期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Contribution of Automated Antigen Tests, the LumiraDx Ag Test in the Response during the Second Wave of the COVID-19 Pandemic in Bangui
1
作者 Clotaire Donatien Rafaï Pierre Somse +18 位作者 Wilfrid Sylvain Nambei Ernest Lango-Yaya Marie-Roseline Darnycka Belizaire Ulrich Vickos Narcisse Patrice Komas Oscar Senzongo Luc Salva Heredeibona Ulrich Jeffrey Kotemossoua Rabbi Mermoz Senekian Simon Pounguinza Jephté Estimé Kaleb Kandou Christian-Diamant Mossoro-Kpinde Laurent Bélec Jean De Dieu Longo Norbert Richard Ngbale Abdoulaye Sepou François-Xavier Mbopi-Keou Gérard Grésenguet Boniface Koffi 《Journal of Tuberculosis Research》 2023年第4期173-183,共11页
Context and objective: The COVID-19 pandemic has become a major public health problem and has mobilized many innovative means of diagnosis. The Central African Republic is not spared. The emergence of variants and the... Context and objective: The COVID-19 pandemic has become a major public health problem and has mobilized many innovative means of diagnosis. The Central African Republic is not spared. The emergence of variants and their impact require health monitoring despite the obligation of vaccination. The purpose of this campaign was to determine the circulation of pending second-wave variants. Patients and Methods: A second mass screening campaign took place from 02 to 22 July 2021 in the main land and river entry points of Bangui (Exit North-PK12, Exit South-PK9, Port Beach) and at the LNBCSP. Antigenic and RT-PCR tests carried out on nasopharyngeal samples made it possible to select strains which were finally sequenced. Results: Of 2687 participants included in the study, 53 (1.97%) were positive for SARS-CoV-2. Thirteen (1.53%) were male and 40 (2.18%) female. The analyses carried out on the LumiraDx analyzer were positive for 109 samples against 53 on the RT-PCR. The prevalence was higher in the most tested age groups (30 to 50 years) with two clusters identified. B.1.617.2 (Delta) variants were predominant (57%). Conclusion: SARS-CoV-2 continues to circulate. The acquisition of automated antigenic tests (LumiraDx&#174) with sensitivity and specificity close to those of the reference test (RT-PCR) will allow better mass diagnosis for an optimization of the surveillance of COVID-19 in our countries with limited resources. The predominance of the B.1.617.2 (Delta) variant would suggest a third wave in the Central African Republic. 展开更多
关键词 COVID-19 Automated Antigen testing
下载PDF
浅谈仪表自动化设计与施工服务时应注意的问题 被引量:7
2
作者 崔育松 《自动化技术与应用》 2013年第6期92-94,119,共4页
本文叙述了仪表在设计、采购、施工及试运行(调试)等阶段的设计要求以及与有关专业、业主等方面的沟通,着重阐述了仪表自动化设计、选型原则及施工阶段的总结。
关键词 仪表自动化 施工服务 专业配合
下载PDF
An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference
3
作者 Yichao Zang Tairan Hu +1 位作者 Tianyang Zhou Wanjiang Deng 《Computers, Materials & Continua》 SCIE EI 2021年第3期2573-2585,共13页
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration testing.Associative rule mining,a data mining technique,has been st... Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration testing.Associative rule mining,a data mining technique,has been studied and explored for a long time.However,few studies have focused on knowledge discovery in the penetration testing area.The experimental result reveals that the long-tail distribution of penetration testing data nullifies the effectiveness of associative rule mining algorithms that are based on frequent pattern.To address this problem,a Bayesian inference based penetration semantic knowledge mining algorithm is proposed.First,a directed bipartite graph model,a kind of Bayesian network,is constructed to formalize penetration testing data.Then,we adopt the maximum likelihood estimate method to optimize the model parameters and decompose a large Bayesian network into smaller networks based on conditional independence of variables for improved solution efficiency.Finally,irrelevant variable elimination is adopted to extract penetration semantic knowledge from the conditional probability distribution of the model.The experimental results show that the proposed method can discover penetration semantic knowledge from raw penetration testing data effectively and efficiently. 展开更多
关键词 Penetration semantic knowledge automated penetration testing Bayesian inference cyber security
下载PDF
Iterative Android automated testing
4
作者 Yi ZHONG Mengyu SHI +2 位作者 Youran XU Chunrong FANG Zhenyu CHEN 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期15-26,共12页
