CN108446231A - A kind of testing protocol consistency use-case priority ordering method based on risk analysis - Google Patents

A kind of testing protocol consistency use-case priority ordering method based on risk analysis Download PDF

Info

Publication number
CN108446231A
CN108446231A CN201810224489.9A CN201810224489A CN108446231A CN 108446231 A CN108446231 A CN 108446231A CN 201810224489 A CN201810224489 A CN 201810224489A CN 108446231 A CN108446231 A CN 108446231A
Authority
CN
China
Prior art keywords
test
case
demand
failure
testing requirement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810224489.9A
Other languages
Chinese (zh)
Inventor
谢昊飞
张艺
王平
高兴
苏文君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201810224489.9A priority Critical patent/CN108446231A/en
Publication of CN108446231A publication Critical patent/CN108446231A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3676Test management for coverage analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)

Abstract

The testing protocol consistency use-case priority ordering method based on risk analysis that the present invention relates to a kind of, belongs to unification of communication protocol testing field.This method includes:S1:Failure risk analysis model is established, test case importance TITC is calculatedz;S2:Original execution sequence T is generated according to test case importanceseq, and execute test;S3:After detecting failure, update remainder is not carried out the priorentropy H of use-caseTi(S);S4:It selects the use-case of priori entropy minimum as next use-case to be executed, and updates test case and execute sequence Tseq.The present invention improves the demand coverage rate and failure error detection rate of the rate that test failure is detected in each regression process and protocol conformance regression test.

