Software Testing Methods

The Purpose of Testing
Test design and testing takes longer than program design and coding. In testing each and every module
is tested. Testing is a systematic approach that the given one is correct or not. Testing find out the bugs
in a given software.
Productivity and Quality in Software
Once in production, each and every stage is subjected to quality control and testing from component
source inspection to final testing before shipping.
If flaws are discovered at any stage, that part will be discarded or cycled back for rework and correction.
The assembly line’s productivity is measured by the sum of the cost of the materials, the rework,
discarded components and the cost of quality assurance and testing.
Note :
By testing we get the quality of a software.
click here for complet book
If we give the guarantee for the quality of a product then it is called Quality Assurance.

Linux commands

1.1 What is a command shell?
􀀀
A program that interprets commands
􀀀
in programs called
Allows a user to execute commands by typing them manually at a terminal, or automaticallyshell scripts.
􀀀
commands.
A shell is not an operating system. It is a way to interface with the operating system and run
1.2 What is BASH?
􀀀
BASH = Bourne Again SHell
􀀀
originally written by Steve Bourne for UNIX systems.
Bash is a shell written as a free replacement to the standard Bourne Shell (/bin/sh)
􀀀
program with and use from the command line.
It has all of the features of the original Bourne Shell, plus additions that make it easier to􀀀
DOWNLOAD
Since it is Free Software, it has been adopted as the default shell on most Linux systems

Linux commands

Why Linux ?
Many users on the system with different privileges
Each user has its own private space
a list of users logged into a system
/etc/passwd information
about user accounts
login name, full name, home directory etc
Superuser account root
or superuser
can modify any file, USE WITH CAUTION
DOWNLOAD
users, who and, w prints

Linux commands

Basic Commands
1.ls -l for listing the files as well as directories those are kept in
the particular working directory
syntax
[root@nettech root]#ls -l
2.ls -la same as 'ls -l'but by this command we can also see the hiden
files.
syntax
[root@nettech root]#ls -la
3.ls -li same as 'ls -la' but it will also shows us the inode number of
each and every file
syntax
[root@nettech root]#ls -li
4.ls by this command we can see only file name nothing else
syntax
[root@nettech root]#ls
5.clear it will clear the screen(short cut ctl+l)
syntax
[root@nettech root]#clear
DOWNLOAD MORE COMMANDS click here

Face recognition

A facial recognition system is a computer application
for automatically identifying or verifying a person from a digital
image or a video frame from a video source. One of the way is to
do this is by comparing selected facial features from the image
and a facial database.It is typically used in security systems and
can be compared to other biometrics such as fingerprint or eye
iris recognition systems.
In this paper we focus on 3-D facial recognition system and
biometric facial recognision system. We do critics on facial
recognision system giving effectiveness and weaknesses. This
paper also introduces scope of recognision system in India
DOWNLOAD

arry of pointers video

arry of pointers in c-language for
all IT students

smart board

        SMART Technologies is the parent company that created the SMART Board.  SMART Technologies was founded in 1987 by David Martin and Nancy Knowlton as a Canadian company that was a distributor for 3M  projectors.  The SMART Board was introduced 18 years ago in 1991!  According the SMART Technologies website, "It was the first interactive whiteboard to provide touch control of computer applications and annotation over standard Microsoft Windows applications" (SMART Technologies ULC).  The company struggled in the early years, but put all of its profits into research development of the SMART Board.  Because nobody knew about the product, SMART had to really work at marketing their product.  As a results, some educators began using the SMART Board and also a partnership with Intel was a key factor that provided the company with needed equity and confidence.  The rest is history!  As SMART Technologies grows as a company, they continue to be cutting edge with both their hardware and software offering educational, corporate, and government solutions.

