Web-based systems represent a young, but rapidly growing technology. As the number of
web applications continues to grow, these systems enter a critical role in a multitude of companies.
The way web systems impact business aspects, combined with an ever-growing internet user mass,
emphasize the importance of developing high-quality products. Thus, proper testing plays a distinctive
part in ensuring reliable, robust and high performing operation of web applications. Issues such as the
security of the web application, the basic functionality of the site, its accessibility to handicapped users
and fully able users, as well as readiness for expected traffic and number of users and the ability to
survive a massive spike in user traffic, both of which are related to load testing. The testing of web
based applications has much in common with the testing of desktop systems like testing of
functionality, configuration, and compatibility. Web application testing consists of the analysis of the
web fault compared to the generic software faults. Other faults are strictly dependent on the interaction
mode because of web application multi-tier architecture. Some web specific faults are authentication
problem, incorrect multi language support, hyperlink problem, cross-browser portability problem,
incorrect form construction, incorrect cookie value, incorrect session management, incorrect
generation of error page, etc.
A Review on Web Application Testing and its Current Research Directions IJECEIAES
Testing is an important part of every software development process on which companies devote considerable time and effort. The burgeoning web applications and their proliferating economic significance in the society made the area of web application testing an area of acute importance. The web applications generally tend to take faster and quicker release cycles making their testing very challenging. The main issues in testing are cost efficiency and bug detection efficiency. Coverage-based testing is the process of ensuring exercise of specific program elements. Coverage measurement helps determine the ―thoroughness‖ of testing achieved. An avalanche of tools, techniques, frameworks came into existence to ascertain the quality of web applications. A comparative study of some of the prominent tools, techniques and models for web application testing is presented. This work highlights the current research directions of some of the web application testing techniques.
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
Integration testing is one the important phase in software testing life cycle (STLC). With the fast growth of internet and web services, web-based applications are also growing rapidly and their importance and complexity is also increasing. Heterogeneous and diverse nature of distributed components, applications, along with their multi-platform support and cooperativeness make these applications more complex and swiftly increasing in their size. Quality assurance of these applications is becoming more crucial and important. Testing is one of the key processes to achieve and ensure the quality of these software or Webbased products. There are many testing challenges involved in Web-based applications. But most importantly integration is the most critical testing associated with Web-based applications. There are number of challenging factors involved in integration testing efforts. These factors have almost 70 percent to 80 percent impact on overall quality of Web-based applications. In software industry different kind of testing approaches are used by practitioners to solve the issues associated with integration which are due
to ever increasing complexities of Web-based applications.
The adoption of smart phones and the usages of mobile applications are increasing rapidly.
Consequently, within limited time-range, mobile Internet usages have managed to take over the
desktop usages particularly since the first smart phone-touched application released by iPhone
in 2007. This paper is proposed to provide solution and answer the most demandable questions
related to mobile application automated and manual testing limitations. Moreover, Mobile
application testing requires agility and physically testing. Agile testing is to detect bugs through
automated tools, whereas the compatibility testing is more to ensure that the apps operates on
mobile OS (Operation Systems) as well as on the different real devices. Moreover, we have
managed to answer automated or manual questions through two mobile application case studies
MES (Mobile Exam System) and MLM (Mobile Lab Mate) by creating test scripts for both case
studies and our experiment results have been discussed and evaluated on whether to adopt test
on real devices or on emulators? In addition to this, we have introduced new mobile application
testing matrix for the testers and some enterprises to obtain knowledge from.
Challenges and solutions in mobile and cloud computing testing - ZANECSatya Kaliki
Cloud Computing and Mobile platforms (e.g. Android, iPhone) have emerged as compelling choices for a large number of software systems and Apps that are built today. While these new paradigms present opportunities for suppliers to provide innovative services, they also present significant challenges to quality engineers. This case study presents practical solutions to overcome those challenges.
