Papers - KATAYAMA Tetsuro
-
Prototype of MixVRT Which Is a Visual Regression Testing Tool That Highlights Layout Defects in Web Pages Reviewed
Aridome Naoki, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
人工生命とロボットに関する国際会議予稿集 30 575 - 579 2025.2
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社ALife Robotics
As a method for detecting layout defects in web pages, image-based visual regression testing is proposed. However, it has the problem that it takes time to detect unintended layout differences that are not based on HTML code changes. This paper proposes a prototype of MixVRT which is a tool to detect layout defects in web pages. It is a visual regression testing tool that highlights layout defects in web pages. From evaluation experiments, the time find to layout defects can be reduced.
-
Proposal of a Method for Automatic Fill-in Fields Detection and for Labels Assignment to Generate Electronic Forms Reviewed
Kimura Yuya, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
人工生命とロボットに関する国際会議予稿集 30 580 - 584 2025.2
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社ALife Robotics
The digitalization of forms is being promoted. One of the effective ways to manage contents filled in fields is using electronic forms. Several tools have been developed to generate them automatically. However, when you use a paper form, the layout of the original form may change, and it takes time to generate electronic one because it is necessary to place fill-in fields on an electronic form by dragging with a mouse. This paper proposes a method for automatic fill-in fields detection and labels assignment to reduce time required to place fill-in fields without changing the layout. The proposed method can reduce the time to place fill-in fields.
-
Aridome N., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 575 - 579 2025.2
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
As a method for detecting layout defects in web pages, image-based visual regression testing is proposed. However, it has the problem that it takes time to detect unintended layout differences that are not based on HTML code changes. This paper proposes a prototype of MixVRT which is a tool to detect layout defects in web pages. It is a visual regression testing tool that highlights layout defects in web pages. From evaluation experiments, the time find to layout defects can be reduced.
-
Kakinoki K., Katayama T.
Lecture Notes in Electrical Engineering 1322 LNEE 375 - 384 2025.2
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:Lecture Notes in Electrical Engineering
To extract important information from the document images, document layout analysis research has been carried out. Previous research analyzes document layouts only for specific document formats. This paper proposes a document layout analysis method that adopts pre-processing based on document image classification to analyze document layouts for various document formats. From the application examples, we have confirmed that the proposed method can correctly analyze document layout by using training models trained for each document format. Furthermore, to evaluate the usefulness of the proposed method, we have compared the F score of the proposed method for document layout analysis using a single training model covering various document formats and using a training model generated for each document format. As a result, we have confirmed that our proposed method is useful in document layout analysis.
-
Evacuation Support System for Tsunami Disasters that Considers Shelter Congestion Reviewed
Nishi H., Nabeyama K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1322 LNEE 51 - 62 2025.2
Publishing type:Research paper (scientific journal) Publisher:Lecture Notes in Electrical Engineering
When a tsunami occurs, an evacuation support system capable of providing information on evacuation routes and shelter locations would enable evacuations to be conducted more swiftly and safely. In previous research, a proposal was made for an evacuation support system using low-power, long-distance communication. However, a challenge arose when shelter locations reached full capacity, requiring information to be shared, which in turn necessitated redirection of evacuees to alternative shelters. Therefore, in this study, a method for sharing shelter congestion information at an earlier stage was developed. The method of sharing based on the remaining capacity of shelters increased evacuation completion by up to 29 evacuees in an evacuee population of 1000.
-
Kimura Y., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 580 - 584 2025.2
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The digitalization of forms is being promoted. One of the effective ways to manage contents filled in fields is using electronic forms. Several tools have been developed to generate them automatically. However, when you use a paper form, the layout of the original form may change, and it takes time to generate electronic one because it is necessary to place fill-in fields on an electronic form by dragging with a mouse. This paper proposes a method for automatic fill-in fields detection and labels assignment to reduce time required to place fill-in fields without changing the layout. The proposed method can reduce the time to place fill-in fields.
-
画面遷移システムを対象としたVDM++仕様記述のための入力テンプレートと 変換ルールの提案 Reviewed
高倉翔太, 片山徹郎
ソフトウェアエンジニアリングシンポジウム2024論文集 182 - 189 2024.9
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
iOSアプリ開発支援を目的としたソフトウェア可視化ツールRAGESSの試作 Reviewed
翁長春樹, 片山徹郎
ソフトウェアエンジニアリングシンポジウム2024論文集 92 - 101 2024.9
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Onaga Haruki, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 10 ( 4 ) 336 - 341 2024.9
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
It is difficult for mobile application developers to understand the structure of large and complex mobile applications. To support iOS application development, we proposed SwiftDiagram: a visualization of the static structure of Swift source code, and demonstrated its usefulness. To further support them, this paper has implemented RAGESS(Real-time Automatic Generation of SwiftDiagram System), which is a software visualization tool. RAGESS performs static analysis on Swift source code and automatically generates the corresponding SwiftDiagram whenever the target project build succeeds.
-
ASLA: Automatic Segmentation and Labeling by Deep Learning for Document Pictures Reviewed
Kakinoki Kanta, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 10 ( 4 ) 362 - 367 2024.9
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
In this paper, we propose ASLA, a segmentation and label generation system for document pictures. ASLA reduces the duration needed for separating document pictures into areas and label generation. By using the application example, we have verified that ASLA operates properly. We have evaluated the usefulness of ASLA in regard to time and accuracy. We have assessed the efficacy of the rule-based area correction method. As a result, we have verified that ASLA is useful.
-
Usability improvement in color constancy CAPTCHA Reviewed
Usuzaki Shotaro, Yihan Wang, Aburada Kentaro, Yamaba Hisaaki, Takatsuka Kayoko, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE Communications Express 13 ( 8 ) 331 - 334 2024.8
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHAs have traditionally been used to deter bots, but ensuring protection against machine learning attacks has become difficult. To tackle this problem, we proposed a CAPTCHA based on color constancy, a human cognitive ability that is difficult for machines to reproduce. Although this method achieved high attack resistance while maintaining usability compared to existing CAPTCHAs, the response time increased due to the color selection operation. To address this, we changed the task to a click-type format while keeping the original concept. Our experimental results show that our method matches the response times of existing CAPTCHAs without compromising attack resistance.
-
A Genetic Algorithm-based Approach for Design-level Class Decomposition Reviewed
Priyambadha B., Takahashi N., Katayama T.
International Journal of Advanced Computer Science and Applications 15 ( 4 ) 461 - 468 2024.4
Authorship:Last author Language:English Publishing type:Research paper (scientific journal) Publisher:International Journal of Advanced Computer Science and Applications
Software is always changed to accommodate environmental changes to preserve its existence. While changes happen to the software, the internal structure tends to decline in quality. The refactoring process is worth running to preserve the internal structure of the software. The decomposition process is a suitable refactoring process for Blob smell in class. It tried to split up the class based on the context in order to arrange it based on each responsibility. The previous approach has been implemented but still leaves problems. The optimum arrangement of class cannot be achieved using the previous approach. The genetic algorithm provides the search mechanism to find the optimum state based on the criterion stated at the beginning of the process. This paper presents the use of genetic algorithms to solve the design-level class decomposition problem. The paper explained several points, including the conversion from class to the chromosome construct, the fitness function calculation, selection, crossover, and mutation. The results show that the use of a genetic algorithm was able to solve the previous problems. The genetic algorithm can solve the local optimum problem from the previous approach. The increment of the fitness function of the study case proves it.
-
Proposal of ASLA Which Is a Segmentation and Labeling Tool for Document Images Based on Deep Learning Reviewed
K. Kakinoki, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics 262 - 266 2024.2
Authorship:Corresponding author Language:English Publishing type:Research paper (international conference proceedings)
-
Extension to Support Types and Operation/Function Definitions in BWDM to Generate Test Case Tool from the VDM++ Specification Reviewed
S. Takakura, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics 257 - 261 2024.2
Authorship:Corresponding author Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of RAGESS Which Is a Tool for Automatically Generating SwiftDiagram to Support iOS App Development Reviewed
H. Onaga, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics 252 - 256 2024.2
Authorship:Corresponding author Language:English Publishing type:Research paper (international conference proceedings)
-
An Improved Conversion Technique from EPNAT Models to VDM++ Specifications for Simulation of Abstract Software Behavior Reviewed
S. Matsumoto, R. Ishigami, T. Katayama, and T. Takagi
Proceedings of International Conference on Artificial Life and Robotics 248 - 251 2024.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Investigation of malware classification based on image representation Reviewed
IH. Kawagoe, S. Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Park, and N. Okazaki
Proc. 29th Int'l Sympo. on Artificial Life and Robotics 2024 (AROB 29th 2024) 29 929 - 931 2024.1
Language:English Publishing type:Research paper (international conference proceedings)
-
On an improvement of hand gesture recognition for realizing an s-EMG based user authentication using finger spelling Reviewed
H. Yamaba, N. Sawagashira, K. Aburada, T. Katayama, and N. Okazaki
Proc. 29th Int'l Sympo. on Artificial Life and Robotics 2024 (AROB 29th 2024) 29 933 - 938 2024.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a DDoS Attack Detection Method Using the Communication Interval Reviewed
Iwasa K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 165 - 174 2024.1
Publishing type:Research paper (scientific journal) Publisher:Lecture Notes in Electrical Engineering
As the scale of Distributed Denial of Service (DDoS) attacks has been escalating in recent years, the need for real-time detection of attacks has increased. Existing intrusion detection systems (IDSs) perform detection with a fixed window size (assumed to be in hours). In previous research, attack detection was performed by preparing windows of multiple sizes, selecting the appropriate window based on the state of the data, and using features learned in advance for that window size. Although this method yielded a high DDoS attack detection rate of 98.30%, it exhibited a considerable false-positive rate of 7.37%. The proposed method measures the communication intervals of identical packets within the window, identified as attack-related in the previous survey, and classifies those packets with an average communication interval below a set threshold as attacks. The experiment resulted in a 50.2% decrease in the false-positive rate.
-
Study of an Image-Based CAPTCHA that is Resistant to Attacks Using Image Recognition Systems Reviewed
Nishikawa S., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 175 - 184 2024.1
Publishing type:Research paper (scientific journal) Publisher:Lecture Notes in Electrical Engineering
In today’s digital age, image-based CAPTCHAs are increasingly vulnerable to attacks using annotation services, which tag images and classify images according to their contents, or reverse image search services. To prevent such attacks, an image-based CAPTCHA was proposed that takes advantage of the fact that humans can correctly recognize images containing many discontinuous points, while existing image recognition systems misrecognize them. However, this CAPTCHA proved susceptible to attacks using noise reduction filters. The objective of the present study is to create a CAPTCHA using images that are resistant to such filters. Images used in the new CAPTCHA were realized by increasing the proportion of lines forming discontinuous surfaces in images. Experimental results demonstrated a human recognition rate of 95.8%, with the image recognition systems successfully identifying only one image overall. Moreover, when a noise reduction filter was applied, the recognition rate was lower than those reported in previous studies.
-
Proposal of a Framework for Continuous Support of the Implementation Step in TDD Reviewed
Miyashita Takeaki, Katayama Tetsuro
Memoirs of Faculty of Engineering, University of Miyazaki 52 81 - 86 2023.10
Language:Japanese Publishing type:Research paper (scientific journal)
-
Development of keypads which use colors or shapes to prevent shoulder surfing Reviewed
Masuzawa R., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 28 ( 4 ) 710 - 717 2023.8
Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
In conventional smart phones and ATMs, a four-digit passcode is entered into a keypad, and the user confirms whether the passcode matches the keypad. However, there is a risk that a third party can easily steal the password by watching the code entry or analyzing the position of fingerprints left on the keypad. There are other solutions, such as biometric authentication or the use of special displays, but both of them are costly and difficult to implement. In this study, we propose a keypad that does not leave fingerprints on the screen, is low cost, and can be used to input passcodes without worry, even if someone is standing next to it. The proposed keypad uses cursors that are moved by directional keys to select numbers, making fingerprint analysis difficult. Because attackers do not know the color that the user has selected, they cannot know which cursor the user is moving. To verify the safety and convenience of this system, we conducted experiments on subjects in their 20 s and 50 s. The results showed that the average difference in authentication time from the conventional method was about 5 s, and the method was generally convenient. We conclude that our keypad system is secure, because no peeping attacks on a subject were successful in guessing the subject’s passcode.
-
テスト駆動開発における継続的な支援を目的としたフレームワークCATddの試作 Reviewed
宮下 丈明, 片山 徹郎
ソフトウェアエンジニアリングシンポジウム2023論文集 144 - 153 2023.8
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Tsunami evacuation simulation considering road width in Aoshima district Reviewed
Nabeyama K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 28 ( 4 ) 779 - 788 2023.7
Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
Japan is one of the countries in the world where natural disasters occur most frequently. Typhoons, earthquakes, tsunamis, volcanic eruptions, and many other natural disasters occur in Japan every year, and the risks are immeasurable. Japan is especially prone to earthquakes because of its location on the North American Plate, Eurasian Plate, Pacific Plate, and Philippine Sea Plate. Preparation for a Nankai Trough earthquake is one of the most important issues. A Nankai trough earthquake is predicted to occur with a probability of 70–80% within 30 years. Accordingly, a tsunami of more than 10 ms is expected to hit a wide area along the Pacific coast from the Kanto region to the Kyushu region, and the impact is expected to be significant. When a tsunami warning is issued, an evacuation support system that provides information on evacuation sites and routes enables faster and safer evacuation actions. In a previous study conducted in our laboratory, we proposed an evacuation support system using Low-Power Wide-Area communications and conducted a simulation to find ways to improve the evacuation support system. However, the simulation was insufficient in that it did not consider delays in evacuation completion time due to road congestion caused by limited road width, which can be expected in an actual disaster. In our current research, as an improvement to make the simulation more realistic for further developing our evacuation support system, we propose a simulation that considers road width. We examined how adoption of this simulation methodology would affect the simulation results by comparing simulations that did and did not consider road width. As a result, the proposed method showed a lower percentage of completed evacuations than the previous simulation, especially for children and the elderly. The reason for this result is that when evacuations begin simultaneously, crowding occurs as people all rush to evacuation centers. This congestion on the roads near evacuation centers prevents people from completing their evacuations. Such a phenomenon is expected to occur not only in simulations but also on actual roads. For this reason, our proposed simulation method that considers road width is a more realistic simulation. Since evacuations by car in the event of a disaster also occur, a future issue is to simulate car congestion as well. Furthermore, simulating what would happen if a disaster made a road impassable is also important.
-
Prototype of the Framework CATdd to Support Continuous Development in Test Driven Development Reviewed
Miyashita Takeaki, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 4 ( 1 ) 35 - 40 2023.6
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
TDD is a development methodology to improve software quality. In this study, we prototype the framework CATdd (Continuous Automated Test Driven Development), which supports continuous development with TDD. CATdd reduces the time of implementation step in TDD by generating new source code that passes tests using LLM. CATdd maintains consistency with other source code in the project by using existing source code and related source code to prompt. As a result of the evaluation experiments, the time for the implementation step in TDD was reduced by 94% for a simple task and by 56% for another more complex task. In conclusion, CATdd is useful to support continuous development.
-
Analysis of Self Determination Factors for Continuance Intention on Online Learning Management System Reviewed
Saputra Mochamad Chandra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu, Wicaksono Satrio Agung
Journal of Robotics, Networking and Artificial Life 10 ( 1 ) 91 - 95 2023.6
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
The COVID-19 pandemic outbreak transformed the paradigm of the educational process. Many educational institutions, including the University, mainly the Faculty of Computer Science, Brawijaya University, have experienced success with learning through the Internet. The continuance intention factor for using an online learning management system is important to ensure learning sustainability. This study investigates continuance intention factor by using self determination model as a research model. The objective of this study is to find the factor factors affecting students' continuance intention toward online learning management systems. The proposed model is useful for investigating continuance intention factors. The study finds that intrinsic regulation, external regulation, identified regulation, and introjected regulation significantly positive impact on continuance intention in learning management systems. Finally, this study provides suggestions for the Faculty to improve the continuance intention of the student in using an online learning management system.
-
The Impact of Design-level Class Decomposition on the Software Maintainability Reviewed
Priyambadha B., Katayama T.
