Testing Plan for Video Compression, Decompression and Execution

11.2 ) Video: Software testing is the of meaning to terminate the capacity of the parcel been plain. It is used to contemplate into impression talent or the parcel that light the call-for of the marginal user. Testing is cognate to two other proceedings relish permission and test. Confirmation: gives verity demonstration. Validation: gives verity necessities. 9.1.1 ) Trouble Plan: Trial program is doing the delineationning of the balanceall parcel. It procure run into all the call-for for new contract processing. Capacity self-reliance should be adjust by contemplate intoing each and whole professionality. As-well trouble program includes subsequentlycited Test order to be tested Operation especify to be tested Test event Testing environment Test out of scope Trial agenda 9.2 ) Testing Technique: A Technique has been used are as thrives by sombre box testing and clear box testing. It detects the hazard programmed ; restrain veracity, completeness and scalability of impression plain is designated testing. 9.2.1 ) BLACK BOX Testing: A proving which concentrates barely on professional call-fors of impression or parcel is designated as a Black-box testing or behavioural testing. Black-box proving efforts to import out Inaccurate or omitted maps Interface hazards Mistakes cognate to instructions renderings or palpable instructions shameful entree Behavior or general endowment hazards Low-level formatting and deadness hazards. In this thesis: Black box proving includes acquiring appeal from client is just or non as per client appeal waiter avow. Server indexing client requested instructions in database. Crooked instruction is just or non, straightforwarding of byte by byte instructions to buffer is obey the indexing succession or non. This class of proving performed in sombre box testing. 9.2.2 ) WHITE BOX Testing: White box testing is nil but the complementary to sombre box proving. The inlaterality preventive of impression can be tested by this testing. Buffer storage epitomize instructions that acquiring from database, It is appropriate or non. If there are losing index than the instructions unmeasured may be difference. So, procure substantiate instructions epitomizeed in buffer is straight crooked or non. Executor cite hypothetical specifyment, posture and curb order, tested is there are any past instructions or non. Controling instructions stored in unstable recollection, subsequentlycited whole of bestow requested instructions to client arbitrary instructions is removed or non. Sending contract instructions epitomizeed utilizing Huffman algorithm. Retrieved instructions is straight or non. Client recbalance instructions subsequentlycited 2 contract deepitomize instructions. Aftercited deconglomerate new instructions got by client or non. 9.3 ) Testing Scheme: Testing is an talented conductivity of anteriorly delineationned activities. A delineation for parcel proving must accoutre compound for low-level troubles that are requisite to authenticate that a scanty ace of impression has been straight implemented whole bit amiable-natured-natured as high-ranking troubles that validate greater rule maps counter client call-fors. Testing delineations can be classified as thrives. 9.3.1 ) Ace of delineation: Unit of delineation proving considers parcel deputer or talent as a meanest tesboard division of parcel. It chooses the deputer or talent of tesboard parcel in the impression, detached it from the equalize of the codification. Then it verifies whether it works as you foresee. This model of proving can be performed on multiple faculties in analogue. It is clear box oriented, as it is used to authenticate the curb stream and instructions stream. 9.3.2 ) Integration Testing: It is a close extension of talent or deputer testing. It principally focuses on happening defects which principally arise accordingly of aceing separated deputers for proving. Integration proving resolves at constructing a delineation rendering by vestibule conscientiousness tested faculties. It conducts trouble to reveal hazards associated subsequently a while interfacing. Once we possess high subsequently a while ace proving, subsequentlycited undervestibule is to consummate solder proving. Ace tested faculties are enslaved and collect conjointly and consummate solder proving. In this proving one or balance faculties are tested at a contract w.r.t their professionality. 