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage... With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage in complex interactive Activities.And the effectiveness of manual testing is highly dependent on the user operation process(UOP)of experienced testers.Based on the UOP,we propose an iterative Android automated testing(IAAT)method that automatically records,extracts,and integrates UOPs to guide the test logic of the tool across the complex Activity iteratively.The feedback test results can train the UOPs to achieve higher coverage in each iteration.We extracted 50 UOPs and conducted experiments on 10 popular mobile APPs to demonstrate IAAT’s effectiveness compared with Monkey and the initial automated tests.The experimental results show a noticeable improvement in the IAAT compared with the test logic without human knowledge.Under the 60 minutes test time,the average code coverage is improved by 13.98%to 37.83%,higher than the 27.48%of Monkey under the same conditions. 展开更多
关键词 quality assurance automated testing UOP test coverage
原文传递
Search-Based Software Test Data Generation for Path Coverage Based on a Feedback-Directed Mechanism
5
作者 Stuart Dereck Semujju Han Huang +2 位作者 Fangqing Liu Yi Xiang Zhifeng Hao 《Complex System Modeling and Simulation》 2023年第1期12-31,共20页
Automatically generating test cases by evolutionary algorithms to satisfy the path coverage criterion has attracted much research attention in software testing.In the context of generating test cases to cover many tar... Automatically generating test cases by evolutionary algorithms to satisfy the path coverage criterion has attracted much research attention in software testing.In the context of generating test cases to cover many target paths,the efficiency of existing methods needs to be further improved when infeasible or difficult paths exist in the program under test.This is because a significant amount of the search budget(i.e.,time allocated for the search to run)is consumed when computing fitness evaluations of individuals on infeasible or difficult paths.In this work,we present a feedback-directed mechanism that temporarily removes groups of paths from the target paths when no improvement is observed for these paths in subsequent generations.To fulfill this task,our strategy first organizes paths into groups.Then,in each generation,the objective scores of each individual for all paths in each group are summed up.For each group,the lowest value of the summed up objective scores among all individuals is assigned as the best aggregated score for a group.A group is removed when no improvement is observed in its best aggregated score over the last two generations.The experimental results show that the proposed approach can significantly improve path coverage rates for programs under test with infeasible or difficult paths in case of a limited search budget.In particular,the feedback-directed mechanism reduces wasting the search budget on infeasible paths or on difficult target paths that require many fitness evaluations before getting an improvement. 展开更多
关键词 automated test case generation software testing path coverage many-objective optimization
原文传递
AWeb Application Fingerprint Recognition Method Based on Machine Learning
6
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 Web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
下载PDF
Model-based automated testing of JavaScript Web applications via longer test sequences
7
作者 Pengfei GAO Yongjie XU +1 位作者 Fu SONG Taolue CHEN 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期53-66,共14页
JavaScript has become one of the most widely used languages for Web development.Its dynamic and event-driven features make it challenging to ensure the correctness of Web applications written in JavaScript.A variety o... JavaScript has become one of the most widely used languages for Web development.Its dynamic and event-driven features make it challenging to ensure the correctness of Web applications written in JavaScript.A variety of dynamic analysis techniques have been proposed which are,however,limited in either coverage or scalability.In this paper,we propose a simple,yet effective,model-based automated testing approach to achieve a high code-coverage within the time budget via testing with longer event sequences.We implement our approach as an open-source tool LJS,and perform extensive experiments on 21 publicly available benchmarks.On average,LJS is able to achieve 86.5%line coverage in 10 minutes.Compared with JSDEP,a state-of-the-art breadth-first search based automated testing tool enriched with partial order reduction,the coverage of LJS is 11%-19%higher than that of JSDEP on real-world large Web applications.Our empirical findings support that proper longer test sequences can achieve a higher code coverage in JavaScript Web application testing. 展开更多
关键词 model-based testing automated testing JavaScript Web applications
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部