Monday, May 20, 2019

Testing Plan for Video Compression, Decompression and Execution

11.2 ) goggle box packet testing is the of import to accomplish the quality of the package been developed. It is used to look into masking faculty or the package that fulfill the demand of the terminal user. interrogation is related to two other procedures like impediment and proof.Confirmation gives verification specification.Validation gives verification necessities.9.1.1 ) mental testing PlanTrial program is doing the planning of the boilersuit package. It will run into all the demand for existent pinch processing. Quality confidence should be educate by look intoing each and every(prenominal) functionality. Besides trial program includes following establish category to be testedOperation seat to be testedTest eventTesting environmentTest out of scopeTrial agenda9.2 ) Testing TechniqueA Technique has been used are as follows by black box testing and white box testing. It detects the mis impress programmed keep truth, completeness and scalability of application developed is called testing.9.2.1 ) minacious BOX TestingA proving which concentrates merely on functional demands of application or package is called as a Black-box testing or behavioural testing. Black-box proving efforts to bring outInaccurate or omitted mapsInterface mistakesMistakes related to in coiffureions constructions or external informations tooth root en maneuverBehavior or public presentation mistakesLow-level formatting and expiration mistakes.In this thesisBlack box proving includes acquiring predication from thickening is proper or non as per invitee petition waiter acknowledge. Server list client requested informations in database. Indexed information is proper or non, directing of byte by byte informations to fender is maintain the indexing sequence or non. This sort of proving performed in black box testing.9.2.2 ) WHITE BOX Testing innocence box testing is nil but the complementary to black box proving. The internal execution of application house be tested by this tes ting.Buffer storage compress informations that acquiring from database, It is relevant or non. If on that point are losing index than the informations content may be alteration. So, will prove informations compressed in buffer is right indexed or non.Executor extract abstractive direct, gravel and control stage, tested is there are each lost informations or non. locking informations stored in impermanent memory, after completion of send requested informations to client autocratic informations is removed or non.Sending clip informations compressed utilizing Huffman algorithmic programic rule.Retrieved informations is right or non.Client retrieve informations after 2 clip decompress informations. After decompressed existent informations got by client or non.9.3 ) Testing SchemeTesting is an powerful conductivity of antecedently planned activities. A scheme for package proving must supply adjustment for dependent trials that are necessary to verify that a little unit of applic ation has been right implemented every bit good as high-ranking trials that validate major g everywherening body maps against client demands. Testing schemes drive out be classified as follows.9.3.1 ) Unit of measurementUnit of measurement proving considers package constituent or faculty as a smallest testable piece of package. It takes the constituent or faculty of testable package in the application, discipline it from the balance of the codification. Then it verifies whether it works as you expect. This type of proving can be done on eightfold faculties in analogue. It is white box oriented, as it is used to verify the control flow and informations flow.9.3.2 ) Integration TestingIt is a logical extension of faculty or constituent testing. It chiefly focuses on happening defects which chiefly arise because of uniting assorted constituents for proving. Integration proving habits at constructing a plan construction by fetching integrity tested faculties. It conducts trial t o uncover mistakes associated with interfacing. Once we have finished with unit proving, following pioneer is to execute moderate proving. Unit tested faculties are taken and assemble together and execute incorporate proving. In this proving one or more than faculties are tested at a