International Journal of Advanced Computer Science and Applications 14 ( 4 ) 405 - 413 2023.4
Authorship:Corresponding author Publishing type:Research paper (scientific journal) Publisher:International Journal of Advanced Computer Science and Applications
The quality of the software's internal structure tends to decay due to the adaptation to environmental changes. Therefore, it is beneficial to maintain the internal structure of the software to benefit future phases of the software life cycle. A common correlation exists between decaying internal structures and problems like software smell and maintenance costs. Refactoring is a process to maintain the internal structure of software artifacts based on the smell. Decomposition of classes is one of the most common refactoring actions based on Blob smell performed at the source code level. Moving the class decomposition process to the design artifact seems to affect the quality and maintainability of the source code positively. Therefore, studying the impact of design-level class decomposition on source code quality and software maintainability is essential to ascertain the benefits of implementing design-level class decomposition. The metrics-based evaluation shows that the design-level class decomposition positively impacts the source code quality and maintainability with the rank biserial value is 0.69.
-
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
Agriculture (Switzerland) 13 ( 3 ) 2023.3
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Agriculture (Switzerland)
Prediction of crop yields is very helpful in ensuring food security, planning harvest management (storage, transport, and labor), and performing market planning. However, in Tanzania, where a majority of the population depends on crop farming as a primary economic activity, the digital tools for predicting crop yields are not yet available, especially at the grass-roots level. In this study, we developed and evaluated Maize Yield Prediction System (MYPS) that uses a short message service (SMS) and the Web to allow rural farmers (via SMS on mobile phones) and government officials (via Web browsers) to predict district-level end-of-season maize yields in Tanzania. The system uses LSTM (Long Short-Term Memory) deep learning models to forecast district-level season-end maize yields from remote sensing data (NDVI on the Terra MODIS satellite) and climate data [maximum temperature, minimum temperature, soil moisture, and precipitation (rainfall)]. The key findings reveal that our unimodal and bimodal deep learning models are very effective in predicting crop yields, achieving mean absolute percentage error (MAPE) scores of 3.656% and 6.648%, respectively, on test (unseen) data. This system will help rural farmers and the government in Tanzania make critical decisions to prevent hunger and plan better harvesting and marketing of crops.
-
VDM++仕様を対象としたテストケース自動生成ツールBWDMの適用範囲拡大による実用性の向上 Reviewed
武藤 崇史, 片山 徹郎
ソフトウェアテストシンポジウム2023東京(JaSST'23 Tokyo)論文集 29 - 36 2023.3
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Miyashita T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 347 - 351 2023.2
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
TDD is a development methodology that brings us closer to better implementation and testing by repeating a series of steps: test design, implementation that satisfies the tests, and refactoring. This paper proposes a framework aimed at supporting the implementation steps in TDD. The proposed framework generates source code that passes tests while retaining refactoring by the developer. The prototyped framework reduced the time required for the implementation process by 94.22% and the generation time by 66.17% compared to manual work.
-
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 352 - 356 2023.2
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The outbreak of the COVID-19 pandemic changed the model of the learning process. Online learning became one of the best solutions for many educational institutions, including the University, especially the Faculty of Computer Science, Brawijaya University. The continuance intention factor for using an online learning management system is important to ensure learning sustainability. To understand students' continuance intention this study proposes self determination model as a research model to find the factors affecting students' continuance intention toward online learning management systems. The proposed model is useful for investigating continuance intention factors. The study finds that intrinsic regulation, external regulation, identified regulation, and introjected regulation significantly positive impact on continuance intention in learning management systems. Finally, this study provides suggestions for the Faculty to improve the continuance intention of the student in using an online learning management system.
-
Matsumoto S., Katayama T., Takagi T.
Proceedings of International Conference on Artificial Life and Robotics 339 - 342 2023.2
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
Extended Place/transition Net with Attributed Tokens (EPNAT) is one of formal modeling languages, and it enables system engineers to construct an executable and abstracted behavioral model of multiple software systems. In this paper, we propose an automated random simulation technique of an EPNAT model in order to detect failures in the model. In the simulation, input is randomly selected for model execution. When a constraint given for each system or multiple systems is violated through the model execution, a failure is revealed. The simulation is terminated by the detection of a failure or the satisfaction of a criterion focusing on the combination of marking, data writing and reading between different systems. A prototype tool of the simulation technique was developed and applied to a trial model to discuss its effectiveness. Two failures inserted into the trial model were successfully detected, and a few challenges were found in the experiment.
-
Muto Takafumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 3 ) 255 - 262 2022.12
Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
The use of the formal specification description language VDM++ in software design can eliminate ambiguity in the specification. However, software testing after implementation is necessary even if the design uses VDM++, but manually generating test cases is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper solves the three problems and improves the usefulness of BWDM by expanding the scope of application of VDM++ definitions and adding a function to generate test cases for object states. In addition, we conducted a comparison experiment with manual test case generation and confirmed that BWDM can reduce work time.
-
Proposal and Implementation of Gamma Which Is a Spatial Data Sharing Distributed MQTT System Reviewed
Ueda Takahiro, Katayama Tetsuro
Memoirs of Faculty of Engineering, University of Miyazaki 51 129 - 133 2022.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
Muto Takafumi, Katayama Tetsuro
Memoirs of Faculty of Engineering, University of Miyazaki 51 141 - 146 2022.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
Suga Kensuke, Katayama Tetsuro
Memoirs of Faculty of Engineering, University of Miyazaki 51 135 - 140 2022.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
VDM++仕様書におけるクラスとインスタンス変数定義の機械学習を用いた生成手法の提案 Reviewed
菅 健将, 片山 徹郎
ソフトウェアエンジニアリングシンポジウム2022論文集 79 - 88 2022.9
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Proposal of Gamma Which Is a Messaging Platform for Spatial Data Reviewed
Ueda Takahiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 2 ) 136 - 142 2022.9
Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
This paper proposes Gamma, which is a messaging platform for spatial data. Gamma uses distributed MQTT system for spatial data sharing, and this paper aims to improve the usefulness of distributed MQTT system. In the experiment, it has been found that Gamma can process more messages than a single MQTT broker. It is confirmed that Gamma achieves scalability by increasing the number of Gateways and distributed MQTT brokers. Furthermore, it is confirmed that the efficiency of the distributed MQTT system can be improved by setting the responsibility area of Gateways.
-
Enhancement of Design Level Class Decomposition using Evaluation Process Reviewed
Priyambadha B., Katayama T.
International Journal of Advanced Computer Science and Applications 13 ( 8 ) 130 - 139 2022.8
Language:English Publishing type:Research paper (scientific journal) Publisher:International Journal of Advanced Computer Science and Applications
Refactoring on the design level artifact such as the class diagram was already done using the threshold-based agglomerative hierarchical clustering method, specifically class decomposition. The approach produced a better cluster based on the label name similarity of attribute and method. But, some problems emerge from the experiment result. The negative Silhouettes element still exist in the cluster. And, there is an unusable cluster that only consists of one attribute element. This paper has proposed the evaluation process to optimize the result of clustering. This evaluation process is an additional process that aims to move the negative Silhouettes element to the other cluster. The movement is also to get the better value of element Silhouettes value. The evaluation process can produce a better result for clusters. The clusters produced from the evaluation process have higher Silhouettes values. The average Silhouettes value is increased by about 40%. Ultimately, the result shows no unusable cluster as mentioned in the previous research.
-
Detection of Blob and Feature Envy Smells in a Class Diagram using Class's Features Reviewed
Priyambadha Bayu, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 1 ) 43 - 48 2022.8
Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
Measuring the quality of software design artifacts is difficult due to the limitation of information in the design phase. The class diagram is one of the design artifacts produced during the design phase. The syntactic and semantic information in the class is essential to consider in the measurement process. Smell detection uses class-related information to detect the smell as an indicator of a lack of quality. Several classifiers use all information related to the class to prove how informative it for the smell detection process. The smell types that are a concern in this research are Blob and Feature Envy. The experiment using three classifiers (j48, Multi-Layer Perceptron, and Naïve Bayes) confirms that Blob smell detection utilizes the information successfully. On the other hand, Feature Envy still needs more elaboration. The average true positive rate by the classifiers is about 80.67%.
-
Proposal of a Method to Generate Classes and Instance Variable Definitions in VDM++ Specification by Using Machine Learning Reviewed
Suga Kensuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 4 ) 189 - 194 2022.6
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate only type and constant definitions in VDM++ specification from natural language specification by using machine learning. This paper proposes a method to generate classes and instance variable definitions in VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F- values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
空間データを対象とした分散MQTTシステムGammaの提案と実装
上田高寛, 片山徹郎
情報処理学会九州支部研究会(火の国情報シンポジウム2022) ( A21-5 ) 1 - 8 2022.3
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Design Level Class Decomposition using the Threshold-based Hierarchical Agglomerative Clustering Reviewed
Bayu Priyambadha, Tetsuro Katayama
International Journal of Advanced Computer Science and Applications 13 ( 3 ) 57 - 64 2022.3
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal)
-
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Artificial Life and Robotics 27 ( 1 ) 179 2022.2
Language:Japanese Publishing type:Research paper (scientific journal)
In the original publication of the article, on Figs. 4 and 5, “CNN” should read as “MLP”. In addition, under the section “4.2 Human and machine success rate”, on the paragraph “For evaluation of the machine success …”, in the following sentence “In the attack experiment, we applied the famous color …” CNN (Convolutional Neural Network) should be corrected as MLP (Multilayer perceptron). The correct sentence should read as “In the attack experiment, we applied the famous color constancy algorithm, Gray-World, Max-RGB, Gray-Edge [11], Second Derivative Gray-Edge, and MLP (Multilayer perceptron) to images that were saved in the experiment for the human success rate
-
Proposal of Gamma Which Is a Spatial Data Sharing Distributed MQTT System Reviewed
Ueda T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 188 - 192 2022.1
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
This paper proposes Gamma, which is a new distributed MQTT system, to improve the usefulness of distributed MQTT systems for sharing spatial data. In the experiment, it has been found that Gamma can process more messages than a single MQTT broker. It is confirmed that Gamma achieves scalability by increasing the number of Gateways and distributed MQTT brokers. Furthermore, it is confirmed that the efficiency of the distributed MQTT system can be improved by setting the responsibility area of Gateways.
-
Proposal for a blockchain based agricultural input voucher system Reviewed
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Artificial Life and Robotics 27 ( 3 ) 461 - 471 2022.1
Language:English Publishing type:Research paper (scientific journal)
Most of the small-scale farmers in Tanzania can’t afford to buy quality agricultural inputs (fertilizers and seeds), therefore the Tanzanian government issues paper-based subsidy vouchers to farmers for buying the inputs at half price. However, challenges like misuse of the vouchers by some government officials (stealing and favoritism in allocation) and lack of trust (difficulty of verifying vouchers’ authenticity) have resulted into low crop productivity for the farmers and loss of government funds. To address this, we have developed agricultural input voucher system which stores and allocates digital subsidy vouchers to farmers in the Hyperledger Fabric blockchain network whose features like hashing and digital signature prevent misuse and ensure trust of the vouchers. Farmers access the digital vouchers through Short Message Service (SMS) in their mobile phones. Evaluation reveals that, the developed system is effective and meets performance demands of Tanzanian farmers. Also, Raft has better performance than Kafka consensus protocol.
-
Suga K., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 178 - 182 2022.1
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate type and constant definitions in VDM++ specification from natural language specification using machine learning. This paper proposes a method to generate classes and instance variable definitions in the VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F-values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Muto T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 183 - 187 2022.1
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
Generating test cases from the VDM++ specification to eliminate ambiguity in the specification is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper extends BWDM to solve three problems. In addition, we conducted a comparison experiment with manual test case generation and confirmed a time saving of about 17 minutes.
-
リレーアタック耐性とボット耐性の両立を目指したインタラクティブな動画CAPTCHAの提案と評価 Reviewed
油田 健太郎, 臼崎 翔太郎, 山場 久昭, 片山 徹郎, 椋木 雅之, 朴 美娘, 岡崎 直宣
情報処理学会論文誌 62 ( 12 ) 1864 - 1878 2021.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:[出版社不明]
Webサービスへの不正対策としてCAPTCHAが用いられている.CAPTCHAは,人間には容易に解答できるがコンピュータ(ボット)には困難な問題を出題し,正しい解答をした者を人間と判断するシステムである.CAPTCHAはリレーアタックと呼ばれるインターネット上の報酬に誘引された人間を利用してCAPTCHAを解読させる方法に対して脆弱である.そこで,本論文ではリレーアタックを行った場合に生じる通信遅延に着目し,リレーアタックでのCAPTCHAの解答を困難にすることを目指したCAPTCHA方式を提案する.提案手法は,連続的に移動するオブジェクトをマウスカーソルで追跡し,その追跡が成功していた時間が所与の値を超えているか否かで人間かボットかを判別する.提案手法を評価するために,リレーアタックの実験環境を構築して実験を行った.次に,自動プログラムを用いた攻撃に対しても評価を行った.その結果,提案手法はリレーアタックと自動プログラムを用いた攻撃に対してロバストな方式であることを明らかにした.
CAPTCHA can be used to protect Web services against unauthorized access. CAPTCHA is designed to detect automated programs (called bots) by requiring them to perform tasks that are easy for humans but difficult for automations. CAPTCHAs are vulnerable to relay attacks in which the challenges are relayed to remote human-solvers who hope for a reward. Our new CAPTCHA uses delay time between communications to prevent relay attacks. In our CAPTCHA, users have to recognize the target object from a number of randomly appearing decoy objects and tracks it with his/her mouse cursor. To pass the test, the user must track the target for a given amount of time. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method. Next, we implemented an automated attack for applying to our CAPTCHA and evaluate its resistance to automated attacks. Our results showed the robustness of our proposed method against relay attack and automated attacks.DOI: 10.20729/00214230
-
Proposal for a crop protection information system for rural farmers in Tanzania Reviewed
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Agronomy 11 ( 12 ) 2021.12
Language:English Publishing type:Research paper (scientific journal)
Crop protection information, such as how to control emergent and outbreak crop diseases and pests, as well as the latest research, regulations, and quality control measures for pesticides and fertilizers, is important to farmers. Rural smallholder farmers in Tanzania have traditionally relied on government agricultural officers who visit them in their villages to provide this crop protection information. However, these officers are few and cannot reach all the farmers on time. This means that farmers fail to make critical farming decisions on time, which can lead to low crop productivity. In this study, we aim to provide farmers with reliable and instant crop protection information by developing a system based on the Short Message Service (SMS) and the Web. This system automatically replies to farmers’ requests for the latest crop protection information in the Swahili language through SMS on a mobile phone or a Web system. The findings reveal that our proposed system can provide farmers with crop protection information at lower cost (500 times cheaper) than the existing Tigo Kilimo system. Furthermore, our proposed system’s deep learning model is effective in understanding and processing Swahili natural language SMS queries for crop protection information with an accuracy of 96.43%. This crop protection information will help farmers make better critical farming decisions on time and improve crop productivity.
-
Performance Evaluation of Blockchain Based Agricultural Input Voucher System Reviewed
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
2021 IEEE 10th Global Conference on Consumer Electronics, GCCE 2021 637 - 638 2021.10
Language:English Publishing type:Research paper (scientific journal) Publisher:2021 IEEE 10th Global Conference on Consumer Electronics, GCCE 2021
Large portion of rural small-scale farmers in Tanzania can't afford to buy quality agricultural inputs (fertilizers and seeds), therefore the government of Tanzania provides these farmers with paper-based subsidy vouchers which allow them to buy the agricultural inputs at only half price. However, challenges like misuse of the vouchers by some government officials (stealing and favoritism in vouchers' allocation) and lack of trust (difficulty of verifying vouchers' authenticity) have resulted into low crop productivity for the farmers and loss of government funds. In our previous work, we developed agricultural input voucher system which stores and allocates digital subsidy vouchers to farmers in the Hyperledger Fabric blockchain network and we evaluated its performance based on transaction throughput and latency metrics which are important to farmers, who access the system through Short Message Service (SMS) in their mobile phones. The blockchain network's features such as hashing and digital signature prevent misuse and ensure trust of the digital vouchers. In this paper, we evaluate performance of the developed blockchain network based on resources (CPU and memory) consumption metrics which are important in planning resources during system deployment. The evaluation findings reveal that, Raft consensus protocol consumes resources more efficiently than Kafka consensus protocol.
-
Katayama Tetsuro, Arima Kaoru
Memoirs of Faculty of Engineering, University of Miyazaki 50 213 - 218 2021.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
UMLとJavaソースコード間のトレーサビリティを リアルタイムに維持するツールRETUSSの試作 Reviewed
有馬 薫, 片山 徹郎
ソフトウェアエンジニアリングシンポジウム2021論文集 242 - 251 2021.9
Authorship:Corresponding author Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Extension of the Function to Ensure Real-time Traceability between UML Sequence Diagram and Java Source Code on RETUSS Reviewed
K. Arima, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, N. Okazaki
Journalof Advances in Artificial Life Robotics (JAALR) 2 ( 1 ) 254 - 258 2021.6
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal)
-
Measuring test suite reusability based on the usage frequency and coverage of reused test cases Reviewed
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 8 ( 1 ) 24 - 28 2021.6
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal)
Test suite reusability measurement is important to obtain the value of reusability as the degree of effectiveness of reused test suite. The measurement in this experiment considers not only the frequency of the successful test suite to examine different objects but also the code coverage as the criteria of a good test suite. The combination of the frequency and code coverage in the measurement reports the current condition of test suite reusability. The research confirms the test suite reusability measurement provides useful information to know the degree of effectiveness of reused test suite, especially in regression testing and automated testing.