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDYijwscjournal
The Security Engineering discipline has become more and more important in the recent years. Security requirements engineering is essential to assure the Quality of the resulting software. An increasing part of the communication and sharing of information in our society utilize Web Applications. Last two years have
seen a significant surge in the amount of Web Application specific vulnerabilities that are disclosed to the public because of the importance of Security Requirements Engineering for Web based systems and as it is still underestimated. Integration of Web and object technologies offer a foundation for expanding the Web to a new generation of applications. In this paper, we outline our proposed Model- Oriented Security Requirement Engineering (MOSRE) Framework for Web Applications. By applying Object-Oriented technologies and modeling to Security Requirement phase. So the completeness, consistency, traceability and reusability of Security Requirements can be cost effectively improved. We implemented our MOSRE Framework for E-Voting Application and set of Security Requirements are identified.
A Review on Web Application Testing and its Current Research Directions IJECEIAES
Testing is an important part of every software development process on which companies devote considerable time and effort. The burgeoning web applications and their proliferating economic significance in the society made the area of web application testing an area of acute importance. The web applications generally tend to take faster and quicker release cycles making their testing very challenging. The main issues in testing are cost efficiency and bug detection efficiency. Coverage-based testing is the process of ensuring exercise of specific program elements. Coverage measurement helps determine the ―thoroughness‖ of testing achieved. An avalanche of tools, techniques, frameworks came into existence to ascertain the quality of web applications. A comparative study of some of the prominent tools, techniques and models for web application testing is presented. This work highlights the current research directions of some of the web application testing techniques.
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
Integration testing is one the important phase in software testing life cycle (STLC). With the fast growth of internet and web services, web-based applications are also growing rapidly and their importance and complexity is also increasing. Heterogeneous and diverse nature of distributed components, applications, along with their multi-platform support and cooperativeness make these applications more complex and swiftly increasing in their size. Quality assurance of these applications is becoming more crucial and important. Testing is one of the key processes to achieve and ensure the quality of these software or Webbased products. There are many testing challenges involved in Web-based applications. But most importantly integration is the most critical testing associated with Web-based applications. There are number of challenging factors involved in integration testing efforts. These factors have almost 70 percent to 80 percent impact on overall quality of Web-based applications. In software industry different kind of testing approaches are used by practitioners to solve the issues associated with integration which are due
to ever increasing complexities of Web-based applications.
The adoption of smart phones and the usages of mobile applications are increasing rapidly.
Consequently, within limited time-range, mobile Internet usages have managed to take over the
desktop usages particularly since the first smart phone-touched application released by iPhone
in 2007. This paper is proposed to provide solution and answer the most demandable questions
related to mobile application automated and manual testing limitations. Moreover, Mobile
application testing requires agility and physically testing. Agile testing is to detect bugs through
automated tools, whereas the compatibility testing is more to ensure that the apps operates on
mobile OS (Operation Systems) as well as on the different real devices. Moreover, we have
managed to answer automated or manual questions through two mobile application case studies
MES (Mobile Exam System) and MLM (Mobile Lab Mate) by creating test scripts for both case
studies and our experiment results have been discussed and evaluated on whether to adopt test
on real devices or on emulators? In addition to this, we have introduced new mobile application
testing matrix for the testers and some enterprises to obtain knowledge from.
Challenges and solutions in mobile and cloud computing testing - ZANECSatya Kaliki
Cloud Computing and Mobile platforms (e.g. Android, iPhone) have emerged as compelling choices for a large number of software systems and Apps that are built today. While these new paradigms present opportunities for suppliers to provide innovative services, they also present significant challenges to quality engineers. This case study presents practical solutions to overcome those challenges.
IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDYijwscjournal
The Security Engineering discipline has become more and more important in the recent years. Security requirements engineering is essential to assure the Quality of the resulting software. An increasing part of the communication and sharing of information in our society utilize Web Applications. Last two years have
seen a significant surge in the amount of Web Application specific vulnerabilities that are disclosed to the public because of the importance of Security Requirements Engineering for Web based systems and as it is still underestimated. Integration of Web and object technologies offer a foundation for expanding the Web to a new generation of applications. In this paper, we outline our proposed Model- Oriented Security Requirement Engineering (MOSRE) Framework for Web Applications. By applying Object-Oriented technologies and modeling to Security Requirement phase. So the completeness, consistency, traceability and reusability of Security Requirements can be cost effectively improved. We implemented our MOSRE Framework for E-Voting Application and set of Security Requirements are identified.
DESQA a Software Quality Assurance FrameworkIJERA Editor
In current software development lifecycles of heterogeneous environments, the pitfalls businesses have to face are that software defect tracking, measurements and quality assurance do not start early enough in the development process. In fact the cost of fixing a defect in a production environment is much higher than in the initial phases of the Software Development Life Cycle (SDLC) which is particularly true for Service Oriented Architecture (SOA). Thus the aim of this study is to develop a new framework for defect tracking and detection and quality estimation for early stages particularly for the design stage of the SDLC. Part of the objectives of this work is to conceptualize, borrow and customize from known frameworks, such as object-oriented programming to build a solid framework using automated rule based intelligent mechanisms to detect and classify defects in software design of SOA. The implementation part demonstrated how the framework can predict the quality level of the designed software. The results showed a good level of quality estimation can be achieved based on the number of design attributes, the number of quality attributes and the number of SOA Design Defects. Assessment shows that metrics provide guidelines to indicate the progress that a software system has made and the quality of design. Using these guidelines, we can develop more usable and maintainable software systems to fulfill the demand of efficient systems for software applications. Another valuable result coming from this study is that developers are trying to keep backwards compatibility when they introduce new functionality. Sometimes, in the same newly-introduced elements developers perform necessary breaking changes in future versions. In that way they give time to their clients to adapt their systems. This is a very valuable practice for the developers because they have more time to assess the quality of their software before releasing it. Other improvements in this research include investigation of other design attributes and SOA Design Defects which can be computed in extending the tests we performed.
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...IJCSES Journal
With the sharp rise in software dependability and failure cost, high quality has been in great demand.However, guaranteeing high quality in software systems which have grown in size and complexity coupled with the constraints imposed on their development has become increasingly difficult, time and resource consuming activity. Consequently, it becomes inevitable to deliver software that have no serious faults. In
this case, object-oriented (OO) products being the de facto standard of software development with their unique features could have some faults that are hard to find or pinpoint the impacts of changes. The earlier faults are identified, found and fixed, the lesser the costs and the higher the quality. To assess product quality, software metrics are used. Many OO metrics have been proposed and developed. Furthermore,
many empirical studies have validated metrics and class fault proneness (FP) relationship. The challenge is which metrics are related to class FP and what activities are performed. Therefore, this study bring together the state-of-the-art in fault prediction of FP that utilizes CK and size metrics. We conducted a systematic literature review over relevant published empirical validation articles. The results obtained are
analysed and presented. It indicates that 29 relevant empirical studies exist and measures such as complexity, coupling and size were found to be strongly related to FP.
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...ijseajournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approaches adopted in Omani market and provides a comparison between existing methods. The results reveal that Agile approach is the most popular model for mobile software engineering in Omani, as it naturally fits most of the applications required in this market. The study also discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature for different mobile app processes. The study provides also a series of recommendations for mobile app developers which should help in selecting the most appropriate method that suits the targeted market sector.
The Increasing Value and Complexity of Software Call for the Reevaluation of ...PRQA
VDC performs annually global market research, regarding the Automated Test and Verification Tool (AT&V) market. The current white paper summarizes findings from a survey in 2011, capturing the input from almost 600 engineers. The respondents are directly involved in Embedded and Enterprise/IT software and systems
development, across a wide range of industries: Automotive, Medical, Telecoms, Aerospace, Military and others.
