SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1799
Abstract— The quality of product and services has become
one of the most important factors that influence national and
international business , Software Quality Assurance (SQA)
is an integral part of the software development process; with
the rapid technology and development in software
application, we must enhance the quality of product; and
with the rapid development in interaction between the
customers and web service and the technological challenges
in the quality provided , we proposed new model to achieve
Software Quality in Web Application and the model divide
into three parts, the first part: server side, second part: Client
side and the third part :Server side intersection Client side
and there party factors helps to enhance SQA .
Key words: Software Quality Assurance, Web Service,
Server side, Client side, Quality Factors, customers
I. INTRODUCTION
Every application or business domain faces a specific set of
software quality issues and software quality must be defined
accordingly. It is important for each software development
project to define its specific meaning of software quality
during the planning phase. Such a definition contributes to
the basis for setting objectives and practical measures of
quality progress and determination of readiness for release
to customers [1].
Software Quality Assurance (SQA) is a planned
and systematic approach to ensure that software processes
and product and products confirms to the goals of SQA are
to improve software quality by appropriately monitoring
both software and the development process the ensure full
compliance with the established standards and
procedures[2]. The software quality assurance must be used
to make a balance between quality and productivity [3].
Quality improvements affect operations
performance in various ways, such as increasing revenue,
reducing costs and improving productivity. Quality has been
regarded as one of the major drivers of competitive strategy
in every industry [4].
II. RELATED WORKS
There are more and more research interests in software
quality assurance because it’s very important in software
product. Many researchers have developed different quality
frameworks. For example, Garvin [4] developed a quality
framework considering an eight dimension product quality
and Parasuraman et al. [5]
Capability Maturity Model Integration (CMMI)
was developed by the software Engineering Institute of
Carnegie- Mellon University under the sponsorship of the
US department of defence. Beginning with the Capability
Maturity Model of Software (SW-CMM) and now
continuing with the Capability Maturity Model International
(CMMI) framework < software development organization
have achieved significant gain in their ability to develop and
deliver system with predictable results [6].
ISO/IEC 90003:2004 International Organization
for Standardization (ISO) is the world’s largest developer
for standards. It was set up in 1947 and is located in Geneva,
Switzerland. The International Standard which ISO develops
are very useful because they contribute to making the
development, manufacturing and supply of products and
services more efficient, safer and cleaner, the leading global
organization that prepares and publishes international
standard for all electronic, electronic and related
technologies. It was set up in 1906 and is also located in
Geneva, Switzerland. Both standards organization are
supported by national member bodies. These member bodies
participate in the standards writing process through technical
committees [7, 8 and 9].
III. MODEL TO PROVIDE SQA
Software Testing involves operating a system, or an
application, under controlled conditions, and evaluating the
results. In most cases, software testing will involve the
development of a test bed, which tests the given software,
upon a set of test cases. The test bed will feed the test input
to the software system, get the result that’s generated by the
software system, and compares the generated result with the
expected result. If the generated result is same as the
expected result, then the software is bug free else, it has
bugs that need to be fixed.
Fig. 1: Model SQA in Website
Here we propose a model that helps to maintain
and improve the quality and required, The SQA in website
the operation is very complex, including Provisions to
achieve quality assurance, especially because of their
specificity for the software and that was the rapid
development of sites should we have to strengthen the
New Model to Achieve Software Quality Assurance (SQA) in Web
Application
Suyash Raizada1
Dr. Manju Kaushik2
1
M. Tech (Software Engineering) 2
Associate Professor
1, 2
Computer Science and Engineering
1, 2
JECRC, University Jaipur, India
New Model to Achieve Software Quality Assurance (SQA) in Web Application
(IJSRD/Vol. 1/Issue 9/2013/0028)
All rights reserved by www.ijsrd.com 1800
quality of their competition and also to maintain the service
provided by this site, We sure this model is a enhancing and
help to saving the Quality Assurance in Website in work
between the provider and customers in the same, the model
less than from the critical stages in life cycle of the website
the services so all parties of the model is very important
client side , server side and server side intersection client
side to achieving the Quality Assurance and to achieve this
there are a total of the requirements necessary to achieve the
desired goal of quality assurance in the locations as in
Figure 1.
A. Server Side Factors
Server side operations are concerned with the sending of the
web page data from the server to the web page visitor’s
browser. In the case of Static Web Pages the data is simply
served immediately upon request for the data from the
visitor’s browser. If the requested page is a Dynamic Web
Page then any pre-processing of the page is carried out and
the output is then served to the visitor.
1) Testability:
Testability requirements for the ease of testing are related to
special features in the programs that help the tester, for
instance by providing predefined intermediate results and
log files. The goal of increasing the testability of software is
not just to detect defects but more importantly, to detect
defects as soon as they are introduced. Thus, reducing the
cost and time to fix the bug and producing higher quality
software each build of the release it is important to be able
to verify every requirement, both explicitly stated and
simply expected. Testability means the ability to verify
requirements.
2) Flexibility:
The ease with which a system or component can be