Description

A kind of testing protocol consistency use-case priority ordering method based on risk analysis
Technical field
The invention belongs to communication protocol software uniformity test technical fields, are related to a kind of agreement one based on risk analysis Cause property test case prioritization method.
Background technology
During protocol conformance, as system under test (SUT) defect is repaired, need through regression test, to ensure to change Part does not impact other unmodified parts, or without introducing new failure.In continuous modification and perfect process In, in the case of limited resources, re-executes all test cases and expend time, manpower, fund.It needs from test case Valuable test case is selected in library preferentially to execute, and to improve failure error detection rate, is provided to tester and administrative staff early The feedback of phase, to start to debug earlier.Test case prioritization technology is according to given target, the survey different to contribution degree Example on probation carries out priority ranking according to significance level, can improve the demand covering rate and failure error detection speed of regression test Rate.
The goal in research of existing test case prioritization technology is defined as:Given all of test use cases T, T can Energy ordered set PT, and sequence object function f, the purpose of test case prioritization is to find out T' ∈ PT so as to arbitrary T' ∈ PT and T' ≠ T " have f (T') >=f (T ") to set up.
How the research contents of test case prioritization mainly according to specific maxim of relation determines test case Significance level.In actual protocol conformance regression test, testing requirement has different significance levels, and testing requirement Between there are dependences, certain use-cases must comply with standard and could execute in other testing requirements.Existing agreement In consistency regression test, test case prioritization method determines that test case is preferential generally according to demand coverage information Grade, often ignores the dependence between testing requirement and failure.Therefore, the significance level of different testing requirements how is determined, How to determine that test case execution sequence becomes protocol conformance to reach faster testing requirement coverage rate and failure error detection rate The problem of test.
Invention content
In view of this, the purpose of the present invention is to provide a kind of, the testing protocol consistency use-case based on risk analysis is preferential Sort method calculates test case importance to carry out priority ranking to test case, whenever being detected in implementation procedure When failure, the execution sequence that test cases is not carried out to remainder is adjusted into Mobile state, and selection is more easily detected the test of failure Use-case is as next use-case to be executed.The rate for detecting test failure in each regression process is improved, agreement one is improved The demand coverage rate and failure error detection rate of cause property regression test.During protocol conformance regression test and malfunction test, Test failure is found as early as possible with more inexpensive.
In order to achieve the above objectives, the present invention provides the following technical solutions:
A kind of testing protocol consistency use-case priority ordering method based on risk analysis, specifically includes following steps:
S1:Failure risk analysis model is established, test case importance TITC is calculatedz
S2:Original execution sequence T is generated according to test case importanceseq, and execute test;
S3:After detecting failure, update remainder is not carried out the priorentropy H of use-caseTi(S);
S4:It selects the use-case of priori entropy minimum as next use-case to be executed, and updates test case and execute sequence Arrange Tseq
Further, in the step S1, the calculating test case importance TITC specifically includes following steps:
S101:Determine the factor of the Risk rated ratio of influence demand, demand, Dependent Demand predominantly in test record unsuccessfully Depth and the test case quantity for covering this demand;
S102:According to PICS/PIXIT tables acquisition of information whole test case to the coverage condition of testing requirement, according to survey The testing requirement that family on probation proposes, establishes testing requirement collection R and test cases collection T:
R={ R1,R2…,Rx,…,Rm, T={ T1,T2…,Tz,…,Tl}
Wherein, binary message set covering theory Rx=[r (x, z)]1×l∈{0,1}1×l, represent the test of testing requirement covering Case entity, m represent testing requirement integrated test demand number, and l represents test cases integrated test number, and x value ranges are 1 ~m, z value range are 1~l, and r (x, z)=1 indicates that demand x is related to test cases z, otherwise r (x, z)=0;
S103:Historical testing information, the demand RF of labeled test failure are called from test record result;If demand is tested State is failure in record, and RF values are 10, are otherwise 0;
S104:Statistics covers the test case amount R S of each testing requirement;
S105:According to dependence between testing requirement, the dependence depth RD of each demand is calculated;
S106:The Risk rated ratio RW of calculating demand(Rx)=WRF*RFx+WRS*RSx+WRD*RDx, WRF、WRS、WRDIt respectively represents The weight of influence factor RF, RS, RD, ranging from 0~5, value is adjusted according to actual conditions;RFx、RSx、RDxIt respectively represents Demand RxInfluence class value in influence factor, S104 and step S105 are obtained through the above steps;
S107:Historical testing information is called from test record result, establishes test failure collection F:
F={ F1,F2,…,Fy,…,Fn}