Programming Research (PRQA) worked with VDC to fine-tune the survey questions to provide deeper insights into the development of high integrity software and the role of static analysis.
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...mathsjournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible
software process, which can deal with many challenges facing the mobile app development process. These
challenges include: volatility of requirements, strong user involvement, development time tightness, process
simplicity, and production of valuable software in low cost. This research study investigates the current
mobile app development approaches adopted in Omani market and provides a comparison between
existing methods. The results reveal that Agile approach is the most popular model for mobile software
engineering in Omani, as it naturally fits most of the applications required in this market. The study also
discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that
XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature
for different mobile app processes. The study provides also a series of recommendations for mobile app
developers which should help in selecting the most appropriate method that suits the targeted market
sector.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
A new model for the selection of web development frameworks: application to P...IJECEIAES
The use of a framework is often essential for medium and large scale developments, but is also of interest for small developments. PHP has evolved as the scripting language the most chosen by developers, which has generated an explosion of PHP frameworks. There is a big debate about what the best PHP frameworks are, because the simple fact is that not all frameworks are built for everyone. Indeed, not all frameworks meet the same needs, and several frameworks can be used together in certain situations. Choosing the right framework, however, can sometimes be difficult. In order to make the selection process easier, we propose a pragmatic and complete model to compare and evaluate the main PHP frameworks. This model is based on a set of comparison criteria based on the Intrinsic durability, industrialized solution, technical adaptability, strategy, technical architecture and Speed criteria. Results show that the values of these criteria allow developers to easily and properly choose the framwork that best meets their needs
A comparative studies of software quality model for the software product eval...imdurgesh
Actually, software products are increasing in a fast way and are used in almost all activities of human life.
Consequently measuring and evaluating the quality of a software product has become a critical task for many companies.
Several models have been proposed to help diverse types of users with quality issues. The development of techniques for
building software has influenced the creation of models to assess the quality. Since 2000 the construction of software
started to depend on generated or manufactured components and gave rise to new challenges in assessing quality.
These components introduce new concepts such as configurability, reusability, availability, better quality and lower cost.
Consequently, the models are classified into basic models which were developed until 2000, and those based on
components called tailored quality models. The purpose of this article is to describe the main models with their strengths
and point out some deficiencies. In this work, we conclude that in the present age, aspects of communications play an
important factor in the quality of the software.
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...IJCNCJournal
Much research has been conducted to detect vulnerabilities of Web Applications; however, these never proposed a methodology to measure the vulnerabilities either qualitatively or quantitatively. In this paper, a methodology is proposed to investigate the quantification of vulnerabilities in Web Applications. We applied the Goal Question Metrics (GQM) methodology to determine all possible security factors and subfactors of Web Applications in the Department of Transportation (DOT) as our proof of concept. Then we
introduced a Multi-layered Fuzzy Logic (MFL) approach based on the security sub-factors’ prioritization in the Analytic Hierarchy Process (AHP). Using AHP, we weighted each security sub-factor before the quantification process in the Fuzzy Logic to handle imprecise crisp number calculation.
Impacts of Object Oriented Programming on Web Application DevelopmentEditor IJCATR
Development of web application nowadays can hardly survive without object oriented approach except for the purpose of just information display. The complexity of application development and the need for content organization has raised the need for web application developers to embrace object oriented programming approach. This paper exposes the impact of object oriented programming on web application development. The exposition was done through a detailed study and analysis of information from secondary sources. The internet was usefully employed to access journal articles for both national and international sources. Our study enables web developers and designers to understand web application features, tools and methodologies for developing web application. It also keeps researchers and scholars abreast of the boost which OOP has brought into Web Applications development.