-
Measuring redundancy score for test suite evaluation by using test cases matching approach Reviewed
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 8 ( 1 ) 1 - 5 2021.6
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal)
Evaluating a test suite that contains redundant test cases is necessary to reduce the cost of testing. The redundant test cases exist when both of the two test cases are executed the same lines of code. This research evaluates the test suite by identifying redundant test cases. Exact match approach is used to investigate the redundant test cases in the test suite. The redundancy score is defined by redundancy formula which is calculated by dividing the number of redundant test cases by numbers of test cases in a test suite. The experiment uses two Java programs. The redundancy scores of the two test suites from each program are 0.37 and 0.67, respectively. It means 37% and 67% redundant test cases are included in the test suites. The redundancy score provides useful information to improve the efficiency of software testing, especially in testing other programs by reusing the same test suite such as regression testing and automated testing.
-
Proposal of a Method to Measure Test Suite Quality Attributes for White-Box Testing Reviewed
Mochamad Chandra Saputra, Tetsuro Katayama
International Journal of Advanced Computer Science and Applications 12 ( 5 ) 286 - 294 2021.5
Authorship:Corresponding author Language:English Publishing type:Research paper (scientific journal)
As an important asset in software testing, measuring quality attributes of the test suite is important to describe the quality of software. This research proposes a method to measure the test suite quality attributes for white-box testing. The attributes are usability, efficiency, reliability, functionality, portability, and maintainability that are selected from 28 attributes in software quality. By using the proposed method, the test suite quality attributes are calculated with various results of level of quality. The result of test suite quality attribute measurement then proves the validity of its result by the reliability analysis. It is used Cohen’s kappa coefficient to validating the result of test suite quality attributes measurement based on the level of agreement between the result of measurement and expert assessment. Reliability analysis on test suite quality attribute finds the attribute that strongly related based on the minimum percentage of level of agreement value are usability, reliability and functionality. Hence, our proposed method is useful to measure test suite quality attributes.
-
Development and evaluation of Swahili text based CAPTCHA Reviewed
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
LifeTech 2021 - 2021 IEEE 3rd Global Conference on Life Sciences and Technologies 293 - 297 2021.3
Language:English Publishing type:Research paper (scientific journal)
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a test used in computing to determine whether the user is human or not and can be used in websites to offer protection against malicious programs (bots) which run automated tasks such as posting fake comments. Most of the Swahili language based websites in Tanzania still use English language based CAPTCHAs such as Google’s reCAPTCHA v2 which has poor usability for native Swahili users and poor robustness. This paper proposes Swahili CAPTCHA which requires users to recognize and correctly spell the distorted and misspelled Swahili words. Evaluation findings reveal that Swahili CAPTCHA is easier to learn and use and has similar robustness compared to reCAPTCHA v2.
-
Proposal and evaluation for color constancy CAPTCHA Reviewed
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
ARTIFICIAL LIFE AND ROBOTICS 26 ( 3 ) 291 - 296 2021.3
Language:English Publishing type:Research paper (scientific journal) Publisher:SPRINGER
CAPTCHAs are technologies that distinguish humans and bot to prevent illegal access. Unfortunately, current CAPTCHAs, even the latest Google reCAPTCHA, have already broken with high accuracy. Although the devices, including emphasizing the distortion of the text and adding noise to the image, improve the machine resistance, they may decrease the accessibility of the web page. The purpose of this study is to propose a new CAPTCHA that can decrease the machine resistance while keeping usability. To achieve this purpose, we focused on color constancy. Color constancy is a human's characteristic that enables humans to recognize the original color of the object by ignoring the effects of illumination light. Color constancy has not been fully reproduced by the program yet. We proposed color constancy CAPTCHA that the user is required to answer an original color of the object in a specified area on the CAPTCHA image with a color filter. In this paper, we created a prototype of CAPTCHA, applied two kinds of color filters, and then evaluated each case for the human success rate, machine success rate, and usability.
-
Identification of Redundant Test Cases by Using Similarity Measurement Method for Test Suite Evaluation Reviewed
Mochamad Chandra Saputra, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journalof Advances in Artificial Life Robotics (JAALR) 1 ( 4 ) 186 - 191 2021.3
Language:English Publishing type:Research paper (scientific journal)
-
Utilizing the Similarity Meaning of Label in Class Cohesion Calculation Reviewed
Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 7 ( 4 ) 270 - 274 2021.3
Language:English Publishing type:Research paper (scientific journal) Publisher:ATLANTIS PRESS
The cohesion is one of the design quality indicators in software engineering. The measurement of the value of cohesion is done by looking at the correlation between attributes and methods that are in a class. In Direct Distance Design Class Cohesion (D3C2) metrics, attributes, and methods are assumed to have a good correlation if they have a similar type. But, the similarity of type parameters and attributes do not always indicate that these attributes are managed (correlated) in the method. This study is trying to gain information that can enhance the degree of certainty of a correlation between the methods and attributes. Relatedness between them has been seen from closeness the meaning of the name tag attribute, method, and parameters. The experimental results declared an increase in the value of cohesion produced in line with the similarity of meaning. (C) 2020 The Authors. Published by Atlantis Press B.V.
-
Test Suite Reusability Measurement Based on Uses Frequently and Coverage of Reused Test Cases Reviewed
Mochamad Chandra Saputra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2021: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 344 - 347 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Improvement of RETUSS to Ensure Traceability between Sequence Diagram in UML and Java Source Code in Real Time Reviewed
Arima Kaoru, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2021: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 352 - 355 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
The Seven Information Features of Class for Blob and Feature Envy Smell Detection in a Class Diagram Reviewed
Bayu Priyambadha, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2021: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 348 - 351 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Identification of Redundant Test Cases by Using Similarity Measurement Method for Test Suite Evaluation Reviewed
Saputra Mochamad Chandra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 1 ( 4 ) 187 - 192 2021
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Evaluating the test suite that contains redundant test cases is necessary to ensure the efficiency of the testing and reducing the cost of testing. The principle of redundant test cases on this research is any test cases on a similar path executed with a similar high value of normalized Euclidean distance. The first, the similarity calculated between the test cases and path coverage uses Euclidean distance. The value of the Euclidean distance on the test case with the lowest value of distance indicating highly similar and possibly executing similar lines of code. The normalized Euclidean distance is using to normalize the value from Euclidean distance result. The experiment uses two java programs. Each redundancy score is 0.37 and 0.67, respectively. It means 37% and 67% of the test cases should be avoided because there are inefficiency test cases on the test suite. The research confirms redundant test cases can be identified by Euclidean distance and normalized Euclidean distance to evaluate the test suite.
-
Extension of the Function to Ensure Real-time Traceability between UML Sequence Diagram and Java Source Code on RETUSS Reviewed
Arima Kaoru, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 1 ) 37 - 41 2021
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Ensuring traceability of software deliverables is one of the methods to ensure software quality. RETUSS (Real-time Ensure Traceability between UML and Source-code System) is a tool that saves labor and time, and eliminates mistakes by human handling in ensuring traceability between UML and source code. However, RETUSS is not useful due to its limited scope of application. This paper improves the usefulness of RETUSS by extending the function to ensure real-time traceability between UML sequence diagrams and Java source code on RETUSS.
-
Katayama T., Shigyo Y., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 7 ( 3 ) 165 - 169 2020.12
Language:English Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
© 2020 The Authors. Published by Atlantis Press B.V. This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/). The natural language includes ambiguous expressions. Vienna Development Method (VDM) is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words that consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification based on its grammar from the classified word list. Identifiers are generated from the classified word list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
Code Coverage Similarity Measurement Using Machine Learning for Test Cases Minimization Reviewed
Saputra M.C., Katayama T.
2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020 287 - 291 2020.10
Language:English Publishing type:Research paper (scientific journal) Publisher:2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020
© 2020 IEEE. Machine learning approach for minimizing the number of test cases on the test suite is an interesting research area on software testing. The research tries to minimize the number of test cases on the test suite by minimizing redundant test cases based on similarity classification. The Support Vector Machine, K-Nearest Neighbour, and Decision tree classify similar test cases by comparing the lines executed by test cases. The result has shown that the support vector machine is the highest score on accuracy and the lowest score on error rate comparing with K-Nearest Neighbour, and Decision tree. Minimize the redundant test cases increase the quality of the test cases, and reducing time on the testing process.
-
Priyambadha B., Katayama T.
2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020 280 - 284 2020.10
Language:English Publishing type:Research paper (scientific journal) Publisher:2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020
© 2020 IEEE. In software engineering, abstracting the class information from XML based design artifact is important to analyze the design phase. The challenge of this research is the information is embedded inner the XML data structure and the target data is more than one and stored in a non-consecutive XML element position. This paper proposes a search algorithm over the XML file using the tree-based keyword as a composition of information. The experimentation confirms that the proposed algorithm can be used to collect all information that lies on the XML file by using the tree-based keyword consistently. The proposed algorithm's performance shows the linear growth rate of the execution time that inline with the growth of the number of lines. The tree-based keyword searching algorithm is promising used in the analysis of XML based software artifact.
-
Shigyo Y., Katayama T.
2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020 292 - 296 2020.10
Language:English Publishing type:Research paper (scientific journal) Publisher:2020 IEEE 9th Global Conference on Consumer Electronics, GCCE 2020
© 2020 IEEE. A natural language contains ambiguous expressions. The VDM++ is one of the methodotogies on the formal methods to write the specification without ambiguity. It is difficult to write a VDM++ specification, because VDM++ is written by strict grammar. This research proposes an approach to automatically generate the VDM++ specification by machine learning. This approach defines four data structures and has four processes. In this paper, variables and only real type in the VDM++ specification are generated automatically by this approach. In order to generate the variables and real type, it is necessary to extract the noun corresponding to the variable from the natural language specification. Consequently, our proposed approach can generate a VDM++ specification and we have confirmed that the generated VDM++ specification is grammatically correct.
-
Katayama Tetsuro, Shigyo Yasuhiro
Memoirs of Faculty of Engineering, University of Miyazaki 49 245 - 250 2020.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
Proposal for Rotating 3D Text-based CAPTCHA Using Subjective Contour Reviewed
USUZAKI Shotaro, ABURADA Kentaro, YAMABA Hisaaki, KATAYAMA Tetsuro, MUKUNOKI Masayuki, PARK Mirang, OKAZAKI Naonobu
J103-B ( 8 ) 332 - 343 2020.8
Language:Japanese Publishing type:Research paper (scientific journal)
In this study, we propose a CAPTCHA to improve the usability of the text-based method. This CAPTCHA shows only the side of the 3D characters rotate vertically or horizontally. Users need to input characters rotating in the specified direction to pass it. Humans can recognize the subjective contours of characters but machines cannot recognize them only seeing the shade. Our experiment result shows that the human success rate exceeded the average success rate of the existing method, and the usability is as high as the image-based CAPTCHA. We need to consider more obstruction to reduce attack accuracy against this CAPTCHA.
-
Considering the Semantic Approach to Assess the Class Cohesion Invited
Bayu Priyambadha, T. Katayama
236 - 246 2020.3
Authorship:Corresponding author Language:English Publishing type:Research paper (conference, symposium, etc.)
-
Test Case Redundancy Elimination Uses Similarity Measurement on Quality Assurance Testing Invited
Mochamad Chandra Saputra, T. Katayama
224 - 235 2020.3
Authorship:Corresponding author Language:English Publishing type:Research paper (conference, symposium, etc.)
-
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG Reviewed
Yamaba H., Nagatomo Y., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1150 AISC 834 - 844 2020.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Advances in Intelligent Systems and Computing
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and selected the candidate gestures based on them. Their performances were evaluated by constructing their identifier using support vector machines.
-
Test Cases Redundant Elimination on Code Coverage Uses Distance and Correlation Measurement Method Reviewed
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020) 755 - 758 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:ALIFE ROBOTICS CO, LTD
The Euclidean distance and correlation measured by comparing the line executed by the test case to find the similarity of the test cases. The test cases have the lowest value of distance means highly similar and possible executing a similar line or path. The research tries to eliminate redundant test cases based on that similarity. Several redundant test cases are eliminated to get the best test cases. By Euclidean distance, the research can eliminate a similar test case on the test suite.
-
The Measurement of Class Cohesion using Semantic Approach Reviewed
Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020) 759 - 762 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:ALIFE ROBOTICS CO, LTD
The cohesion is one of the design quality indicators that can be measured by focusing on the correlation between elements inner the class. In Direct Distance Design Class Cohesion (D3C2) metrics, elements are assumed correlated if they have a similar type. In this research, the correlation between elements' inner class is not only based on type similarity but also on the meaning of the element's name. The results confirm that the value of cohesion increases in line with the similarity of meaning.
-
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Lecture Notes on Data Engineering and Communications Technologies 47 323 - 333 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:Lecture Notes on Data Engineering and Communications Technologies
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and compared the identification performance of some candidate sets of feature values with adopting support vector machines.
-
Proposal of an Algorithm to Generate VDM++ by Using Words Extracted from the Natural Language Specification Reviewed
Yasuhiro Shigyo, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020) 763 - 766 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:ALIFE ROBOTICS CO, LTD
The natural language includes ambiguous expressions. VDM is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words which consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification from the extracted words list. Identifiers are generated from the extracted words list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
Evaluation of manual alphabets based gestures for a user authentication method using s-emg
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1036 570 - 580 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. At the present time, since mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and evaluated their potential as the important element of the user authentication method.
-
Blockchain-based malware detection method using shared signatures of suspected malware files
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Advances in Intelligent Systems and Computing 1036 305 - 316 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Although rapid malware detection is very important, the detection is difficult due to the increase of new malware. In recent years, blockchain technology has attracted the attention of many people due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a blockchain-based malware detection method that uses shared signatures of suspected malware files. The proposed method can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it can improve the malware detection by utilizing signatures on the blockchain. In the evaluation experiment, we perform a more real simulation compared with our previous work to evaluate the detection accuracy. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate and the false positive rate.
-
Test cases redundant elimination on code coverage uses distance and correlation measurement method Reviewed
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 755 - 758 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The Euclidean distance and correlation measured by comparing the line executed by the test case to find the similarity of the test cases. The test cases have the lowest value of distance means highly similar and possible executing a similar line or path. The research tries to eliminate redundant test cases based on that similarity. Several redundant test cases are eliminated to get the best test cases. By Euclidean distance, the research can eliminate a similar test case on the test suite.
-
Shigyo Y., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 763 - 766 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The natural language includes ambiguous expressions. VDM is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words which consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification from the extracted words list. Identifiers are generated from the extracted words list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
On a user authentication method to realise an authentication system using s-EMG Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
International Journal of Grid and Utility Computing 11 ( 5 ) 725 - 734 2020
Language:English Publishing type:Research paper (scientific journal) Publisher:International Journal of Grid and Utility Computing
© 2020 Inderscience Enterprises Ltd. To prevent shoulder-surfing attacks, we proposed a user authentication method using surface electromyogram (s-EMG) signals, which can be used to identify who generated the signals and which gestures were made. Our method uses a technique called 'pass-gesture', which refers to a series of hand gestures, to achieve s-EMG-based authentication. However, it is necessary to introduce computer programs that can recognise gestures from the s-EMG signals. In this paper, we propose two methods that can be used to compare s-EMG signals and determine whether they were made by the same gesture. One uses support vector machines (SVMs), and the other uses dynamic time warping. We also introduced an appropriate method for selecting the validation data used to train SVMs using correlation coefficients and cross-correlation functions. A series of experiments was carried out to confirm the performance of those proposed methods, and the effectiveness of the two methods was confirmed.
-
The measurement of class cohesion using semantic approach Reviewed
Priyambadha B., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 759 - 762 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The cohesion is one of the design quality indicators that can be measured by focusing on the correlation between elements inner the class. In Direct Distance Design Class Cohesion (D3C2) metrics, elements are assumed correlated if they have a similar type. In this research, the correlation between elements' inner class is not only based on type similarity but also on the meaning of the element’s name. The results confirm that the value of cohesion increases in line with the similarity of meaning.
