# Pairwise Combination Strategy And Constraints Strategy

Decent Essays
One of the objectives of this research is to develop a tool in Java programming language. Following the stated objective, CBPTT was developed in Java language and integrated using the NetBeans IDE 8.0.2 software. In order to show how pairwise combination strategy and constraints strategy was implemented in CBPTT let consider the example illustrated in Table 1.1. There are three parameters with quantity of 2, 3 and 3. These parameters are input as string which is presented as {2,3,3}. From this input, CBPTT split based on commas. This resulted in p which started from 0 to increment based on the split value. Then, p became the quantity of parameter which is 3. Parameter value was retrieved when information was converted in integer. Table …show more content…
Since CBPTT only accept integer, comma and x as constraint input. This input was converted to get the constraints information. Based on pizza ordering system, there were three constraints which is vegetarian cheese with roasted chicken, vegetarian cheese with ground beef and meat lover and mushroom. To convert this input into constraint input format, the index of each value must be known. Table 3.6 shows the index of each parameter value of pizza ordering system.

Table 3.6 System index information
System Configurations Pizza Options (parameters) Pizza Type (0) Index Toppings (1) Index Size (2) Index Vegetarian Cheese 0 Roasted Chicken 0 Large 0 Meat Lover 1 Ground Beef 1 Medium 1 Mushroom (Mu) 2 Small 2

Now, based on parameter value index, these constraints was input as {0:0:x, 0:1:x,1:2:x} where ‘x’ is ‘do not care’ value. That means, ‘x’ represent every possible value for the parameter. CBPTT split this input to achieve result as
First constraint: 0:0:x
Second constraint: 0:1:x
Third constraint: 1:2:x Then, these constraints were divided by colon. After that, each value was combined in pair based on parameter pair to produce result as shown in Table 3.7.

Table 3.7 Combined constraints list
Parameter combination First constraint {0:0:x} Second constraint {0:1:x} Third constraint {1:2:x}
[0:1] 0:0 0:1
Each value of parameter was randomized to be combined as test cases. Since it is randomized, no fixed test cases can be got from this process. For instance, pizza ordering system can produced 11 random test case of {{1:1:2}, {0:1:0}, {1:0:0}, {0:1:2}, {0:2:1}, {1:0:1}, {0:1:1}, {1:0:2}, {1:2:1}, {1:2:0}, {1:2:2}}. From these random test case lists, each test case was divided and paired. Result of all random test case paired was shown in Table 3.9.
Table 3.9 Divided test case
Random test case Divided test case
1:1:2 [1:1]
[1:2]
[1:2]
0:1:0 [0:1]
[0:0]
[1:0]
1:0:0 [1:0]
[1:0]
[0:0]
0:1:2 [0:1]
[0:2]
[1:2]
0:2:1 [0:2]
[0:1]
[2:1]
1:0:1 [1:0]
[1:1]
[0:1]
0:1:1 [0:1]
[0:1]
[1:1]
1:0:2 [1:0]
[1:2]
[0:2]
1:2:1 [1:2]
[1:1]
[2:1]
1:2:0 [1:2]
[1:0]
[2:0]
1:2:2 [1:2]
[1:2]

## Related Documents

• Decent Essays

The code can appear in several forms, however in this lab the modular approach was used. This form allows the program to be created in sections, and then the sections are compiled together to formulate the code in its entirety. In each part of this lab a code was created using this approach, such as code one which can be seen in Figure 5. After a code, has been completed it is compiled to ensure no errors are present, which would interfere with the output generated on the DE2-115 board.…

• 703 Words
• 3 Pages
Decent Essays
• Decent Essays

\$s3 (i ? n) #beq \$t0, \$zero, load1 # go to exit1 if \$s0 ? \$s3 (i ? n) subi \$s1, \$s0, 1 # j = i – 1 for2tst: slti \$t0, \$s1, 0 # \$t0 = 1 if \$s1 < 0 (j < 0) bne \$t0, \$zero, load2 # go to exit2 if \$s1 < 0 (j < 0) sll \$t1, \$s1, 2 # \$t1 = j * 4 add \$t2, \$s2, \$t1 # \$t2 = v + (j * 4) lw \$t3, 0(\$t2)…

• 695 Words
• 3 Pages
Decent Essays
• Improved Essays

The assignment during the third week was to find the information that would entail the usage of the two definable word with, which came as an abstraction and encapsulation in reference to the design methods of object oriented programming. The example that would come to mind is the design of one or more of the software application used during the past few weeks within the online lecture class and the usage of hiding information by design. The design of any program can be the structure of the application and it does only what its attribute’s and behavior entail it to do, forgetting what other purposes the application has in mind for operation. The information that would best describe the usage comes as the control flow of the design on the programming that have been implemented so far in the published manual areas during the past week. This is encompassed by the design of the statement in the functionality of the program setting of the statements, functions and the way the program is executed for operations.…

• 505 Words
• 3 Pages
Improved Essays
• Improved Essays

Hi Jun, Thank you for your patience as we’ve reviewed the latest FreeFlyer files you sent us. The particular engineer who was reviewing your questions is out of the office sick today, so it will be another day or two before our full analysis can be sent back to you. However, he conveyed the preliminary results to us yesterday which I will share with you now:The primary engineer who’s reviewing your questions is out of the office sick today, so it will be another day or two before our full analysis can be sent back to you. However, they conveyed the preliminary results of their analysis to us yesterday; which I have bulleted below: • The primary reason you are seeing the discrepancies is simply due to lack of tuning in the Kalman filter. In the current configuration, much of the tracking data is being rejected, initially, during the Mission Plans set up.…