modified for use in applications or environments other than
those for which it was specifically designed. Flexibility
normally refers to the ability for the solution adapt to
possible or future changes in its requirements. When you
design or build a solution you should try to cater for these
changes which inevitably arrive in the future.
3) Reliability:
Reliability requirements deal with failures to provide
service, they determine the maximum allowed software
system failure rate, and can refer to the entire system or to
one or more of its separate functions. Reliability tests
measure the ability of the system to keep operating for a
long time without developing failures.
4) Maintainability:
The Capability of the software product to be modified.
Modifications may include corrections, improvements or
adaptation of the software to changes in environment, And
in requirements and functional specifications.
5) Re-usability:
Reusability requirements deal with the use of software
modules originally designed for one project in a new
Software project currently being developed.
B. Client side Factors:
Client side operations are performed on the visitor’s
computer by the users Internet browser to display the web
page as the data is received from the server.
1) Portability:
Portability requirements tend to the adaptation of a software
system to other environments consisting of different
hardware, different operating systems, requirements make it
possible to continue using the same basic software in diverse
hardware and operating systems and designed and
programmed to any explorer in display our web site in the
same size because some explorer have different structure
and features
2) Usability:
Usability is easy to use the Software must be usable, without
undue effort, by the type of user for whom it is designed.
This means that it should have an appropriate user interface
and adequate documentation.
3) Privacy:
Privacy requirements specify how data privacy is to be
maintained, As the Web provides many mechanisms to
interlink data across systems, and it is important that it keeps
the possibility for users that want or need it, to keep their
personal information private and fragmented.
4) Standard Design:
Web Design and Applications involve the standards for
building and Rendering Web pages, including HTML, CSS,
SVG, device APIs, and other technologies for Web
applications (“WebApps”). This section also includes
information on how to make pages accessible to people with
disabilities (WCAG), to internationalize them, and make
them work on mobile devices.
5) Correctness:
Correctness requirements are defined in a list of the software
system’s required outputs and the output is very important
for costumer and users because the data must be clear and
newest at the time 24/24.
C. Server side Intersection Client side Factors:
That the same grouping between the server side and client
side factors to enhance the quality assurance web site and
that is very important to help into the find quality assurance.
1) Security:
Security is today a relevant requirement for any distributed
application, and in particular for these enabled by the Web
such as firewall for anti-denial service and antivirus server,
to protect from any attack and encryption server with, the
important data and use certification security such as SSL to
Enhance the data security and anti-break of service.
2) Efficiency:
Efficiency requirements deal with the hardware resources
needed to perform all the functions of the software system in
conformance to all other requirements and the bandwidth in
transfer the data between the server and client and the Speed
up in line internet connection must be high speed.
3) Integrity:
Integrity requirements deal with the software system
security; it is the requirement that data and process be
protected from unauthorized modification.
4) Ethics:
Important factors in quality is the ethics that the website
does not attack a religious community or geographical areas
or working on the immorality and corruption and encourage
hatred between human beings and of the regions cannot be
there the quality of the content provided through this site
versa must be served Services serve the human way or
New Model to Achieve Software Quality Assurance (SQA) in Web Application
(IJSRD/Vol. 1/Issue 9/2013/0028)
All rights reserved by www.ijsrd.com 1801
optimal content helps to be fraudulent to users and we must
be mindful of our ethics offices with all segments of society
and his message to be Semitic, and that does not use user
information to expose their affairs. And the developers and
user are having the same Responsibility.
IV. RESULTS AND VISION FOR MODEL
We sure the model is enhancing and will help to save the
Quality Assurance in Website in work between the provider
and customers in the same, the model less than from the
critical stage in life cycle the services so all parties of the
model is very important client side, server side and server
side intersection client side to achieving the Quality
Assurance.
V. CONCLUSION
In this paper, we have tried to solve and add some
new model to support the Website Quality Assurance
because day by day, all users are ready to use the website
and all applications converts the windows applications to
Web Application and we must enhance the Quality
Assurance in the party of website from the Server Side and
Client Side and the factors influencing both and we must to
saving into website in all factors and in future work I like to
create mode to check up that all factors in our model, to
make sure that the factors work in true way .
REFERENCES
[1] Lazic L., Kolasinac A., Avdic D., “The Software
Quality Economics Model for Software Project
Optimization”, WSEAS Transaction on Computers,
Issue 1, Vol. 8, January 2009.
[2] NASA Software Quality Assurance Centre Software
Assurance Guidebook_NASA-GB_A201, 1989
[3] Liao H., Enke D., and Wiedbe H., “An Expert
Advisory System for ISO 9001 Quality System,”
Expert System with Application, vol. 27, pp. 313-
322, 2004.
[4] Li H., Meissner J., “Improving Quality in Business
Process Outsourcing through Technology”, 2008.
[5] Garvin A., “Competing on the Eight dimensions of
Quality” Harvard Business Review Nov-Dec 101–
109, 1987.
[6] Carnegie Mellon University Software Engineering
Institute, CMMI overview Pittsburgh, USA, 2005.
[7] IEC, About the IEC,
http://www.ies.ch/about/mission-e.html,2006
[8] ISO, ISO/IEC 9003:2004: Software Engineering
Guideline for the Application for ISO 9001:2000 to
Computer Software, ISO press, 2004.
[9] ISO, Overview of the ISO,
http://www.iso.org/iso/en/aboutiso/introduaction/inde
x.html,2006.

