Browsing by Author "Tuglular, Tugkan"
Now showing 1 - 20 of 32
- Results Per Page
- Sort Options
Book Part Citation - WoS: 4Citation - Scopus: 8Advances in Model-Based Testing of Graphical User Interfaces(Elsevier Academic Press inc, 2017) Belli, Fevzi; Beyazit, Mutlu; Budnik, Christof J.; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüGraphical user interfaces (GUIs) enable comfortable interactions of the computer-based systems with their environment. Large systems usually require complex GUIs, which are commonly fault prone and thus are to be carefully designed, implemented, and tested. As a thorough testing is not feasible, techniques are favored to test relevant features of the system under test that will be specifically modeled. This chapter summarizes, reviews, and exemplifies conventional and novel techniques for model-based GUI testing.Conference Object Citation - WoS: 1Citation - Scopus: 1Application of Human-Robot Interaction Features to Design and Purchase Processes of Home Robots(Springer international Publishing Ag, 2021) Yapici, Nur Beril; Tuglular, Tugkan; Basoglu, Nuri; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüProduction of home robots, such as robotic vacuum cleaners, currently focuses more on the technology and its engineering than the needs of people and their interaction with robots. An observation supporting this view is that the home robots are not customizable. In other words, buyers cannot select the features and built their home robots to order. Stemmed from this observation, the paper proposes an approach that starts with a classification of features of home robots. This classification concerns robot interaction with humans and the environment, a home in our case. Following the classification, the proposed approach utilizes a new hybrid model based on a built-to-order model and dynamic eco-strategy explorer model, enabling designers to develop a production line and buyers to customize their home robots with the classified features. Finally, we applied the proposed approach to robotic vacuum cleaners. We developed a feature model for robotic vacuum cleaners, from which we formed a common uses scenario model.Article Citation - WoS: 2Citation - Scopus: 1Application of the Law of Minimum and Dissimilarity Analysis to Regression Test Case Prioritization(Ieee-inst Electrical Electronics Engineers inc, 2023) Ufuktepe, Ekincan; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüRegression testing is one of the most expensive processes in testing. Prioritizing test cases in regression testing is critical for the goal of detecting the faults sooner within a large set of test cases. We propose a test case prioritization (TCP) technique for regression testing called LoM-Score inspired by the Law of Minimum (LoM) from biology. This technique calculates the impact probabilities of methods calculated by change impact analysis with forward slicing and orders test cases according to LoM. However, this ordering doesn't consider the possibility that consecutive test cases may be covering the same methods repeatedly. Thereby, such ordering can delay the time of revealing faults that exist in other methods. To solve this problem, we enhance the LoM-Score TCP technique with an adaptive approach, namely with a dissimilarity-based coordinate analysis approach. The dissimilarity-based coordinate analysis uses Jaccard Similarity for calculating the similarity coefficients between test cases in terms of covered methods and the enhanced technique called Dissimilarity-LoM-Score (Dis-LoM-Score) applies a penalty with respective on the ordered test cases. We performed our case study on 10 open-source Java projects from Defects4J, which is a dataset of real bugs and an infrastructure for controlled experiments provided for software engineering researchers. Then, we hand-seeded multiple mutants generated by Major, which is a mutation testing tool. Then we compared our TCP techniques LoM-Score and Dis-LoM-Score with the four traditional TCP techniques based on their Average Percentage of Faults Detected (APFD) results.Conference Object Citation - WoS: 0An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies(Ieee, 2009) Tekbacak, Fatih; Tuglular, Tugkan; Dikenelli, Oguz; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüMulti-agent systems (MAS) which communicate with intra-domain and inter-domain agent platforms have access control requirements. Instead of a central mechanism, a fine-graned access control mechanism could have been applied to MAS platforms. This paper emphasizes MAS-based domain and security ontologies with XACML-based access control approach for MAS platforms. The domain dependent behaviour and access control parameters in agent ontologies could be combined within a common XACML policy documents should be consistent to enforce policies for MAS. To obtain this conditions. Agent-based access control requirements and common XACML policy documents should be consistent to enforce policies for MAS. To obtain this condition, the translation of organizational policies and platform based policies have to be considered in derail and the verified policy features have to be enforced in MAS to provide access for resources.Conference Object Citation - WoS: 0Automatic Code Generation with Document Responsibility Collaboration Modelling Method(Ieee, 2020) Tuglular, Tugkan; Leblebici, Onur; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüUML is highly preferred for design in current software development approaches. However, the conceptual gap between entities in business processes and classes in UML designs is not small. To reduce this gap, this paper proposes using documents that are vital to every business. The proposed new method called Document