-
State transition tuple coverage criterion for extended place/transition net-based testing Reviewed
Takagi T., Kurozumi R., Katayama T.
Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2019-December 29 - 30 2019.12
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
© 2019 IEEE. This paper shows a STT (State Transition Tuple) coverage criterion for extended place/transition net-based testing. A STT as a measuring object consists of state transitions whose execution may trigger a target failure. The test efficiency is evaluated based on the ratio of STTs executed by test cases.
-
Implementation of CAPTCHA suitable for mobile devices Reviewed
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 601 - 605 2019.12
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a technology designed to prevent automated programs (known as bots) from acquiring access to on-line accounts to send spam mail, manipulate vote numbers in on-line polls, or take other malicious actions. In addition, access to Web services has been incorporated into mobile devices, such as smartphones. However, because most CAPTCHAs are not designed for mobile devices, user-friendly CAPTCHA for mobile devices is required. Thus, we implemented CAPTCHA on mobile devices and evaluated its resistance to bots. Our CAPTCHA showed robustness against bots, with good usability.
-
An evaluation of the interactive video CAPTCHA method against automated attack Reviewed
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 453 - 457 2019.12
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is designed to detect automated programs (called bots) by requiring them to perform tasks that are easy for humans but difficult for automations. CAPTCHAs are vulnerable to relay attacks in which the challenges are relayed to remote human-solvers. In our previous paper, we proposed an interactive video type CAPTCHA that is strongly resistant to relay attacks. However, a quantitative evaluation of resistance to automated attacks still has not been carried out. Herein, we implement an automated attack for applying to our CAPTCHA and evaluate its resistance to automated attacks. Our results show the robustness of our proposed method against mean shift algorithm.
-
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification Reviewed
Katayama Tetsuro, Futa Hirakoba, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 6 ( 3 ) 143 - 147 2019.12
Language:English Publishing type:Research paper (scientific journal)
-
回路上の電圧値可視化による回路設計支援ツールADVISの開発 Reviewed
西田 龍登, 片山 徹郎
組込みシステムシンポジウム2019論文集 1 - 4 2019.9
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar Reviewed
Katayama Tetsuro, Miyaji Toshihiro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 6 ( 2 ) 123 - 127 2019.9
Language:English Publishing type:Research paper (scientific journal)
-
Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
( 2019 ) 1 - 4 2019.8
Language:English Publishing type:Research paper (scientific journal)
-
平木場 風太, 片山 徹郎
ソフトウェアエンジニアリングシンポジウム2019論文集 ( 2019 ) 126 - 134 2019.8
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Investigation on Blockchain‐based Malware Information Sharing Method in Malware Detection System
藤竜成, 臼崎翔太郎, 油田健太郎, 山場久昭, 片山徹郎, PARK Mirang, 白鳥則郎, 岡崎直宣
電子情報通信学会技術研究報告 119 ( 140(ISEC2019 12-61) ) 293‐298 2019.7
-
回路設計支援を目的としたArduinoシミュレータADVISの現状と課題
西田龍登, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
解析表現文法を対象とした構文ファイルのチェックツールTamiasの開発
宮地俊宏, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
VDM++仕様を対象としたテストケース自動生成ツールBWDMへのPICTの適用
平木場風太, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG Reviewed
Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Advances in Intelligent Systems and Computing 927 693 - 701 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare many gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and examined their ability for the use of passwords of the authentication method.
-
Investigation on sharing signatures of suspected malware files using blockchain technology Reviewed
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Lecture Notes in Engineering and Computer Science 2239 94 - 99 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Engineering and Computer Science
© 2019 Turkiye Klinikleri Journal of Medical Sciences. All rights reserved. In recent years, the amount of new malware has been rapidly increasing. Because malware has an adverse effect on the Internet, upon which modern society is increasingly dependent, its detection is very important. In addition, blockchain technology has attracted the attention of many people in recent years due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a system for sharing the signatures of suspected malware files using blockchain technology. The proposed system can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it improves the accuracy of detection and removal of malware by utilizing signatures recorded by the blockchain. In the evaluation experiment, we created a prototype of the proposed system and investigated its effect on the accuracy of detection and removal of malware. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate by about 4% and the false positive rate by about 2.5%.
-
CHAMSIN: CaptcHA by caMouflaged StrINg Reviewed
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE COMMUNICATIONS EXPRESS 8 ( 3 ) 55 - 60 2019.3
Language:English Publishing type:Research paper (scientific journal)
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
Katayama Tetsuro, Nishida Tatsumi, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 4 ) 249 - 252 2019.3
Language:English Publishing type:Research paper (scientific journal)
-
Interactive Video CAPTCHA for Better Resistance to Automated Attack Reviewed
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network 2019.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018
© 2018 IPSJ. A 'Completely Automated Public Turing Test to Tell Computers and Humans Apart' (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA's resistance to relay and automated attacks. Our results show that, if our CAPTHCA's parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.
-
Tamias: a Syntax File Checker for Parsing Expression Grammar Reviewed
Miyaji Toshihiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 169 - 172 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of an Arduino Simulator to Support Circuit Design Reviewed
Nishida Tatsumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 173 - 176 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML Reviewed
Mori Keisuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 165 - 168 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM Reviewed
Hirakoba Futa, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 161 - 164 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Artificial Life and Robotics 2019.1
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time Reviewed
Katayama Tetsuro, Mori Keisuke, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 2 ) 114 - 117 2018.9
Language:English Publishing type:Research paper (scientific journal)
-
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG Reviewed
Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018 22 733 - 742 2018.9
Language:English Publishing type:Research paper (international conference proceedings)
-
UMLとソースコードの間でトレーサビリティをリアルタイムに維持するツールRETUSSの現状と課題
森敬介, 片山徹郎
宮崎大学工学部紀要 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of TFVIS (Transitions and Flow VISalization) for Java Programs Reviewed
佐藤 拓弥, 片山 徹郎, 喜多 義弘, 山場 久昭, 油田 健太郎, 岡崎 直宣
情報処理学会論文誌 59 ( 4 ) 1137 - 1149 2018.4
Language:Japanese Publishing type:Research paper (scientific journal)
ソフトウェア開発におけるデバッグは,手間のかかる工程である.プログラムの欠陥を効率良く特定するためには,プログラム実行時の挙動を把握することが重要である.しかし,プログラム実行時の挙動は一般的に不可視であり,その挙動がどこまで正しかったのかを把握することは困難である.そこで,本研究では,Javaプログラムのデバッグの効率化を目的として,プログラムの欠陥特定を支援するデータ遷移可視化ツールTFVIS(Transitions and Flow VISualization)を開発した.TFVISは,プログラム実行時のデータ遷移と実行フローの可視化を行う.評価実験では,TFVISを活用することで欠陥特定に要する時間を約35%削減できることを確認した.このことから,TFVISによる可視化がデバッグ効率の向上に効果的であるといえる.It takes much time in debugging process. To find bugs effectively, it's important to understand the dynamic behavior of programs. But it's difficult since the dynamic behavior of the program is generally invisible. To support understanding the dynamic behavior, we have developed TFVIS (Transitions and Flow VISualization). It provides visualization of data transitions and data flow of Java programs. In the evaluation experiment, we confirmed that by using TFVIS we can reduce the time required to identify defects by about 35%. Hence, it can be said that visualization by TFVIS is effective to improve debugging efficiency.
-
An examination of the interactive video CAPTCHA method to resist relay attack Reviewed
Tatsuda Ryohei, Aburada Kentaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 7 ( 4 ) 136 - 141 2018.4
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a kind of challenge response test, which is used to distinguish human users from malicious computer program such as bots. However, the attack technique called relay attack as a method to avoid the CAPTCHA has been devised. This attack relays the CAPTCHA challenges to remote human-solvers, let them to decode CAPTCHA challenges. We used delay time that is caused by communications needed in relay attack. Our new CAPTCHA uses this delay time between communications to prevent relay attacks. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method.
-
Yamaba H., Kurogi T., Aburada K., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 23 ( 1 ) 87 - 93 2018.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2017, ISAROB. At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based method as a gesture classifier and we also discussed its security.
-
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG Reviewed
Kurogi Tokiyoshi, Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES 17 889 - 900 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
-
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks Reviewed
Tatsuda Ryohei, Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Shiratori Norio, Okazaki Naonobu
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES 17 870 - 879 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of RETUSS to Ensure Traceability between Class Diagram in UML and Java Source Code in Real Time Reviewed
K. Mori, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2018) 522 - 525 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of a Tool to Defect Specific Comments Reviewed
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2018) 526 - 529 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Negative Test Case Generation from an Extended Place/Transition Net-Based Mutants Reviewed
T. Takagi and T. Katayama
Proc. 2018 Int’l Conf. on Artifical Life and Robotics (ICAROB2018) 513 - 516 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
-
A study on user identification method using cross-correlation and SVM to realize an authentication system by s-EMG Reviewed
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 462 - 467 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Introduction of traffic characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Y. Arikawa, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 484 - 489 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Heuristic test case generation technique using extended place/transition nets Reviewed
Takagi T., Akagi A., Katayama T.
Studies in Computational Intelligence 727 103 - 115 2018
Language:English Publishing type:Research paper (scientific journal) Publisher:Studies in Computational Intelligence
© Springer International Publishing AG 2018. This paper shows a novel heuristic test case generation technique using an extended PN (place/transition net). A guard and action are introduced to improve the representation power of a PN. Also, a weight that represents the degree of testing priority is given to each transition of a PN. Our algorithm that heuristically searches the extended PN generates a specified number of feasible test cases that focus on parts of higher testing priority.
-
Evaluation of Index Poisoning Method in Large Scale Winny Network
Aburada Kentaro, Kita Yoshihiro, Yamaba Hisaaki, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES 17 999 - 1006 2018
Language:Japanese Publishing type:Research paper (scientific journal)
-
Development of a Monitoring System Based on Power Consumption Reviewed
Aburada Kentaro, Todaka Kengo, Yamaba Hisaaki, Katayama Tetsuro, Park Mirang, Shiratori Norio, Okazaki Naonobu
ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017 7 363 - 372 2018
Language:English Publishing type:Research paper (international conference proceedings)
-
Automated Generation of Decision Table and Boundary Values from VDM++ Specification Reviewed
H. Tachiyama, T. Katayama, and T. Oda
the 15th Overture Workshop: New Capabilities and Applications for Model-based Systems Engineering 95 - 103 2017.10
Language:English Publishing type:Research paper (international conference proceedings)
-
BWDM: Test Cases Automatic Generation Tool Based on Boundary Value Analysis with VDM++ Reviewed
Tetsuro Katayama, Hiroki Tachiyama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 4 ( 2 ) 110 - 113 2017.9
Language:English Publishing type:Research paper (scientific journal)
-
Development of a Tool for Extended Place/Transition Net-Based Mutation Testing and Its Application Example Reviewed
T. Takagi, S. Morimoto, and T. Katayama
Journal of Robotics, Networking and Artificial Life (JRNAL) 4 ( 2 ) 168 - 174 2017.9
Language:English Publishing type:Research paper (scientific journal)
-
VDM++仕様を用いたテストケース自動生成ツールBWDMにおけるif-then-else式の構造認識手法の提案 Reviewed
立山博基, 片山徹郎
情報処理学会 ソフトウェアエンジニアリングシンポジウム2017(SES2017) 130 - 137 2017.8
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
VDM++仕様を用いたデシジョンテーブル自動生成ツール VDTableにおける複合条件式への対応 Reviewed
黄一諾, 片山徹郎
情報処理学会 ソフトウェアエンジニアリングシンポジウム2017(SES2017) 175 - 181 2017.8
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
テストケース自動生成ツールBWDMの現状と課題
立山博基, 片山徹郎
宮崎大学工学部紀要 ( 46 ) 269 - 273 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Early Detection of Lung Cancer by Artificial Neural Network and Fuzzy Inference System
Khaing Zin Htwe, K. Yamamori, T. Katayama, and Tin Mar Kyi
宮崎大学工学部紀要 ( 46 ) 321 - 326 2017.7
Language:English Publishing type:Research paper (bulletin of university, research institution)
-
Improving Software Development in Business Operation Effectively Approached by CMMI
Hnin Thandar Tun, T. Katayama, K. Yamamori, and Khine Khine Oo
宮崎大学工学部紀要 ( 46 ) 285 - 289 2017.7
Language:English Publishing type:Research paper (bulletin of university, research institution)
-
例外処理を含むJavaプログラムへの適用を目的としたデータ遷移可視化ツールTFVISの拡張
佐藤拓弥, 片山徹郎
宮崎大学工学部紀要 ( 46 ) 279 - 283 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
変数名に着目したリファクタリング支援ツールMCCの現状と課題
田上諭, 片山徹郎
宮崎大学工学部紀要 ( 46 ) 275 - 278 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
VDM++仕様を対象にしたテストケース自動生成ツールBWDMにおける if式の構造認識に基づいたテストケース生成手法の提案 Reviewed
立山博基, 片山徹郎
ソフトウェア・シンポジウム2017 (SS2017) 13 - 21 2017.6
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
ソースコードに存在する不適切なコメントの検出手法適用事例 Reviewed
甲斐秀一, 田上諭, 片山徹郎
ソフトウェア・シンポジウム2017 (SS2017) 65 - 65 2017.6
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
ソースコードの品質向上を目的とした特定のコメントを検出するツール Reviewed
田上諭, 甲斐秀一, 片山徹郎
ソフトウェア・シンポジウム2017 (SS2017) 56 - 64 2017.6
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
例外処理を含むJavaプログラムを対象とした データ遷移可視化ツールTFVISの適用範囲の拡大 Reviewed
佐藤拓弥, 片山徹郎, 水久保直哉, 田中伸英
ソフトウェア・シンポジウム2017 (SS2017) 28 - 35 2017.6
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Evaluation of feature values of surface electromyograms for user authentication on mobile devices
Yamaba H., Kurogi A., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 22 ( 1 ) 108 - 112 2017.3
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2016, ISAROB.At the present time, mobile devices, such as tablet-type PCs and smart phones, have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that use surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, are detected over the skin surface. Muscle movement can be differentiated by analyzing the s-EMG. In this paper, a method that uses a list of gestures as a password is proposed. And also, results of experiments are presented that was carried out to investigate the performance of the method extracting feature values from s-EMG signals (using the Fourier transform) adopted in this research. MyoTM, which is the candidate of s-EMG measurement device used in a prototype system for future substantiative experiments, was used in the experiment together with the s-EMG measuring device used in the previous research to investigate its performance.
-
Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA Reviewed
T. Katayama, Y. Kikkawa, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 3 ( 4 ) 231 - 235 2017.3
Language:English Publishing type:Research paper (scientific journal)
-
Development of a Tool for Extended Place/transition Net-Based Mutation Testing Reviewed
T. Takagi, S. Morimoto, and T. Katayama
Proc. 2017 Int’l Conf. on Artifical Life and Robotics (ICAROB2017) 266 - 270 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Automatically Business Decision Making System for Software Development by using CMMI Reviewed
Hnin Thandar Tun, T. Katayama, K. Yamamori, and Khine Khine Oo
Proc. 2017 Int’l Conf. on Artifical Life and Robotics (ICAROB2017) 288 - 291 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Improvement of Transitions and Flow Visualization TFVIS for Exception Handling Reviewed
T. Sato, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. 2017 Int’l Conf. on Artifical Life and Robotics (ICAROB2017) 283 - 287 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of Refactoring Support Tool MCC Focusing on the Naming of Variables Reviewed
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. 2017 Int’l Conf. on Artifical Life and Robotics (ICAROB2017) 279 - 282 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of Test Cases Automatic Generation Tool BWDM Based on Boundary Value Analysis with VDM++ Reviewed
H. Tachiyama, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. 2017 Int’l Conf. on Artifical Life and Robotics (ICAROB2017) 275 - 278 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Improvement of Decision Table Automatic Generation Tool VDTable for let in Statement Reviewed
Y. Huang, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. 2017 Int’l Conf. on Artifical Life and Robotics (ICAROB2017) 271 - 274 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Automated lung nodule classification by artificial neural network and fuzzy inference system
Htwe K., Yamamori K., Katayama T., Kyi T.
2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016 2016.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016
© 2016 IEEE.Lung cancer is the most cause of death from all cancers being less survival rate according to various online cancer societies. The former medical studies showed that the early diagnosis of lung cancer with screening program is the way to decline mortality rate. Radiological examination takes a tremendous time and need many medical experts having a large number of images per patient. Consequently, the accuracy of examination results mainly depends on the skills of physicians. Computer-aided Detection (CAD) in radiology can provide a functional and advantageous way to physicians aiming at improving accuracy and assisting in early detection of cancer, saving the time of radiologists in exam evaluation of cancers. Our proposed CAD system has fulfilled these all tasks combining image processing and Artificial Neuro-Fuzzy Inference System (ANFIS); with 98% sensitivity of finding true lung nodules, 94.4% sensitivity and 85% accuracy of removing false detectives, and 87% sensitivity and 78% accuracy for cancerous nodules detection.