More Related Content

What's hot

Software quality
Software qualitySoftware quality
Software qualitySantu Kumar
 
Ch 1 the software quality assurance challange
Ch 1 the software quality assurance challangeCh 1 the software quality assurance challange
Ch 1 the software quality assurance challangeKittitouch Suteeca
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality FactorsUsman Khan
 
A comparative studies of software quality model for the software product eval...
A comparative studies of software quality model for the software product eval...A comparative studies of software quality model for the software product eval...
A comparative studies of software quality model for the software product eval...imdurgesh
 
Software evaluation competency, criteria, quality
Software evaluation    competency, criteria, qualitySoftware evaluation    competency, criteria, quality
Software evaluation competency, criteria, qualityvasishta bhargava
 
Software Quality Assurance class 1
Software Quality Assurance  class 1Software Quality Assurance  class 1
Software Quality Assurance class 1Santhiya Grace
 
Lect1 fault+quality
Lect1 fault+qualityLect1 fault+quality
Lect1 fault+qualitybabak sh
 
Ch 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleCh 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleKittitouch Suteeca
 
McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance sundas Shabbir
 
DESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkDESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkIJERA Editor
 
Enhancing Software Quality Using Agile Techniques
Enhancing Software Quality Using Agile TechniquesEnhancing Software Quality Using Agile Techniques
Enhancing Software Quality Using Agile TechniquesIOSR Journals
 
Sdd Maintenance Of Software Solutions
Sdd Maintenance Of Software SolutionsSdd Maintenance Of Software Solutions
Sdd Maintenance Of Software Solutionsgavhays
 
Enabling Continuous Quality in Mobile App Development
Enabling Continuous Quality in Mobile App DevelopmentEnabling Continuous Quality in Mobile App Development
Enabling Continuous Quality in Mobile App DevelopmentMatthew Young
 
Software Quality Management
Software Quality ManagementSoftware Quality Management
Software Quality ManagementKrishna Sujeer
 
Software Quality Models: A Comparative Study paper
Software Quality Models: A Comparative Study  paperSoftware Quality Models: A Comparative Study  paper
Software Quality Models: A Comparative Study paperMoutasm Tamimi
 
Software quality requirements_and_evaluation
Software quality requirements_and_evaluationSoftware quality requirements_and_evaluation
Software quality requirements_and_evaluationlathioniuiu1512
 

What's hot (20)

Software quality
Software qualitySoftware quality
Software quality
 
Ch 1 the software quality assurance challange
Ch 1 the software quality assurance challangeCh 1 the software quality assurance challange
Ch 1 the software quality assurance challange
 
McCall's Quality Factors
McCall's Quality FactorsMcCall's Quality Factors
McCall's Quality Factors
 
A comparative studies of software quality model for the software product eval...
A comparative studies of software quality model for the software product eval...A comparative studies of software quality model for the software product eval...
A comparative studies of software quality model for the software product eval...
 
Software evaluation competency, criteria, quality
Software evaluation    competency, criteria, qualitySoftware evaluation    competency, criteria, quality
Software evaluation competency, criteria, quality
 
Software Quality Assurance class 1
Software Quality Assurance  class 1Software Quality Assurance  class 1
Software Quality Assurance class 1
 
Lect1 fault+quality
Lect1 fault+qualityLect1 fault+quality
Lect1 fault+quality
 
Ch 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleCh 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycle
 
McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance McCall Software Quality Model in Software Quality Assurance
McCall Software Quality Model in Software Quality Assurance
 
Customizing iso 9126 quality model for evaluation of b2 b applications
Customizing iso 9126 quality model for evaluation of b2 b applicationsCustomizing iso 9126 quality model for evaluation of b2 b applications
Customizing iso 9126 quality model for evaluation of b2 b applications
 
DESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkDESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance Framework
 
Software quality management lecture notes
Software quality management lecture notesSoftware quality management lecture notes
Software quality management lecture notes
 
Enhancing Software Quality Using Agile Techniques
Enhancing Software Quality Using Agile TechniquesEnhancing Software Quality Using Agile Techniques
Enhancing Software Quality Using Agile Techniques
 
Sdd Maintenance Of Software Solutions
Sdd Maintenance Of Software SolutionsSdd Maintenance Of Software Solutions
Sdd Maintenance Of Software Solutions
 
Software quality
Software qualitySoftware quality
Software quality
 
Enabling Continuous Quality in Mobile App Development
Enabling Continuous Quality in Mobile App DevelopmentEnabling Continuous Quality in Mobile App Development
Enabling Continuous Quality in Mobile App Development
 
C0371019027
C0371019027C0371019027
C0371019027
 
Software Quality Management
Software Quality ManagementSoftware Quality Management
Software Quality Management
 
Software Quality Models: A Comparative Study paper
Software Quality Models: A Comparative Study  paperSoftware Quality Models: A Comparative Study  paper
Software Quality Models: A Comparative Study paper
 
Software quality requirements_and_evaluation
Software quality requirements_and_evaluationSoftware quality requirements_and_evaluation
Software quality requirements_and_evaluation
 

Viewers also liked

A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...
A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...
A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...ijsrd.com
 
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...ijsrd.com
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithmijsrd.com
 
erimental Investigation of Process Parameter on Tensile Strength of Selective...
erimental Investigation of Process Parameter on Tensile Strength of Selective...erimental Investigation of Process Parameter on Tensile Strength of Selective...
erimental Investigation of Process Parameter on Tensile Strength of Selective...ijsrd.com
 