Responsibility Collaboration puts the concept of documents at the center. In the proposed method, documents are meta-models of classes in terms of programming, and at the same time, they are meta-models of relationships in terms of permanence. The proposed Document Responsibility Collaboration method uses the domain concept in which domains are made up of documents, and a document defined in a domain can work with another document in any domain to fulfill its responsibility. Document Responsibility Collaboration method defines a process, which starts at the transition from analysis to design phase and continues to the code generation phase. An example from the order management domain is provided to validate the recommended method.Conference Object Citation - WoS: 1Automatic enforcement of location aware user based network access control policies(World Scientific and Engineering Acad and Soc, 2008) Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüMultiple interconnected network segments distributed across various locations, such as corporate networks, where users or employees constantly travel among segments and require to access servers, need to have network access control mechanisms that are able to adapt to these location changes. The idea of a firewall changing or adapting its rules depending on the location of users is presented by an architecture in this paper. This architecture proposes deployment of a policy server at the management level and policy agents at the firewall level, so that policy-driven network security management is enabled by specifying location aware user based network access control policies at the network security management and enforcing them at the managed firewalls. The architecture presented in this paper utilizes user VPN connection event triggers for dynamic policy configuration and automated policy deployment to firewalls. Location aware user based network access control policies, which are management level policies, are implemented using XACML. A network level policy is usually a configuration, or policy, file local to the firewall. The policy agent incorporated into the firewall performs the mapping from management level policy to firewall policy.Conference Object Citation - WoS: 1Citation - Scopus: 5Automation Architecture for Bayesian Network Based Test Case Prioritization and Execution(Ieee, 2016) Ufuktepe, Ekincan; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüAn automation architecture for Bayesian Network based test case prioritization is designed for software written in Java programming language following the approach proposed by Mirarab and Tahvildari [2]. The architecture is implemented as an integration of a series of tools and called Bayesian Network based test case prioritization and execution platform. The platform is triggered by a change in the source code, then it collects necessary information to be supplied to Bayesian Network and uses Bayesian Network evaluation results to run high priority unit tests.Conference Object Citation - WoS: 4Code Change Sniffer: Predicting Future Code Changes with Markov Chain(Ieee Computer Soc, 2021) Ufuktepe, Ekincan; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüCode changes are one of the essential processes of software evolution. These changes are performed to fix bugs, improve quality of software, and provide a better user experience. However, such changes made in code could lead to ripple effects that can cause unwanted behavior. To prevent such issues occurring after code changes, code change prediction, change impact analysis techniques are used. The proposed approach uses static call information, forward slicing, and method change information to build a Markov chain, which provides a prediction for code changes in the near future commits. For static call information, we utilized and compared call graph and effect graph. We performed an evaluation on five open-source projects from GitHub that varies between 5K-26K lines of code. To measure the effectiveness of our proposed approach, recall, precision, and f-measure metrics have been used on five open-source projects. The results show that the Markov chain that is based on call graph can have higher precision compared to effect graph. On the other hand, for small number of cases higher recall values are obtained with effect graph compared to call graph. With a Markov chain model based on call graph and effect graph, we can achieve recall values between 98%-100%.Conference Object Citation - WoS: 0Container Damage Detection and Classification Using Container Images(Ieee, 2020) Imamoglu, Zeynep Ekici; Tuglular, Tugkan; Bastanlar, Yalin; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüIn the logistics sector, digital transformation is of great importance in terms of competition. In the present case, container warehouse entry / exit operations are carried out manually by the logistics personnel including container damage detection. During container warehouse entry / exit process, the process of detecting damaged containers is carried out by the personnel and several minutes are required to upload to the IT system. The aim of our work is to automate the detection of damaged containers. This way, the mistakes made by the personnel will be eliminated and the process will be accelerated. In this work, we propose to use a convolutional neural network (CNN) that takes the container images and classify them as damaged or undamaged. We modeled the problem as a binary classification and employed different CNN models. The result we obtained shows that there is no single best method for the classification. It is shown how the dataset was created and how the parameters used in the layered structures affect the models employed in this