clip w.r.t their functionality.9.3.3 ) arrangement TestingIt verifies the full merchandise, after uniting all package and hardware constituents and validates it harmonizing to original undertaking demands. The chief purpose of agreement proving is to accomplish a successful execution of the computing machine based musical arrangement utilizing sequence of trials. In the peculiar each trial may hold different intents but purpose behind all is verify the combination and working of system elements.9.4 ) Trial CaseSome conditions or variables which followed by examiner to measure the effectivity of any(prenominal) application or system called as Test illustrates. It may be a individual measure, or m ultiple stairss, to guarantee the rightness of an application. A sure consequence or result is can be shown as follows. Table 9.4 show the trial congressman for the proposed system, as table follow by the trial instance name, measure require to memorize evaluate consequence, expected consequence from the proposed system, an existent how system response and in conclusion comment for trial instance to be base on balls or fail.Test Case No.Test CaseNameStairssExpectedConsequenceActualConsequenceRemarkCase 1Client RequestStore informations in innkeeper client can bespeak merely for those informations.Request accept by waiter and acknowledgeRequest accept by waiter and acknowledge to client.Base on ballsCase 2Server informations indexingServer shop informations in database as per client petition database indexing those informations.Indexing as per the existent sequence of sketch agitateIndexed range file to direct informations to buffer as per existent sequence of picture fileBa se on ballsCase 3Buffer acquire informations from database as per indexedDatabase send informations to the buffer in bytesData infusion in byte format for buffer procedureData extracted in byte format and send to bufferBase on ballsCase 4Compress informations in bufferBuffer compacting informations that got from databaseCompress Data as per acquiring byte from databaseCompressedDatas that got from database in bytesBase on ballsCase 5Extracting notional broadside, position and command wad from tight picture file in bytesExecutor extract theoretical account, position and restrainer information and those information shop in array of bytesExtraction of 3 parts and measure theoretical account and position portion to direct to the clientExtract merely view portion there are no any back land sound consequenceFailCase 6Extracting theoretical account, position and command portion from byte codification of picture fileIn executor utilizing FuzzyMVC algorithm to pull out theoretical accoun t, position and command portionExtract Model, position and command portion from picture file in byte formatExtracted theoretical account, position and accountantBase on ballsCase 7Storing control portion informations as a impermanent fileStore Control information from picture in buffer for impermanentImpermanent storage of control portion and take that storage unnumerable after completion of dealingStoring control portion informations as a impermanent file but did non take after dealing completionFailCase 8Storing control portion informations as a impermanent fileShop information from picture in buffer for impermanentImpermanent storage of control portion and take that occupied infinite after completion of client receivingStoring informations of control file as a impermanent information and take that informations utilizing buffer algorithmBase on ballsCase 9Sending extracted theoretical account and position portion to the clientStoring control information from picture file and dire ct theoretical account and position portion to the clientSend theoretical account and position portion to the clientSent information continuously to the clientBase on ballsCase 10Decompress accepted informationsClient need to uncompress informations that got from waiterGZip algorithm is used for compress and decompress, decompressing of informationsDecompressed informations and got existent consequence without deformationBase on ballsTable 9.4 Trial instances10.1 ) RESULT AnalysisFor ciphering the public presentation of proposed system and besides doing comparative analysis with the consequence been generated from the data-based rating.Compaction