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
To improve the reliability and efficiency of Web Software, the Testing Team should be creative and
innovative, the experience and intuition of Tester also matters a lot. And most often the destructive nature
of Tester brings reliable software to the user. Actually, Testing is the responsibility of everybody who is
involved in the Project. But, one’s personal curiosity and attention is more important than the various
techniques and tools available in the market for Web Testing due to the phenomena that Software Testing is
an art. In this study, we are actually discussing certain techniques and tools which can be helpful to
minimize bugs in Web Application and achieve reliability and efficiency to a certain level. Indeed, for
bettering the quality of Web Application, Testing may not be considered as the only effective method
because no one can certify that a system is bug-free. This paper presents some essential web testing
techniques, strategies, methods and tools which need to be focused on when performing Web Testing for
several web applications in order to achieve better results.
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
To improve the reliability and efficiency of Web Software, the Testing Team should be creative and innovative, the experience and intuition of Tester also matters a lot. And most often the destructive nature of Tester brings reliable software to the user. Actually, Testing is the responsibility of everybody who is
involved in the Project. But, one’s personal curiosity and attention is more important than the various techniques and tools available in the market for Web Testing due to the phenomena that Software Testing is an art. In this study, we are actually discussing certain techniques and tools which can be helpful to minimize bugs in Web Application and achieve reliability and efficiency to a certain level. Indeed, for
bettering the quality of Web Application, Testing may not be considered as the only effective method because no one can certify that a system is bug-free. This paper presents some essential web testing
techniques, strategies, methods and tools which need to be focused on when performing Web Testing for
several web applications in order to achieve better results.
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfkalichargn70th171
Remaining informed about evolving trends is crucial for both businesses and developers in the dynamic field of web development. The year 2024 heralds groundbreaking advancements poised to revolutionize website construction and interaction. From progressive web apps and voice search optimization to prioritizing accessibility and cybersecurity, staying attuned to these trends is imperative. In this blog, we delve deeper into the pivotal trends shaping the future of web development in the upcoming year.
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
In diverse industrial and academic environments, the quality of the software has been evaluated using
different analytic studies. The contribution of the present work is focused on the development of a
methodology in order to improve the evaluation and analysis of the reliability of web-based software
applications. The Personal Software Process (PSP) was introduced in our methodology for improving the
quality of the process and the product. The Evaluation + Improvement (Ei) process is performed in our
methodology to evaluate and improve the quality of the software system. We tested our methodology in a
web-based software system and used statistical modeling theory for the analysis and evaluation of the
reliability. The behavior of the system under ideal conditions was evaluated and compared against the
operation of the system executing under real conditions. The results obtained demonstrated the
effectiveness and applicability of our methodology
DESQA a Software Quality Assurance FrameworkIJERA Editor
In current software development lifecycles of heterogeneous environments, the pitfalls businesses have to face are that software defect tracking, measurements and quality assurance do not start early enough in the development process. In fact the cost of fixing a defect in a production environment is much higher than in the initial phases of the Software Development Life Cycle (SDLC) which is particularly true for Service Oriented Architecture (SOA). Thus the aim of this study is to develop a new framework for defect tracking and detection and quality estimation for early stages particularly for the design stage of the SDLC. Part of the objectives of this work is to conceptualize, borrow and customize from known frameworks, such as object-oriented programming to build a solid framework using automated rule based intelligent mechanisms to detect and classify defects in software design of SOA. The implementation part demonstrated how the framework can predict the quality level of the designed software. The results showed a good level of quality estimation can be achieved based on the number of design attributes, the number of quality attributes and the number of SOA Design Defects. Assessment shows that metrics provide guidelines to indicate the progress that a software system has made and the quality of design. Using these guidelines, we can develop more usable and maintainable software systems to fulfill the demand of efficient systems for software applications. Another valuable result coming from this study is that developers are trying to keep backwards compatibility when they introduce new functionality. Sometimes, in the same newly-introduced elements developers perform necessary breaking changes in future versions. In that way they give time to their clients to adapt their systems. This is a very valuable practice for the developers because they have more time to assess the quality of their software before releasing it. Other improvements in this research include investigation of other design attributes and SOA Design Defects which can be computed in extending the tests we performed.
