based Testing of Digital IP-CoreMicrocontroller Based Testing of Digital IP-Core
Microcontroller Based Testing of Digital IP-Core
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
 
High-Performance Timing Simulation of Embedded Software
High-Performance Timing Simulation of Embedded SoftwareHigh-Performance Timing Simulation of Embedded Software
High-Performance Timing Simulation of Embedded Software
 
Formal Verification Of An Intellectual Property In a Field Programmable Gate ...
Formal Verification Of An Intellectual Property In a Field Programmable Gate ...Formal Verification Of An Intellectual Property In a Field Programmable Gate ...
Formal Verification Of An Intellectual Property In a Field Programmable Gate ...
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
Microkontroler
MicrokontrolerMicrokontroler
Microkontroler
 
UVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATIONUVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATION
 
Deployment of Debug and Trace for features in RISC-V Core
Deployment of Debug and Trace for features in RISC-V CoreDeployment of Debug and Trace for features in RISC-V Core
Deployment of Debug and Trace for features in RISC-V Core
 
Verilog Ams Used In Top Down Methodology For Wireless Integrated Circuits
Verilog Ams Used In Top Down Methodology For Wireless Integrated CircuitsVerilog Ams Used In Top Down Methodology For Wireless Integrated Circuits
Verilog Ams Used In Top Down Methodology For Wireless Integrated Circuits
 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle software
 
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
 
IRJET- Design of Fault Injection Technique for Digital HDL Models
IRJET-  	  Design of Fault Injection Technique for Digital HDL ModelsIRJET-  	  Design of Fault Injection Technique for Digital HDL Models
IRJET- Design of Fault Injection Technique for Digital HDL Models
 
Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...
Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...
Performancetestingbasedontimecomplexityanalysisforembeddedsoftware 1008150404...
 
Performance testing based on time complexity analysis for embedded software
Performance testing based on time complexity analysis for embedded softwarePerformance testing based on time complexity analysis for embedded software
Performance testing based on time complexity analysis for embedded software
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

KĂĽrzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

KĂĽrzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Systematic Model based Testing with Coverage Analysis

