In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t...In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing.展开更多
A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault inje...A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components.展开更多
AREVA operates a world-wide unique thermal hydraulic platform to ensure high safety standards in the nuclear industries. This platform is operated as an accredited test and inspection body according to ISO 17025 and 1...AREVA operates a world-wide unique thermal hydraulic platform to ensure high safety standards in the nuclear industries. This platform is operated as an accredited test and inspection body according to ISO 17025 and 17020 to grant a high and independently confmned quality standard. The accreditation also ensures the independency of the organization and confidentiality to the individual stakeholders, for example research centers, utilities, components suppliers, engineering companies and vendors. Especially for nuclear power plants, it is very relevant to consider that reliability depends on the integrity of its components during its life time-from design through construction, operation and maintenance. For example, a typical NPP (nuclear power plant) has 1,000 to 2,000 large valves and 7,500 to 12,500 small valves, of which about 200 to 400 are designated Safety Class 1. The qualification of these Safety Class 1 components is relevant for reactor new builds but also for installed plants. This paper explains newly established qualification tasks, the corresponding testing infrastructure, and the state of the art of testing technology. By way of example, the paper describes the program and possible sequence of qualifying NPP safety-related components.展开更多
Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keywor...Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches.展开更多
Linear mixed-effects models are widely used in analysis of longitudinal data. However, testing for zero-variance components of random effects has not been well-resolved in statistical literature, although some likelih...Linear mixed-effects models are widely used in analysis of longitudinal data. However, testing for zero-variance components of random effects has not been well-resolved in statistical literature, although some likelihood-based procedures have been proposed and studied. In this article, we propose a generalized p-value based method in coupling with fiducial inference to tackle this problem. The proposed method is also applied to test linearity of the nonparametric functions in additive models. We provide theoretical justifications and develop an implementation algorithm for the proposed method. We evaluate its finite-sample performance and compare it with that of the restricted likelihood ratio test via simulation experiments. We illustrate the proposed approach using an application from a nutritional study.展开更多
In the point of application to ultrasonic nondestructive testing of surface stress and defect in polymer component, the oblique suxface wave transducer is investigated on its acoustic property and especially the mecha...In the point of application to ultrasonic nondestructive testing of surface stress and defect in polymer component, the oblique suxface wave transducer is investigated on its acoustic property and especially the mechanism of acoustic attenuation of acoustic entrant material inside the transducer. A new kind of room temperature vulcanized silicone elastomer as wedge material, in which ultrasound can propagate in very low speed with weak attenuation, is developed through a great deal of trials. The corresponding ultrasonic transducer is also designed for further researches and application to detect surface stress and surface crack in aerospace transparent component.展开更多
Through reusing software test components, automated software testing generally costs less than manual software testing. There has been much research on how to develop the reusable test components, but few fall on how ...Through reusing software test components, automated software testing generally costs less than manual software testing. There has been much research on how to develop the reusable test components, but few fall on how to estimate the reusability of test conlponents for automated testing. The purpose of this paper is to present a method of minimum reusability estimation for automated testing based on the return on investment (ROI) model. Minimum reusability is a benchmark for the whole automated testing process. If the reusability in one test execution is less than the minimum reusability, some new strategies must be adopted ill the next test execution to increase the reusability. Only by this way, we can reduce unnecessary costs and finally get a return on the investment of automated testing.展开更多
基金supported by National Natural Science Foundation of China (NSFC grant number:61202110,61401180 and 61502205)the Postdoctoral Science Foundation of China (Grant number:2015M571687 and 2015M581739)the Graduate Research Innovation Project of Jiangsu Province(KYLX15_1079 and KYLX16_0900)
文摘In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing.
基金Project(513150601)supported by the National Pre-Research Project Foundation of China
文摘A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components.
文摘AREVA operates a world-wide unique thermal hydraulic platform to ensure high safety standards in the nuclear industries. This platform is operated as an accredited test and inspection body according to ISO 17025 and 17020 to grant a high and independently confmned quality standard. The accreditation also ensures the independency of the organization and confidentiality to the individual stakeholders, for example research centers, utilities, components suppliers, engineering companies and vendors. Especially for nuclear power plants, it is very relevant to consider that reliability depends on the integrity of its components during its life time-from design through construction, operation and maintenance. For example, a typical NPP (nuclear power plant) has 1,000 to 2,000 large valves and 7,500 to 12,500 small valves, of which about 200 to 400 are designated Safety Class 1. The qualification of these Safety Class 1 components is relevant for reactor new builds but also for installed plants. This paper explains newly established qualification tasks, the corresponding testing infrastructure, and the state of the art of testing technology. By way of example, the paper describes the program and possible sequence of qualifying NPP safety-related components.
基金supported by the National Natural Science Foundation of China (Nos.61202110 and 61502205)the Postdoctoral Science Foundation of China (Nos.2015M571687 and 2015M581739)the Graduate Research Innovation Project of Jiangsu Province (No.KYLX15 1079)
文摘Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches.
基金supported by Shandong Provincial Natural Science Foundation of China(Grant No.ZR2014AM019)National Natural Science Foundation of China(Grant Nos.11171188 and 11529101)the Scientific Research Foundation for the Returned Overseas Chinese Scholars,State Education Ministry of China,and National Science Foundation of USA(Grant Nos.DMS-1418042 and DMS-1620898)
文摘Linear mixed-effects models are widely used in analysis of longitudinal data. However, testing for zero-variance components of random effects has not been well-resolved in statistical literature, although some likelihood-based procedures have been proposed and studied. In this article, we propose a generalized p-value based method in coupling with fiducial inference to tackle this problem. The proposed method is also applied to test linearity of the nonparametric functions in additive models. We provide theoretical justifications and develop an implementation algorithm for the proposed method. We evaluate its finite-sample performance and compare it with that of the restricted likelihood ratio test via simulation experiments. We illustrate the proposed approach using an application from a nutritional study.
文摘In the point of application to ultrasonic nondestructive testing of surface stress and defect in polymer component, the oblique suxface wave transducer is investigated on its acoustic property and especially the mechanism of acoustic attenuation of acoustic entrant material inside the transducer. A new kind of room temperature vulcanized silicone elastomer as wedge material, in which ultrasound can propagate in very low speed with weak attenuation, is developed through a great deal of trials. The corresponding ultrasonic transducer is also designed for further researches and application to detect surface stress and surface crack in aerospace transparent component.
基金Foundation item: the National Natural Science Foundation of China (No. 90718037)
文摘Through reusing software test components, automated software testing generally costs less than manual software testing. There has been much research on how to develop the reusable test components, but few fall on how to estimate the reusability of test conlponents for automated testing. The purpose of this paper is to present a method of minimum reusability estimation for automated testing based on the return on investment (ROI) model. Minimum reusability is a benchmark for the whole automated testing process. If the reusability in one test execution is less than the minimum reusability, some new strategies must be adopted ill the next test execution to increase the reusability. Only by this way, we can reduce unnecessary costs and finally get a return on the investment of automated testing.