-
Business goals monitoring and control measures in CMMI
Tun H., Katayama T., Yamamori K., Oo K.
2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016 2016.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016
© 2016 IEEE.Business goals monitoring and control measures are important process to achieve the target of business systematically in specified business area or project. Monitoring and control provide business goals with a measurable index to align directly in a specific area or project. In this paper, we generate all of the business process improvement goals by Capability Maturity Model Integration (CMMI) model. This procedure that is used to establish the business goals of an effective business area or related project work scope applied by Goal Question Metric (GQM) approach. This approach will be defined all of the business process goals and measurable index to perform business operation functionality. The metric program framework that is used in this paper to generate the metric plan is described, followed by a complete metric plan, which includes GQM Analysis to monitor and control measurements of defined goals systematically.
-
VDM++仕様に対する境界値分析を用いたテストケース自動生成 Reviewed
立山博基, 片山徹郎
ソフトウェアテストシンポジウム2016九州(JaSST'16 Kyushu) 32 - 32 2016.11
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
不吉な臭いがするコメントとその検出方法 Reviewed
田上諭, 片山徹郎
ソフトウェアテストシンポジウム2016九州(JaSST'16 Kyushu) 32 - 32 2016.11
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
An Attempt to Use a Gesture Control Armband for a User Authentication System Using Surface Electromyograms Reviewed
H. Yamaba, K. Kurogi, S. Kubota, T. Katayama, M. Park, and N. Okazaki
The 21st International Sysmposium on Artifical Life and Robotics 2016 (AROB 21st 2016) 342 - 345 2016.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA Reviewed
Y. Kikkawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2016 Int'l Conf. on Artificial Life and Robotics (ICAROB 2016) 340 - 344 2016.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of an Authentication Method using Two Types of Machine Learning and Mouse Operation Trajectory Reviewed
Y. Kita, K. Aburada, T. Katayama, M. Park, and N. Okazaki
The 21st International Sysmposium on Artifical Life and Robotics 2016 (AROB 21st 2016) 346 - 349 2016.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of a Decision Table Generation Tool from the Formal Specification Reviewed
T. Katayama, K. Nishikawa, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 3 ) 205 - 208 2015.12
Language:English Publishing type:Research paper (scientific journal)
-
TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows Reviewed
T. Katayama, H. Nakamura, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 3 ) 177 - 181 2015.12
Language:English Publishing type:Research paper (scientific journal)
-
Winnyネットワークにおけるクラスタリングを用いたインデックスポイゾニングシステムの実相と評価
油田健太郎, 山場久昭, 片山徹郎, 朴美娘, 岡崎直宣
情報処理学会論文誌 56 ( 12 ) 2395 - 2405 2015.12
Language:Japanese Publishing type:Research paper (scientific journal)
-
Countermeasure against fingerprinting attack in Tor by separated contents retrieval
N. Okazaki, K. Toyoda, E. Yokoyama, H. So, T. Katayama, and M. Park
IEICE Communications Express 4 ( 12 ) 370 - 375 2015.12
Language:English Publishing type:Research paper (scientific journal)
-
MDAを用いたソフトウェア開発におけるモデルとソースコード間の整合性維持ツールの試作 Reviewed
吉川裕基, 片山徹郎
情報処理学会 ソフトウェアエンジニアリングシンポジウム2015(SES2015) 145 - 152 2015.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
MDAにおけるモデルの変更に対するソースコード修正手法の提案
吉川裕基, 片山徹郎
宮崎大学工学部紀要 ( 44 ) 203 - 208 2015.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Web-Based Software Testing Tool with Visualization for Java Programs
M. C. Saputra, T. Katayama, H. Suyono, and A. Basuki
宮崎大学工学部紀要 ( 44 ) 209 - 220 2015.7
Language:English Publishing type:Research paper (bulletin of university, research institution)
-
Code Coverage Visualization on Web-Based Testing Tool for Java Programs Reviewed
M. Chandra Saputra and T. Katayama
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 2 ) 89 - 93 2015.6
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA Reviewed
T. Katayama, Y. Kikkawa, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 2 ) 135 - 139 2015.6
Language:English Publishing type:Research paper (scientific journal)
-
Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks Reviewed
K. Aburada, H. Yamaba, S. Kubota, T. Katayama, M. Park, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 2 ) 120 - 124 2015.6
Language:English Publishing type:Research paper (scientific journal)
-
Basic Studies for Realizing User Authentication Method Using Surface Electromyogram Signals
IPSJ SIG Notes 2015 ( 32 ) 1 - 6 2015.5
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, are detected over the skin surface. Muscle movement can be differentiated by analyzing the s-EMG. In this paper, a series of experiments was carried out to investigate the prospect of an authentication method using s-EMGs. Specifically, several gestures of the wrist were introduced, and the s-EMGs generated for each motion pattern were measured. We compared the s-EMG patterns generated by each subject with the patterns generated by other subjects. As a result, it was found that each subject has similar patterns that are different from those of other subjects. Thus, s-EMGs can be used to confirm one' s identification for authenticating passwords on touchscreen devices.
-
Prototype of a Supporting Tool to Generate Testing Communication Diagram Reviewed
T. Katayama, S. Urata, Y. Ogata, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 1 ) 9 - 12 2015.4
Language:English Publishing type:Research paper (scientific journal)
-
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device Reviewed
H. Yamaba, S. Nagatomo, K. Aburada, S. Kubota, T. Katayama, M. Park, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 2 ( 1 ) 60 - 63 2015.4
Language:English Publishing type:Research paper (scientific journal)
-
IPSJ Journal 56 ( 3 ) 808 - 818 2015.3
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
A reversal turing test called CAPTCHA is used in many webservice sites to prevent the automatic program called bots from making unauthorized accounts. The CAPTCHA with images of correct answer string, called as the text-based CAPTCHA, is widely prevalent because of an ease implementing in the website. The optical character recognition technologies enable bots solve the text-based CAPTCHA automatically. Any researchers have pointed out the vulnerability of the text-based CAPTCHA. Absorbing the vulnerability of the text-based CAPTCHA, the image-based CAPTCHA is proposed, which use the human abilities to discern objects in images. However, the existing image-based CAPTCHAs also have problems about usability and robustness. In this paper, we propose a new image-based CAPTCHA using images without a correct answer string and with obstruction figures, to achieve high usability and robustness. In order to confirm a effectiveness of the proposed method, we argue to absorb some considerable attacks in the image-based CAPTCHA, and conduct assessment of usability through our questionnaire. The results show that the proposed system absorb the attacks adequately and has usability.
-
文字認識攻撃に耐性を持つランダム妨害図形を用いた画像ベース CAPTCHA方式の提案
田村拓己, 久保田真一郎, 油田健太郎, 片山徹郎, 朴美娘, 岡崎直宣
情報処理学会論文誌 56 ( 3 ) 808 - 818 2015.3
Language:Japanese Publishing type:Research paper (scientific journal)
-
Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs Reviewed
T. Katayama, S. Kitano, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 1 ( 4 ) 299 - 302 2015.3
Language:English Publishing type:Research paper (scientific journal)
-
Prototype of a Decision Table Generation Tool from the Formal Specification Reviewed
K. Nishikawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 388 - 391 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA Reviewed
Y. Kikkawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 384 - 387 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs Reviewed
S. Kitano, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 380 - 383 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows Reviewed
H. Nakamura, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 376 - 379 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
Code Coverage Visualization on Web-Based Testing Tool for Java Programs Reviewed
M. Chandra Saputra and T. Katayama
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 372 - 375 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
Prototype of a Supporting Tool to Generate Testing Communication Diagram Reviewed
T. Katayama, S. Urata, Y. Ogata, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 368 - 371 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
Evaluation of Neighbors Based Routing for ad hoc networks Reviewed
K. Aburada, H. Yamaba, S. Kubota, T. Katayama, M. Park, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 335 - 339 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
An Authentication Method for Mobile Devices that is Independent of Tap-Operation on a Touchscreen Reviewed
H. Yamaba, S. Nagatomo, K. Aburada, S. Kubota, T. Katayama, M. Park, and N. Okazaki
Proc. 2015 Int'l Conf. on Artificial Life and Robotics (ICAROB 2015) 327 - 330 2015.1
Language:English Publishing type:Research paper (scientific journal)
-
Countermeasure against fingerprinting attack in Tor by separated contents retrieval
Okazaki Naonobu, Toyoda Kentaroh, Yokoyama Emiri, So Hirofumi, Katayama Tetsuro, Park Mirang
IEICE Communications Express 4 ( 12 ) 370 - 375 2015
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
Tor (The Onion Router) realizes that anonymous web surfing without revealing the user's identity. However, A. Panachenko et al. reveals that an onion router that directly communicates with a user can infer which website a user accesses by leveraging site-specific traffic features, e.g., volume and time, and this attack is called the fingerprinting attack. In this paper, we propose a countermeasure against the fingerprinting attack by obfuscating site-specific traffic features. The idea is to establish two distinct Tor connections and to separately request text-based contents and image-based one through them. We show the effectiveness of our scheme with experiments.
-
Proposal of a Supporting Method for Debugging to Reproduce Java Multi-threaded Programs by Petri-net Reviewed
T. Katayama, S. Kitano, Y. Kita, H. Yamaba, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 1 ( 3 ) 207 - 211 2014.12
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Supporting Method to Generate a Decision Table from the Formal Specification Reviewed
T. Katayama, K. Nishikawa, Y. Kita, H. Yamaba, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 1 ( 3 ) 174 - 178 2014.12
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Method to Build Markov Chain Usage Model from UML Diagrams for Communication Delay Testing in Distributed Systems Reviewed
T. Katayama, Z. Zhao, Y. Kita, H. Yamaba, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 1 ( 2 ) 120 - 124 2014.9
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Visualizing Method of Data Transitions to Support Debugging for Java Programs Reviewed
T. Katayama, H. Nakamura, Y. Kita, H. Yamaba, and N. Okazaki
Journal of Robotics, Networking and Artificial Life (JRNAL) 1 ( 2 ) 111 - 115 2014.9
Language:English Publishing type:Research paper (scientific journal)
-
Javaプログラム実行時のデータ遷移可視化によるデバッグ支援 Reviewed
中村紘人, 片山徹郎, 喜多義弘, 山場久昭, 岡崎直宣
情報処理学会 ソフトウェアエンジニアリングシンポジウム2014(SES2014) 125 - 130 2014.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
形式仕様を用いたデシジョンテーブル生成手法の提案 Reviewed
西川拳太, 片山徹郎, 喜多義弘, 山場久昭, 岡崎直宣
情報処理学会 ソフトウェアエンジニアリングシンポジウム2014(SES2014) 39 - 44 2014.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
Shoichiro Kitano, Tetsuro Katayama
IPSJ SIG Notes 2014 ( 23 ) 1 - 8 2014.7
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
In multi-threaded programs, it is difficult to reproduce the situation when existing bugs are discovered because execution of the multi-threaded programs is usually non-deterministic. Therefore, it is difficult to obtain the information for understanding the behavior of the program when bugs are discovered. And, to identify the cause of bags becomes difficult. This paper proposes a supporting method for debugging to reproduce Java multi-threaded programs by visualizing the behavior of the programs with Petri-net. Conventional Petri-net cannot enough express the complicated behavior of the multi-threaded programs. Therefore, we extend Petri-net. We have confirmed the effectiveness of our method by implementing a prototype of a debugging supporting tool based on our method. In experiment for confirmation, to use our tool could identify the cause of the bug in about 33.6% of the time it takes without our tool. This result shows that our method and tool can improve efficiency in debugging for the multi-threaded programs.
-
形式手法を用いたテスト設計時におけるデシジョンテーブル生成支援手法の提案
西川拳太, 片山徹郎
宮崎大学工学部紀要 ( 43 ) 257 - 262 2014.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
データ遷移の可視化手法によるバグの原因特定支援について
中村紘人, 片山徹郎
宮崎大学工学部紀要 ( 43 ) 249 - 256 2014.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
ペトリネットを用いたJavaマルチスレッドプログラムの実行を再現することによるデバッグ支援手法の提案
北野翔一郎, 片山徹郎
宮崎大学工学部紀要 ( 43 ) 243 - 248 2014.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of a Supporting Method to Generate a Decision Table from the Formal Specification Reviewed
K. Nishikawa, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. Int'l Conf. on Artificial Life and Robotics (ICAROB 2014) 222 - 225 2014.1
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Supporting Method for Debugging to Reproduce Java Multi-threaded Programs by Petri-Net Reviewed
S. Kitano, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. Int'l Conf. on Artificial Life and Robotics (ICAROB 2014) 218 - 221 2014.1
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Method to Build Markov Chain Usage Model from UML Diagrams for Communication Delay Testing in Distributed Systems Reviewed
Z. Zhao, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. Int'l Conf. on Artificial Life and Robotics (ICAROB 2014) 214 - 217 2014.1
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Visualizing Method of Data Transitions to Support Debugging for Java Programs Reviewed
H. Nakamura, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proc. Int'l Conf. on Artificial Life and Robotics (ICAROB 2014) 210 - 213 2014.1
Language:English Publishing type:Research paper (scientific journal)
-
Combinatorial test architecture design using viewpoint diagram
Nishi Y., Katayama T., Yoshizawa S.
Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2013 295 - 300 2013.9
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2013
Software test has recently been a large-scale and complicated artifact, as is the software itself. It is necessary to reduce huge combinatorial test cases. This paper focuses on reduction of test parameters and combinations in test architectural design. First we will mention the test architecture design phase in TDLC: Test Development Life Cycle. Second we will introduce NGT: Notation for Generic Testing, which is a set of concepts or notation for design of software test architecture. This paper shows four examples of test architecture design patterns: Interaction-Viewpoint Conversion pattern, Interaction Cluster Partitioning Pattern, Interaction Demotion Pattern and Interaction Necessity Analysis. © 2013 IEEE.
-
Proposal of testing diagrams for visualizing test cases
Urata S., Katayama T.
Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation, ICST 2013 483 - 484 2013.9
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation, ICST 2013
A software system becomes a large scale in recent years. As a result, test cases used in software testing have become a large scale. It is difficult to understand where the software system is tested by a large quantity of test cases. For this reason, testing diagrams to visualize test cases are proposed. To generate the testing diagrams, the test case and UML (Unified Modeling Language) diagram are compared and their common information is added to the UML diagram. This paper uses communication diagram and state machine diagram. Generating the testing diagrams can overlook the whole test cases. As a result, we can easily understand where the software system is tested by test cases. Moreover, the testing diagrams support that you find faults in the test cases and/or UML diagrams. © 2013 IEEE.
DOI: 10.1109/ICST.2013.81
-
テストケースの可視化を実現するテスト用ダイアグラムの提案 Reviewed
浦田聖也, 片山徹郎
情報処理学会 ソフトウェアエンジニアリングシンポジウム2013(SES2013) 2013.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
A conversion method from an ETSC to a timed Petri net to improve the matrix-based discrete event controller and its unified support system Reviewed
H. Yamaba, S. Kitano, K. Takatsuka, T. Katayama, N. Okazaki, and S. Tomita
Proc. 17th Int'l Conf. on Knowledge-Based and Intelligent Information and Engineering Systems (KES2013) 660 - 669 2013.9
Language:English Publishing type:Research paper (international conference proceedings)
-
テストケースの可視化を目的としたテスト用ダイアグラムの提案
浦田聖也, 片山徹郎
宮崎大学工学部紀要 ( 42 ) 263 - 269 2013.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
''Matrix-Bases Discrete-Event System Controller''を閣僚するためのETSCから時間ペトリネットへの変換手法とその統一的支援システム
北野翔一郎, 山場久昭, 高塚佳代子, 片山徹郎, 岡崎直直, 冨田重幸
火の国情報シンポジウム2013 CD-ROM 2013.3
Language:Japanese Publishing type:Research paper (scientific journal)
-
Combinatorial Test Architecture Design Using Viewpoint Diagram Reviewed
Y. Nishi, T. Katayama, and S. Yoshizawa
2nd Int'l Works. on Combinatorial Testing (IWCT 2013) 2013.3
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of Testing Diagrams for Visualizing Test Cases Reviewed
S. Urata and T. Katayama
6th Int'l Conf. on Software Testing, Verification and Validation (ICST2013) 2013.3
Language:English Publishing type:Research paper (scientific journal)
-
MATSUOKA Shingo, KATAYAMA Tetsuro
Technical report of IEICE. SS 112 ( 373 ) 37 - 42 2013.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
This paper aims to reduce the effort spent on understanding and confirming the testing progress by visualizing the progress of unit testing in software development in real-time. As an approach to achieve the goal, an automatic unit testing and visualization tool " Jvis " (Tool for Java programs to visualize unit testing) has been implemented Jvis is executed the automated testing based on CO (statement coverage) and C1 (branch coverage) for the test target program. Jvis visualizes current testing progress in real-time. As a result of the experiment applying programs with the defect to Jvis, each examinees could detect the defect in short time Hence, the effort spent on understanding and confirming the testing progress can be reduced by real-time visualization of the testing porogress from this experiment.
