Computer Science ›› 2019, Vol. 46 ›› Issue (8): 239-243.doi: 10.11896/j.issn.1002-137X.2019.08.039

• Software & Database Technology • Previous Articles     Next Articles

Priority Ranking Method of Test Cases Based on Fault Location

CHEN Jing1, SHU Qiang2, XIE Hao-fei3   

  1. (School of Economics and Business Administration,Chongqing University of Education,Chongqing 400067,China)1
    (Chongqing University of Posts and Telecommunications,Chongqing 400065,China)2
    (School of Automation,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)3
  • Received:2019-04-29 Online:2019-08-15 Published:2019-08-15

Abstract: Protocol conformance testing is a method to verify whether the tested implementation is consistent with the standard protocol specification,which can ensure the interconnection and interworking of the equipment or system in accordance with the protocol.In the process of debugging,upgrading and repairing the tested equipment,it is often necessary to re-execute all test cases to ensure the completeness of protocol conformance testing.In the process of protocol implementation,it is necessary to test frequently and repairs this process until the protocol implementation of the tested equipment fully conforms to the protocol standard specification.In each regression process,the unstrategic execution of all test cases in the test case set will increase the workload of the test.Only at the end of all test cases,whether the test failure has been repaired correctly,or if other new failures have been detected,can be determined.As a result,some test cases that can detect faults can not be executed as soon as possible,and the test can not focus on the error-prone parts.The cost of test execution is large,which affects the test efficiency.Therefore,in the process of protocol conformance testing,how to optimize the huge test case set and reduce the test cost.Under the premise of ensuring the test requirements,using as few test cases as possible to detect the faults in the system as soon as possible,and improving the test fault detection rate has become an urgent problem to be solved.In this paper,based on the research of the existing test case priority sorting methods,the test case priority sorting algorithm based on fault location was improved,so as to improve the efficiency of fault detection.Combined with the dependence between test requirements,the dynamic adjustment of sequence is performed,and the test cases with high error detection probability are selected dynamically.The algorithm is verified effectively on the protocol conformance test system of wireless sensor networks.Compared with the Additional and FTP algorithms,its average percentage of fault detection APFD and test cost TCFD increases by at least 9.2% and 7.6% respectively.

Key words: Protocol conformance test, Fault detection, Sort method, Efficiency improvement, Method improvement

CLC Number: 

