{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:16:23Z","timestamp":1771002983009,"version":"3.50.1"},"reference-count":25,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:00:00Z","timestamp":1736294400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2025,5]]},"abstract":"<jats:p>Intelligent Measurement Terminals (IMTs) are pivotal components within the power grid measurement system. Conducting thorough testing of IMT applications before their deployment is a critical step in ensuring the safety of the power grid. To enhance the efficiency of application testing, this paper proposes an automated test case generation method for IMT applications based on natural language processing (NLP) techniques. First, the hierarchical relationships among various application functions are represented as a directed graph based on the Chinese requirements specifications of the application under test. Subsequently, the action flow of each function is analyzed through a four-step process: Chinese word segmentation, part-of-speech tagging, named entity recognition, and syntactic structure analysis. Finally, black-box function test cases are automatically generated according to the directed graph and the analyzed action flow. The proposed method is tested on two requirements specifications for IMT applications. The experimental results show that the proposed method achieves comparable test coverage and success rates to manual test case writing while demonstrating much less time costs.<\/jats:p>","DOI":"10.1177\/14727978241312993","type":"journal-article","created":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T23:41:27Z","timestamp":1747611687000},"page":"2300-2309","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic generation of test cases for intelligent measurement terminal applications based on natural language processing"],"prefix":"10.1177","volume":"25","author":[{"given":"Yin","family":"Zhao","sequence":"first","affiliation":[{"name":"Guangdong Power Grid Co., Ltd"}]},{"given":"Xingyuan","family":"Fan","sequence":"additional","affiliation":[{"name":"Guangdong Power Grid Co., Ltd"}]},{"given":"Jun","family":"Dong","sequence":"additional","affiliation":[{"name":"Guangdong Power Grid Co., Ltd"}]},{"given":"Mi","family":"Zhou","sequence":"additional","affiliation":[{"name":"CSG Electric Power Research Institute, China Southern Power Grid"},{"name":"Guangdong Provincial Key Laboratory of Intelligent Measurement and Advanced Metering of Power Grid"}]},{"given":"Xiaodong","family":"Zhou","sequence":"additional","affiliation":[{"name":"CSG Electric Power Research Institute, China Southern Power Grid"},{"name":"Guangdong Provincial Key Laboratory of Intelligent Measurement and Advanced Metering of Power Grid"}]}],"member":"179","published-online":{"date-parts":[[2025,1,8]]},"reference":[{"key":"e_1_3_2_2_2","volume-title":"Introduction to software testing","author":"Ammann P","year":"2017","unstructured":"Ammann P, Offutt J. Introduction to software testing. Cambridge: Cambridge University Press, 2017."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3368208"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781394298976"},{"key":"e_1_3_2_5_2","volume-title":"Black-box testing: techniques for functional testing of software and systems","author":"Beizer B","year":"1995","unstructured":"Beizer B. Black-box testing: techniques for functional testing of software and systems. New York: John Wiley & Sons, Inc., 1995."},{"issue":"6","key":"e_1_3_2_6_2","article-title":"A comparative study of white box, black box and grey box testing techniques","volume":"3","author":"Khan ME","year":"2012","unstructured":"Khan ME, Khan F. A comparative study of white box, black box and grey box testing techniques. Int J Adv Comput Sci Appl 2012; 3(6).","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"2","key":"e_1_3_2_7_2","first-page":"29","article-title":"Black box and white box testing techniques-a literature review","volume":"2","author":"Nidhra S","year":"2012","unstructured":"Nidhra S, Dondeti J. Black box and white box testing techniques-a literature review. Int J Embed Syst App (IJESA) 2012; 2(2): 29\u201350.","journal-title":"Int J Embed Syst App (IJESA)"},{"issue":"12","key":"e_1_3_2_8_2","first-page":"301","article-title":"A comparative study of black box testing and white box testing","volume":"5","author":"Verma A","year":"2017","unstructured":"Verma A, Khatana A, Chaudhary S. A comparative study of black box testing and white box testing. Int J Comput Sci Eng 2017; 5(12): 301\u2013304.","journal-title":"Int J Comput Sci Eng"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6313016"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04379"},{"key":"e_1_3_2_11_2","first-page":"1729","article-title":"A survey on test case reuse techniques","volume":"13","author":"Kong J","year":"2023","unstructured":"Kong