ComparisonFigure 10.1 ( a ) Compaction ComparisonRMI Compress TimeSimple compress TimeArray size0.080.082220.0820.089450.0940.1600.10.11700.1100.1275Decompression ComparisonFigure 10.1 ( B ) Decompression ComparisonGZIP Decompress TimeSimple Decompress TimeArray Size0.0220.022220.0230.0232450.0280.03600.0520.054700.0560.058575Transmissi on of informations utilizing J2ME RMI ( Between 2 machines )Figure 10.1 ( degree Celsius ) Transmission of Data utilizing J2ME RMIJ2ME RMI ( Between 2 machine )Simple transmissionthrough IP referenceArray Size0.630.66220.6560.695450.7420.776600.7930.811700.82140.84175Transmission of informations utilizing J2ME RMI ( apply 1 machines ) Figure 10.1 ( vitamin D ) Data transmittal in individual machineJ2ME RMI ( one machine )Simple transmittal through socketArray Size0.6420.644220.7850.789400.8310.862600.8850.89700.9180.93475Comparison of Proposed organization with Current System.Figure 10.1 ( vitamin E ) Proposed system and Youtube comparingProposed System Time TakingYouTube Time TakingArray Size1.00211.032221.0311.082401.4231.48601.6021.637801.81.841001.861.891201.921.961402.0032.151602.4232.5012002.6542.75622011.1 ) MainFigure-11.1 Main GUI11.2 ) VideoFigure- 11.2 Video selection11.3 ) pictorial matter PLAYER ( Small size picture ) Figure 11.3 ( a ) Small size picture thes pianFigure 11.3 ( B ) HD picture participant11.4 ) AUDIO ChoiceFigure 11.4 ( a ) Audio choiceFigure 11.4 ( B ) Audio PlayerDecisionThis research proposed an offloading picture conglutination, decompression and executing of picture at server side. Compaction utilizing Gzip method is more effectual than any other compression techniques. Gzip enjoyment Quad tree method every bit good as Huffman algorithm to compact the information utilizing this sort of compaction of informations we can state that information is more confidential while directing from waiter to client.Proposed system practice session buffer storage. It will bring informations from database in bytes, compress informations and send to the executor for farther procedure. Buffer storage usage Data buffer algorithm to hive away informations and direct informations as per demand to executor. Executor extract theoretical account, position and command portion from picture file and direct theoretical account and positio n portion to the requested client and shop control portion as a impermanent information.This proposed system is more confidential than any other unrecorded cyclosis of picture or any other picture downloader. Proposed system is taking less clip than any other system for unrecorded cyclosis or download. When we are directing theoretical account, position and command portion together to any client at that clip command portion taking more clip to put to death. But, with this proposed system we are cover version merely with theoretical account and position portion. System Extract command portion and usage Huffman algorithm at directing clip, it will take less clip than control information send over web.MentionsRESEARCH / JOURNAL PAPER1. IEEE CS, 2004 Adaptive Offloading for Pervasive computation, Published by the IEEE CS and IEEE ComSoc,1536-1268/04/ $ 20.00 2004 IEEE2. CHUEN, 1990 Fuzzy logic in control system Fuzzy logic accountant Part I, CHUEN CHIEN, pupil member, IEEE, IEEE deal ing on system, MAN and cybernetics, vol.20, NO-2, March / April. 19903. NIC, France Transparent and participating Code Offloading for Java Applications, Nicolas Geoffray, Gael Thomas, and BertilFolliotLaboratoired, Informatique de Paris 6 8 herb of grace du Capitaine Scott, 75015 Paris France4. ALI, 2003 Image Encoding Using Block-Based Transformation Algorithm, Mohammad Ali, BaniYounes and AmanJantan, IAENG International Journal of Computer Science, 351, IJCS_35_1_03.5. BALAKRISHNA, 2013 EMBEDDING OF EXECUTABLE FILE IN ENCRYPTED IMAGE using LSB MECHANISM, P.Sathish Kumar, Mr. C.BalaKrishnan, International Conference on Information Systems and Computing ( ICISC-2013 ) , INDIA, ISSN 2250-2459 ( Online ) , An ISO 90012008 Certified Journal, al-Quran 3, Particular Issue 1, January 20136. JOSHI, IJCET A generic wine PERFORMANCE EVALUATION MODEL FOR THE FILE SYSTEMS, Farid, SD Joshi, Manjusha Joshi International diary of Computer Engineering & A applied science ( IJCET ) ,5,17. ZH ANG, SKYPE Profiling