Comparative Analysis of Performance Testing Tools
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1583-1597, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.15831597
Abstract
In Software Engineering, testing a website/web application has become a basic necessity for proper working of the software. Testing can be performed manually as well as with the help of automation testing tools to meet functional and non-functional requirements. Performance testing is one of the non-functional testing in Software Engineering which is necessary to check the high scalability, speed and stability of the system and to discover the number of concurrent users that can access the application without a heavy degradation of the user experience, to find application’s behavior under load, to check the time it takes to respond and understand if your website loads in a decent amount of time. The comparative analysis of testing tools is done to provide tester an easy selection of tool thereby saving the time in checking and installing each and every tool. Comparison is done based on installation process, complexity of usage, throughput generated of website, response time, report generation techniques, external library requirements, etc.
Key-Words / Index Term
Testing tools, Types of tools
References
[1] Performance testing: Analyzing differences of response time between performance testing tools by Muhammad Dhiauddin MohamedSuffian and F. R. Fahrurazi,:13/04/2017
[2]Comparative Analysis of Open Source Automated Software Testing Tools: Selenium, Sikuli and Watir Inderjeet Singh and Bindia Tarika ,:13/04/2017
[3]IJCA - A Survey on Cross Browser Inconsistencies in Web Application,:13/04/2017
[4]Detection of Cross Browser Inconsistency Author`s : C.P.Patidar, Meena Sharma, Varsha Sharda. ,:13/04/2017
[5]Experiences in performance testing of web applications with Unified Authentication platform using Jmeter - IEEE Xplore Document,:13/04/2017
[6]Review on Software Testing Techniques by Bindia Tarika,:13/04/2017
[7]Analysis of Automation and Manual Testing Using Software Testing Tool Priyanka Rathi Vipul Mehra,:13/04/2017
[8]A Review On Software Testing In SDlC And Testing Tools T.Amruthavalli, S.MahaLAkshmi, K.HariKrishnan,:13/04/2017
[9]INFOTEH-JAHORINA Vol. 13, March 2014.- 63 7 -Challenges in Estimating Software Testing Effort,:13/04/2017
[11]Software Design,Testing & Engineering:Andrew S.Tanenbaum,:13/04/2017
[12]Why Performance Testing: https://abstracta.us/2015/10/12/why-performance-testing-is-necessary:13/04/2017
[13]PerformanceTestingBasics:https://www.tutorialspoint.com/software_testing_dictionary/performance_testing.htm,:13/04/2017
[14]Performance Testing Types: http://www.guru99.com/performance-testing.html,:13/04/2017
[15]Apache JMeter:http://jmeter.apache.org/ ,:13/04/2017
[16]https://www.loadtestingtool.com/ ,:13/04/2017
[17]BlazeMeter: http:// https://www.blazemeter.com ,:13/04/2017
[18]LoadStorm: https://loadstorm.com/ ,:13/04/2017
[19]Pylot Tool:https://qatestingtools.com/testing-tool/pylt,:13/04/2017
[20]BlazeMeter Procing: https://www.blazemeter.com/pricing,: 13/04/2017
Citation
Chandra Prakash Patidar, "Comparative Analysis of Performance Testing Tools," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1583-1597, 2018.
Design and Development of a Multi-Instance Fingerprint Template Security Scheme
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1598-1603, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.15981603
Abstract
Cancellable biometrics is one of the productive areas of biometrics and it guarantees the non-invertibility and revocability properties of an ideal template security scheme. In this paper, various cancellable fingerprint template security schemes, their comparison and a novel method for securing the multi-instance fingerprints have been discussed. The pseudocode of the proposed scheme is also presented. The proposed technique produces one fused secured template and this template is formed with the help of feature level fusion technique. The division method is used to secure both of the templates in order to make them non-invertible. The calculated EER and GAR for the proposed technique are 2.87% and 89.937% respectively.
Key-Words / Index Term
Cancellable Biometrics, Many-to-one mapping, Non-Invertible transforms, Biometric Salting
References
[1] A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A tool for information security,” IEEE Trans. Inf. Forensics Secur., vol. 1, no. 2, pp. 125–143, 2006.
[2] A. K. Jain and A. Kumar, “Biometrics of Next Generation: An Overview,” Second Gener. Biometrics Ethical, Leg. Soc. Context, vol. 11, pp. 49–79, 2010.
[3] O. Ogbanufe and D. J. Kim, “Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment,” Decis. Support Syst., vol. 106, pp. 1–14, 2018.
[4] Introduction to biometrics. "A.K, jain". .
[5] K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, 2008.