GIS Based Power Distribution System: A Case study for the Junagadh City
GIS Based Power Distribution System: A Case study for the Junagadh CityGIS Based Power Distribution System: A Case study for the Junagadh City
GIS Based Power Distribution System: A Case study for the Junagadh Cityijsrd.com
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Incremental Discretization for Naive Bayes Learning using FIFFD
Incremental Discretization for Naive Bayes Learning using FIFFDIncremental Discretization for Naive Bayes Learning using FIFFD
Incremental Discretization for Naive Bayes Learning using FIFFDijsrd.com
 
Analysis on a Waveguide Mode Converter
Analysis on a Waveguide Mode ConverterAnalysis on a Waveguide Mode Converter
Analysis on a Waveguide Mode Converterijsrd.com
 
Myoelectric Leg for Transfemoral Amputee
Myoelectric Leg for Transfemoral AmputeeMyoelectric Leg for Transfemoral Amputee
Myoelectric Leg for Transfemoral Amputeeijsrd.com
 
Hand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in HardwareHand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in Hardwareijsrd.com
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection Systemijsrd.com
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
 
Design and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated MultiplierDesign and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated Multiplierijsrd.com
 
Study of Grout Mix Design Using to Admixture
Study of Grout Mix Design Using to AdmixtureStudy of Grout Mix Design Using to Admixture
Study of Grout Mix Design Using to Admixtureijsrd.com
 

Viewers also liked (14)

A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...
A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...
A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Alg...
 
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...
An Efficient Method for Detecting Impurity from Rice Mixture Using Digital Em...
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
 
erimental Investigation of Process Parameter on Tensile Strength of Selective...
erimental Investigation of Process Parameter on Tensile Strength of Selective...erimental Investigation of Process Parameter on Tensile Strength of Selective...
erimental Investigation of Process Parameter on Tensile Strength of Selective...
 
GIS Based Power Distribution System: A Case study for the Junagadh City
GIS Based Power Distribution System: A Case study for the Junagadh CityGIS Based Power Distribution System: A Case study for the Junagadh City
GIS Based Power Distribution System: A Case study for the Junagadh City
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Incremental Discretization for Naive Bayes Learning using FIFFD
Incremental Discretization for Naive Bayes Learning using FIFFDIncremental Discretization for Naive Bayes Learning using FIFFD
Incremental Discretization for Naive Bayes Learning using FIFFD
 
Analysis on a Waveguide Mode Converter
Analysis on a Waveguide Mode ConverterAnalysis on a Waveguide Mode Converter
Analysis on a Waveguide Mode Converter
 
Myoelectric Leg for Transfemoral Amputee
Myoelectric Leg for Transfemoral AmputeeMyoelectric Leg for Transfemoral Amputee
Myoelectric Leg for Transfemoral Amputee
 
Hand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in HardwareHand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in Hardware
 
New Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection SystemNew Fuzzy Logic Based Intrusion Detection System
New Fuzzy Logic Based Intrusion Detection System
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
Design and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated MultiplierDesign and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated Multiplier
 
Study of Grout Mix Design Using to Admixture
Study of Grout Mix Design Using to AdmixtureStudy of Grout Mix Design Using to Admixture
Study of Grout Mix Design Using to Admixture
 

Similar to New Model to Achieve Software Quality Assurance (SQA) in Web Application

Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
 
Ensuring Effective Performance Testing in Web Applications.pdf
Ensuring Effective Performance Testing in Web Applications.pdfEnsuring Effective Performance Testing in Web Applications.pdf
Ensuring Effective Performance Testing in Web Applications.pdfkalichargn70th171
 
BOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdf
BOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdfBOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdf
BOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdfasiyahanif9977
 
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...IRJET Journal
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineeringsmumbahelp
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
How to Build Software from Scratch in 5 Simple Steps.pdf
How to Build Software from Scratch in 5 Simple Steps.pdfHow to Build Software from Scratch in 5 Simple Steps.pdf
How to Build Software from Scratch in 5 Simple Steps.pdfBaek Yongsun
 