Wherein, n represents test failure number, and y value ranges are 1~n;
S108:The information set covering theory C of demand and failure is established, size is m × n, wherein CxyDemand R is represented for 1xAnd therefore Hinder FyIt is relevant, otherwise CxyValue is 0;Calculate failure FyRisk exposure value, calculation is as follows:
S109:The risk exposure weights of calculating demandWhereinSVy For failure FySeverity values, according to failure to the influence degree of system under test (SUT), value range is 1~4;
S120:The testing requirement selected according to user establishes the information set covering theory D of testing requirement and test case, greatly Small is m × l;DxzTest case T is indicated for 1zIt can be with meet demand Rx, otherwise DxzValue is 0;Calculate test case importance value:
Further, in the step S105, the dependence depth of each demand of calculating specifically includes following steps:
1) according to protocol development document, the directed acyclic graph DAG of function dependence between representing testing requirement is established:G= (V, E), V represent testing requirement set, and E represents the oriented line set of function dependence between testing requirement;If testing requirement RqExecution depend on testing requirement Rp, then directed edge is from representing testing requirement RpNode direction represent testing requirement RqSection Point;
2) boolean adjacency matrix M is established according to DAG, size is m × m, if Mpq=1 indicates demand RpDependent on demand Rq, If 0, demand R is indicatedpWith demand RqBetween there is no directly relying on relationship;Wherein p represents line number, and q represents columns, and p and q take It is worth ranging from 1~m;
3) to being compared with M [p, q] after each single item progress M [p, k]+M [k, p] operation in matrix M, show that maximum value is assigned Give M [p, q];Wherein k represents intermediate node, and value range is 1~m;
4) finally show that the maximum value of matrix pth row represents demand RpDependence depth.
Further, in the step S2, the original execution sequence TseqIt is arranged according to test case importance value descending Row.
Further, in the step S3, update remainder is not carried out the priorentropy H of use-caseTi(S), following steps are specifically included:
1) according to original execution sequence TseqImplementation of test cases when detecting failure, counts { t1,…,ti-1It is executed Use-case, tiFor test crash use-case.Remaining non-test case sequence is { ti+1,…,ti+a,…,tl}。
Assuming that test cases ti+1Test passes through, demand SjDubious value measurement representation beAssuming that Test cases ti+aTest crash, then demand SjDubious value measurement representation beDemand SjDubious value Metric calculation mode is as follows:
Wherein, fail (sj) and pass (sj) indicate and demand sjWith the use-case test crash of covering mappings relationship and survey Try successful number;Totalpass indicates that the test case sum that test passes through, totalfail indicate the test of test crash Use-case sum.
2) each demand is calculated separately in test case ti+1There are the conditional probabilities of failure after execution
α indicates test case ti+1The prior probability of failure,TFiExpression has been held Row test use cases { t1,…,tiIn test crash use number of cases, TPiIndicate the number that test passes through.
3) it calculates and is not carried out test case ti+1Priorentropy
4) according to above step 1) to step 3), the remaining priorentropy for being not carried out test case is calculated separately, priori is selected The test case of entropy minimum is as next use-case to be executed in cycle tests.
The beneficial effects of the present invention are:The present invention improve detected in each regression process test failure rate and The demand coverage rate and failure error detection rate of protocol conformance regression test.
Description of the drawings
In order to keep the purpose of the present invention, technical solution and advantageous effect clearer, the present invention provides following attached drawing and carries out Explanation:
Fig. 1 is the general frame figure of the method for the invention;
Fig. 2 is initial test case sequence product process figure of the present invention;
Fig. 3 is the execution sequence dynamic adjustment flow of the present invention for being not carried out test case.
Specific implementation mode
Below in conjunction with attached drawing, the preferred embodiment of the present invention is described in detail.
A kind of testing protocol consistency use-case priority ordering method this method based on risk analysis, is divided into two stages: First stage is to generate initial test case to execute sequence.According to the consensus standard specification surveyed, the work(between testing requirement is established Energy dependence, the demand to fail in Dependent Demand depth, test record and the test case quantity for covering this demand are made To influence the factor of Requirements Risks weight, failure risk analysis model is established.Then, according between testing requirement and test failure Covering mappings relationship, obtain the risk exposure value of testing requirement.The foundation calculated using risk exposure value summation as importance, It generates initial test case and executes sequence.Second stage is to be not carried out the execution sequence dynamic adjustment of test case.It was executing When detecting failure in journey, the covering mappings relationship according to the test result of executed use-case, and between testing requirement is established Fault location model based on information theory, dynamic adjustment are not carried out the execution sequence of test case, and error detection is quickly searched to reach The purpose of the higher test case of rate.
