Fault Detection of Reachability Testing with Game Theoretic Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
This paper presents a game theoretic approach to fault detection of reachability testing. Physical systems are susceptible to fault at any time. Due to this reason the problem of determining and reacting to fault detection has received a greater attention in today’s era. In this paper we study the fault detection of reachability tesing from a game theoretic point of view. Reachability testing is an approach that combines non-deterministic and deterministic testing. It is based on a technique, called prefix-based testing, which executes a test run deterministically up to a certain point and there after allows the test run to proceed non-deterministically. We use the well known framework of reachability testing in two fold. First, reachability testing adopts a dynamic framework in which SYN-sequences are derived automatically and on-the-fly, without constructing any static models. Second, reachability testing is an interleaving-free approach in which independent events are never totally ordered in a SYN-sequence. Therefore, reachability testing automatically avoids the problem of exercising more than one interleaving of the same partial ordering of events. The methodology controls the evolution of the system and chooses whether and when a fault occurs and the detection of the same. Case study and preliminary experimental results indicate that proves to be a viable approach using game theoretic method.
Authors and Affiliations
S. Preetha , Dr. M. Punithavalli
An Evident Theoretic Feature Selection Approach for Text Categorization
With the exponential growth of textual documents available in unstructured form on the Internet, feature selection approaches are increasingly significant for the preprocessing of textual documents for automatic text cat...
A Novel Session Based Dual Image Encoding and Hiding Technique Using DWT and Spread Spectrum
This work proposes a DWT based Steganographic technique. Cover image is decomposed into four sub bands using DWT. Two Encoded secret images are embedded within the HL and HH sub bands respectively. During embedding secre...
Software Reliability Growth Models for the Safety Critical Software with Imperfect Debugging
In this paper, we will investigate how to perform he log-logistic testing-effort function (TEF) into different software reliability growth models based on non-homogeneous Poisson process (NHPP). The models parameters are...
Great Circle Distance Methode for Improving Operational Control System Based on GPS Tracking System
Fleet monitoring conducted to determine the position of the movement of the fleet to a point of reference. There are three applications that are necessary for the implementation of the monitoring system. They are Global...
Image Segmentation using Extended Edge Operator for Mammographic Images
Detection of edges in an image is a very important step owards understanding image features. Since edges often occur at mage locations representing object boundaries, edge etection is extensively used in image segmenta...