Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015
Envision Issue Inclined of an Application Exploiting Model-Based Integration and System Test Automation
Kiran V. Bakka, Aarti Deshpande
Abstract: The world's expanded reliance on programming enabled automated frameworks has elevated real worries about programming and coding dependability furthermore, configuration. New practical approaches and apparatuses for software stability and quality assurance are required. This paper shows an automated test era technique, called New Model-based Integration and System Test Automation (MISTA), for implementation of programming frameworks. Given a Model-Implementation Depiction (MID) speci?cation, MISTA creates test code that can be executed quickly with the procedure under test. The MID speci?cation utilizes a Petri net to catch both control and information related prerequisites for functional testing, access control testing, or deep testing with exhaustive models. Subsequent to producing experiments from the test model as per a given model, MISTA changes over the experiments into executable test code by mapping model-level components into usage level develops. MISTA has executed test generators for different test scope criteria of test models, code generators for different programming and scripting dialects, and test execution environments, for example, Java, C, C++, C#, HTML, Selenium, Webdriver, and Robot Framework. MISTA has been connected to the functional and exhaustive testing of different real-world programming frameworks. Our surveys have shown that MISTA can be profoundly powerful in flaw identification.
Keywords: Functional testing, Model-based testing, Petri nets, Exhaustive testing, Configuration testing, Regression testing, Software assurance
Edition: Volume 4 Issue 10, October 2015,
Pages: 2060 - 2063
How to Cite this Article?
Kiran V. Bakka, Aarti Deshpande, "Envision Issue Inclined of an Application Exploiting Model-Based Integration and System Test Automation", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB159252, Volume 4 Issue 10, October 2015, 2060 - 2063
How to Share this Article?
Similar Articles with Keyword 'Regression testing'
Prioritizing the Test Cases of Web Services by APFD Metric
Manali Gupta, Shweta Rathour
TESTING OF WEB APPLICATIONS BASED ON MODEL DRIVEN ARCHITECTURE
Harsimrat Kaur, Janpreet Sigh
Similar Articles with Keyword 'Functional'
Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Similar Articles with Keyword 'testing'
Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth, K. Venkata Ramana
Calibration Software: Performance Analysis
Prasad Rajendra Kumbhar, Anil R. Surve, Shailender Shekhawat
Similar Articles with Keyword 'Petri'
Big Data Quality: Early Detection of Errors in Process Flow using Alignments and Compliance Rules
Melody Wadzanayi Murakwani, Manoj Sethi
Optimizing Resource Conflicts in Workflow Management Systems Using an Innovative Algorithm
Darshana Patel, Mitula Pandya
Similar Articles with Keyword 'nets'
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Glaucoma Detection Using Machine Learning
Similar Articles with Keyword 'Exhaustive'
Detection of Malicious URLs using Classification Algorithm
Muskan V. Jaiswal, Dr. Anjali B. Raut
Detecting and Blocking of Malicious URL
Muskan V. Jaiswal, Anjali B. Raut
Similar Articles with Keyword 'Configuration'
Reliable and Rapid Routing Configurations for Network Recovery
William Asiedu K. O. Boateng
Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'Regression'
Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Heart Disease Prediction with Machine Learning Approaches
Similar Articles with Keyword 'Software'
Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Performance Analysis of Clustal W Algorithm on Linux Cluster
Swati Jasrotia, Salam Din
Similar Articles with Keyword 'assurance'
Crypto View: Visual Representation of Cryptographic Algorithms
Surumi Basheer, Sreena Sreedhar
A Synopsis on Point to Point Sharing Using Cloud Based Mobile Community-Based System (Cloud MoV System)
N. Shaleen Saroj, K. Lakshmi, Dr. S. Prem Kumar