As shown in Figure 1, the testing protocol consistency use-case priority ordering method of the present invention based on risk analysis, tool Body includes the following steps:
Step 1:Establish test use cases, testing requirement collection, test failure collection;
1, test use cases are expressed as T:T={ T1,T2,…,Tz,…,Tl};
2, the testing requirement proposed according to test user, establishes testing requirement collection Req:R={ R1,R2…,Rx,…,Rm};
3, test failure collection F (F={ F are established1,F2,…,Fy,…,Fn});
Step 2:Determine test case and demand, mapping relations between testing requirement and failure;
1, the coverage condition of testing requirement is selected according to user according to PICS/PIXIT table acquisition of information whole test cases The coverage condition of demand to be measured is marked in test case to fixed testing requirement, establishes testing requirement and test case Information set covering theory D, size are m × l.DxzTest case T is indicated for 1zIt can be with meet demand Rx, otherwise DxzValue is 0;
2, the information set covering theory C of demand and failure is established, size is m × n, and wherein size is m × n, wherein CxyFor 1 generation Table demand RxWith failure FyIt is relevant, otherwise CxyValue is 0, and wherein y value ranges are 1~n.
Step 3:Determine that initial test case executes sequence, as shown in Figure 2:
1, call historical testing information from test record result, according to user's grassroot project propose testing requirement, from Historical testing information, the demand RF of labeled test failure are called in test record result.If state is to lose in demand test record It loses, RF values are 10, are otherwise 0.Statistics covers the test case amount R S of each testing requirement.It is relied on according between testing requirement Relationship calculates the dependence depth RD of each demand.
2, the dependence depth of testing requirement is calculated.It is as follows:
1) according to protocol development document, the directed acyclic graph (DAG) of function dependence between representing testing requirement, G are established =(V, E).V represents testing requirement set, and E represents the oriented line set of function dependence between testing requirement.If demand Rq Execution depend on testing requirement Rp, then directed edge is from representing testing requirement RpNode direction represent testing requirement RqNode.
2) boolean adjacency matrix D is established according to DAG, size is m × m.If Dpq=1 indicates demand RpDependent on demand Rq, If 0, demand R is indicatedpWith demand RqBetween there is no directly relying on relationship.Wherein p represents line number, and q represents columns.P and q take It is worth ranging from 1~m.
3) to being compared with M [p, q] after each single item progress M [p, k]+D [k, p] operation in matrix M, show that maximum value is assigned Give M [p, q].Wherein k represents intermediate node, and value range is 1~m.
4) finally show that the maximum value of matrix pth row represents demand RpDependence depth.
3, demand R is calculatedxRisk rated ratioWRF、WRS、WRDPoint It Dai Biao not represent the weight of influence factor RF, RS, RD, ranging from 0~5, value can be adjusted according to actual conditions.RFx、 RSx、RDxRespectively represent demand RxInfluence class value in influence factor.
4, failure F is calculatedyRisk exposure value:
5, demand R is calculatedxRisk exposure weights SVxFor Failure FySeverity values, according to failure to the influence degree degree of system under test (SUT), value range is 1~4.
6, test case T is calculatedzImportance value
7, according to test case importance, output test case executes sequence.
Step 4:Dynamic adjustment test case executes sequence, as shown in Figure 3:
1, test case importance TITC is chosen successivelyzMaximum test case carries out implementation procedure.
2, when detecting test failure, { t is counted1,…,ti-1It is executed use-case, tiFor test crash use-case.It is remaining Non- test case sequence is { ti+1,…,ti+a,…,tl}。
Assuming that test cases ti+1Test passes through, demand SjDubious value measurement representation beAssuming that Test cases ti+aTest crash, then demand SjDubious value measurement representation beDemand SjDubious value Metric calculation mode is as follows:
Wherein, fail (sj) and pass (sj) indicate and demand sjWith the use-case test crash of covering mappings relationship and survey Try successful number.Totalpass indicates that the test case sum that test passes through, totalfail indicate the test of test crash Use-case sum.
3, each demand is calculated separately in test case ti+1There are the conditional probabilities of failure after execution
α indicates test case ti+1The prior probability of failure,TFiExpression has been held Row test use cases { t1,…,tiIn test crash use number of cases, TPiIndicate the number that test passes through.
4, it calculates and is not carried out test case ti+1Priorentropy
5, according to above step 2 to step 4, the remaining priorentropy for being not carried out test case is calculated separately, priorentropy is selected Minimum test case is as next use-case to be executed in cycle tests.It is out of order if not detecting, continues to select currently to survey The maximum test case of example importance on probation is executed, if detecting failure, updates the priorentropy of remaining test case.
6, all testing requirements are capped, and test terminates.
Finally illustrate, preferred embodiment above is merely illustrative of the technical solution of the present invention and unrestricted, although logical It crosses above preferred embodiment the present invention is described in detail, however, those skilled in the art should understand that, can be Various changes are made to it in form and in details, without departing from claims of the present invention limited range.