COMMON WRITTEN EXAMINATION [CWE] FOR RECRUITMENT IN CLERICAL CADRE IN 19 PUBLIC SECTOR BANKS

       A Common Written Examination (CWE) will be conducted by the Institute of
Banking Personnel Selection (IBPS) as a pre-requisite for selection of personnel for
Clerical cadre posts in the Public Sector Banks
Since clerical cadre recruitment would be on State-wise basis, candidates can apply
for vacancies in one State/ UT only. It will therefore be necessary that candidates appear
for examination in one of the centres of a particular State/UT where they would like to
apply for emaployment i.e. they have to appear for the examination from a centre for
that particular State/UT as mentioned in Annexure I. The candidate may also be required
to possess proficiency in the Official Language of the State/UT for which vacancies he
wishes to apply to be eligible as per the notifications of the Participating Banks.
Application Fees/ Intimation Charges (Payable from 24.08.2011 and 23.09.2011
both dates inclusive)
- Rs. 50/- for SC/ST/PWD/EXSM candidates.
- Rs.350/- for all others click here for more

scclmines Singareni Collieries 2011 Recruitment for mining graduate trainee , mine surveyor , junior mining engineer

Online application for Singareni mining graduate trainee , mine surveyor , junior mining engineer trainee :
Singareni Collieries Company Limited are invited the online application for the recruitment of the mining graduate trainee , mine surveyor , junior mining engineer trainee in Singareni
How to apply and submit the online application for the above posts:
ONLINE Application can be submitted upto 5.00 PM on 08.09.2011 (website closure). Candidates have to take a print of the ONLINE Application Form after successful submission of data.The printed form of the application signed by the candidate enclosing therewith copies of certificates in proof of age, qualification, experience, marks memos, caste etc., self-addressed stamped (Rs.5/-) envelope should be sent to the Director (PA&W), The Singareni Collieries Co. Ltd., Recruitment Cell, Kothagudem 507 101, Khammam Dist. (AP) only by POST / COURIER to reach on or before 19.09.2011, super scribing the application registration number and name of the post on the envelope.Envelopes not indicating application registration number (OR) applications without registration number will be rejected at the initial stage itself. 
Mining graduate trainee(Men only) :
vacancies : 57
Educational Qualification : B.Tech or BE OR AMIE or its equivalent with 55% marks in Aggregate
Mine surveyor (Men only) :
vacancies : 10
Educational Qualification : SSC, Mine surveyor of competency under coal mines regulation
Junior mining engineer trainee (Men only):
vacancies : 100
Educational Qualification : Diploma in mining engineering from any state board of Technical education
For more Details : click here

data warehousing and mining


Organisations are today suffering from a malaise of data overflow.Data mining. The extraction of hidden predictive information from large databases is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions
.Data warehousing and data mining can address a technology that enables the decision-maker to process huge amount of data in a reasonable amount of time and to extract intelligence/knowledge in a near real time. Data mining is only one step in the knowledge discovery process. Other steps include identifying the problem to be solved, collecting and preparing the right data, interpreting and deploying models, and monitoring the results. The real key to success, however, is to have a thorough understanding of your data and of your business. Algorithms can provide meaningful results only when sensibly directed.
DOWNLOAD full document

semantic web



             The problem with majority of data on the web is that it is difficult to use on a large scale, because there is no global system for publishing data in such a way as it can be easily processed by anyone. Everyone using the WWW has the problem that who can you trust to send you e-mails; how can I know s u r e if a transaction really occurred. So the semantic web can be seen as a huge engineering solution… but it is more than that.
             The Semantic Web is a mesh of information linked up in such a way as to be easily procesable by machines, on a global scale. The Semantic Web provides a common framework that allows data to be shared and reused across application. It is a collaborat- ive effort led by W3C. The Semantic Web is about common formats for integration and combination of data drawn from diverse sources, where the original Web mainly concentrates on the interchange of documents.
             The Semantic Web approach instead develops languages for expressing information in a machine processable form. This development of Semantic Web is occurring in atleast two areas: from the infrastructural, all-embracing, position as espoused by the W3C/MIT and other academically -focused organizations.
DOWNLOAD  full document