[6] C. Rathgeb and A. Uhl, “A Survey on Biometric Cryptosystems,” pp. 1–25, 2011.
[7] G. Kumar et al., “Symmetric hash functions for secure fingerprint biometric systems,” Pattern Recognit. Lett., vol. 28, no. 16, pp. 2427–2436, 2007.
[8] G. Kumar, S. Tulyakov, and V. Govindaraju, “Combination of symmetric hash functions for secure fingerprint matching,” Proc. - Int. Conf. Pattern Recognit., pp. 890–893, 2010.
[9] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561–572, 2007.
[10] F. Q. F. Quan, S. F. S. Fei, C. A. C. Anni, and Z. F. Z. Feifei, “Cracking Cancelable Fingerprint Template of Ratha,” 2008 Int. Symp. Comput. Sci. Comput. Technol., vol. 2, pp. 572–575, 2008.
[11] S. Wang and J. Hu, “Alignment-free cancelable fingerprint template design : A densely infinite-to-one mapping ( DITOM ) approach,” Pattern Recognit., vol. 45, no. 12, pp. 4129–4137, 2012.
[12] C. Lee and J. Kim, “Journal of Network and Computer Applications Cancelable fingerprint templates using minutiae-based bit-strings,” J. Netw. Comput. Appl., vol. 33, no. 3, pp. 236–246, 2010.
[13] Z. Jin, T. S. Ong, and C. Tee, “Generating Revocable Fingerprint Template Using Polar Grid based 3- Tuple Quantization Technique,” pp. 0–3, 2011.
Citation
Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal, "Design and Development of a Multi-Instance Fingerprint Template Security Scheme," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1598-1603, 2018.
VM Optimization using Deadline Based Task Scheduling in Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.1604-1608, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.16041608
Abstract
The approach of scheduling the tasks directly impacts the performance of cloud. Deadline based approach is the major area of concern in cloud computing, because deadline based tasks must be executed in time. In this paper, a novel deadline based task scheduling system model has been proposed. In proposed model, tasks have been executed on the basis of deadline constraint. Auto-scalability and resource optimization are other factors that have also been taken into consideration into the present work. The proposed model assists in reducing the makespan of the requests that is valuable to user.
Key-Words / Index Term
Cloud computing, deadline based constraint, makespan, resource optimization, scheduling algorithm
References
[1] Javier Celaya, Unai Arronategui, “A Highly Scalable Decentralized Schedulerof Tasks with Deadlines”, in IEEE/ACM 12th International Conference on Grid Computing, 2011, pp. 58 – 65.
[2] Lu Guan, Ying Wang, Yanfei Li, “A Dynamic Resource Allocation Method in IaaSBased on Deadline Time”, in IEEE 14th Asia-PacificNetwork Operations and Management Symposium (APNOMS), 2012, pp. 1 – 4.
[3] Guan Le, Ke Xu, Junde Song, “Dynamic Resource Provisioning and Scheduling with Deadline Constraint in Elastic Cloud”, in IEEE International Conference on Service Science, 2013, pp. 113-117.
[4] Zhao-Rong Lai, Che-Wei Chang, Xue Liu, Tei-Wei Kuo, Pi-Cheng Hsiu, “Deadline-Aware Load Balancing for MapReduce”, in IEEE 20th Internati-onal Conference on Embedded and Real-Time Computing Systems & Applications, 2014, pp. 1-10.
[5] Chien-Hung Chen, Jenn-Wei Lin, Sy-Yen Kuo, “Deadline-Constrained MapReduce Scheduling Based on Graph Modelling”, in IEEE International Conference on Cloud Computing, 2014, pp. 416-423.
[6] Maurice Khabbaz, Chadi Assi, “Modelling and Analysis of A Novel Deadline-Aware Scheduling Scheme for Cloud Computing Data Centers”,in IEEE Transactions on Cloud Computing, 2015, pp. 15.
[7] Dinesh Komarasamy, Vijayalakshmi Muthu-swamy, “Adaptive Deadline based Dependent Job Scheduling algorithm in Cloud Computing”, in IEEE Seventh International Conference on Advanced Computing, 2015, pp. 1-5.
[8] R Krishnam Raju Indukuri, Suresh Varma Penmasta, Dr. M V Rama Sundari, Dr. G. Jose Moses, “Performance Evaluation of Deadline Aware Multi Stage Schedulingin Cloud Computing”, in IEEE 6th International Conference on Advanced Computing, 2016, pp. 229-234.