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...kalichargn70th171
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET Journal
 
Unit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdfUnit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdfshreyaporekar9
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project PlanEng-Mohammad
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
A STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONS
A STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONSA STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONS
A STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONSecij
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesIRJET Journal
 
Term Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentTerm Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentSharad Srivastava
 
Softweare Engieering
Softweare Engieering Softweare Engieering
Softweare Engieering Huda Alameen
 

Similar to New Model to Achieve Software Quality Assurance (SQA) in Web Application (20)

Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
Ensuring Effective Performance Testing in Web Applications.pdf
Ensuring Effective Performance Testing in Web Applications.pdfEnsuring Effective Performance Testing in Web Applications.pdf
Ensuring Effective Performance Testing in Web Applications.pdf
 
BOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdf
BOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdfBOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdf
BOOST YOUR WEBSITE WITH TOP STRATEGIES TOOLS FOR WEB APP TESTING.pdf
 
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
M017548895
M017548895M017548895
M017548895
 
How to Build Software from Scratch in 5 Simple Steps.pdf
How to Build Software from Scratch in 5 Simple Steps.pdfHow to Build Software from Scratch in 5 Simple Steps.pdf
How to Build Software from Scratch in 5 Simple Steps.pdf
 
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
 
Unit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdfUnit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdf
 
Apq Qms Project Plan
Apq Qms Project PlanApq Qms Project Plan
Apq Qms Project Plan
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Web Testing
Web TestingWeb Testing
Web Testing
 
A STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONS
A STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONSA STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONS
A STUDY OF FORMULATION OF SOFTWARE TEST METRICS FOR INTERNET BASED APPLICATIONS
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
 
Term Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentTerm Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software Development
 
Softweare Engieering
Softweare Engieering Softweare Engieering
Softweare Engieering
 
Se lec 3
Se lec 3Se lec 3
Se lec 3
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