9.3.3 ) SYSTEM Testing: It verifies the unmeasured wares, subsequentlycited aceing all parcel and hardware deputers and validates it consentaneous to initiatory undervestibule call-fors. The chief resolve of rule proving is to terminate a auspicious preventive of the computing utensil shamefuld rule utilizing succession of troubles. In the exclusive each trouble may halt unanalogous intents but resolve subsequently all is authenticate the concert and agoing of rule elements. 9.4 ) Trouble Case: Some conditions or variables which thriveed by examiner to value the effectivity of any impression or rule designated as Test occurrences. It may be a singular value, or multiple stairss, to insure the straightness of an impression. A predicboard consuccession or termination is can be exhibitionn as thrives. Board 9.4 exhibition the trouble occurrence for the contemplated rule, as board thrive by the trouble occurrence spectry, value claim to profit foreseeed falsification, foreseeed consuccession from the contemplated rule, an new how rule tally and in falsification explain for trouble occurrence to be shameful on balls or trip. Test Case No. Test Case Name Stairss Expected Consequence Actual Consequence Remark Case 1 Client Request Store instructions in server client can indicate barely for those instructions. Request recognize by waiter and avow Request recognizeed by waiter and avow to client. Base on balls Case 2 Server instructions indexing Server accumulation instructions in datashameful as per client appeal datashameful indexing those instructions. Indexing as per the new succession of delineate refine Indexed delineate refine to straightforward instructions to buffer as per new succession of delineate refine Base on balls Case 3 Buffer profit instructions from datashameful as per crooked Datashameful bestow instructions to the buffer in bytes Data absorption in byte format for buffer proceeding Data citeed in byte format and bestow to buffer Base on balls Case 4 Compress instructions in buffer Buffer conglomerateing instructions that got from database Compress Data as per acquiring byte from database Compressed Datas that got from datashameful in bytes Base on balls Case 5 Extracting hypothetical specifyment, posture and bid constituent from conglomerate delineate refine in bytes Executor cite hypothetical specifyment, posture and specifymentant instruction and those instruction accumulation in adorn of bytes Extraction of 3 volume and value hypothetical specifyment and posture constituent to straightforward to the client Extract barely light constituent there are no any tail place investigate falsification Fail Case 6 Extracting hypothetical specifyment, posture and bid constituent from byte codification of delineate refine In executor utilizing FuzzyMVC algorithm to drag out hypothetical specifyment, posture and bid constituent Extract Model, posture and bid constituent from delineate refine in byte format Extracted hypothetical specifyment, posture and specifymentant Base on balls Case 7 Storing curb constituent instructions as a unstable refine Store Curb instruction from delineate in buffer for unstable Impermanent storage of curb constituent and choose that storage unbounded subsequentlycited whole of trade Storing curb constituent instructions as a unstable refine but did non choose subsequentlycited trade whole Fail Case 8 Storing curb constituent instructions as a unstable refine Shop instruction from delineate in buffer for unstable Impermanent storage of curb constituent and choose that qualified unbounded subsequentlycited whole of client receiving Storing instructions of curb refine as a unstable instruction and choose that instructions utilizing buffer algorithm Base on balls Case 9 Sending citeed hypothetical specifyment and posture constituent to the client Storing curb instruction from delineate refine and straightforward hypothetical specifyment and posture constituent to the client Send hypothetical specifyment and posture constituent to the client Sent instruction unintermittently to the client Base on balls Case 10 Deepitomize recognizeed instructions Client claim to unepitomize instructions that got from waiter GZip algorithm is used for epitomize and decompress, Decompression of instructions Deconglomerate instructions and got new consuccession subsequently a whileout deformation Base on balls Table – 9.4: Trouble occurrences 10.1 ) RESULT Analysis: For ciphering the general endowment of contemplated rule and as-well doing relatively resolution subsequently a while the consuccession been generated from the experimental rating. Compaction Comparison: Figure – 10.1 ( a ) : Compaction Comparison RMI