  • TP13
[1] JIANG B,CHAN W K.On the integration of test adequacy,test case prioritization,and statistical fault localization[C]∥Proceedings of the 10th International Conference on Quality Software (QSIC).Zhangjiajie:IEEE,2010:377-384.
[2] JONES J A,HARROLD M J.Empirical evaluation of the tarantula automatic fault-localization technique[C]∥International Conference on Automated Software Engineering.Long Beach,USA:IEEE,2005:273-282.
[3] PERELMAN L S,ABBAS W,KOUTSOUKOS X,et al.Sensor placement for fault location identification in water networks:A minimum test cover approach[J].Automatica,2016,72(C):166-176.
[4] HAO D,ZHANG L,ZANG L,et al.To be optimal or not in test-case prioritization[J].IEEE Transactions on Software Engineering,2016,42(5):490-505.
[5] ZHEN W,TANG Y H,LIU M,et al.Travelling wave fault location test technique and its applications using high speedtra-velling wave generator[C]∥Power and Energy Engineering Conference.Shanghai:IEEE,2012:1-4.
[6] MASRI W,ASSI R A,et al.Prevalence of coincidental correctness and mitigation of its impact on fault localization[J].Acm Transactions on Software Engineering & Methodology,2014,23(1):1-28.
[7] MIAO Y,CHEN Z,LI S,et al.Identifying coincidental correctness for fault localization by clustering test cases[M]∥Advances in Production Management Systems.Competitive Manufacturing for Innovative Products and Services.Berlin:Springer International Publishing,2012:158-165.
[8] BODE F,SACHS F,FRANZ M R.Tarantula peptide inhibits atrial fibrillation[J].Nature,2001,409(6816):35-36.
[9] YOO S,HARMAN M,CLARK D.Fault localization prioritization:Comparing information-theoretic and coverage-based approaches[J].Acm Transactions on Software Engineering & Methodology,2013,22(3):1-29.
[10] ZHAO S,FANG Y,LI W,et al.Design and implemention of an emulation node for space network protocol testing[C]∥International Conference on Machine Learning and Intelligent Communications.Cham:Springer,2017:658-667.
[11] WANG R,TIAN Y L,ZHOU D H,et al.Test-suite Reduction Based on MC/DC in Software Fault Localization[J].Computer Science,2015,42(10):170-174.(in Chinese) 王瑞,田宇立,周东红,等.面向故障定位的基于MC/DC的测试用例约简方法[J].计算机科学,2015,42(10):170-174.
[12] LI X,ZHANG C,LUO X.Naive Bayesian Applied in Automatic Test Cases Generation.Journal of Chongqing University of Technology(Natural Science),2012,26(2):76-78.(in Chinese) 李欣, 张聪, 罗宪. 朴素贝叶斯应用于自动化测试用例生成. 重庆理工大学学报(自然科学), 2012, 26(2):76-78.
[13] WU D P,LI Y,WANG R Y.A link failure localization strategy based on knight’s tour for Mesh optical network.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2011,23(1):1-5.(in Chinese) 吴大鹏,李阳,王汝言.基于骑士巡游的Mesh光网络链路故障定位策略.重庆邮电大学学报(自然科学版),2011,23(1):1-5.
[1] LIU Yun,YIN Chuan-huan,HU Di,ZHAO Tian,LIANG Yu. Communication Satellite Fault Detection Based on Recurrent Neural Network [J]. Computer Science, 2020, 47(2): 227-232.
[2] XIAO Zhen-hua, LIANG Yi-wen, TAN Cheng-yu, ZHOU Wen. Fault Detection Method Based on Immune Homeostasis Mechanism [J]. Computer Science, 2019, 46(8): 337-341.
[3] LIU Xiao-zhen,LIU Jing-sen. Distribution Routing Problem Based on Cuckoo Search Algorithm with Directional Mutation [J]. Computer Science, 2019, 46(7): 165-171.
[4] PAN Li-li, WANG Tian-e, QIN Jiao-hua and XIANG Xu-yu. Test Case Prioritization Based on DU Chains [J]. Computer Science, 2017, 44(4): 173-176.
[5] LV Ning, YAN Lu-qi and BAI Guang-yuan. Fault Detection for Beer Fermentation Process Based on Segmentation Multiway Kernel Principal Component Analysis [J]. Computer Science, 2016, 43(Z6): 25-27, 33.
[6] YAO Yi, LIU Yong, SHEN Xuan-fan, LIAO Yong and ZHAO Ming. Packet Drop Detector Design Based on IEEE 802.11e in Wireless Sensor and Actuator Networks [J]. Computer Science, 2016, 43(8): 66-70.
[7] LI Jun-li and LI Wei-hua. Semi-supervised SVDD-KFCM Algorithm and its Application in Bearing Fault Detection [J]. Computer Science, 2015, 42(Z6): 134-137.
[8] WANG Yao-xuan,YE Jun-min,CHEN Jing-ru and OU Zhong-hong. Software Fault Location Method Based on Fault Detection Model of Bipartitie Graphs [J]. Computer Science, 2013, 40(6): 160-163.
[9] . Test Suite Reduction Methods Based on K-medoids [J]. Computer Science, 2012, 39(Z6): 422-424.
[10] WAN Ya-ping,FENG Dan,OUYANG Li-jun,LIU Li,YANG Tian-ming. Self-feedback Fault Detection Algorithm for Peer-to-Peer Storage System [J]. Computer Science, 2010, 37(2): 48-52.
[11] . [J]. Computer Science, 2009, 36(2): 278-281.
[12] LIU Gang, ZHOU Jing-Li, Qin Lei-Hua ,CHEN Xiao-Ping (Computer Department of Huazhong University of Science and Technology, Wuhan 430074). [J]. Computer Science, 2007, 34(5): 75-78.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111, 142 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121, 136 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .