SlideShare a Scribd company logo
1 of 4
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 3 (May 2013), PP. 59-62
59
Test Case Prioritization Using Genetic Algorithm
Ms.Kirandeep Kaur1
, Mr.Vinay Chopra2
1
(CSE, KCCEIT, Nawanshahrr /PTU, INDIA)
2
(CSE, DAVIET, Jalandhar /PTU, INDIA)
Abstract: Test case prioritization is one of the techniques used to reduce the rate of fault detection.
Test case prioritization techniques help engineers execute regression tests in an order that achieves
testing objectives earlier in the testing process. Test case prioritization techniques schedule test cases
for execution in an order that attempts to increase their effectiveness at meeting some performance
goal. Various goals are possible; one involves rate of fault detection. Rate of fault detection measure of
how quickly faults are detected within the testing process.
Keywords: Testing, Regression Testing, Test case prioritization, Genetic Algorithm.
I. INTRODUCTION
Testing is an important engineering activity responsible for a significant portion of the costs of
developing and maintaining software. Testing is the process of analyzing a software item to detect the
differences between existing and required conditions (that is defects/errors/bugs) and to evaluate the features of
the software item. Testing software is operating the software under controlled conditions:
1. To verify that it behaves “as specified”,
2. To detect errors, and
3. To validate that what has been specified is what the user actually wanted.
In general, however, testing techniques are heuristics and their performance varies with different
scenarios; thus, they must be studied empirically.
II. TESTING LEVELS BASED ON SOFTWARE ACTIVITY
Tests can be derived from requirements and specifications, design artifacts, or the source code. A
different level of testing accompanies each distinct software development activity:
Fig 1: Software development activities and testing levels
Fig 1 illustrates a typical scenario for testing levels and how they relate to software development activities by
isolating each step.
1. Acceptance Testing – access software with respect to requirements. The requirements analysis phase of
software development captures the customer’s needs. Acceptance testing is designed to determine
whether the completed software in fact meets these needs. In other words, acceptance testing probes
whether the software does what the users want. Acceptance testing must involve users or other
individuals who have strong domain knowledge.
2. System Testing – access software with respect to architectural design. The architectural design phase
of software development chooses components and connectors that together realize a system whose
specification is intended to meet the previously identified requirements. System testing is designed to
determine whether the assembled system meets its specifications. It assumes that the pieces work
individually, and asks if the system works as a whole.
3. Integration Testing – access software with respect to subsystem design. The subsystem design phase of
software development specifies the structure and behavior of subsystems, each of which is intended to
Test Case Prioritization Using Genetic Algorithm
60
satisfy some function in the overall architecture. Often, the subsystems are adaptations of previously
developed software. Integration testing is designed to assess whether the interfaces between modules in
a given subsystem have consistent assumptions and communicate correctly. Integration testing must
assume that modules work correctly.
4. Module Testing – access software with respect to detailed design. The detailed design phase of software
development determines the structure and behavior of individual modules. A program unit, or procedure,
is one or more contiguous program statements, with a name that other parts of the software use to call it.
Module testing is designed to assess individual modules in isolation, including how the component units
interact with each other and their associated data structures.
5. Unit Testing – access software with respect to implementation.
III. REGRESSION TESTING
Regression testing is an expensive testing process used to validate modified software and detect
whether new faults have been introduced into previously tested code. One goal of prioritization is to increase a
test suite's rate of fault detection. To reduce the cost of regression testing, software testers may prioritize their
test cases so that those which are more important, by some measure, are run earlier in the regression testing
process. There are following Methods of Regression Testing:
Table 1: Methods of Regression Testing
Methods Descriptions
Retest all All the tests in the existing test suite should be re-executed. This is very
expensive as it requires huge time & resources.
Regression test selection Re-executing the entire test suite, it is better to select part of test suite to
be run. Test cases selected can be categorized as:
 Reusable Test Case: It can be used in succeeding regression
cycles.
 Obsolete Test Case: It can’t be used in succeeding regression
cycles.
Test case prioritization
(TCP)
Selection of the Test Cases based on priority will greatly reduce the
regression test suite.
IV. TEST CASE PRIORITIZATION (TCP)
Test case prioritization techniques schedule test cases for execution in an order that attempts to increase
their effectiveness at meeting some performance goal. Various goals are possible; one involves rate of fault
detection. Rate of fault detection measure of how quickly faults are detected within the testing process. An
improved rate of fault detection during testing can provide faster feedback on the system under test. Each test
cases are assigned a priority. Priority is set according to some criteria like Early Fault detection, Execution time,
etc. The effectiveness of any system is calculated on the basis of fault detection when software evolves. An
improved fault detection during testing can provide faster feedback on the system under test. Test case
prioritization is one of the techniques used to reduce the fault detection. There are following Prioritization
Factors:
Table 2: Prioritization Factors
S.NO PRIORITIZTION FACTORS
1 Customer-Assigned Priority (CP): It is the measurement of importance to the customer’s
need. Customer’s need vary from 1 to 10 and assigned by customer itself. Where 10 is used
to identify the highest customer priority.
2 Implementation complexity (IC): No. of faults increases as the requirement is become high in
implementation complexity. Value from 0 to 10 assigned by the developer on the basis of its
application complexity and by using larger value higher complexity is denoted.
3 Changes in Requirements (RC): The no. of times of requirement has been changed with
respect to when the requirement was first introduced. It also ranges from 1 to 10.
Formula is: Ri= (M/N)*10
Where i= No. of changes for any requirements.
Ri=Change in requirements.
M=No. of times ith
requirement change.
N=Max. no. of requirement.
4 Fault Impact of Requirements (FI): Development team to identify the requirement which has
had customer reported failures. The developer can use the previous data to reduce the fault
Test Case Prioritization Using Genetic Algorithm
61
impact.
5 Traceability (TR): Traceability calculates the mapping that exists between requirements and
test. It helps in determining whether a requirement is enough tested is difficult for the testers
if the test cases are not relevant to particular requirements. A problem which is very
common is insufficiency of traceability. If traceability is not good or poor that may cause
project over runs and failures.
6 Execution Time (ET): Execution time of the test case as cost of test case. Test case costs
should have a large impact on the TCP. In terms of test case cost, It can be relate to the
resources, such as execution time of test case, Hardware costs or even engineers salaries.
In our case, test case cost is the execution time of test case.
V. TEST CASE PRIORITIZTION TECHNIQUES
There are following TCP techniques :
1. No prioritization: No prioritization tests in test suite. It is simply the application of no technique apply.
2. Random Prioritization: A test case is selected randomly for execution.
3. Optimal Prioritization: A test case which determines maximum new faults is executed first.
4. Code-coverage based prioritization: It covers maximum functions, classes or code fragments of software
program within minimum time have highest priority in the prioritize test suite. If multiple test cases cover
the same number of functions, orders these randomly.
5. Mutation based prioritization: It is based on the fault-based technique. A mutant of statement is generated
(automatically) by randomly changing the statement.
VI. GENETIC ALGORITHMS
G A are inspired by Darwin’s theory about evolution. Simply said, a solution to a problem solve by G
A is evolved. Each individual is represented by a sequence of variables/parameters (called genes), known as the
chromosome. The chromosome encodes a possible solution to a given problem. The encoding can take many
forms, for example, binary, real-valued, or character-based.
1. Selection: A selection depending on the fitness value decides which individuals are to be used as the
“parents” for producing the next generation.
2. Crossover: Crossover is a genetic operator that combines two individuals (the parents) to produce a
new individual (the offspring).
3. Mutation: After a crossover is performed, Mutation take place. This is to prevent falling all solutions in
population into a local optimum of a solved problem. Mutation changes randomly the new individual.
Table 3: Advantages & limitations of Genetic Algorithms
ADVANTAGES OF GENETIC ALGORITHMS LIMITATIONS OF GENETIC ALGORITHMS
1. It solve every optimization problem 1. They find a solution to evolution.
2. Solve problem with multiple solution. 2. A better solution is only in comparison to
other solutions.
VII. CONCLUSION
In Previous studies have shown that several prioritization techniques can significantly improve rate of fault
detection. But we have shown that the effectiveness of these techniques varies considerably across various
attributes of the program, test suites, and modifications being considered. This variation makes it difficult for a
practitioner to choose an appropriate prioritization technique for a given testing scenario. The prioritization
techniques also include coverage and change attributes but it is observed that engineers choosing to prioritize for
both coverage and change attributes may actually achieve poorer rates of fault detection.
REFERENCESS
[1]. G. Rothermel, R.H. Untch, C. Chu, & M. J Harrold, “Test Case Prioritization: An Empirical
Study”, Proceedings of the International Conference on Software Maintenance, Oxford, UK, IEEE,
Vol. 20, Issue no. 6, pp: 1-10, 1999.
[2]. Praveen Ranjan Srivastava, “Test Case Prioritization”, Journal of Theoretical and Applied
Information Technology, pp: 178-181, 2008.
[3]. P. Ammann, P. E. Black, and W. Ding, “Model Checkers in Software Testing Technical report”,
National Institute of Standards and Technology, 2002.
Test Case Prioritization Using Genetic Algorithm
62
[4]. Sebastian Elbaum,¤ Gregg Rothermel,y Satya Kanduri,z Alexey G. Malishevsky, “Selecting a Cost-
Effective Test Case Prioritization Technique”, pp: 1-26, 2004.
[5]. Sujata, Mohit Kumar, Dr. Varun Kumar, “Requirements based Test Case Prioritization using
Genetic Algorithm”, IJCST Vol. 1, Issue 2, pp: 189-191, 2010.
[6]. Ruchika Malhotra, Arvinder Kaur and Yogesh Singh, "A Regression Test Selection and
Prioritization Technique," Journal of Information Processing Systems, Vol.6, No.2, pp.235- 252, Jun
2010.
[7]. Peter M. Kruse1 and Kiran Lakhotia2, “Multi Objective Algorithms for Automated Generation of
Combinatorial Test Cases with the Classification Tree Method”, pp: 1-6, 2011.
[8]. Chhabi Rani,Rajibb mall, “Test Case Prioritization of object-oriented programs”, Setlabs briefings,
Vol.9, No.4, pp. 31-40, 2011.
[9]. S. Raju, G. V. Uma, “Factors Oriented Test Case Prioritization Technique in Regression Testing
using Genetic Algorithm”, European Journal of Scientific Research, ISSN 1450-216X, Vol.74, No.3,
pp. 389-402, 2012.
[10]. Miso Yoon, Eunyoung Lee, Mikyoung Song, Byoungju Choi, “A Test Case Prioritization through
Correlation of Requirement and Risk”, Journal of Software Engineering and Applications, Vol. 5,
823-835, 2012.
[11]. Prem Parashar, Arvind Kalia, Rajesh Bhatia, “How Time-Fault Ratio helps in Test Case
Prioritization for Regression Testing”, Int.J. of Software Engineering, IJSE Vol.5 No.2, pp: 25-35,
2012.
[12]. E. Ashraf, A. Rauf, and K. Mahmood, “Value based Regression Test Case Prioritization”,
Proceedings of the World Congress on Engineering and Computer Science, ISBN: 978-988-19251-6-9,
ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online), Vol. 1, 2012.

More Related Content

What's hot

A survey of software testing
A survey of software testingA survey of software testing
A survey of software testingTao He
 
Software testing q as collection by ravi
Software testing q as   collection by raviSoftware testing q as   collection by ravi
Software testing q as collection by raviRavindranath Tagore
 
Chapter 2 - White Box Test Techniques
Chapter 2 - White Box Test TechniquesChapter 2 - White Box Test Techniques
Chapter 2 - White Box Test TechniquesNeeraj Kumar Singh
 
12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluating12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluatingMike Cusack
 
01 software test engineering (manual testing)
01 software test engineering (manual testing)01 software test engineering (manual testing)
01 software test engineering (manual testing)Siddireddy Balu
 
Importance of Testing in SDLC
Importance of Testing in SDLCImportance of Testing in SDLC
Importance of Testing in SDLCIJEACS
 
Software Testing and Quality Assurance Assignment 2
Software Testing and Quality Assurance Assignment 2Software Testing and Quality Assurance Assignment 2
Software Testing and Quality Assurance Assignment 2Gurpreet singh
 
Object Oriented Analysis
Object Oriented AnalysisObject Oriented Analysis
Object Oriented AnalysisAMITJain879
 
Chapter 7 software reliability
Chapter 7 software reliabilityChapter 7 software reliability
Chapter 7 software reliabilitydespicable me
 
Research Activities: past, present, and future.
Research Activities: past, present, and future.Research Activities: past, present, and future.
Research Activities: past, present, and future.Marco Torchiano
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliabilityranapoonam1
 
Manuel testing word
Manuel testing wordManuel testing word
Manuel testing wordVijay R
 

What's hot (16)

A survey of software testing
A survey of software testingA survey of software testing
A survey of software testing
 
C41041120
C41041120C41041120
C41041120
 
Software testing q as collection by ravi
Software testing q as   collection by raviSoftware testing q as   collection by ravi
Software testing q as collection by ravi
 
Chapter 2 - White Box Test Techniques
Chapter 2 - White Box Test TechniquesChapter 2 - White Box Test Techniques
Chapter 2 - White Box Test Techniques
 
12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluating12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluating
 
01 software test engineering (manual testing)
01 software test engineering (manual testing)01 software test engineering (manual testing)
01 software test engineering (manual testing)
 
Importance of Testing in SDLC
Importance of Testing in SDLCImportance of Testing in SDLC
Importance of Testing in SDLC
 
Software Testing and Quality Assurance Assignment 2
Software Testing and Quality Assurance Assignment 2Software Testing and Quality Assurance Assignment 2
Software Testing and Quality Assurance Assignment 2
 
Object Oriented Analysis
Object Oriented AnalysisObject Oriented Analysis
Object Oriented Analysis
 
Chapter 2 - Test Management
Chapter 2 - Test ManagementChapter 2 - Test Management
Chapter 2 - Test Management
 
Chapter 7 software reliability
Chapter 7 software reliabilityChapter 7 software reliability
Chapter 7 software reliability
 
Research Activities: past, present, and future.
Research Activities: past, present, and future.Research Activities: past, present, and future.
Research Activities: past, present, and future.
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Test design techniques
Test design techniquesTest design techniques
Test design techniques
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 
Manuel testing word
Manuel testing wordManuel testing word
Manuel testing word
 

Viewers also liked

156 Tache References 18th February 2010 Middlesbrough
156 Tache References   18th February 2010 Middlesbrough156 Tache References   18th February 2010 Middlesbrough
156 Tache References 18th February 2010 MiddlesbroughMark Adams
 
Twitter Social Anthropology 2 (Unfinished)
Twitter Social Anthropology 2 (Unfinished)Twitter Social Anthropology 2 (Unfinished)
Twitter Social Anthropology 2 (Unfinished)Mark Adams
 
What can Social Anthropology contribute to the field of Medical Anthropology?...
What can Social Anthropology contribute to the field of Medical Anthropology?...What can Social Anthropology contribute to the field of Medical Anthropology?...
What can Social Anthropology contribute to the field of Medical Anthropology?...Rielo Institute for Integral Development
 
Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...
Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...
Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...theholongroup
 

Viewers also liked (6)

156 Tache References 18th February 2010 Middlesbrough
156 Tache References   18th February 2010 Middlesbrough156 Tache References   18th February 2010 Middlesbrough
156 Tache References 18th February 2010 Middlesbrough
 
Twitter Social Anthropology 2 (Unfinished)
Twitter Social Anthropology 2 (Unfinished)Twitter Social Anthropology 2 (Unfinished)
Twitter Social Anthropology 2 (Unfinished)
 
What can Social Anthropology contribute to the field of Medical Anthropology?...
What can Social Anthropology contribute to the field of Medical Anthropology?...What can Social Anthropology contribute to the field of Medical Anthropology?...
What can Social Anthropology contribute to the field of Medical Anthropology?...
 
Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...
Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...
Cyborg Camp YVR 2013: Amber Case: “From Solid to Liquid to Air: Cyborg Anthro...
 
Digital Libraries of the Future
Digital Libraries of the Future
Digital Libraries of the Future
Digital Libraries of the Future
 
The Future of Library and Information Science Education: A Global Perspective...
The Future of Library and Information Science Education: A Global Perspective...The Future of Library and Information Science Education: A Global Perspective...
The Future of Library and Information Science Education: A Global Perspective...
 

Similar to International Journal of Engineering Research and Development (IJERD)

TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTTEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTijfcstjournal
 
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTTEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTijfcstjournal
 
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTTEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTijfcstjournal
 
Configuration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case PrioritizationConfiguration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case Prioritizationijsrd.com
 
Regression Optimizer
Regression OptimizerRegression Optimizer
Regression OptimizerShradha Singh
 
Object Oriented Testing
Object Oriented TestingObject Oriented Testing
Object Oriented TestingAMITJain879
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyCSEIJJournal
 
A Productive Method for Improving Test Effectiveness
A Productive Method for Improving Test EffectivenessA Productive Method for Improving Test Effectiveness
A Productive Method for Improving Test EffectivenessShradha Singh
 
A NOVEL APPROACH FOR TEST CASEPRIORITIZATION
A NOVEL APPROACH FOR TEST CASEPRIORITIZATIONA NOVEL APPROACH FOR TEST CASEPRIORITIZATION
A NOVEL APPROACH FOR TEST CASEPRIORITIZATIONIJCSEA Journal
 
Effectiveness of test case
Effectiveness of test caseEffectiveness of test case
Effectiveness of test caseijseajournal
 
object oriented system analysis and design
object oriented system analysis and designobject oriented system analysis and design
object oriented system analysis and designwekineheshete
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)KMS Technology
 
Principles and Goals of Software Testing
Principles and Goals of Software Testing Principles and Goals of Software Testing
Principles and Goals of Software Testing INFOGAIN PUBLICATION
 
Some Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingSome Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingKumari Warsha Goel
 

Similar to International Journal of Engineering Research and Development (IJERD) (20)

TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTTEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
 
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTTEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
 
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TESTTEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
TEST CASE PRIORITIZATION FOR OPTIMIZING A REGRESSION TEST
 
Configuration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case PrioritizationConfiguration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case Prioritization
 
Regression Optimizer
Regression OptimizerRegression Optimizer
Regression Optimizer
 
Object Oriented Testing
Object Oriented TestingObject Oriented Testing
Object Oriented Testing
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
 
A Productive Method for Improving Test Effectiveness
A Productive Method for Improving Test EffectivenessA Productive Method for Improving Test Effectiveness
A Productive Method for Improving Test Effectiveness
 
A NOVEL APPROACH FOR TEST CASEPRIORITIZATION
A NOVEL APPROACH FOR TEST CASEPRIORITIZATIONA NOVEL APPROACH FOR TEST CASEPRIORITIZATION
A NOVEL APPROACH FOR TEST CASEPRIORITIZATION
 
Effectiveness of test case
Effectiveness of test caseEffectiveness of test case
Effectiveness of test case
 
object oriented system analysis and design
object oriented system analysis and designobject oriented system analysis and design
object oriented system analysis and design
 
programming testing.pdf
programming testing.pdfprogramming testing.pdf
programming testing.pdf
 
programming testing.pdf
programming testing.pdfprogramming testing.pdf
programming testing.pdf
 
programming testing.pdf
programming testing.pdfprogramming testing.pdf
programming testing.pdf
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)
 
Testing
Testing Testing
Testing
 
Principles and Goals of Software Testing
Principles and Goals of Software Testing Principles and Goals of Software Testing
Principles and Goals of Software Testing
 
Some Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingSome Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software Testing
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Software testing
Software testingSoftware testing
Software testing
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 3 (May 2013), PP. 59-62 59 Test Case Prioritization Using Genetic Algorithm Ms.Kirandeep Kaur1 , Mr.Vinay Chopra2 1 (CSE, KCCEIT, Nawanshahrr /PTU, INDIA) 2 (CSE, DAVIET, Jalandhar /PTU, INDIA) Abstract: Test case prioritization is one of the techniques used to reduce the rate of fault detection. Test case prioritization techniques help engineers execute regression tests in an order that achieves testing objectives earlier in the testing process. Test case prioritization techniques schedule test cases for execution in an order that attempts to increase their effectiveness at meeting some performance goal. Various goals are possible; one involves rate of fault detection. Rate of fault detection measure of how quickly faults are detected within the testing process. Keywords: Testing, Regression Testing, Test case prioritization, Genetic Algorithm. I. INTRODUCTION Testing is an important engineering activity responsible for a significant portion of the costs of developing and maintaining software. Testing is the process of analyzing a software item to detect the differences between existing and required conditions (that is defects/errors/bugs) and to evaluate the features of the software item. Testing software is operating the software under controlled conditions: 1. To verify that it behaves “as specified”, 2. To detect errors, and 3. To validate that what has been specified is what the user actually wanted. In general, however, testing techniques are heuristics and their performance varies with different scenarios; thus, they must be studied empirically. II. TESTING LEVELS BASED ON SOFTWARE ACTIVITY Tests can be derived from requirements and specifications, design artifacts, or the source code. A different level of testing accompanies each distinct software development activity: Fig 1: Software development activities and testing levels Fig 1 illustrates a typical scenario for testing levels and how they relate to software development activities by isolating each step. 1. Acceptance Testing – access software with respect to requirements. The requirements analysis phase of software development captures the customer’s needs. Acceptance testing is designed to determine whether the completed software in fact meets these needs. In other words, acceptance testing probes whether the software does what the users want. Acceptance testing must involve users or other individuals who have strong domain knowledge. 2. System Testing – access software with respect to architectural design. The architectural design phase of software development chooses components and connectors that together realize a system whose specification is intended to meet the previously identified requirements. System testing is designed to determine whether the assembled system meets its specifications. It assumes that the pieces work individually, and asks if the system works as a whole. 3. Integration Testing – access software with respect to subsystem design. The subsystem design phase of software development specifies the structure and behavior of subsystems, each of which is intended to