-
DDoS攻撃者によるIPトレースバックに対する妨害手法とその対策に関する検討 Reviewed
川端良樹, 喜多義弘, 山場久昭, 油田健太郎, 朴美娘, 片山徹郎, 岡崎直宣
日本セキュリティ・マネジメント学会誌 26 ( 3 ) 15 - 32 2013.1
Language:Japanese Publishing type:Research paper (scientific journal)
-
Yamaba H., Kitano S., Takatsuka K., Katayama T., Okazaki N., Tomita S.
Procedia Computer Science 22 467 - 476 2013
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Procedia Computer Science
The matrix-based discrete-event system controller (MDEC) framework, which is a sophisticated framework proposed by Jose Mireles et al., is a promising method for designing control systems for discrete manufacturing systems. In a previous study, we improved the MDEC framework by introducing a timed Petri net and an expanded timed-state-chart (ETSC) that was developed in our laboratory in order to describe complex behavior of discrete manufacturing systems. In the present study, a computer system supporting the design of such control systems was implemented based on the improved framework (MDEC2). ETSC models, which users draw through a GUI, are converted into timed Petri nets in the form of matrices, and such matrices are embedded into controllers of MDEC2. Through a series of experiments, we confirmed that the obtained controllers functioned well. © 2013 The Authors.
-
Javaプログラムのための単体テスト並列実行ツールの試作 Reviewed
西川拳太, 松岡慎吾, 片山徹郎
ソフトウェアテストシンポジウム2012九州(JaSST'12 Kyushu) 30 - 33 2012.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
テストケースの可視化を目的としたテスト用状態マシン図作成手法の提案 Reviewed
浦田聖也, 片山徹郎
ソフトウェアテストシンポジウム2012九州(JaSST'12 Kyushu) 30 - 33 2012.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
Javaプログラムを対象とした単体テスト可視化ツール``Jvis''の開発 Reviewed
松岡慎吾, 喜多義弘, 片山徹郎
情報処理学会 ソフトウェアエンジニアリングシンポジウム2012(SES2012) 2012.8
Language:Japanese Publishing type:Research paper (scientific journal)
-
シミュレータ作成の手間を削減可能な 二部構成シミュレータ設計手法の提案
川元卓, 喜多義弘, 片山徹郎
宮崎大学工学部紀要 ( 41 ) 269 - 276 2012.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Javaプログラムを対象とした単体テスト自動実行および 可視化ツール``Jvis''の開発
松岡慎吾, 喜多義弘, 片山徹郎
宮崎大学工学部紀要 ( 41 ) 261 - 268 2012.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
KITA Yoshihiro, KATAYAMA Tetsuro, TOMITA Shigeyuki
The IEICE transactions on information and systems (Japanese edetion) 95 ( 4 ) 855 - 869 2012.4
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
-
Javaプログラム読解支援のためのプログラム可視化ツールAvisの実装と評価 Reviewed
喜多義弘, 片山徹郎, 冨田重幸
電子情報通信学会論文誌 J95-D ( 4 ) 855 - 869 2012.4
Language:Japanese Publishing type:Research paper (scientific journal)
-
Prototype of an Automatic Unit Testing Tool with Random Testing for Java Programs Reviewed
S. Matsuoka, Y. Kita, and T. Katayama
Proc. 22nd Int'l Sympo. on Softw. Reliability Eng. (ISSRE2011) 2011.12
Language:English Publishing type:Research paper (international conference proceedings)
-
Formal Verification of Software Designs in Hierarchical State Transition Matrix with SMT-based Bounded Model Checking Reviewed
W. Kong, N. Katahira, M. Watanabe, T. Katayama, K. Hisazumi, and A. Fukuda
Proc. 2011 Asia-Pacific Softw. Eng. Conf. (APSEC 2011) 81 - 88 2011.12
Language:English Publishing type:Research paper (international conference proceedings)
-
Motivation to Establish a Concept of Test Architecture Invited
T. Katayama
Proc. International Workshop on Software Test Architecture (InSTA) 2011.12
Language:English Publishing type:Research paper (international conference proceedings)
-
Kong W., Katahira N., Watanabe M., Katayama T., Hisazumi K., Fukuda A.
Proceedings - Asia-Pacific Software Engineering Conference, APSEC 81 - 88 2011.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - Asia-Pacific Software Engineering Conference, APSEC
Hierarchical State Transition Matrix (HSTM) is a table-based modeling language for developing designs of software systems. Although widely used and adopted by (particularly Japanese) software industry, there is still lack of mechanized formal verification supports for conducting rigorous and automatic analysis to improve reliability of HSTM designs. In this paper, we first present a formalization of HSTM designs as state transition systems. Consequentially, based on this formalization, we propose a symbolic encoding approach, through which correctness of a HSTM design with respect to LTL properties could be represented as Bounded Model Checking (BMC) problems that could be determined by Satisfiability Modulo Theories (SMT) solving. We have implemented our encoding approach in a tool called Garakabu2 with the state-of-the-art SMT solver CVC3 as its back-ended solver. Furthermore, in our preliminary experiments, a conceptually simple but steadily effective way of accelerating SMT solving for HSTM designs is investigated and reported. © 2011 IEEE.
-
Proposal of an Execution Paths Indication Method for Integration Testing by Using an Automatic Visualization Tool `Avis' Reviewed
Y. Kita, T. Katayama, and S. Tomita
Proc. 5th World Congress for Softw. Quality(5WCSQ) 2011.11
Language:English Publishing type:Research paper (international conference proceedings)
-
コーディングとテストの並列開発手法実現のための一考察 Reviewed
大久保暢人, 松岡慎吾, 喜多義弘, 片山徹郎
ソフトウェアテストシンポジウム2011九州(JaSST'11 Kyushu) 30 - 32 2011.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
An SMT-based approach to bounded model checking of designs in communicating state transition matrix
Kong W., Katahira N., Qian W., Watanabe M., Katayama T., Fukuda A.
Proceedings - 2011 International Conference on Computational Science and Its Applications, ICCSA 2011 159 - 167 2011.9
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - 2011 International Conference on Computational Science and Its Applications, ICCSA 2011
State Transition Matrix (STM) is a table-based modeling language for developing designs of software systems. Although widely accepted and used in software industry, there is lack of formal verification supports for conducting rigorous analysis to improve reliability of STM designs. In this paper, we present a symbolic encoding approach for STM designs that employ message passing as the means of communication, through which correctness of a STM design with respect to invariant properties could be Bounded Model Checked (BMC) by using Satisfiability Modulo Theories (SMT) solving techniques. We have built a prototype implementation of the proposed encoding and the state-of-the-art SMT solver - Yices, is used in our experiments as a back-end tool to evaluate the effectiveness of our approach. In addition, two approaches for accelerating SMT solving by introducing additional knowledge are proposed and their effectiveness is shown by our preliminary experimental results. © 2011 IEEE.
-
ソフトウェア要求仕様書に基づいたテスト項目作成手法の提案 Reviewed
喜多義弘, 鈴木三紀夫, 秋山浩一, 片山徹郎, 西康晴
情報処理学会 ソフトウェアエンジニアリングシンポジウム2011(SES2011) 2011 ( 2 ) 1 - 6 2011.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
組込みソフトウェア開発支援のための命令セットシミュレータ(ISS)作成支援ツールの試作
東園修平, 片山徹郎
宮崎大学工学部紀要 ( 40 ) 263 - 268 2011.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
ランダムテスト手法を用いたJava プログラム単体テスト自動実行ツールの試作 Reviewed
松岡慎吾, 喜多義弘, 片山徹郎
ソフトウェア・シンポジウム SS2011 2011.6
Language:Japanese Publishing type:Research paper (scientific journal)
-
An SMT-based Approach to Bounded Model Checking of Designs in Communicating State Transition Matrix Reviewed
W. Kong, N. Katahira, W. Qian, M. Watanabe, T. Katayama, and A. Fukuda
11th Int'l Conf. on Computational Sci. and Its Application (ICCSA 2011) 159 - 167 2011.6
Language:English Publishing type:Research paper (international conference proceedings)
-
An SMT-Based Approach to Bounded Model Checking of Designs in State Transition Matrix Reviewed
W. Kong, T. Shiraishi, N. Katahira, M. Watanabe, T. Katayama, and A. Fukuda
IEICE Trans. on Info. & Sys. E94-D ( 5 ) 946 - 957 2011.5
Language:English Publishing type:Research paper (scientific journal)
-
An SMT-based approach to bounded model checking of designs in state transition matrix
Kong W., Shiraishi T., Katahira N., Watanabe M., Katayama T., Fukuda A.
IEICE Transactions on Information and Systems E94-D ( 5 ) 946 - 957 2011.5
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:IEICE Transactions on Information and Systems
State Transition Matrix (STM) is a table-based modeling language that has been frequently used in industry for specifying behaviors of systems. Functional correctness of a STM design (i.e., a design developed with STM) could often be expressed as invariant properties. In this paper, we first present a formalization of the static and dynamic aspects of STM designs. Consequentially, based on this formalization, we investigate a symbolic encoding approach, through which a STM design could be bounded model checked w.r.t. invariant properties by using Satisfiability Modulo Theories (SMT) solving technique. We have built a prototype implementation of the proposed encoding and the state-of-the-art SMT solver - Yices, is used in our experiments to evaluate the effectiveness of our approach. Two attempts for accelerating SMT solving are also reported. © 2011 The Institute of Electronics.
-
検証技法としてのモデル検証、その検証結果のフィードバックについて Reviewed
片平典幸, 孔維強, 渡辺政彦, 片山徹郎, 福田晃
ソフトウェアテストシンポジウム2010九州(JaSST'10 Kyushu) 44 - 45 2010.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
Javaプログラム単体テスト自動実行ツール開発に向けた一考察 Reviewed
松岡慎吾, 片山徹郎
ソフトウェアテストシンポジウム2010九州(JaSST'10 Kyushu) 40 - 43 2010.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
状態遷移構文とテスト構文を導入した組込みソフトウェア向けプログラミング言語開発 Reviewed
岡山直樹, 片山徹郎
情報処理学会 組込みシステムシンポジウム2010(ESS2010) 43 - 48 2010.10
Language:Japanese Publishing type:Research paper (scientific journal)
-
信頼性向上を目的とした組込みソフトウェア向けプログラミング言語の開発
岡山直樹, 片山徹郎
宮崎大学工学部紀要 ( 39 ) 301 - 306 2010.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
プログラム自動可視化ツールAvisを利用した結合テスト実施のための実行経路抽出手法の提案 Reviewed
喜多義弘, 片山徹郎, 冨田重幸
情報処理学会論文誌 51 ( 9 ) 1859 - 1872 2010.9
Language:Japanese Publishing type:Research paper (scientific journal)
-
Model Checking of Software Design in State Transition Matrix Reviewed
T. Shiraishi, W. Kong, Y. Mizushima, N. Katahira, M. Matsumoto, M. Watanabe, T. Katayama, and A. Fukuda
Proc. 2010 Int'l Conf. Softw. Eng. Research and Practice (SERP'10) 507 - 513 2010.7
Language:English Publishing type:Research paper (international conference proceedings)
-
結合テストのためのプログラム自動可視化ツールAvisによる実行経路表示手法の提案
喜多義弘, 片山徹郎, 冨田重幸
火の国情報シンポジウム2010 CD-ROM 2010.3
Language:Japanese Publishing type:Research paper (scientific journal)
-
Design and development of state transition matrix model checking tool Garakabu2.
SHIRAISHI T., KONG W., MATSUMOTO M., KATAYAMA T., FUKUDA A., MIZUSHIMA Y., KATAHIRA N., WATANABE M.
72 ( 0 ) 283 - 284 2010.3
Language:Japanese Publishing type:Research paper (scientific journal)
-
Extension and evaluation of an automatic visualization tool "Avis" for programming education
Kita Y., Tokunaga T., Katayama T., Tomita S.
Proceedings of the IASTED International Conference on Software Engineering, SE 2009 31 - 36 2009.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of the IASTED International Conference on Software Engineering, SE 2009
As the demand for software is increasing more rapidly than ever, demand for educating novice programmers are increasing in order to increase the population of programmers to cope with this issue. We developed an automatic visualization tool "Avis" that generates a flowchart and execution paths from source codes of a Java programs for supporting programming education. This paper describes extension of Avis for generating sequence diagrams together with the evaluation of practical use in education to aids novice programmers to understand source code of programs.
-
FURUTONO TOMOYUKI, SAKAMOTO NORIAKI, MINE TSUNENORI, KUSAKABE SHIGERU, SUGANUMA AKIRA, KANEKO KUNIHIKO, NAKANISHI TSUNEO, FUKASE MITSUAKI, OMORI YOICHI, UDDIN MOHAMMAD MESBAH, NOMA TSUKASA, SUEYOSHI TOSHINORI, KATAYAMA TETSURO, MORIMOTO TSUYOSHI, ARAKI KEIJIRO, FUKUDA AKIRA, YASUURA HIROTO
IPSJ SIG Notes 2009 ( 32 ) 171 - 176 2009.3
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
The progress of Information Technology, which is the infrastructure of an advanced information society, is remarkable and has the enormous impact on our daily life. On the other hand, it has been pointed out by the industry that there is a lack of highly skilled ICT personnel who can lead the next generation. In order to address this issue, the Graduate School of Information Science and Electrical Engineering in Kyushu University has established Social Information System Engineering Course. In this education course, we have been running the practical education program with an objective to foster world class leader who has extraordinary technical skill and sense of ethics. This program is supported by various companies through Nippon Keidanren and by Ministry of Education, Culture, Sports, Science and Technology. This paper describes the content, method, result and evaluation for our two years experience. We also discuss the issues and concerns that need to be resolved.
-
Extension and Evaluation of an Automatic Visualization Tool ``Avis'' for Programming Education Reviewed
Y. Kita, T. Tokunaga, T. Katayama, S. Tomita
Proc. Int'l Association of Sci. and Tech. for Development(IASTED) Int'l Conf. on Softw. Eng. (SE 2009) 31 - 36 2009.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Method of Displaying Paths with 3D Graphics in Automatic Visualization Tool "Avis"
TOKUNAGA Tomoki, KITA Yoshihiro, KATAYAMA Tetsuro
IEICE technical report 108 ( 242 ) 55 - 60 2008.10
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
"Avis" is an automatic visualization tool for supporting programing education. It analyzes source codes of Java programs and it generates a control flow graph, paths, and sequence diagrams corresponded to the paths. But, as one of problems it has, it is not easy to understand a relation between paths and sequence diagrams. This paper proposes a method of displaying paths with 3D graphics to understand a relation between paths and sequence diagrams, and improves "Avis" which draws a hexahedron that displays a path on the front and a sequence diagram on the right side. The path and the sequence diagram can be compared as a same time by operating the hexahedron. It has been easier to understand a relation between paths and sequence diagrams.
-
ライントレースカーを対象としたシミュレータのマルチウィンドウ表示について Reviewed
池田健太郎, 片山徹郎
情報処理学会 組込みシステムシンポジウム2008(ESS2008)論文集 222 - 223 2008.10
Language:Japanese Publishing type:Research paper (scientific journal)
-
Prototype of a Simulator to Reflect Behavior of a Line Trace Car
Ikeda Kentaro, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 37 317 - 324 2008.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Tokunaga Tomoki, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 37 325 - 332 2008.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
ライントレースカーの動作を反映するシミュレータの試作
池田健太郎, 片山徹郎
宮崎大学工学部紀要 ( 37 ) 317 - 324 2008.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
プログラミング教育支援のためのプログラム自動可視化ツール Avisにおける実行パス表示手法の改良
徳永友樹, 片山徹郎
宮崎大学工学部紀要 ( 37 ) 325 - 332 2008.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Hot Topics on Software Testing : Testing for Concurrent Programs
KATAYAMA Tetsuro, TAKAHASHI Juichi
IPSJ Magazine 49 ( 2 ) 154 - 161 2008.2
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
-
Proposal of a Test Case Generation Method for Embedded Systems from Sequence Diagram
INOUE Yo, KATAYAMA Tetsuro
IEICE technical report 107 ( 392 ) 85 - 90 2007.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
An efficient testing to keep the quality of products is required in embedded system development. But, test-cases are made according to the experience and capability of a tester. This paper proposes a test case generation method for the efficient testing. Concretely, test-cases and a table that expresses timing of user actions from a sequence diagram of UML (Unified Modeling Language) are generated. By using this method, discovering lack of specification, and improving of productivity of testing can be expected.
-
Implementation and evaluation of an automatic visualization tool "PGT" for programming education
Kita Y., Katayama T., Tomita S.
Proceedings - SERA 2007: Fifth ACIS International Conference on Software Engineering Research, Management, and Applications 213 - 220 2007.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - SERA 2007: Fifth ACIS International Conference on Software Engineering Research, Management, and Applications
As the demand for software is increasing more rapidly than ever, demand for programmers is increasing. It is important to educate novice programmers in order to increase the population of programmers. They have to read source codes of various programs, when they learn programming. But, it is not easy task for them to understand the behavior of a program only by reading the source code. This paper describes implementation and evaluation of an automatic visualization tool "PGT(Path Generation Tool)" for aiding programs in reading the source code of a Java program. PGT generates paths from a source code by visualizing the paths corresponded to the statements of the source code so that understand the meaningof the program easily. © 2007 IEEE.
DOI: 10.1109/SERA.2007.92
-
UMLを用いた組込みシステム開発におけるシーケンス図を利用したテストケース作成手法の提案 Reviewed
井上陽, 片山徹郎
ソフトウェアテストシンポジウム2007九州(JaSST'07 Kyushu) 53 - 55 2007.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
Prototype of a Simulator to Reflect a Speed Value in a Code of a Line Trace Car Reviewed
K. Ikeda and T. Katayama
Joint Works. on Embedded Softw. Development (JWSD2007) 43 - 52 2007.10
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Refinement Method of UML Diagrams to Support Making PIM in MDA Development
Inoue Yo, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 36 313 - 320 2007.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Prototype of Supporting Automation to Pass a First Test in Test Driven Development for Java programs
Shino Teruo, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 36 305 - 312 2007.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
MDAにおけるPIM作成支援を目的としたUMLダイアグラム洗練手法の提案
井上陽, 片山徹郎
宮崎大学工学部紀要 ( 36 ) 313 - 320 2007.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Javaを対象としたテスト駆動開発における初回テストパス自動化支援ツールの試作
篠晃朗, 片山徹郎
宮崎大学工学部紀要 ( 36 ) 305 - 312 2007.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
プログラミング教育支援のためのプログラム自動可視化ツールAvisの試作 Reviewed
喜多義弘, 徳永友樹, 片山徹郎, 冨田重幸
情報処理学会 ソフトウェアエンジニアリングシンポジウム2007(SES2007) 223 - 226 2007.8
Language:Japanese Publishing type:Research paper (scientific journal)
-
Implementation and Evaluation of an Automatic Visualization Tool ``PGT'' for Programming Education Reviewed
Y. Kita, T. Katayama, and S. Tomita
Proc. 5th Int'l Conf. on Softw. Eng. Research, Management & Applications(SERA2007) 213 - 220 2007.8
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of a simulator to reflect a speed value in a code of linetracecar
Ikeda Kentaro, Katayama Tetsuro
Record of Joint Conference of Electrical and Electronics Engineers in Kyushu 2007 ( 0 ) 514 - 514 2007
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Committee of Joint Conference of Electrical, Electronics and Information Engineers in Kyushu
-
Proposal of a Method to Display Paths Using a Sequence Diagram in Program Visualization Tool "Avis"
Tokunaga Tomoki, Katayama Tetsuro
Record of Joint Conference of Electrical and Electronics Engineers in Kyushu 2007 ( 0 ) 517 - 517 2007
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Committee of Joint Conference of Electrical, Electronics and Information Engineers in Kyushu
-
Extension of Automatic Visualization Tool "Avis" for Large Scale Programs
KITA Yoshihiro, KATAYAMA Tetsuro, TOMITA Shigeyuki
IEICE technical report 106 ( 426 ) 37 - 42 2006.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
As the demand for software is increasing more rapidly, the demand for the number of programmers is escalating. It is important to educate programmers in order to increase the number of skillful programmers. In this research, the automatic visualization tool "Avis" has been developed for Java to educate the programmers. Avis consists of three parts: "Parser," "CF-Generator," and "P-Generator." But large scale programs are not applied to P-Generator because P-Generator gets into overflow by excessive declaration of array. In this paper, the data structure of P-Generator is extended so that it can be applied the large scale programs. Consequently, the practicality of Avis improved because more Java programs can be applied to Avis. Moreover, the usefulness of Avis has been confirmed by using Avis for students of University of Miyazaki.
-
TAKESHITA Akito, KATAYAMA Tetsuro
IEICE technical report 106 ( 426 ) 43 - 48 2006.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
In object-oriented programs, such as Java, a system is executed by sending and receiving messages between the objects generated in run-time. However, it is difficult to understand what message communication an object actually is executed only by the source code. This research aims at the reliability improvement of Java programs and the understanding support of the behavior of the Java programs, and visualizes the execution history of the Java programs by using a sequence diagram. Java programs are analyzed dynamically and method call relations between objects are expressed on a sequence diagram based on the execution history. Values of arguments and return values when a method call occurs are also displayed on the same sequence diagram. Consequently, an understanding of the behavior and improvement of reliability of programs are promoted, because the message communication by objects can be shown visually.
-
Study on Displaying the Execution History for Java Programs Using JavaCC
Takeshita Akito, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 35 321 - 328 2006.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
JavaCCを利用したJavaプログラムの実行履歴表示について
竹下彰人, 片山徹郎
宮崎大学工学部紀要 ( 35 ) 321 - 328 2006.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Extension of Automatic Visualization Tool "Avis" for Structure of Classes
KITA Yoshihiro, KAWASOE Takanori, KATAYAMA Tetsuro
IEICE technical report 105 ( 490 ) 7 - 12 2005.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
As the demand for software is increasing more rapidly, the demand for the number of programmers is escalating. It is important to educate novice programmers in order to increase the number of skillful programmers. In this research, the automatic visualization tool "Avis" has been developed for Java to educate the novice programmers. But, most Java programs are not applied to Avis because Avis can not accept the structure of classes. Avis consists of three parts : "Parser,""FC-Generator," and "P-Generator." Parser and FC-Generator have been enhanced to apply the structure of classes. In this paper, P-Generator is extended so that it can be applied the structure of classes for Java to. Consequently, by using Avis, the novice programmers can understand the behavior of Java programs easily.
-
SHIMOMURA Kiyohito, KATAYAMA Tetsuro
IEICE technical report 105 ( 490 ) 13 - 18 2005.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
UML (Unified Modeling Language) is often used at the requirements analysis and the design. However, in describing source codes from models, it takes time and artificial mistakes may occur. In this research, the conversion rules for programming support have been extracted from UML diagrams to Java source codes. It is possible for the conversion rules to improve productivity and reliability of software. In this paper, new conversion rules have been extracted, a prototype of conversion tool that automatically generates Java source codes from UML diagrams based on the extracted conversion rules has been implemented, and it is confirmed that the conversion rules are useful.
-
Proposal of a Method to Support Testing for Java Programs with UML Reviewed
共著者:T. Katayama and Y. Yabuya
Proc. 2005 Asia-Pacific Softw. Eng. Conf. (APSEC 2005), 533-540 2005.12
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of an automatic visualization tool for java to educate novice programmers
Kita Y., Kawasoe T., Katayama T.
Proceedings of the IASTED International Conference on Software Engineering: part of the 23rd IASTED International Multi-Conference on Applied Informatics, SE 2005 307 - 312 2005.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of the IASTED International Conference on Software Engineering: part of the 23rd IASTED International Multi-Conference on Applied Informatics, SE 2005
The demand for software is increasing more rapidly than ever. The demand for the programmers is increasing. It is important to educate novice programmers in order to increase the number of skillful programmers. This paper describes a prototype of an automatic visualization tool "Avis" for Java programs to educate the novice programmers to the programming. "Avis" generates a flowchart and paths, from the source code. Since "Avis" visualizes correspondence of the statements of the source code to the flowchart and paths, the novice programmers can understand the behavior of Java programs easily.
-
Proposal of a method to support testing for Java programs with UML
Katayama T., Yabuya Y.
Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2005 533 - 540 2005.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - Asia-Pacific Software Engineering Conference, APSEC
There is an increasing need for effective testing of software for complex safety-critical applications. This paper proposes a supporting method of testing for Java programs by using Unified Modeling Language (UML) in order to improve the reliability of them. The correspondences of source codes in Java and elements of a class diagram, a sequence diagram, and a statechart diagram have been extracted. By using the extracted correspondences as test items in testing, it becomes possible to test effectively the specification of software, the structure of Java programs, the flows of processing of a system, and the flow of transition between states. Moreover, in order to confirm the validity of the proposed method, a prototype tool to support testing for Java programs is implemented. The inputs of this prototype are three diagrams, and the outputs are test items generated from, the extracted correspondences. As an example, a source code of blackjack game in Java has been tested by using the test items outputted from the prototype. It has been possible to test 67.2% of the number of lines in the whole source code. © 2005 IEEE.
-
KAWASOE Takanori, KATAYAMA Tetsuro
IEICE technical report 105 ( 331 ) 1 - 6 2005.10
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
In Java, a method or a variable might be called as an object. The method is executed when it is called by the object. This call relation is made difficult to understand the behavior of the program. This research aims at supporting the understanding of the behavior of Java programs. In the paper, the control flowgraph which includs information of call relations among objects is generated. By visualizing a program with the control flowgraph, the time needed to understand the behavior of the program is reduced.
-
組込みシステムの性能に応じたUMLの変形について
共著者:佐々木心也, 片山徹郎
情報処理学会組込みソフトウェアシンポジウム2005 (ESS2005), 140-143頁 2005.10
-
Implementing of a Static Analytical Part for Program Visualization with JavaParser
Kawasoe Takanori, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 34 249 - 256 2005.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Extraction of Transformation Rules from UML Diagrams to SpecC
KATAYAMA Tetsuro
IEICE transactions on information and systems 88 ( 6 ) 1126 - 1133 2005.6
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:電子情報通信学会
Embedded systems are used in broad fields. They are one of the indispensable and fundamental technologies in a highly informative society in recent years. As embedded systems are large-scale and complicated, it is prosperous to design and develop a system LSI (Large Scale Integration). The structure of the system LSI has been increasing complexity every year. The degree of improvement of its design productivity has not caught up with the degree of its complexity by conventional methods or techniques. Hence, an idea for the design of a system LSI which has the flow of describing specifications of a system in UML (Unified Modeling Language) and then designing the system in a system level language has already proposed. It is important to establish how to convert from UML to a system level language in specification description or design with the idea. This paper proposes, extracts and verifies transformation rules from UML to SpecC which is one of system level languages. SpecC code has been generated actually from elements in diagrams in UML based on the rules. As an example to verify the rules, "headlights control system of a car" is adopted. SpecC code has been generated actually from elements in diagrams in UML based on the rules. It has been confirmed that the example is executed correctly in simulations. By using the transformation rules proposed in this paper, specification and implementation of a system can be connected seamlessly. Hence, it can improve the design productivity of a system LSI and the productivity of embedded systems.
-
Extraction of Transformation Rules from UML Diagrams to SpecC Reviewed
T. Katayama
IEICE Trans. on Info. & Sys., Vol.E88-D, No.6, 1126-1133 E88-D ( 6 ) 1126 - 1133 2005.6
Language:English Publishing type:Research paper (scientific journal)
-
Prototype of an Automatic Visualization Tool for Java to Educate Novice Programmers
共著者:Y. Kita, T. Kawasoe, and T. Katayama
Proc. Int'l Conf. on Softw. Eng. (SE 2005), as part of the 23rd Int'l Association of Sci. and Tech. for Development (IASTED) Int'l Multi-Conf. on Applied Informatics, 307-312 2005.2
-
Extraction of the Conversion Rules to Support the Programming from UML to Java Source Codes
SHIMOMURA Kiyohito, KATAYAMA Tetsuro
Technical report of IEICE. SS 104 ( 570 ) 25 - 30 2005.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
In recent years, the object-oriented development cases with UML are increasing. Moreover, since competition of a market is intensifying, software must be released for a very short period of time. In this paper, the conversion rules for programming support to Java source codes are extracted from the elements of four diagrams (class diagram, activity diagram, sequence diagram, and collaboration diagram) within only the specifications of UML and Java. The conversion rules proposed in this paper mean the rules to support generation of Java source codes by using the correspondence relation between elements of a diagram and Java source codes. It is confirmed that Java source codes could partially be generated from UML by using these rules.
-
Study on an Automatic Visualization Tool for Java to Educate Novice Programmers
KITA Yoshihiro, KAWASOE Takanori, KATAYAMA Tetsuro
Technical report of IEICE. SS 104 ( 570 ) 19 - 24 2005.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
The demand for software is increasing more rapidly than ever. The demand for the programmers is increasing. It is important to educate novice programmers in order to increase the number of skillful programmers. This paper describes a prototype of an automatic visualization tool "Avis" for Java programs to educate the novice programmers in order to support their programming. "Avis" generates a flowchart and paths from Java source codes. Since "Avis" visualizes the correspondence of the statements of the source codes to the flowchart and paths, the novice programmers can understand the behavior of Java programs easily.
-
Study on a Testing Method for Java Programs with UML Diagrams
YABUYA Yusuke, SHIMOMURA Kiyohito, KATAYAMA Tetsuro
Technical report of IEICE. SS 104 ( 466 ) 7 - 12 2004.11
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
In software development, UML(Unified Modeling Language) is used more as the development by using object-oriented technology increases. And, the case in which system troubles have occurred owing to insufficient testing has been increasing. This research aims at increasing reliability of programs written in Java object-oriented language by testing them with UML diagrams. This paper extracts relations between source codes in Java and elements of class, sequence, and statechart diagrams. By using the extracted relations in test design, it becomes possible to test efficiently the structure of Java programs, the flow of state transition and processing of a system and the specification of software.
-
Extraction of Relations between UML Class Diagram and Programs in Java
Yabuya Yusuke, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 33 375 - 382 2004.10
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Study on Abstraction of USB Device Drivers on Linux with Dividing Source Codes of the Device Drivers
Mizukawa Shota, Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 33 367 - 374 2004.10
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Study on Abstraction of USB Device Drivers on Linux
MIZUKAWA Shota, KATAYAMA Tetsuro
IPSJ SIG Notes 2004 ( 82 ) 9 - 16 2004.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
Writing device drivers spends much time and makes efforts because it needs much knowledge of the target operating system (OS) and device. And, many device drivers must be written. This research aims at reducing the burdens of programmers who write device drivers by abstracting device drivers. As a preparatory research, this paper adopts Linux as a target OS and USB (Universal Serial Bus) device as a target device, and defines an algorithm for PROBE function of USB device drivers on Linux. USB device drivers on Linux are abstracted with dividing source codes of the device drivers by the algorithm. In addition, this paper tries dividing source codes of DISCONNECT, open, and close functions. It can assist the programmers in understanding structure or behavior of device drivers.
-
A Study of Co-design for Systems with Interfaces of USB Devices in SpecC,
Proc. 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI2003), Vol.7, 234-240 2003.7
-
Co-design of Device Driver and Firmware for USB Devices in SpecC
Katayama Tetsuro
Memoirs of the Faculty of Engineering, Miyazaki University 32 357 - 364 2003.7
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Proposal of a Supporting Method for Diagrams Generation with the Transformation Rules in UML
Proc. 2002 Asia-Pacific Softw. Eng. Conf. (APSEC 2002), 475-484 2002.12
-
Co - design of Device Driver and Firmware for USB Devices in SpecC
KATAYAMA Tetsuro, FUKUMOTO Yoshiyuki
IPSJ SIG Notes 2002 ( 79 ) 39 - 46 2002.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
This research aims at increasing productivity of design for systems used USB (Universal Serial Bus) by co-design with SpecC, which is one of system level languages. As a preparatory research, this paper attempts co-design of device driver and firmware which are softwares of USB. First, specification of USB device driver and firmware of Linux are described with SpecC, and the specification was verified with simulation. Next, a decoder which transforms the specification into the source codes of device driver and firmware which can be compiled is implemented in Perl language. Executing the both source codes which are generated by the decoder confirmed that they satisfied the specification.