  • 1. Short Paper ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013 Systematic Model based Testing with Coverage Analysis Divyesh Divakar1 and Ashwini K G2 1, 2 Assistant Professor, Dept. of Electrical and Electronics Engineering Canara Engineering College, Mangalore, India divyesh_divakar@rediffmail.com, ashwini_shenoy@rediffmail.com Abstract— Aviation safety has come a long way in over one on target boards and the outputs checked to ensure that hundred years of implementation. In aeronautics, commonly, they match the simulated model output [3]. Extensive testing requirements are Simulink Models. Considering this, many is required for any safety critical system [4]. But failures still conventional low level testing methods are adapted by various happen in flight controls. test engineers. This paper is to propose a method to undertake Low Level testing/ debugging in comparatively easier and This paper intends to change the thought from faster way. As a first step, an attempt is made to simulate correctness-by-construction to construction-for-correctness. developed safety critical control blocks within a specified Any design related to safety critical application tends to be simulation time. For this, the blocks developed will be utilized the safest thereby ensuring Correctness-by-construction. For to test in Simulink environment. What we propose here is this, once the system model is built, rigorous validation and Processor in loop test method using RTDX. The idea is to verification procedures are to be followed. Instead an simulate model (requirement) in parallel with handwritten application can be assured to be the safest by following code (not a generated one) running on a specified target, certain verification process throughout the construction. subjected to same inputs (test cases). Comparing the results In order to define tests capable of detecting errors and of model and target, fidelity can be assured. This paper suggests a development workflow starting with a model created in producing confidence in the software, test scenarios should Simulink and proceeding through generating verified and be designed which are systematically based on the software profiled code for the processor. requirements. However, requirement-based, i.e. logical, test scenarios are abstract and not executable [5]. This means Index Terms — Coverage analysis, Embedded software, that they cannot be used directly for test execution. Therefore, MATLAB, Safety critical system, Software, Software safety. additional executable test scenarios are needed, which can stimulate the interface of the respective test object. I. NOMENCLATURE The test coverage is a function of software design CCS - Code Composer Studio assurance level. For a safety assured software system, test RTDX - Real Time Data Exchange coverage of software requirements as a function of software PIL - Processor in loop design assurance level is nothing short of essentiality. Coverage refers to the extent to which a given verification I. INTRODUCTION activity has satisfied its objectives. Coverage is a measure, not a method or a test and is usually expressed as percentage Modern electronic systems increasingly make use of of an activity that is accomplished. Appropriate coverage embedded computer systems to add functionality, increase measures give verification activities a sense of the adequacy flexibility, controllability and performance. This can lead to of the verification accomplished. new and different failure modes which cannot be addressed with traditional fault tolerance techniques [1]. This is III. PROCESSOR IN LOOP especially significant in Life/Safety critical system. Safety critical systems are those systems whose failure Processor in Loop (PIL) testing environment serve as a could result in loss of life, significant property damage, or data exchange interface between the host simulation and the damage to the environment. Safety-critical systems are object code executing on the target. PIL simulation increasingly computer-based and their development has traditionally been pioneered within the avionics and automotive industries. The avionics industry has succeeded in producing standard methods for producing life-critical avionics software. The standard approach is to carefully code, inspect, document, test, verify and analyse the system [2]. In model based verification process, the models are manually transformed into code or with the use of autocode generators. The code is compiled and executed on the PC or Fig. 1. Proposed Tool © 2013 ACEEE 42 DOI: 01.IJEPE.4.1.1079
  • 2. Short Paper ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013 capability functionally verifies models with the algorithm in output. However, when the input changes direction, an deployed on target platform without having to manually create initial change in input has no effect on the output. The amount an embedded test harness. The proposed tool using this of side-to-side play in the system is referred to as the capability is shown in fig.1. deadband. The deadband is centered about the output. PIL tests are close to real time but do not run in real time, as Simulink controls the execution of the PIL code on the target processor. The simulation halts during each sample period while data is transferred to the target processor. Once the object code completes executing on the processor, the data is transferred back to the host to resume host simulation. Fig. 3 Initial state of Backlash Through this approach, the functional difference between The fig. 3 shows the block’s initial state, with the default the model and compiled object code can be checked, to deadband width of 1 and initial output of 0 and fig. 4 shows identify any potential deviations in the performance the complete behaviour of backlash. introduced by compilation process. A system with play can be in one of three modes: ď‚· Disengaged - In this mode, the input does not drive A. Model (Can be Requirement) the output and the output remains constant. For an example, we developed a safety critical control ď‚· Engaged in a positive direction - In this mode, the block, (to be precise- Backlash) as per the requirements and input is increasing (has a positive slope) and the is shown in fig.2. The functionality and behaviour of this output is equal to the input minus half the deadband block was thoroughly studied before getting into the testing. width. ď‚· Engaged in a negative direction - In this mode ,the input is decreasing (has a negative slope) and the output is equal to the input plus half the deadband width. Fig. 4 Simulated behaviour of Backlash B. C Code Fig. 2 Simulink Model for Backlash For high quality software, it is important to choose the Experience has shown that aircraft structures are generally programming language and compiler to be used. There are affected by structural nonlinearities. The form of the likely to be a large number of different factors to take into nonlinearity encountered on actual aircraft structures is in account when making this choice, such as the past experience general not very well known and is an area worthy of further of the programmers; the re-use of existing modules; the research. In absence of more definite information, two compilers available, including the speed of execution of their relatively simple characteristic types of structural generated code; and the portability of the programs [6]. One nonlinearities are: backlash and centrally symmetric of the languages most commonly used in safety related hysteresis loop. applications and, therefore, the most often evaluated one in The amount by which the width of a tooth space exceeds this respect is C [7]. Matlab share handles easily with CCS, the thickness of the engaging tooth on the pitch circles is its thus developed code for the PIL environment is in C language. measure.   