Claims (5)

1. a kind of testing protocol consistency use-case priority ordering method based on risk analysis, which is characterized in that this method is specific Include the following steps:
S1:Failure risk analysis model is established, test case importance TITC is calculatedz
S2:Original execution sequence T is generated according to test case importanceseq, and execute test;
S3:After detecting failure, update remainder is not carried out the priorentropy of use-case
S4:It selects the use-case of priori entropy minimum as next use-case to be executed, and updates test case and execute sequence Tseq
2. a kind of testing protocol consistency use-case priority ordering method based on risk analysis according to claim 1, It is characterized in that, in the step S1, the calculating test case importance TITC specifically includes following steps:
S101:Determine the factor of the Risk rated ratio of influence demand, demand, the Dependent Demand depth to fail predominantly in test record And cover the test case quantity of this demand;
S102:According to PICS/PIXIT tables acquisition of information whole test case to the coverage condition of testing requirement, used according to test The testing requirement that family proposes, establishes testing requirement collection R and test cases collection T:
R={ R1,R2…,Rx,…,Rm, T={ T1,T2…,Tz,…,Tl}
Wherein, binary message set covering theory Rx=[r (x, z)]1×l∈{0,1}1×l, represent the test cases of testing requirement covering Entity, m represent testing requirement integrated test demand number, and l represents test cases integrated test number, and x value ranges are 1~m, Z value ranges are 1~l, and r (x, z)=1 indicates that demand x is related to test cases z, otherwise r (x, z)=0;
S103:Historical testing information, the demand RF of labeled test failure are called from test record result;If demand test record Middle state is failure, and RF values are 10, are otherwise 0;
S104:Statistics covers the test case amount R S of each testing requirement;
S105:According to dependence between testing requirement, the dependence depth RD of each demand is calculated;
S106:The Risk rated ratio RW of calculating demand(Rx)=WRF*RFx+WRS*RSx+WRD*RDx, WRF、WRS、WRDRespectively represent influence because The weight of plain RF, RS, RD, ranging from 0~5, value is adjusted according to actual conditions;RFx、RSx、RDxRespectively represent demand Rx Influence class value in influence factor, S104 and step S105 are obtained through the above steps;
S107:Historical testing information is called from test record result, establishes test failure collection F:
F={ F1,F2,…,Fy,…,Fn}
Wherein, n represents test failure number, and y value ranges are 1~n;
S108:The information set covering theory C of demand and failure is established, size is m × n, wherein CxyDemand R is represented for 1xWith failure Fy It is relevant, otherwise CxyValue is 0;Calculate failure FyRisk exposure value, calculation is as follows:
S109:The risk exposure weights of calculating demandWhereinSVy For failure FySeverity values;
S120:The testing requirement selected according to user establishes information the set covering theory D, size m of testing requirement and test case ×l;DxzTest case T is indicated for 1zIt can be with meet demand Rx, otherwise DxzValue is 0;Calculate test case importance value:
3. a kind of testing protocol consistency use-case priority ordering method based on risk analysis according to claim 2, It is characterized in that, in the step S105, the dependence depth of each demand of calculating specifically includes following steps:
1) according to protocol development document, the directed acyclic graph DAG of function dependence between representing testing requirement is established:G=(V, E), V represents testing requirement set, and E represents the oriented line set of function dependence between testing requirement;If testing requirement Rq's It executes and depends on testing requirement Rp, then directed edge is from representing testing requirement RpNode direction represent testing requirement RqNode;
2) boolean adjacency matrix M is established according to DAG, size is m × m, if Mpq=1 indicates demand RpDependent on demand Rq, if 0, Expression demand RpWith demand RqBetween there is no directly relying on relationship;Wherein p represents line number, and q represents columns, p and q value ranges For 1~m;
3) to being compared with M [p, q] after each single item progress M [p, k]+M [k, p] operation in matrix M, show that maximum value is assigned to M [p,q];Wherein k represents intermediate node, and value range is 1~m;
4) finally show that the maximum value of matrix pth row represents demand RpDependence depth.
4. a kind of testing protocol consistency use-case priority ordering method based on risk analysis according to claim 1, It is characterized in that, in the step S2, the original execution sequence TseqIt is arranged according to test case importance value descending.
5. a kind of testing protocol consistency use-case priority ordering method based on risk analysis according to claim 1, It is characterized in that, in the step S3, update remainder is not carried out the priorentropy of use-caseSpecifically include following steps:
1) according to original execution sequence TseqImplementation of test cases when detecting failure, counts { t1,…,ti-1It is executed use-case, tiFor test crash use-case;Remaining non-test case sequence is { ti+1,…,ti+a,…,tl};
Assuming that test cases ti+1Test passes through, demand SjDubious value measurement representation beAssuming that test Case ti+aTest crash, then demand SjDubious value measurement representation beDemand SjSuspicious value metric meter Calculation mode is as follows:
Wherein, fail (sj) and pass (sj) indicate and demand sjUse-case test crash with covering mappings relationship and test at The number of work(, totalpass indicate that the test case sum that test passes through, totalfail indicate the test case of test crash Sum;
2) each demand is calculated separately in test case ti+1There are the conditional probabilities of failure after execution
α indicates test case ti+1The prior probability of failure,TFiIndicate that executed is surveyed Try set of uses case { t1,…,tiIn test crash use number of cases, TPiIndicate the number that test passes through;
3) it calculates and is not carried out test case ti+1Priorentropy
4) according to above step 1) to step 3), the remaining priorentropy for being not carried out test case is calculated separately, selects priorentropy most Small test case is as next use-case to be executed in cycle tests.
CN201810224489.9A 2018-03-19 2018-03-19 A kind of testing protocol consistency use-case priority ordering method based on risk analysis Withdrawn CN108446231A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810224489.9A CN108446231A (en) 2018-03-19 2018-03-19 A kind of testing protocol consistency use-case priority ordering method based on risk analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810224489.9A CN108446231A (en) 2018-03-19 2018-03-19 A kind of testing protocol consistency use-case priority ordering method based on risk analysis