New Model to Achieve Software Quality Assurance (SQA) in Web Application

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1799 Abstract— The quality of product and services has become one of the most important factors that influence national and international business , Software Quality Assurance (SQA) is an integral part of the software development process; with the rapid technology and development in software application, we must enhance the quality of product; and with the rapid development in interaction between the customers and web service and the technological challenges in the quality provided , we proposed new model to achieve Software Quality in Web Application and the model divide into three parts, the first part: server side, second part: Client side and the third part :Server side intersection Client side and there party factors helps to enhance SQA . Key words: Software Quality Assurance, Web Service, Server side, Client side, Quality Factors, customers I. INTRODUCTION Every application or business domain faces a specific set of software quality issues and software quality must be defined accordingly. It is important for each software development project to define its specific meaning of software quality during the planning phase. Such a definition contributes to the basis for setting objectives and practical measures of quality progress and determination of readiness for release to customers [1]. Software Quality Assurance (SQA) is a planned and systematic approach to ensure that software processes and product and products confirms to the goals of SQA are to improve software quality by appropriately monitoring both software and the development process the ensure full compliance with the established standards and procedures[2]. The software quality assurance must be used to make a balance between quality and productivity [3]. Quality improvements affect operations performance in various ways, such as increasing revenue, reducing costs and improving productivity. Quality has been regarded as one of the major drivers of competitive strategy in every industry [4]. II. RELATED WORKS There are more and more research interests in software quality assurance because it’s very important in software product. Many researchers have developed different quality frameworks. For example, Garvin [4] developed a quality framework considering an eight dimension product quality and Parasuraman et al. [5] Capability Maturity Model Integration (CMMI) was developed by the software Engineering Institute of Carnegie- Mellon University under the sponsorship of the US department of defence. Beginning with the Capability Maturity Model of Software (SW-CMM) and now continuing with the Capability Maturity Model International (CMMI) framework < software development organization have achieved significant gain in their ability to develop and deliver system with predictable results [6]. ISO/IEC 90003:2004 International Organization for Standardization (ISO) is the world’s largest developer for standards. It was set up in 1947 and is located in Geneva, Switzerland. The International Standard which ISO develops are very useful because they contribute to making the development, manufacturing and supply of products and services more efficient, safer and cleaner, the leading global organization that prepares and publishes international standard for all electronic, electronic and related technologies. It was set up in 1906 and is also located in Geneva, Switzerland. Both standards organization are supported by national member bodies. These member bodies participate in the standards writing process through technical committees [7, 8 and 9]. III. MODEL TO PROVIDE SQA Software Testing involves operating a system, or an application, under controlled conditions, and evaluating the results. In most cases, software testing will involve the development of a test bed, which tests the given software, upon a set of test cases. The test bed will feed the test input to the software system, get the result that’s generated by the software system, and compares the generated result with the expected result. If the generated result is same as the expected result, then the software is bug free else, it has bugs that need to be fixed. Fig. 1: Model SQA in Website Here we propose a model that helps to maintain and improve the quality and required, The SQA in website the operation is very complex, including Provisions to achieve quality assurance, especially because of their specificity for the software and that was the rapid development of sites should we have to strengthen the New Model to Achieve Software Quality Assurance (SQA) in Web Application Suyash Raizada1 Dr. Manju Kaushik2 1 M. Tech (Software Engineering) 2 Associate Professor 1, 2 Computer Science and Engineering 1, 2 JECRC, University Jaipur, India
  • 2. New Model to Achieve Software Quality Assurance (SQA) in Web Application (IJSRD/Vol. 1/Issue 9/2013/0028) All rights reserved by www.ijsrd.com 1800 quality of their competition and also to maintain the service provided by this site, We sure this model is a enhancing and help to saving the Quality Assurance in Website in work between the provider and customers in the same, the model less than from the critical stages in life cycle of the website the services so all parties of the model is very important client side , server side and server side intersection client side to achieving the Quality Assurance and to achieve this there are a total of the requirements necessary to achieve the desired goal of quality assurance in the locations as in Figure 1. A. Server Side Factors Server side operations are concerned with the sending of the web page data from the server to the web page visitor’s browser. In the case of Static Web Pages the data is simply served immediately upon request for the data from the visitor’s browser. If the requested page is a Dynamic Web Page then any pre-processing of the page is carried out and the output is then served to the visitor. 1) Testability: Testability requirements for the ease of testing are related to special features in the programs that help the tester, for instance by providing predefined intermediate results and log files. The goal of increasing the testability of software is not just to detect defects but more importantly, to detect defects as soon as they are introduced. Thus, reducing the cost and time to fix the bug and producing higher quality software each build of the release it is important to be able to verify every requirement, both explicitly stated and simply expected. Testability means the ability to verify requirements. 