  • 2. Test Case Prioritization Using Genetic Algorithm 60 satisfy some function in the overall architecture. Often, the subsystems are adaptations of previously developed software. Integration testing is designed to assess whether the interfaces between modules in a given subsystem have consistent assumptions and communicate correctly. Integration testing must assume that modules work correctly. 4. Module Testing – access software with respect to detailed design. The detailed design phase of software development determines the structure and behavior of individual modules. A program unit, or procedure, is one or more contiguous program statements, with a name that other parts of the software use to call it. Module testing is designed to assess individual modules in isolation, including how the component units interact with each other and their associated data structures. 5. Unit Testing – access software with respect to implementation. III. REGRESSION TESTING Regression testing is an expensive testing process used to validate modified software and detect whether new faults have been introduced into previously tested code. One goal of prioritization is to increase a test suite's rate of fault detection. To reduce the cost of regression testing, software testers may prioritize their test cases so that those which are more important, by some measure, are run earlier in the regression testing process. There are following Methods of Regression Testing: Table 1: Methods of Regression Testing Methods Descriptions Retest all All the tests in the existing test suite should be re-executed. This is very expensive as it requires huge time & resources. Regression test selection Re-executing the entire test suite, it is better to select part of test suite to be run. Test cases selected can be categorized as:  Reusable Test Case: It can be used in succeeding regression cycles.  Obsolete Test Case: It can’t be used in succeeding regression cycles. Test case prioritization (TCP) Selection of the Test Cases based on priority will greatly reduce the regression test suite. IV. TEST CASE PRIORITIZATION (TCP) Test case prioritization techniques schedule test cases for execution in an order that attempts to increase their effectiveness at meeting some performance goal. Various goals are possible; one involves rate of fault detection. Rate of fault detection measure of how quickly faults are detected within the testing process. An improved rate of fault detection during testing can provide faster feedback on the system under test. Each test cases are assigned a priority. Priority is set according to some criteria like Early Fault detection, Execution time, etc. The effectiveness of any system is calculated on the basis of fault detection when software evolves. An improved fault detection during testing can provide faster feedback on the system under test. Test case prioritization is one of the techniques used to reduce the fault detection. There are following Prioritization Factors: Table 2: Prioritization Factors S.NO PRIORITIZTION FACTORS 1 Customer-Assigned Priority (CP): It is the measurement of importance to the customer’s need. Customer’s need vary from 1 to 10 and assigned by customer itself. Where 10 is used to identify the highest customer priority. 2 Implementation complexity (IC): No. of faults increases as the requirement is become high in implementation complexity. Value from 0 to 10 assigned by the developer on the basis of its application complexity and by using larger value higher complexity is denoted. 3 Changes in Requirements (RC): The no. of times of requirement has been changed with respect to when the requirement was first introduced. It also ranges from 1 to 10. Formula is: Ri= (M/N)*10 Where i= No. of changes for any requirements. Ri=Change in requirements. M=No. of times ith requirement change. N=Max. no. of requirement. 4 Fault Impact of Requirements (FI): Development team to identify the requirement which has had customer reported failures. The developer can use the previous data to reduce the fault
  • 3. Test Case Prioritization Using Genetic Algorithm 61 impact. 5 Traceability (TR): Traceability calculates the mapping that exists between requirements and test. It helps in determining whether a requirement is enough tested is difficult for the testers if the test cases are not relevant to particular requirements. A problem which is very common is insufficiency of traceability. If traceability is not good or poor that may cause project over runs and failures. 6 Execution Time (ET): Execution time of the test case as cost of test case. Test case costs should have a large impact on the TCP. In terms of test case cost, It can be relate to the resources, such as execution time of test case, Hardware costs or even engineers salaries. In our case, test case cost is the execution time of test case. V. TEST CASE PRIORITIZTION TECHNIQUES There are following TCP techniques : 1. No prioritization: No prioritization tests in test suite. It is simply the application of no technique apply. 2. Random Prioritization: A test case is selected randomly for execution. 