Claytronics

Claytronics is mainly linked with nanotechnology along with robotics. Gone were the days when we admire the “voice transmission technology”.Days were going when we are thinking of video transmission. And these are the days when we can easily transmit 3-dimensional objects from one place to another place without any medium!!!   
             Yes!!! Medium less transmission of an object is possible through a technology named “CLAYTRONICS”. We can, not only send an object from place to another but also can change the size, shape, color, and all physical properties just by a single instruction using this programmable matter. So by this a white car can be converted to a red car, and then to grey without any effort. The claytronic matter made up of small tiny spherical particles called “catoms”.
DOWNLOD DOCUMENT

IPV6

Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3G networks into all IP networks has made mobile IPv6 an ideal choice to support this kind of handover. However if soft handover is not employed, the latency posed by mobile IPv6 makes it undesirable for providing seamless mobility. This paper presents handover between wireless LAN systems and third generation universal mobile telecommunications system (UMTS) networks using fast mobile IPv6 protocol with preauthentication. The handover is optimized by link-layer triggers based on an efficient handover decision algorithm. Proposed
handover scheme minimizes the power consumption of the mobile devices by reducing the duration for which the two interfaces of the device will be active Download full document

Palm vein technologies

                 Palm vein technologies are one of the upcoming technologies which is highly secure. It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. It is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. Moreover, its contact less feature gives it a hygienic advantage over other biometric authentication technologies.
 The palm secure works by capturing a person’s vein pattern image while radiating it with near-infrared rays. The PalmSecure detects the structure of the pattern of veins on the palm of the human hand with the utmost precision. The sensor emits a near-infrared beam towards the palm of the hand and the blood flowing through these back to the heart with reduced oxygen absorbs this radiation, causing the veins to appear as a black pattern. Download full document

Mobile Computing

Computing has been undergoing a bit of renaissance lately. A Few years ago it was
a simple matter of finding a data compatible mobile phone, a PC card modem, and a matching cable and installing it as modem. Then people started to use PDA’s as well. Cell phones started to come with infrared ports to allow communication with laptops. Then cell phones started to come with modems built in. The connecting methods of mobile computing, its introduction, connection types, factors affecting connections, mobile applications and its limitations are explained
Download full document

3-G Technology

      Third Generation (3G) mobile devices and services will transform wireless communications in to on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand. The first generation of mobile phones consisted of the analog models that emerged in the early 1980s. The second generation of digital mobile phones appeared about ten years later along with the first digital mobile networks. During the second generation, the mobile telecommunications industry experienced exponential growth both in terms of subscribers as well as new types of value-added services. Mobile phones are rapidly becoming the preferred means of personal communication, creating the world's largest consumer electronics industry.

Download full document

3D WATERMARKING ROBUST TO ACCESSIBLE ATTACKS

In this paper we propose a new watermarking approach for 3D polygonal meshes. In the field of multimedia watermarking, mesh watermarking is less advanced than image or video. The main difficulty is due to the irregular structure of  3D meshes that makes them more vulnerable to attacks. To address this issue, we introduce a new criterion –accessibility in the common 3D graphics software-for selecting attacks and propose a list of common attacks based on this criterion. Consequently, in this paper, we consider attacks like cut, change of the format, affine transformation, subdivision and small scale deformation that are usually found in the graphical software. We present several schemes to achieve robustness against these attacks. Watermark embedding is done by perturbing the vertices in their tangent space that provides us invisibility of the watermark. Hiding capacity in this method is as big as the number of the vertices of the
mesh that is usually big enough for expensive 3D meshes Download full document

Nano Technology

To lead a healthy human life, barriers to it are minimized by miracle thinking. This is the special and interesting concept of “inserting a chip into human body” for monitoring and controlling the biological activities of body.
for this purpose,3 chips are placed in the human body.chip1 back ups the data from brain,chip2 monitors the blood vessels and chip3 monitors endocrine glands’ secretions. These chips are controlled and operated externally through control centre.
        download full document