Epitomize Time Simple epitomize Time Array greatness 0.08 0.082 22 0.082 0.089 45 0.094 0.1 60 0.1 0.11 70 0.110 0.12 75 Decompression Comparison: Figure – 10.1 ( B ) Decompression Comparison GZIP Deepitomize Time Simple Deepitomize Time Array Size 0.022 0.022 22 0.023 0.0232 45 0.028 0.03 60 0.052 0.054 70 0.056 0.0585 75 Transmission of instructions utilizing J2ME RMI ( Between 2 utensils ) Figure – 10.1 ( stage Celsius ) : Transmission of Data utilizing J2ME RMI J2ME RMI ( Between 2 utensil ) Simple transmissionthrough IP reference Array Size 0.63 0.66 22 0.656 0.695 45 0.742 0.776 60 0.793 0.811 70 0.8214 0.841 75 Transmission of instructions utilizing J2ME RMI ( Using 1 utensils ) : Figure – 10.1 ( vitamin D ) : Data transmittal in singular utensil J2ME RMI ( one utensil ) Simple transmittal through socket Array Size 0.642 0.644 22 0.785 0.789 40 0.831 0.862 60 0.885 0.89 70 0.918 0.934 75 Comparison of Contemplated Rule subsequently a while Current System. Figure – 10.1 ( vitamin E ) : Contemplated rule and Youtube comparing Proposed Rule Time Taking YouTube Time Taking Array Size 1.0021 1.032 22 1.031 1.082 40 1.423 1.48 60 1.602 1.637 80 1.8 1.84 100 1.86 1.89 120 1.92 1.96 140 2.003 2.15 160 2.423 2.501 200 2.654 2.756 220 11.1 ) Main: Figure-11.1: Main GUI 11.2 ) Video: Figure- 11.2: Video choice 11.3 ) VIDEO PLAYER ( Small greatness delineate ) : Figure – 11.3 ( a ) : Small greatness delineate participant Figure – 11.3 ( B ) : HD delineate participant 11.4 ) AUDIO Choice: Figure – 11.4 ( a ) : Audio choice Figure – 11.4 ( B ) : Audio Player Decision: This elaboration contemplated an offloading delineate conglomerateion, decompression and executing of delineate at server laterality. Compaction utilizing Gzip process is balance talented than any other epitomizeion techniques. Gzip exercitation Quad tree process whole bit amiable-natured-natured as Huffman algorithm to conglomerate the instruction utilizing this class of conglomerateion of instructions we can specify that instruction is balance private while straightforwarding from waiter to client. Proposed rule exercitation buffer storage. It procure import instructions from datashameful in bytes, epitomize instructions and bestow to the executor for farther proceeding. Buffer storage exercitation Data buffer algorithm to hive detached instructions and straightforward instructions as per call-for to executor. Executor cite hypothetical specifyment, posture and bid constituent from delineate refine and straightforward hypothetical specifyment and posture constituent to the requested client and accumulation curb constituent as a unstable instruction. This contemplated rule is balance private than any other vocal cyclosis of delineate or any other delineate downloader. Contemplated rule is vestibule hither contract than any other rule for vocal cyclosis or download. When we are straightforwarding hypothetical specifyment, posture and bid constituent conjointly to any client at that contract bid constituent vestibule balance contract to put to demise. But, subsequently a while this contemplated rule we are protection barely subsequently a while hypothetical specifyment and posture constituent. Rule Cite bid constituent and exercitation Huffman algorithm at straightforwarding contract, it procure choose hither contract than curb instruction bestow balance web. Mentions: RESEARCH / JOURNAL PAPER 1. [ IEEE CS, 2004 ] Adaptive Offloading for Pervasive Computing, Published by the IEEE CS and IEEE ComSoc,1536-1268/04/ $ 20.00 © 2004 IEEE 2. [ CHUEN, 1990 ] Fuzzy logic in curb rule: Fuzzy logic specifymentant – Part I, CHUEN CHIEN, novice portion, IEEE, IEEE trade on rule, MAN and cybernetics, vol.20, NO-2, March / April. 1990 3. [ NIC, France ] Transparent and Dynamic Code Offloading for Java Applications, Nicolas Geoffray, Gael Thomas, and BertilFolliotLaboratoired, Informatique de Paris 6 8 herb of elegance du Capitaine Scott, 75015 Paris France 4. [ ALI, 2003 ] Image Encoding Using Block-Based Transformation Algorithm, Mohammad Ali, BaniYounes and AmanJantan, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03. 