3. Optimal Prioritization: A test case which determines maximum new faults is executed first. 4. Code-coverage based prioritization: It covers maximum functions, classes or code fragments of software program within minimum time have highest priority in the prioritize test suite. If multiple test cases cover the same number of functions, orders these randomly. 5. Mutation based prioritization: It is based on the fault-based technique. A mutant of statement is generated (automatically) by randomly changing the statement. VI. GENETIC ALGORITHMS G A are inspired by Darwin’s theory about evolution. Simply said, a solution to a problem solve by G A is evolved. Each individual is represented by a sequence of variables/parameters (called genes), known as the chromosome. The chromosome encodes a possible solution to a given problem. The encoding can take many forms, for example, binary, real-valued, or character-based. 1. Selection: A selection depending on the fitness value decides which individuals are to be used as the “parents” for producing the next generation. 2. Crossover: Crossover is a genetic operator that combines two individuals (the parents) to produce a new individual (the offspring). 3. Mutation: After a crossover is performed, Mutation take place. This is to prevent falling all solutions in population into a local optimum of a solved problem. Mutation changes randomly the new individual. Table 3: Advantages & limitations of Genetic Algorithms ADVANTAGES OF GENETIC ALGORITHMS LIMITATIONS OF GENETIC ALGORITHMS 1. It solve every optimization problem 1. They find a solution to evolution. 2. Solve problem with multiple solution. 2. A better solution is only in comparison to other solutions. VII. CONCLUSION In Previous studies have shown that several prioritization techniques can significantly improve rate of fault detection. But we have shown that the effectiveness of these techniques varies considerably across various attributes of the program, test suites, and modifications being considered. This variation makes it difficult for a practitioner to choose an appropriate prioritization technique for a given testing scenario. The prioritization techniques also include coverage and change attributes but it is observed that engineers choosing to prioritize for both coverage and change attributes may actually achieve poorer rates of fault detection. REFERENCESS [1]. G. Rothermel, R.H. Untch, C. Chu, & M. J Harrold, “Test Case Prioritization: An Empirical Study”, Proceedings of the International Conference on Software Maintenance, Oxford, UK, IEEE, Vol. 20, Issue no. 6, pp: 1-10, 1999. [2]. Praveen Ranjan Srivastava, “Test Case Prioritization”, Journal of Theoretical and Applied Information Technology, pp: 178-181, 2008. [3]. P. Ammann, P. E. Black, and W. Ding, “Model Checkers in Software Testing Technical report”, National Institute of Standards and Technology, 2002.
  • 4. Test Case Prioritization Using Genetic Algorithm 62 [4]. Sebastian Elbaum,¤ Gregg Rothermel,y Satya Kanduri,z Alexey G. Malishevsky, “Selecting a Cost- Effective Test Case Prioritization Technique”, pp: 1-26, 2004. [5]. Sujata, Mohit Kumar, Dr. Varun Kumar, “Requirements based Test Case Prioritization using Genetic Algorithm”, IJCST Vol. 1, Issue 2, pp: 189-191, 2010. [6]. Ruchika Malhotra, Arvinder Kaur and Yogesh Singh, "A Regression Test Selection and Prioritization Technique," Journal of Information Processing Systems, Vol.6, No.2, pp.235- 252, Jun 2010. [7]. Peter M. Kruse1 and Kiran Lakhotia2, “Multi Objective Algorithms for Automated Generation of Combinatorial Test Cases with the Classification Tree Method”, pp: 1-6, 2011. [8]. Chhabi Rani,Rajibb mall, “Test Case Prioritization of object-oriented programs”, Setlabs briefings, Vol.9, No.4, pp. 31-40, 2011. [9]. S. Raju, G. V. Uma, “Factors Oriented Test Case Prioritization Technique in Regression Testing using Genetic Algorithm”, European Journal of Scientific Research, ISSN 1450-216X, Vol.74, No.3, pp. 389-402, 2012. [10]. Miso Yoon, Eunyoung Lee, Mikyoung Song, Byoungju Choi, “A Test Case Prioritization through Correlation of Requirement and Risk”, Journal of Software Engineering and Applications, Vol. 5, 823-835, 2012. [11]. Prem Parashar, Arvind Kalia, Rajesh Bhatia, “How Time-Fault Ratio helps in Test Case Prioritization for Regression Testing”, Int.J. of Software Engineering, IJSE Vol.5 No.2, pp: 25-35, 2012. [12]. E. Ashraf, A. Rauf, and K. Mahmood, “Value based Regression Test Case Prioritization”, Proceedings of the World Congress on Engineering and Computer Science, ISBN: 978-988-19251-6-9, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online), Vol. 1, 2012.