• 408 Words
• 2 Pages
Improved Essays
• Improved Essays

from 1 to 0. Explanation on how this is done is dealt in the later chapters. A backup reset can be generated when VDD or VBAT power on, if both supplies had been previously turned off. It can also be done in a software way when RCC_BDCR bit is triggered. BDCR means backup domain control register.…

• 449 Words
• 2 Pages
Improved Essays
• Decent Essays

We implemented the proposed algorithm in HM15.0 [4] of H.265/HEVC reference software and compared it with TZ Search in terms of computations (search speed measured by total encoding time and ME time) and performance (PSNR and bit rate). Average Speedup is defined as the ratio of the time of TZ search algorithm to the proposed algorithm. Test conditions [8] for simulation are as follows: 1. Four different quantization parameters (QP=22, 27, 32, 37) to test the algorithm at different bit rates. 2.…

• 279 Words
• 2 Pages
Decent Essays
• Improved Essays

Furthermore, guidelines considering the selection of algorithms and input parameters for the MHNSGA algorithm are resulted from the analysis of real-world databases. When it comes to solving the controller placement problem with tens of millions placements for which performing the exhaustive evaluation requires a considerable amount of time and memory budget, our proposed heuristic approach is an appropriate choice. As described before, for such these large-scale instances, it is only possible to calculate an upper bound for evaluated placements and nothing can be expressed about the obtained accuracy of the heuristic algorithm. This is due to not existing the actual Pareto optimal solutions and hence, the absence of reference data to compare.…

• 404 Words
• 2 Pages
Improved Essays
• Improved Essays

Testing is one of the most important parts of software development life cycle. It is an element of software quality assurance and can be described as a process of running a program in such a manner as to uncover any errors. Testing also demonstrates that software functions appear to be working according to specifications, that behavioral and performance requirements appear to have been met. That test will be carried out when the system is complete. In this chapter, I test my simulation software with testing method.…

• 607 Words
• 3 Pages
Improved Essays
• Great Essays

BTEC Subsidiary Diploma in Construction & the Built Environment Unit 4 – Construction Science and Materials Assignment 1 Human Comfort within Buildings Report Student: Peter McCaughey Teacher: Mrs Keyes Scenario A property developer is converting an old railway station into retail and office accommodation. The client is keen to make the working environment for the staff as comfortable as possible. As a consultant, explain how this can be done by addressing the relevant grading criteria.…

• 1340 Words
• 6 Pages
Great Essays
• Superior Essays

Epidemiologic Surveillance 6318 Short Report # 3 An Evaluation of the STI Surveillance in the Summerville County Importance of Evaluation According to CDC, surveillance is the ongoing systemic collection, analysis, and interpretation of health related data which is essential for planning, implementation, and evaluation of public health practice (Lee et al, 2010). Surveillance system evaluation should be done periodically to assess the effectiveness, relevance and impact of the surveillance system (Lee et al, 2010). Evaluation of the surveillance system is of importance because it will help ensure that data collection resource is used efficiently and that public health problems is monitored effectively (Lee et al, 2010).…

• 1344 Words
• 6 Pages
Superior Essays
• Improved Essays

“ Benjamin Franklin stated,”That it is better 100 guilty persons should escape than that one innocent person should suffer, is a Maxim that has been long and generally approved.” In William shakespeare's Romeo and Juliet, people often wonder how things could have gone so wrong for the “Two star-crossed lovers.” As the story unfolds, it is evident that many characters play a vital role in the event that ultimately leads to the tragic deaths of Romeo and Juliet. Well because of their selfishness,feud and pride, Friar Lawrence had to secretly marry Romeo and Juliet behind their parents back but not just that he was also considered responsible for both of their deaths without anyone knowing because he gave a potion to Juliet and made Romeo…

• 839 Words
• 4 Pages
Improved Essays
• Improved Essays

Nutrition The assessment shows that the family prefers cooking their own meals to eating outside. The family eats vegetables, fruits, spaghetti, meat ball, potato, and beaf, also drinks water, coffee, and soft drink. Family also has good food storage, perishable foods are kept in the refrigerator and non perishable foods are kept in the pantry…

• 1097 Words
• 5 Pages
Improved Essays
• Superior Essays

(Attention Getter) Let’s go for a walk into a grocery store, what item grabs your attention? Well, if you 're a compulsive buyer you’ll probably get it or you may stay away. The chances are that item that you got or wanted to get had a good amount of delicious sugar in it. (Reveal Topic)…

• 1511 Words
• 6 Pages
Superior Essays
• Improved Essays

1. Please explain why you wish to pursue a career at Bloomberg I really enjoy a vibrant and fast-paced lifestyle, as well as international exposure. Through my experience at Franklin Covey talking to people and using computers as a top sales representative, I can contribute to your company by increasing client satisfaction with my knowledge in business, business analytics, computers, and languages. My time spent at Intel, Johnson and Johnson Medical, and the MBA supports me to be successful at Bloomberg. I also enjoy talking to people as well as integrating my knowledge about technology.…

• 742 Words
• 3 Pages
Improved Essays
• Improved Essays

On Monday, October 5th we discussed how we would going about not using your phone to text for 24 hours, so I decided that I would not text from Monday at 11 o’clock until the same time on Tuesday. My immediate thought process was that this assignment was going to be rather challenging because sometimes you just need to text people to remain in contact and coordinate your daily routine. But as I began to think more about it, I realized how easy this task was going to be. All I had to do was not send a text for 24 hours, I could still read and receive text messages and I still had various social media platforms to keep myself entertained.…

• 1502 Words
• 6 Pages
Improved Essays