As  actually  indicated  by  measuring  devices, A segment of developed C code indicating the backlash may be determined variously in the transverse, functionality of the model is given below: normal, or axial planes, and wither in the direction of the pitch void bckfn(int init, double inp, state *a) circles or on the line of action. Such measurements should { be converted to corresponding values on transverse pitch double Out; circles for general comparison. The Backlash block implements Out = a->Out; a system in which a change in input causes an equal change if (init == 1) © 2013 ACEEE 43 DOI: 01.IJEPE.4.1.1079
  • 3. Short Paper ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013 Out = ic; else { if (inp > (Out + deadband/2)) Out = inp - (deadband/2); else if (inp < (Out - deadband/2)) Out = inp + (deadband/2); } a->Out = Out; } Now, the model is in Matlab/Simulink and C code in CCS. This necessitates establishing all the handles to start with PIL simulation. A function can be executed by calling it by means of the function handle. Many such blocks where designed and each block is identified and determined to have separate functionality and Fig. 5 RTDX initialisation in CCS its use is limited to the right system. IV. WORKING WITH RTDX RTDX offers continuous bi-directional data exchange in real time with minimal perturbation on the application. Basically its Texas Instrument’s DSP analysis technology. RTDX provides continuous visibility into the way target applications operate in the real world. This helps us to get a realistic view of how the system will work. RTDX establishes across the connection between MATLAB software and CCS, by which we can: ď‚· Send and retrieve data from memory on the processor. ď‚· Change the operating characteristics of the program. ď‚· Make changes to algorithms as needed without stopping the program or setting breakpoints in the code (fig.5). RTDX and Embedded IDE link CC provide a communication channel that enables to exchange data in real time or close to real time between Matlab and target simulator while target application is running (fig.6). System level test benches can be used to compare performance and results of Fig. 6 Simulation with RTDX code with the original reference model. the simulation and target implementation with RTDX can be Embedded IDE link CC utilizes the in process easily adapted with proper understanding of the concept. communication and data transfer technology in CCS. As a Many improvements are to be made to our approach to result, application can read and write large data sets faster standardize the same. and quickly from and to the target. It supports PIL simulation with various processors using the same Matlab and Simulink A. Coverage Analysis test vectors for system design and verification. Coverage is a form of testing that inspects the code directly and is a form of white box testing. Increasing the V. VERIFICATION coverage increases the confidence in the design’s Tests on PIL level are important because they can reveal correctness. faults that are caused by the target compiler or by the Code coverage describes the degree to which the source processor architecture. It is the last integration level which code of a program as been tested. One or more coverage allows debugging during tests in a cheap and manageable criteria are used to measure how well the program is exercised way. The model and target implementation is randomly by collection of test cases. The entire program was run with simulated to check any functional difference between them. some test suites. Following is a bit of code developed for the Fig.7 shows the obtained results. Looking into the results system. obtained, it can be concluded that this approach of comparing © 2013 ACEEE 44 DOI: 01.IJEPE.4.1.1079
  • 4. Short Paper ACEEE Int. J. on Electrical and Power Engineering, Vol. 4, No. 1, Feb 2013 Fig. 7 Simulation Result index = find(input>= (deadband)); Fig. 8 Code coverage if isempty(index) and evaluation. A modeling and testing framework is proposed . which successfully does a regular random testing to generate . optimized test sets giving complete system coverage. In index = find(input <= -(deadband/2)); future, the PIL test method has to be extended for a processor if isempty(index) board taking into consideration the real world inputs and cov(2,1) = max((deadband/2 - noise in quantization. input(index)).^2); cov(2,2) = 0; REFERENCES else [1] Embedded software design for safety critical systems, cov(2,1) = max((deadband/2 - Knowledge transfer network electronics, Nov. 2009. input(index)).^2); [2] Divyesh Divakar, Hariram Selvamurugan, Yogananda Jeppu, . Nagaraj Murthy, Manjunath L, Shreesha Chokkadi, . “Randomized Testing to Describe the Behaviour of Safety Critical Control Blocks”, National Conference on Information . Systems, 2011. “unpublished” end [3] Divyesh Divakar, K. Samatha, A. V. Veena Rani, Hariram Statement coverage is simplest form of coverage, which Selvamurugan, Yogananda Jeppu, Nagaraj Murthy and indicates that each and every statement is executed at least Shreesha Chokkadi, “Optimization of Test case and Coverage once. Functional coverage refers directly to the computation Analysis for Model Based Design”, 34 TH National systems performed by the system. During simulation, each function conference on System Solutions for Global Challenges: Energy, Environment and Security,10-12 December 2010. call is exercised (here max). “unpublished” Execution of blocks which act as a decision point is to be [4] Johnson, C. W.; Holloway, C. M. “The Dangers of Failure analyzed for decision coverage. To obtain full decision Masking in Fault-Tolerant Software: Aspects of a Recent In- coverage, all the conditions in if statement is to be satisfied. Flight Upset”, Event NASA Center: Langley Research Center The complete code coverage analysis was performed by Publication Year 2007, Document ID: 20070034017. considering optimized test cases. The obtained simulation [5] Mirko Conrad, Ines Fey, Sadegh Sadeghipour. “Systematic result is shown in fig. 8. Model Based Testing of Embedded Automative Software”, Science Direct Electronic Notes in Theoretical Computer CONCLUSION Science 111 Publication Year 2005, page 13–26. [6] C.J.Burgess, “Software quality issues when choosing a The basic control blocks of any safety critical system/ programming language”, university of Bristol, England, 1995 test specimen was developed and tested using random test [7] Wolfgang A. Halang, Janusz Zalewski, “Programming cases. A C code was developed for the control blocks. languages for use in safety-related applications”, Annual Improvement and measurement of system quality involves Reviews in Control, 2003 the stages of test case specification, generation, execution © 2013 ACEEE 45 DOI: 01.IJEPE.4.1.1079