[9] Vinay Kand S M Dilip Kumar, “Auto-scaling for Deadline Constrained Scientific Workflows in Cloud Environment”, in IEEE Annual India Conference (INDICON), 2016, pp. 1-6.
[10] Longkun Guo, Hong Shen, “Efficient Approxi-mation Algorithms for the Bounded Flexible Schedu-ling Problem in Clouds”, in IEEE Transactions on Parallel and Distributed Systems, 2017, pp. 1-12.
[11] Jieun Choi, Younsun Ahn, Seoyoung Kim, Yoonhee Kim1, Jaeyoung Choi, “VM Auto-scaling Methods for High Throughput Computing on Hybrid Infrastructure”, in cluster computing, springer, 2015, pp. 1063–1073.
Citation
Monika, Pardeep Kumar, Sanjay Tyagi, "VM Optimization using Deadline Based Task Scheduling in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1604-1608, 2018.
Review of Comparisons on Secure & Energy Efficient Clustering Protocols in Wireless Sensor Networks
Review Paper | Journal Paper
Vol.6 , Issue.6 , pp.1609-1614, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.16091614
Abstract
Research on wireless sensor networks has recently received much attention as they offer an advantage of monitoring various kinds of environment by sensing physical phenomenon. Prolonged network lifetime, scalability, and load balancing are important requirement for many sensor network applications. Clustering sensor nodes is an effective technique for achieving these goals. In this paper, we evaluate and compare state-of-the-art clustering protocols, i.e., LEACH,LEACH C and HEED. Finally, these clustering approaches were compared based on a few metrics such as convergence rate, cluster stability, cluster overlapping, location-awareness and support for node mobility. Finally, we summarize and conclude the paper with some future directions
Key-Words / Index Term
Cluster Head Selection, HEED and LEACH Protocol ,Wireless Sensor Networks (WSN)
References
[1] Li Xunbo, Li Na, Chen Liang, Shen Yan, Wang Zhenlin, and Zhu Zhibin?An Improved LEACH for Clustering Protocols In Wireless Sensor Networks?. 2010 International Conference on Measuring Technology and Mechatronics Automation.
[2] K. Akkaya, M. Younis, ?A survey on Routing Protocols for Wireless Sensor Networks?, Computer Networks (Elsevier) Journal, 2004.
[3] Parminder Kaur, Mrs. MamtaKatiyar,?The Energy-Efficient Hierarchical Routing Protocols for WSN: A Review? IJARCSSE, Volume 2, Issue 11, November 2012 ISSN: 2277 128X
[4] I. F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, ?Wireless sensor networks: a survey, ? Computer Networks, Vol.38, pp. 393,422, March 2002.
[5] W. Hinzelman, A. Chandrakasan, H. Balakrishnan. "Energy-Efficient communication protocol for wireless microsensor network", Proc. of the Hawaii International Conference on System Sciences, IEEE Computer Society, Washington. DC USA, Jan 2000, pp.3005-3014.
[6] M. BaniYassein, A. Al-zou`bi, Y. Khamayseh, W. Mardini ?Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)?, International Journal of Digital Content Technology and its Applications Volume 3, Number 2, June 2009.
[7] Sabarish B A, Guru Moorthy S M, Dhivya M A, Sakthi Naveen K, Vaishnavi S ?A survey on clustering protocols in Wireless Sensor Networks? International Journal Of Advances In Computing and Information Technology, published on April 2012.
[8] OssamaYounis, Sonia Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Transactions on Mobile Computing, vol. 03, no. 4, pp. 366-379, Oct., 2004.
[9] Boyinbode, O.; Le, H.; Mbogho, A.; Takizawa, M; Poliah, R. A Survey on Clustering Algorithms for Wireless Sensor Networks. In Proceedings of 2010 13th International Conference on Network-Based Information Systems, Takayama, Japan, 14?16 September, 2010; pp. 358?364.
[10] Xu, D.; Gao, J. Comparison study to hierarchical routing protocols in wireless sensor networks. Procedia Environ. Sci. 2011, 10, 595?600.
[11] O. Younis and S. Fahmy, ?HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,? IEEE Transactions on Mobile Computing, vol .3 , no. 4, Dec 2004, pp. 366-79.
[12] AbdoSaif Mohammed, M.N. Shanmukhaswamy "A Novel Algorithm to Select Cluster Heads with Highest and Balanced Energy in Wireless Sensor Networks? International Journal of Computer Applications (0975?8887) Volume 54? No.4, September 2012.
Citation
Suresh Kumar, Kalpana Midha, "Review of Comparisons on Secure & Energy Efficient Clustering Protocols in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1609-1614, 2018.