Skype Video Calls Rate Control and Video Quality, Xinggong Zhang, Yang Xuy, HaoHuy, Yong Liuy, Zongming Guo and Yao Wang.8. MAKWANA, 2015 Performance electric shock Analysis of Application Implemented on fighting(a) Storage Framework, Naveenkumar J, Raj Makwana, Prof. S. D. Joshi, Prof. D. M. Thakore International Journal of move ond Research in Computer Science and parcel Engineering.9. MAHESH, 2014 Video compressing Techniques A Comprehensive Survey, M.Atheeshwari, K.Mahesh, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014 ISSN 2277 128X.10. FOX, 1998 Fox et al. , Adapting to Network and Client Variation Using Active Proxies Lessons and Positions, IEEE Personal Comm. , Aug. 1998, pp. 1019.11. NOBLE, 2000 B.D. Noble, System Support for Mobile, Adaptive Applications, IEEE Personal Comm. , Feb. 2000, pp. 4449.12. NOBLE, 1997 B.D. Baronial et al. , Agile Application-Aware Adaptation f or Mobility, Proc. 16th ACM Symp. Operating Systems Principles ( SOSP 97 ) , ACM Press, 1997, pp. 276287.13. LARA, 2001 E. de Lara, D.S. Wallach, and W. Zwaenepoel, Puppeteer Component-Based Adaptation for Mobile Computing, Proc. 3rdUSENIX Symp. Internet Technologies and Systems ( USITS 01 ) , Usenix Assoc. , 2001, pp. 159170.14. X. GU, 2003 X. Gu et al. , Adaptive Offloading Inference for Delivering Applications in a Permeant Computing Environment, Proc. 1st IEEE Intl Conf. Pervasive Computing and Comm. ( PerCom 03 ) , IEEE CS Press, 2003, pp. 10711415. GARAY, 1979 M. Garey and D. Johnson, Computers and Intractability A Guide to the Theory of NPCompleteness, W.H. Freeman, 1979.16. STOER, 1997 ACM M. Stoer and F. Wagner, A Simple Min- Cut Algorithm, J. ACM, July 1997, pp.585591.17.NAHRSTEDT, 1999 B. Li and K. Nahrstedt, A Control-Based Middleware Framework for Quality-of-Service Adaptations, IEEE J. Selected Areas in Comm. , Sept. 1999, pp. 1632165.18. GHOSE, IJCET Gopal Thapa, Kalpana Sharma and M.K.Ghose, Multi Resolution Motion Estimation Techniques For Video Compression A Survey International diary of Computer Engineering & A engineering ( IJCET ) , Volume 3, Issue 2, 2012, pp. 399 406, ISSN soft touch 0976 6367, ISSN Online 0976 6375.19. SOUMYA, 2013 B.K.N.Srinivasa Rao, P.Sowmya, Architectural Implementation of Video Compression Through Wavelet Transform cryptograph And Ezw Coding International diary of Computer Engineering & A Technology ( IJCET ) , Volume 3, Issue 3, 2012, pp. 202 210, ISSN Print 0976 6367, ISSN Online 0976 6375.Web sites1.hypertext conveyance of title protocol //en.wikipedia.org/wiki/Computation_offloading2.hypertext raptus protocol //www.oracle.com/technetwork/java/index-jsp-140794.html3.hypertext transfer protocol //cit.srce.unizg.hr/index.php/CIT/article/view/16094.hypertext transfer protocol //javarevisited.blogspot.in/2013/04/10-reasons-to-learn-java-programming.html5.hypertext transfer protocol //docs.oracle.com /javase/tutorial/java/generics/why.html6.hypertext transfer protocol //jcp.org/en/jsr/detail? id=667.hypertext transfer protocol //www.deitel.com/articles/java_tutorials/20060422/PlayingVideowithJMF/ haves1.BALAGURUSAMY, Programming with JAVA a primer , 4th edition ( Mc Graw Hill )2.DREAMTECH, M.T.SAVALIYA, Advance Java Tecnology3.Mark Nelson and Jean-loup Gailly, M & A T Books, New York, United States of America, 2nd edition, The Data Compression Book4.Ross Williams, Kluwer Books, Norwell, United States of America, Adaptive Data CompressionList OF PUBLICATIONSSR. No.Title of PaperName of WritersName of the Journal / Publication / ConferenceVolume / Issue /DateImpact Factor1.Performance Impact Analysis of Application Implemented on Active Storage FrameworkRaj Makwana, NaveenKumar J. , Prof. D.M.Thakore,Prof. S.D.JoshiInternational Journal of Advance Research in Computer Science and Software Engineering( IJARCSSE )Volume 5, Issue 2,28ThursdayFebruary 2015 ISSN 2277 128Xpp. 550-554,2 .52.Offloading compaction and decompressionlogic closer to photograph files utilizing RemoteProcedure CallRaj Makwana, NaveenKumar J. , Prof. D.M.Thakore,Prof. S.D.JoshiInternational Journal of computing machine Engineering and Technology( IJCET )Volume 6, Issue 3,30ThursdayMarch 2015, pp. 37-45ISSN 0976 6367 ( Print )ISSN 0976 6375 ( Online )8.9Maestro Of Technology Dissertation, 2014-2015Page 1

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.