J, Li Y, Li M, et al. A survey on test case reuse techniques. Comput Sci Appl 2023; 13: 1729.","journal-title":"Comput Sci Appl"},{"issue":"02","key":"e_1_3_2_12_2","first-page":"201","article-title":"Intelligent testing method for railway CTC interface text based on fuzzy natural language processing","volume":"6","author":"Jiao Y","year":"2024","unstructured":"Jiao Y, Li R, Wang J. Intelligent testing method for railway CTC interface text based on fuzzy natural language processing. J Intell Sci Techno 2024; 6(02): 201\u2013209.","journal-title":"J Intell Sci Techno"},{"issue":"01","key":"e_1_3_2_13_2","first-page":"216","article-title":"Research and development of standardized test system for power grid security and stability control devices","volume":"10","author":"Yang Y","year":"2023","unstructured":"Yang Y. Research and development of standardized test system for power grid security and stability control devices. Elect Techno Eco 2023; 10(01): 216\u2013218+222.","journal-title":"Elect Techno Eco"},{"issue":"12","key":"e_1_3_2_14_2","first-page":"113","article-title":"From object-oriented to goal-oriented requirements analysis","volume":"28","author":"Cheng Y","year":"2001","unstructured":"Cheng Y, Cai Z, Yuan Z. From object-oriented to goal-oriented requirements analysis. Comp Sci 2001; 28(12): 113\u2013117.","journal-title":"Comp Sci"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"e_1_3_2_16_2","volume-title":"Writing effective use cases","author":"Cockburn A","year":"2008","unstructured":"Cockburn A, Cockburn L. Writing effective use cases. United States: Addison-Wesley Longman Publishing Co., Inc., 2008."},{"issue":"02","key":"e_1_3_2_17_2","first-page":"225","article-title":"A review of research progress in Chinese word segmentation technology","volume":"22","author":"Zhong X","year":"2023","unstructured":"Zhong X, Li Y. A review of research progress in Chinese word segmentation technology. Software Guide 2023; 22(02): 225\u2013230.","journal-title":"Software Guide"},{"issue":"03","key":"e_1_3_2_18_2","first-page":"46","article-title":"The first international evaluation on ancient Chinese word segmentation and part-of-speech tagging","volume":"37","author":"Li B","year":"2023","unstructured":"Li B, Yuan Y, Lu J, et al. The first international evaluation on ancient Chinese word segmentation and part-of-speech tagging. J Chin Inf Process 2023; 37(03): 46\u201353+64.","journal-title":"J Chin Inf Process"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.13274\/j.cnki.hdzj.2024.01.015"},{"key":"e_1_3_2_20_2","unstructured":"Cavnar WB Trenkle JM. N-gram-based text categorization. In: Proceedings of SDAIR-94 3rd annual symposium on document analysis and information retrieval Vegas NV 11\u201313 Apr 1994 1994 vol 161175 p. 14."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-018-2467-9"},{"key":"e_1_3_2_22_2","first-page":"30","volume-title":"Frontiers and trends in syntactic analysis. Journal of Chinese Information Processing","author":"Tu K","year":"2020","unstructured":"Tu K, Li J., Development Report on Chinese Information Processing. Frontiers and trends in syntactic analysis. Journal of Chinese Information Processing. Beijing: Journal of Chinese Information Processing, 2020, 34, pp. 30\u201341."},{"issue":"07","key":"e_1_3_2_23_2","first-page":"30","article-title":"A review of the frontiers in syntactic parsing","volume":"34","author":"Tu K","year":"2020","unstructured":"Tu K, Li J. A review of the frontiers in syntactic parsing. J Chin Inf Process 2020; 34(07): 30\u201341.","journal-title":"J Chin Inf Process"},{"key":"e_1_3_2_24_2","volume-title":"Research on mathematical natural language structure analysis and its applications based on parser","author":"Sun F","year":"2021","unstructured":"Sun F. Research on mathematical natural language structure analysis and its applications based on parser. Chengdu: University of Electronic Science and Technology of China, 2021."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1162\/nol_a_00029"},{"key":"e_1_3_2_26_2","unstructured":"Socher R Bauer J Manning CD et al. Parsing with compositional vector grammars. In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) Sofia Bulgaria August 4 2013 pp. 455\u2013465."}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241312993","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14727978241312993","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241312993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:30:56Z","timestamp":1771000256000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14727978241312993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,8]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["10.1177\/14727978241312993"],"URL":"https:\/\/doi.org\/10.1177\/14727978241312993","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,8]]}}}