-
Katayama Tetsuro, Iwaki Yoshiyuki
Memoirs of the Faculty of Engineering, Miyazaki University 31 385 - 391 2002.7
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
Proposal of a supporting method for diagram generation with the transformation rules in UML
Katayama T.
Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2002-January 475 - 484 2002
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - Asia-Pacific Software Engineering Conference, APSEC
© 2002 IEEE.Various object-oriented methodologies have been advocated in recent years. Unified Modeling Language (UML) for such notation is becoming increasingly popular. This paper proposes a supporting method for diagram generation with transformation rules in UML to draw diagrams which eliminated contradiction in a short time by using common elements which other diagrams have. The validity of the proposed method is confirmed by implementing a diagram transformation editor and verifying part of the rules on the editor. The rules are extracted and used without any extension or semantics. Consequently, diagrams without contradiction can be generated in a short time. Transformation of diagrams which show the same character as the sequence diagram and collaboration diagram expressing the interaction of an object has generated a near-complete diagram.
-
Abstraction of Device Drivers and Inputs of the Device Driver Generation System for UNIX-like Operating Systems
共著者:T. Katayama, K. Saisho, and A. Fukuda
Proc. 2001 Int'l Association of Sci. and Tech. for Development (IASTED) Int'l Conf. on Applied Informatics (AI'2001), 489-495 2001.2
-
組み込み向けOSにおけるタイミング制御の必要なデバイスドライバの自動生成について
共著者:村上智一, 片山徹郎, 最所圭三,福田晃
情報処理学会コンピュータシステムシンポジウム論文集, 115-122頁 2000.11
-
組み込み用マイクロカーネルOSの自動生成に向けて
共著者:久住憲嗣, 森若和雄, 中西恒夫, 片山徹郎, 最所圭三, 福田晃
情報処理学会コンピュータシステムシンポジウム論文集, 107-113頁 2000.11
-
Prototype of the Device Driver Generation System for UNIX-like Operating System
共著者:T. Katayama, K. Saisho, and A. Fukuda
Proc. Int'l Symp. on Principles of Software Evolution (ISPSE2000), 302-310 2000.11
-
Memory Conscious Scheduling for Cluster-based NUMA Multi-processors
共著者:T. Koita, T. Katayama, K. Saisho, and A. Fukuda
J. of Supercomputing, Kluwer academic publishers, Vol.16, No.3, 217-235 2000.7
-
Memory conscious scheduling for cluster-based NUMA multiprocessors
Koita T., Katayama T., Saisho K., Fukuda A.
Journal of Supercomputing 16 ( 3 ) 217 - 235 2000.7
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Supercomputing
For Non-Uniform Memory Access (NUMA) multiprocessors, memory access overhead is crucial to system performance. Processor scheduling and page placement schemes, dominant factors of memory access overhead, are closely related. In particular, if the processor scheduling scheme is dynamic space-sharing, it should be considered together with the page placement scheme for efficient process execution. Most research in this area, however, has focused exclusively on either the processor scheduling scheme or the page placement scheme alone without considering the interaction between the two. This paper proposes several policies for cluster-based NUMA multiprocessors that are combinations of a processor scheduling scheme and a page placement scheme and investigates the interaction between them. The simulation results show that policies that cooperate to employ the home-cluster concept achieve the best performance. The paper also compares the best of the proposed policies with other existing dynamic processor scheduling policies. Based on our study reported here, the best policy is found to perform better than other existing policies.
-
UNIX系OSにおけるデバイスドライバの抽象化と生成システムの実現
共著者:奥野幹也, 片山徹郎, 最所圭三, 福田晃
情報処理学会論文誌, 41巻, 6号, 1755-1765頁 2000.6
-
Performance Evaluation of Home-Cluster Based Scheduling for NUMA Multiprocessors
共著者:T. Koita, T. Katayama, K. Saisho, and A. Fukuda
Proc. 2000 Int'l Conf. on Parallel and Distributed Processing Techniques and Applications (PDPTA'2000) Vol.4, 1939-1945 2000.6
-
Performance Evaluation of Memory Conscious Scheduling for NUMA Multiprocessors
共著者:T. Koita, T. Katayama, K. Saisho, and A. Fukuda
Proc. 2000 Int'l Association of Sci. and Tech. for Development (IASTED) Int'l Conf. on Applied Informatics (AI'2000), 855-861 2000.2
-
Prototype of the device driver generation system for unix-like operating systems
Katayama T., Saisho K., Fukuda A.
International Workshop on Principles of Software Evolution (IWPSE) 2000-January 302 - 310 2000
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:International Workshop on Principles of Software Evolution (IWPSE)
© 2001 IEEE.Writing device drivers spends much time and makes efforts because it needs knowledge of the target device and operating system (OS). In order to lighten the burden, the authors have proposed a model to generate device drivers and a device driver generation system before. The system generates a source code of a device driver from three inputs: device driver specification, OS dependent specification, and device dependent specification. The device drivers generated in the model are evolutionary because they can be expanded their features easily. They, however, are not always effective because the burden in describing the device dependent specification, which is one of the inputs, is nearly as same as the traditional method. In this paper, to aim at more reduction of the burden, device drivers are abstracted again, each input is defined afresh, and then a prototype of the system is implemented. As an example of the generation, an interrupt handler of a network device, FreeBSD and Linux as the target OS, and Etherlink XL as the target device are chosen. The OS dependent specification and the device dependent specification can be reused in each OS and device, respectively. As a result, an identical device dependent specification can be applied to the both OSs. The burden in generating new device drivers or porting ones to other OSs can be reduced.
-
Proposal of a Support System for Device Driver Generation
共著者:T. Katayama, K. Saisho, and A. Fukuda
Proc. 1999 Asia-Pacific Softw. Eng. Conf. (APSEC'99), 494-497 1999.12
-
Test-case Generation for Concurrent Programs with the Testing Criteria Using Interaction Sequences
共著者:T. Katayama, E. Itoh, Z. Furukawa, and K. Ushijima
Proc. 1999 Asia-Pacific Softw. Eng. Conf. (APSEC'99), 590-597 1999.12
-
デバイスドライバ生成システムにおける入力の改良
共著者:奥野幹也, 片山徹郎, 最所圭三, 福田晃
情報処理学会コンピュータシステムシンポジウム論文集, 137-144頁 1999.11
-
Home-cluster Based Processor Scheduling with Page Placement for NUMA Multiprocessors
共著者:T. Koita, T. Katayama, K. Saisho, and A. Fukuda
Proc. 1999 Int'l Conf. on Parallel and Distributed Processing Techniques and Applications (PDPTA'99), Vol.1, 539-545 1999.6
-
Generating a Device Driver with a Formal Specification Language
共著者:T. Katayama, K. Saisho, and A. Fukuda
Proc. 1999 Int'l Association of Sci. and Tech. for Development (IASTED) Int'l Conf. on Applied Informatics (AI'99), 638-643 1999.2
-
Proposal of a support system for device driver generation
Katayama T., Saisho K., Fukuda A.
Proceedings - 6th Asia Pacific Software Engineering Conference, APSEC 1999 494 - 497 1999
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - 6th Asia Pacific Software Engineering Conference, APSEC 1999
© 1999 IEEE. Writing device drivers is one of the most difficult tasks to develop or port operating systems (OSs). A device driver needs to be described according to the target device and OS. In the description, programmers must know information about hardware such as specifications of devices and carefully describe complex parts such as timing control. This paper proposes a support system for device driver generation. The inputs for the system are device driver specification which shows operations of the device, OS dependent specification which shows dependent parts on the OS, and device dependent specification which shows dependent parts on the device. As an example, network devices are adopted. The inputs to generate device drivers by the proposed system are described.
-
Test-case generation for concurrent programs with the testing criteria using interaction sequences
Katayama T., Itoh E., Furukawa Z., Ushijima K.
Proceedings - 6th Asia Pacific Software Engineering Conference, APSEC 1999 590 - 597 1999
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - 6th Asia Pacific Software Engineering Conference, APSEC 1999
© 1999 IEEE. Test-cases play an important roll for high quality software testing. Inadequate test-cases may cause bugs remaining after testing. Overlapped test-cases lead to increases in testing costs. The paper proposes a test-case generation method with the EIAG (Event InterActions Graph) and the ISTC (Interaction Sequences Testing Criteria). The EIAG represents behavior of concurrent programs. It consists of Event Graphs and Interactions. An Event Graph is a control flow graph of a program unit in a concurrent program. The Interactions represent interactions (synchronizations, communications and waits) between the program units. The ISTC proposed are based on sequences of Interactions. The cooperated paths (copaths) on the EIAG as test-cases satisfying the ISTC are generated. The generated copaths can detect dead (unreachable) statements which concern interactions, and they can find some communication errors and deadlocks in testing. It is, however, necessary to validate feasibility of the generated copaths.
-
Design and Implementation of Test-case Generation for Concurrent Programs
共著者:T. Katayama, Z. Furukawa, and K. Ushijima
Proc. 1998 Asia-Pacific Softw. Eng. Conf. (APSEC'98), 262-269 1998.12
-
Processor Scheduling with Page Placement for Cluster-based NUMA Multiprocessors
共著者:T. Koita, T. Katayama, K. Saisho, and A. Fukuda
Proc. 1998 Int'l Conf. on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Vol.2, 851-858 1998.7
-
タスク型を含む並行処理プログラムのテストケース生成法について
共著者:片山徹郎, 古川善吾, 牛島和夫
電子情報通信学会論文誌, j81-D-1巻, 6号, 809-818頁 1998.6
-
A Method for Automatic Generation of Device Drivers with a Formal Specification Language
共著者:T. Katayama, K. Saisho, and A. Fukuda
Proc. Int'l Workshop on Principles of Software Evolution (IWPSE98), 183-187 1998.4
-
Performance Evaluation of Two-level Processor Scheduling in Collaboration with Memory Management for NUMA Multiprocessors
共著者:T. Koita, T. Katayama, K. Saisho, and A. Fukuda
Proc. The 1998 Int'l Association of Sci. and Tech. for Development (IASTED'98), 265-272 1998.2
-
Design and implementation of test-case generation for concurrent programs
Katayama T., Furukawa Z., Ushijima K.
Proceedings - 1998 Asia Pacific Software Engineering Conference, APSEC 1998 1998-December 262 - 269 1998.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings - 1998 Asia Pacific Software Engineering Conference, APSEC 1998
© 1998 IEEE. Test-cases play an important role for high quality of software testing. Inadequate test-cases may cause bugs remaining after testing. Overlapped ones lead to the increases in testing costs. This paper proposes the Event InterActions Graph (EIAG) representing behavior of concurrent programs including any task-type and the cooperated paths (copaths) on the EIAG as test-cases, and describes the test-case generation tool (TCgen) for concurrent programs written in Ada programming language. The EIAG consists of Event Graphs and Interactions. An Event Graph is a control flow graph of a program unit in a concurrent program. The interactions represent interactions such as synchronizations between the program units. TCgen generates test-cases as copaths from an Ada concurrent program. The generated copaths satisfy given testing criteria. They can find some communication errors in testing and detecting unreachable statements which concern interactions. It is, however, necessary to validate feasibility of the generated copaths.
-
A Test-case Generation Method for Concurrent Programs Including Task-types
共著者:T. Katayama, Z. Furukawa, and K. Ushijima
Proc. Joint 1997 Asia-Pacific Softw. Eng. Conf. and Int'l Comp. Sci. Conf. (APSEC'97/ICSC'97), 485-494 1997.12
-
Test-case generation method for concurrent programs including task-types
Katayama T., Furukawa Z., Ushijima K.
Proceedings of the Asia-Pacific Software Engineering Conference and International Computer Science Conference, APSEC and ICSC 485 - 494 1997.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of the Asia-Pacific Software Engineering Conference and International Computer Science Conference, APSEC and ICSC
A task-type in concurrent programs is a template of task-instances which are dynamically generated in execution of the programs. The number of the generated task-instances may not be statically determined. Therefore, test-cases generated by our previously proposed method may not be realized in execution of the programs. This paper proposes an enhanced test-case generation method. Concurrent programs are classified into four kinds under two viewpoints: whether the number of task-instances generated from a task-type can be determined statically or dynamically, and whether or not the task-instances communicate with each other. The enhanced method uses a modified Event InterActions Graph(EIAG). The EIAG consists of Event Graphs and Interactions. An Event Graph is an abstract control flow graph of a program unit. The Interactions represent interactions between the units. Because the modified EIAG represents more accurate behavior of a program than the EIAG does, test-cases generated by the enhanced method increase the possibility of realizing themselves. The test-cases in the method increase in number. The method, however, is practical in the sense that the number of task-instances generated from a task-type is restricted.
-
デバイスドライバの仕様記述に適した言語の開発について
共著者:片山徹郎, 最所圭三, 福田晃
情報処理学会コンピュータシステムシンポジウム '97 論文集, 53-58頁 1997.11
-
移動計算機のためのWWW情報発信システムの構築 Reviewed
共著者:田頭茂明, 片山徹郎, 最所圭三, 福田晃
情報処理学会コンピュータシステムシンポジウム '97 論文集, 17-24頁 1997.11
Language:Japanese Publishing type:Research paper (scientific journal)
-
A Method for Structural Testing of Ada Concurrent Programs Using the Event Interactions Graph
共著者:T. Katayama, Z. Furukawa, and K. Ushijima
Proc. 1996 Asia-Pacific Softw. Eng. Conf. (APSEC'96), 355-364 1996.12
-
A method for structural testing of Ada concurrent programs using the Event Interactions Graph Reviewed
Katayama T., Furukawa Z., Ushijima K.
Proceedings - Asia-Pacific Software Engineering Conference, APSEC 355 - 364 1996
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings - Asia-Pacific Software Engineering Conference, APSEC
© 1996 IEEE. Software testing generally proceeds as follows: generating test-cases, selecting test-data, executing a test target program, inspecting execution result and evaluating whether testing has already been sufficient or not yet. As for methods for structural testing of programs, the way using a coverage, where the coverage means what extent given testing criteria are satisfied, is noted. At the evaluating step, whether or not we finish the testing is determined in view of the coverage. This paper proposes a method for structural testing of concurrent programs written in Ada programming language, especially, test-case generation and execution of the programs. The Event InterActions Graph (EIAG) is used as a model for concurrent programs. The EIAG consists of Event Graphs and Interactions. An Event Graph is a control flow graph of a program unit in a concurrent program. The Interactions represent interactions between the program units. Program units are such as procedures, functions and task-Types. After generating test-cases on the EIAG, a method for selecting test-data is described and measures to cope with infeasible test-cases with which are generated in this step is clarified. And a forced execution of a test target concurrent program in order to solve the nondeterministic execution is investigated. The nondeterministic execution is characteristic of concurrent programs.
-
Event Interactions Graph for Test-case Generation of Concurrent Programs
共著者:T. Katayama, Z. Furukawa, andK. Ushijima
Proc. 1995 Asia-Pacific Softw. Eng. Conf. (APSEC'95), 29-37 1995.12
-
動的に生成されたプロセス間で通信・同期を行なう並行処理プログラムのテスト法について
共著者:片山徹郎, 古川善吾, 牛島和夫
ソフトウェア・シンポジウム '95 論文集, 172-180頁 1995.6
-
Event interactions graph for test-case generations of concurrent programs Reviewed
Katayama T., Furukawa Z., Ushijima K.
Proceedings - 1995 Asia Pacific Software Engineering Conference, APSEC 1995 29 - 37 1995
Language:English Publishing type:Research paper (scientific journal) Publisher:Proceedings - 1995 Asia Pacific Software Engineering Conference, APSEC 1995
© 1995 IEEE. Test cases play an important role for high-quality software testing. Inadequate test-cases may cause bugs to remain after testing. Overlapped test cases may increase costs. This paper proposes an event interactions graph (EIAG), representing the behavior of concurrent programs and the cooperated paths (copaths) on the EIAG as test cases. The EIAG consists of event graphs and interactions. An event graph is a control flow graph of a program unit in a concurrent program. The interactions are synchronizations, communications and waits between the program units. Copaths can be generated automatically by the algorithms which are presented in this paper. The generated copaths can detect dead (unreachable) statements and can find some communication errors in testing. However, it is necessary to validate the feasibility of the generated copaths.
-
並行処理プログラムにおけるテストケースの定義と生成ツールの試作
共著者:片山徹郎, 菰田敏行, 古川善吾, 牛島和夫
情報処理学会論文誌, 34巻, 11号, 2223-2232頁 1993.11
-
Event-Constraint Model of a Concurrent Program for Test-Case Generation
共著者:T. Katayama, Z. Furukawa, andK. Ushijima
Proc. 1992 Joint Conf. of Softw. Eng. (JCSE'92), 285-292 1992.3