2) Flexibility: The ease with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. Flexibility normally refers to the ability for the solution adapt to possible or future changes in its requirements. When you design or build a solution you should try to cater for these changes which inevitably arrive in the future. 3) Reliability: Reliability requirements deal with failures to provide service, they determine the maximum allowed software system failure rate, and can refer to the entire system or to one or more of its separate functions. Reliability tests measure the ability of the system to keep operating for a long time without developing failures. 4) Maintainability: The Capability of the software product to be modified. Modifications may include corrections, improvements or adaptation of the software to changes in environment, And in requirements and functional specifications. 5) Re-usability: Reusability requirements deal with the use of software modules originally designed for one project in a new Software project currently being developed. B. Client side Factors: Client side operations are performed on the visitor’s computer by the users Internet browser to display the web page as the data is received from the server. 1) Portability: Portability requirements tend to the adaptation of a software system to other environments consisting of different hardware, different operating systems, requirements make it possible to continue using the same basic software in diverse hardware and operating systems and designed and programmed to any explorer in display our web site in the same size because some explorer have different structure and features 2) Usability: Usability is easy to use the Software must be usable, without undue effort, by the type of user for whom it is designed. This means that it should have an appropriate user interface and adequate documentation. 3) Privacy: Privacy requirements specify how data privacy is to be maintained, As the Web provides many mechanisms to interlink data across systems, and it is important that it keeps the possibility for users that want or need it, to keep their personal information private and fragmented. 4) Standard Design: Web Design and Applications involve the standards for building and Rendering Web pages, including HTML, CSS, SVG, device APIs, and other technologies for Web applications (“WebApps”). This section also includes information on how to make pages accessible to people with disabilities (WCAG), to internationalize them, and make them work on mobile devices. 5) Correctness: Correctness requirements are defined in a list of the software system’s required outputs and the output is very important for costumer and users because the data must be clear and newest at the time 24/24. C. Server side Intersection Client side Factors: That the same grouping between the server side and client side factors to enhance the quality assurance web site and that is very important to help into the find quality assurance. 1) Security: Security is today a relevant requirement for any distributed application, and in particular for these enabled by the Web such as firewall for anti-denial service and antivirus server, to protect from any attack and encryption server with, the important data and use certification security such as SSL to Enhance the data security and anti-break of service. 2) Efficiency: Efficiency requirements deal with the hardware resources needed to perform all the functions of the software system in conformance to all other requirements and the bandwidth in transfer the data between the server and client and the Speed up in line internet connection must be high speed. 3) Integrity: Integrity requirements deal with the software system security; it is the requirement that data and process be protected from unauthorized modification. 4) Ethics: Important factors in quality is the ethics that the website does not attack a religious community or geographical areas or working on the immorality and corruption and encourage hatred between human beings and of the regions cannot be there the quality of the content provided through this site versa must be served Services serve the human way or
  • 3. New Model to Achieve Software Quality Assurance (SQA) in Web Application (IJSRD/Vol. 1/Issue 9/2013/0028) All rights reserved by www.ijsrd.com 1801 optimal content helps to be fraudulent to users and we must be mindful of our ethics offices with all segments of society and his message to be Semitic, and that does not use user information to expose their affairs. And the developers and user are having the same Responsibility. IV. RESULTS AND VISION FOR MODEL We sure the model is enhancing and will help to save the Quality Assurance in Website in work between the provider and customers in the same, the model less than from the critical stage in life cycle the services so all parties of the model is very important client side, server side and server side intersection client side to achieving the Quality Assurance. V. CONCLUSION In this paper, we have tried to solve and add some new model to support the Website Quality Assurance because day by day, all users are ready to use the website and all applications converts the windows applications to Web Application and we must enhance the Quality Assurance in the party of website from the Server Side and Client Side and the factors influencing both and we must to saving into website in all factors and in future work I like to create mode to check up that all factors in our model, to make sure that the factors work in true way . REFERENCES [1] Lazic L., Kolasinac A., Avdic D., “The Software Quality Economics Model for Software Project Optimization”, WSEAS Transaction on Computers, Issue 1, Vol. 8, January 2009. [2] NASA Software Quality Assurance Centre Software Assurance Guidebook_NASA-GB_A201, 1989 [3] Liao H., Enke D., and Wiedbe H., “An Expert Advisory System for ISO 9001 Quality System,” Expert System with Application, vol. 27, pp. 313- 322, 2004. [4] Li H., Meissner J., “Improving Quality in Business Process Outsourcing through Technology”, 2008. [5] Garvin A., “Competing on the Eight dimensions of Quality” Harvard Business Review Nov-Dec 101– 109, 1987. [6] Carnegie Mellon University Software Engineering Institute, CMMI overview Pittsburgh, USA, 2005. [7] IEC, About the IEC, http://www.ies.ch/about/mission-e.html,2006 [8] ISO, ISO/IEC 9003:2004: Software Engineering Guideline for the Application for ISO 9001:2000 to Computer Software, ISO press, 2004. [9] ISO, Overview of the ISO, http://www.iso.org/iso/en/aboutiso/introduaction/inde x.html,2006.