study.Conference Object Citation - WoS: 0Citation - Scopus: 0Coverage Guided Multiple Base Choice Testing(Ieee Computer Soc, 2020) Tuglular, Tugkan; Leblebici, Onur; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüA coverage guided input domain testing approach is presented with a feedback loop-controlled testing workflow and a tool is developed to support this workflow. Multiple base choices coverage criterion (MBCC) is chosen for systematic unit test generation in the proposed approach and branch coverage information is utilized as feedback to improve selection of bases, which results in improved branch coverage. The proposed workflow is supported with the tool designed and developed for coverage guided MBCC-based unit testing.Article Citation - WoS: 2Citation - Scopus: 2A Domain-Specific Language for the Document-Based Model-Driven Engineering of Business Applications(Ieee-inst Electrical Electronics Engineers inc, 2022) Leblebici, Onur; Kardas, Geylani; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği Bölümü; Bilgisayar Mühendisliği BölümüTo facilitate the development of business applications, a domain-specific language (DSL), called DARC, is introduced in this paper. Business documents including the descriptions of the responsibilities, authorizations, and collaborations, are used as the first-class entities during model-driven engineering (MDE) with DARC. Hence the implementation of the business applications can be automatically achieved from the corresponding document models. The evaluation of using DARC DSL for the development of commercial business software was performed in an international sales, logistics, and service solution provider company. The results showed that the code for all business documents and more than 50% of the responsibility descriptions composing the business applications could be generated automatically by modeling with DARC. Finally, according to the users' feedback, the assessment clearly revealed the adoption of DARC features in terms of the DSL quality characteristics, namely functional suitability, usability, reliability, maintainability, productivity, extensibility, compatibility, and expressiveness.Article Citation - WoS: 4Citation - Scopus: 9End-to-end security implementation for mobile devices using TLS protocol(Springer France, 2006) Kayayurt, Baris; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.Article Citation - WoS: 4Citation - Scopus: 5Estimating software robustness in relation to input validation vulnerabilities using Bayesian networks(Springer, 2018) Ufuktepe, Ekincan; Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüEstimating the robustness of software in the presence of invalid inputs has long been a challenging task owing to the fact that developers usually fail to take the necessary action to validate inputs during the design and implementation of software. We propose a method for estimating the robustness of software in relation to input validation vulnerabilities using Bayesian networks. The proposed method runs on all program functions and/or methods. It calculates a robustness value using information on the existence of input validation code in the functions and utilizing common weakness scores of known input validation vulnerabilities. In the case study, ten well-known software libraries implemented in the JavaScript language, which are chosen because of their increasing popularity among software developers, are evaluated. Using our method, software development teams can track changes made to software to deal with invalid inputs.Conference Object Citation - WoS: 0Event Sequence Graph-based Feature-oriented Testing: A Preliminary Study(Ieee, 2018) Tuglular, Tugkan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüThis paper proposes a model-based approach for feature-oriented testing using event sequence graphs (ESGs). ESGs are used to generate test cases automatically for positive and negative testing. To fit ESG models to feature-oriented testing, two new improvements on ESGs are proposed. The first improvement is on repetitive use of refinement ESG and the second improvement is saving state in an ESG and passing it to the following ESG. This is a work towards communicating hierarchical ESGs. The preliminary results demonstrate the feasibility of the proposed approach. The proposed approach improves testability of features.Conference Object Citation - WoS: 5Featured Event Sequence Graphs for Model-Based Incremental Testing of Software Product Lines(Ieee Computer Soc, 2019) Tuglular, Tugkan; Beyazit, Mutlu; Ozturk, Dilek; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüThe goal of software product lines (SPLs) is rapid development of high-quality software products in a specific domain with cost minimization. To assure quality of software products from SPLs, products need to be tested systematically. However, testing every product variant in isolation is generally not feasible for large number of product variants. An approach to deal with this issue is to use incremental testing, where test artifacts that are developed for one product are reused for another product which can be obtained by incrementally adding features to the prior product. We propose a novel model-based test generation approach for products developed using SPL that follows incremental testing paradigm. First, we introduce Featured Event Sequence Graphs (FESGs), an extension of ESGs, that provide necessary definitions and operations to support commonalities and variabilities in SPLs with respect to test models. Then we propose a test generation technique for the product variants of an SPL, which starts from any product. The proposed technique with FESGs avoids redundant test generation for each product from SPL. We compare our