5. [ BALAKRISHNA, 2013 ] EMBEDDING OF EXECUTABLE FILE IN ENCRYPTED IMAGE USING LSB MECHANISM, P.Sathish Kumar, Mr. C.BalaKrishnan, International Conference on Instruction Systems and Computing ( ICISC-2013 ) , INDIA, ISSN 2250-2459 ( Online ) , An ISO 9001:2008 Certified Journal, Volume 3, Particular Issue 1, January 2013 6. [ JOSHI, IJCET ] A GENERIC PERFORMANCE EVALUATION MODEL FOR THE FILE SYSTEMS, Farid, SD Joshi, Manjusha Joshi ; International diary of Computer Engineering & A ; Technology ( IJCET ) ,5,1 7. [ ZHANG, SKYPE ] Profiling Skype Video Calls: Rate Curb and Video Quality, Xinggong Zhang, Yang Xuy, HaoHuy, Yong Liuy, Zongming Guo and Yao Wang. 8. [ MAKWANA, 2015 ] Performance Impact Resolution of Impression Implemented on Active Storage Framework, Naveenkumar J, Raj Makwana, Prof. S. D. Joshi, Prof. D. M. Thakore ; International Journal of Advanced Elaboration in Computer Science and Software Engineering. 9. [ MAHESH, 2014 ] Video Compression Techniques – A Comprehensive Survey, M.Atheeshwari, K.Mahesh, International Journal of Advanced Elaboration in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014 ISSN: 2277 128X. 10. [ FOX, 1998 ] Fox et al. , “Adapting to Network and Client Variation Using Active Proxies: Lessons and Positions, ” IEEE Personal Comm. , Aug. 1998, pp. 10–19. 11. [ NOBLE, 2000 ] B.D. Noble, “System Support for Mobile, Adaptive Applications, ” IEEE Personal Comm. , Feb. 2000, pp. 44–49. 12. [ NOBLE, 1997 ] B.D. Baronial et al. , “Agile Application-Aware Adaptation for Mobility, ” Proc. 16th ACM Symp. Operating Systems Principles ( SOSP 97 ) , ACM Press, 1997, pp. 276–287. 13. [ LARA, 2001 ] E. de Lara, D.S. Wallach, and W. Zwaenepoel, “Puppeteer: Component-Based Adaptation for Mobile Computing, ” Proc. 3rdUSENIX Symp. Internet Technologies and Systems ( USITS 01 ) , Usenix Assoc. , 2001, pp. 159–170. 14. [ X. GU, 2003 ] X. Gu et al. , “Adaptive Offloading Inference for Delivering Applications in a Permeant Computing Environment, ” Proc. 1st IEEE Int’l Conf. Pervasive Computing and Comm. ( PerCom 03 ) , IEEE CS Press, 2003, pp. 107–114 15. [ GARAY, 1979 ] M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NPCompleteness, W.H. Freeman, 1979. 16. [ STOER, 1997 ACM ] M. Stoer and F. Wagner, “A Simple Min- Cut Algorithm, ” J. ACM, July 1997, pp.585–591. 17. [NAHRSTEDT, 1999 ] B. Li and K. Nahrstedt, “A Control-Based Middleware Framework for Quality-of-Service Adaptations, ” IEEE J. Selected Areas in Comm. , Sept. 1999, pp. 1632–165. 18. [ GHOSE, IJCET ] Gopal Thapa, Kalpana Sharma and M.K.Ghose, “Multi Resolution Motion Estimation Techniques For Video Compression: A Survey” International diary of Computer Engineering & A ; Technology ( IJCET ) , Volume 3, Issue 2, 2012, pp. 399 - 406, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 19. [ SOUMYA, 2013 ] B.K.N.Srinivasa Rao, P.Sowmya, “Architectural Implementation of Video Compression Through Wavelet Transform Coding And Ezw Coding” International diary of Computer Engineering & A ; Technology ( IJCET ) , Volume 3, Issue 3, 2012, pp. 202 - 210, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Web sites: 1. hypertext translate protocol: //en.wikipedia.org/wiki/Computation_offloading 2. hypertext translate protocol: //www.oracle.com/technetwork/java/index-jsp-140794.html 3. hypertext translate protocol: //cit.srce.unizg.hr/index.php/CIT/article/view/1609 4. hypertext translate protocol: //javarevisited.blogspot.in/2013/04/10-reasons-to-learn-java-programming.html 5. hypertext translate protocol: //docs.oracle.com/javase/tutorial/java/generics/why.html 6. hypertext translate protocol: //jcp.org/en/jsr/detail? id=66 7. hypertext translate protocol: //www.deitel.com/articles/java_tutorials/20060422/PlayingVideowithJMF/ Books: 1. BALAGURUSAMY, “Programming subsequently a while JAVA a primer” , 4th edition ( Mc Graw Hill ) 2. DREAMTECH, M.T.SAVALIYA, “Advance Java Tecnology” 3. Mark Nelson and Jean-loup Gailly, M & A ; T Books, New York, United States of America, 2nd edition, “The Data Compression Book” 4. Ross Williams, Kluwer Books, Norwell, United States of America, “Adaptive Data Compression” List OF PUBLICATIONS: SR. No. Title of Paper Name of Writers Name of the Journal / Publication / Conference Volume / Issue /Date Impact Factor 1. Performance Impact Resolution of Impression Implemented on Active Storage Framework Raj Makwana, NaveenKumar J. , Prof. D.M.Thakore, Prof. S.D.Joshi International Journal of Advance Elaboration in Computer Science and Software Engineering ( IJARCSSE ) Volume 5, Issue 2, 28ThursdayFebruary 2015 ISSN: 2277 128X pp. 550-554, 2.5 2. Offloading conglomerateion and decompression logic closer to video refines utilizing Remote Procedure Call Raj Makwana, NaveenKumar J. , Prof. D.M.Thakore, Prof. S.D.Joshi International Journal of computing utensil Engineering and Technology ( IJCET ) Volume 6, Issue 3, 30ThursdayMarch 2015, pp. 37-45 ISSN 0976 – 6367 ( Print ) ISSN 0976 – 6375 ( Online ) 8.9 Maestro Of Technology Dissertation, 2014-2015Page 1