Publications (1)

Publication Number Publication Date
CN108446231A true CN108446231A (en) 2018-08-24

Family

ID=63195178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810224489.9A Withdrawn CN108446231A (en) 2018-03-19 2018-03-19 A kind of testing protocol consistency use-case priority ordering method based on risk analysis

Country Status (1)

Country Link
CN (1) CN108446231A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101431A (en) * 2018-09-26 2018-12-28 深圳壹账通智能科技有限公司 A kind of testing case management, computer readable storage medium and terminal device
CN109614328A (en) * 2018-12-06 2019-04-12 北京字节跳动网络技术有限公司 Method and apparatus for handling test data
CN109726124A (en) * 2018-12-20 2019-05-07 北京爱奇艺科技有限公司 Test macro, test method, managing device, test device and calculating equipment
CN110071849A (en) * 2019-04-09 2019-07-30 中南民族大学 A kind of security protocol property analysis method with high safety and device based on implementation ontology
CN111427772A (en) * 2020-03-05 2020-07-17 广东睿江云计算股份有限公司 Multidimensional test case priority ordering method
CN111813694A (en) * 2020-08-11 2020-10-23 中国工商银行股份有限公司 Test method, test device, electronic device, and readable storage medium
CN114978974A (en) * 2022-05-20 2022-08-30 国网重庆市电力公司电力科学研究院 Wireless communication module testing method, device, equipment and storage medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101431A (en) * 2018-09-26 2018-12-28 深圳壹账通智能科技有限公司 A kind of testing case management, computer readable storage medium and terminal device
CN109614328A (en) * 2018-12-06 2019-04-12 北京字节跳动网络技术有限公司 Method and apparatus for handling test data
CN109614328B (en) * 2018-12-06 2022-03-04 北京字节跳动网络技术有限公司 Method and apparatus for processing test data
CN109726124A (en) * 2018-12-20 2019-05-07 北京爱奇艺科技有限公司 Test macro, test method, managing device, test device and calculating equipment
CN110071849A (en) * 2019-04-09 2019-07-30 中南民族大学 A kind of security protocol property analysis method with high safety and device based on implementation ontology
CN111427772A (en) * 2020-03-05 2020-07-17 广东睿江云计算股份有限公司 Multidimensional test case priority ordering method
CN111813694A (en) * 2020-08-11 2020-10-23 中国工商银行股份有限公司 Test method, test device, electronic device, and readable storage medium
CN111813694B (en) * 2020-08-11 2024-03-15 中国工商银行股份有限公司 Test method, test device, electronic equipment and readable storage medium
CN114978974A (en) * 2022-05-20 2022-08-30 国网重庆市电力公司电力科学研究院 Wireless communication module testing method, device, equipment and storage medium
CN114978974B (en) * 2022-05-20 2023-09-19 国网重庆市电力公司电力科学研究院 Wireless communication module testing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108446231A (en) A kind of testing protocol consistency use-case priority ordering method based on risk analysis
CN106021771A (en) Method and device for diagnosing faults
CN110472846A (en) Nuclear power plant's thermal-hydraulic safety analysis the best-estimated adds uncertain method
CN107274038A (en) A kind of LSSVM Prediction of annual electricity consumption methods optimized based on ant lion
CN109359796A (en) A kind of electric energy meter production firm evaluation method based on more evaluation indexes
Soto et al. Using autonomous search for generating good enumeration strategy blends in constraint programming
CN102708052B (en) Software fault automatic positioning method in a kind of unit testing
CN110262959B (en) Bottom layer service pressure testing method and device, electronic equipment and storage medium
CN105930900B (en) The Forecasting Methodology and system of a kind of hybrid wind power generation
CN106406870A (en) Software complex network-based four-dimensional software evolution measurement analysis method
CN102446135A (en) Software quality detection method
CN106595788B (en) Based on the modified large pumping station flow monitoring method of Multi-parameter coupling
CN109101410A (en) A kind of risk driven test method and device and computer readable storage medium
Fiondella et al. Optimal allocation of testing effort considering software architecture
CN106294174B (en) The various dimensions measure and device of testing adequacy
CN109389280A (en) Electric energy meter production firm evaluation method based on Multiple Attribute Decision Model
CN107015900A (en) A kind of service performance Forecasting Methodology of video website
Subandri et al. Cyclomatic complexity for determining product complexity level in COCOMO II
CN108873023A (en) A kind of processing method for the observed quantity improving positioning accuracy
CN108363660A (en) A kind of method of generating test program and device
CN109101731A (en) Time-varying reliability sequence optimisation method based on B-distance
CN105739478A (en) Missile fault prediction device and method
Kaur et al. Early software fault prediction using real time defect data
CN104679656B (en) A kind of combined test method of adaptive adjustment defects detection rate
JP2020047847A (en) Data processing method, data processor and data processing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180824