technique with in-isolation testing approach by a case study.Conference Object Citation - WoS: 3Citation - Scopus: 2Heterogeneous Modeling and Testing of Software Product Lines(Ieee Computer Soc, 2021) Belli, Fevzi; Tuglular, Tugkan; Ufuktepe, Ekincan; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüSoftware product line (SPL) engineering is a widely accepted approach to systematically realizing software reuse in an industrial environment. Feature models, a centerpiece of most SPL engineering techniques, are appropriate to model the variability and the structure of SPLs, but not their behavior. This paper uses the idea to link feature modeling to model-based behavior modeling and to determine the test direction (top-down or bottom-up) based on the variability binding. This heterogeneous modeling enables a holistic system testing for validating both desirable (positive) and undesirable (negative) properties of the SPL and variants. The proposed approach is validated by a non-trivial example and evaluated by comparison.Article Citation - WoS: 0Incremental Testing in Software Product Lines-An Event Based Approach(Ieee-inst Electrical Electronics Engineers inc, 2023) Beyazit, Mutlu; Tuglular, Tugkan; Kaya, Dilek Ozturk; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüOne way of developing fast, effective, and high-quality software products is to reuse previously developed software components and products. In the case of a product family, the software product line (SPL) approach can make reuse more effective. The goal of SPLs is faster development of low-cost and high-quality software products. This paper proposes an incremental model-based approach to test products in SPLs. The proposed approach utilizes event-based behavioral models of the SPL features. It reuses existing event-based feature models and event-based product models along with their test cases to generate test cases for each new product developed by adding a new feature to an existing product. Newly introduced featured event sequence graphs (FESGs) are used for behavioral feature and product modeling; thus, generated test cases are event sequences. The paper presents evaluations with three software product lines to validate the approach and analyze its characteristics by comparing it to the state-of-the-art ESG-based testing approach. Results show that the proposed incremental testing approach highly reuses the existing test sets as intended. Also, it is superior to the state-of-the-art approach in terms of fault detection effectiveness and test generation effort but inferior in terms of test set size and test execution effort.Conference Object Citation - WoS: 0INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR STRATEGY MAP OF IZMIR(Lookus Scientific, 2013) Tuglular, Tugkan; Tekir, Selma; Velibeyoglu, Koray; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüThis study aims to understand current dynamics of the Izmir's ICT sector by looking at its dynamics and mapping the spatial distribution of the firms. It is based on series of analysis produced for Izmir Development Agency in 2012 within the frame of preparation of 2014-2023 Izmir Regional Development Plan. It conducts a Delphi survey to support situation knowledge as well as trend prediction for the next 10 years' period. Furthermore, gap analysis is performed to measure the margin between the current situation of the ICT sector and future trends predicted by experts. The study also maps Izmir's ICT sector's location preferences based on Izmir Chamber of Commerce's publicly available web-based database. It illustrated that ICT sector's trend largely based on centripetal and spontaneously developed clusters placed in the central part of the city. On the other hand, planned technology regions and science parks are relatively immature and need to be developed. Within the light of this dichotomy this study proposes a strategy map to Izmir's ICT sector.Article Citation - WoS: 7Citation - Scopus: 9Input Contract Testing of Graphical User Interfaces(World Scientific Publ Co Pte Ltd, 2016) Tuglular, Tugkan; Belli, Fevzi; Linschulte, Michael; Tuğlular, Tuğkan; Bilgisayar Mühendisliği BölümüUser inputs are critical for the security, safety, and reliability of software systems. This paper proposes a new concept called user input contracts, which is an integral part of a design-by-contract supplemented development process, and a model-based testing approach to detect violations of user input contracts. The approach generates test cases from an input contract integrated with graph-based model of user interface specification and applies them to the system under consideration. The paper presents a proof-of-concept tool that has been developed and used to validate the approach by experiments. The experiments are conducted on a web-based system for marketing tourist services to analyze input robustness of system under consideration with respect to user input contracts.Conference Object Citation - WoS: 0Model Based Testing of VHDL Programs(Ieee, 2015) Ayav, Tolga; Tuglular, Tugkan; Belli, Fevzi; Tuğlular, Tuğkan; Ayav, Tolga; Bilgisayar Mühendisliği Bölümü; Bilgisayar Mühendisliği BölümüVHDL programs are often validated by means of test benches constructed from formal system specification. To include real-time properties of VHDL programs, the proposed approach first transforms them to concurrently running network of timed automata and then performs model checking on properties taken from the specification. Counterexamples generated by the model checker are used to form a test bench. The approach is validated by a case study composed of a nontrivial application running on a microprocessor. As presented, the approach enables testing both hardware and software at once.