STATE-OF-THE-ART IN EMPIRICAL VALIDATION OF SOFTWARE METRICS FOR FAULT PRONEN...IJCSES Journal
With the sharp rise in software dependability and failure cost, high quality has been in great demand.However, guaranteeing high quality in software systems which have grown in size and complexity coupled with the constraints imposed on their development has become increasingly difficult, time and resource consuming activity. Consequently, it becomes inevitable to deliver software that have no serious faults. In
this case, object-oriented (OO) products being the de facto standard of software development with their unique features could have some faults that are hard to find or pinpoint the impacts of changes. The earlier faults are identified, found and fixed, the lesser the costs and the higher the quality. To assess product quality, software metrics are used. Many OO metrics have been proposed and developed. Furthermore,
many empirical studies have validated metrics and class fault proneness (FP) relationship. The challenge is which metrics are related to class FP and what activities are performed. Therefore, this study bring together the state-of-the-art in fault prediction of FP that utilizes CK and size metrics. We conducted a systematic literature review over relevant published empirical validation articles. The results obtained are
analysed and presented. It indicates that 29 relevant empirical studies exist and measures such as complexity, coupling and size were found to be strongly related to FP.
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...ijseajournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approaches adopted in Omani market and provides a comparison between existing methods. The results reveal that Agile approach is the most popular model for mobile software engineering in Omani, as it naturally fits most of the applications required in this market. The study also discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature for different mobile app processes. The study provides also a series of recommendations for mobile app developers which should help in selecting the most appropriate method that suits the targeted market sector.
The Increasing Value and Complexity of Software Call for the Reevaluation of ...PRQA
VDC performs annually global market research, regarding the Automated Test and Verification Tool (AT&V) market. The current white paper summarizes findings from a survey in 2011, capturing the input from almost 600 engineers. The respondents are directly involved in Embedded and Enterprise/IT software and systems
development, across a wide range of industries: Automotive, Medical, Telecoms, Aerospace, Military and others.
Programming Research (PRQA) worked with VDC to fine-tune the survey questions to provide deeper insights into the development of high integrity software and the role of static analysis.
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...mathsjournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible
software process, which can deal with many challenges facing the mobile app development process. These
challenges include: volatility of requirements, strong user involvement, development time tightness, process
simplicity, and production of valuable software in low cost. This research study investigates the current
mobile app development approaches adopted in Omani market and provides a comparison between
existing methods. The results reveal that Agile approach is the most popular model for mobile software
engineering in Omani, as it naturally fits most of the applications required in this market. The study also
discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that
XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature
for different mobile app processes. The study provides also a series of recommendations for mobile app
developers which should help in selecting the most appropriate method that suits the targeted market
sector.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
A new model for the selection of web development frameworks: application to P...IJECEIAES
The use of a framework is often essential for medium and large scale developments, but is also of interest for small developments. PHP has evolved as the scripting language the most chosen by developers, which has generated an explosion of PHP frameworks. There is a big debate about what the best PHP frameworks are, because the simple fact is that not all frameworks are built for everyone. Indeed, not all frameworks meet the same needs, and several frameworks can be used together in certain situations. Choosing the right framework, however, can sometimes be difficult. In order to make the selection process easier, we propose a pragmatic and complete model to compare and evaluate the main PHP frameworks. This model is based on a set of comparison criteria based on the Intrinsic durability, industrialized solution, technical adaptability, strategy, technical architecture and Speed criteria. Results show that the values of these criteria allow developers to easily and properly choose the framwork that best meets their needs
A comparative studies of software quality model for the software product eval...imdurgesh
Actually, software products are increasing in a fast way and are used in almost all activities of human life.
Consequently measuring and evaluating the quality of a software product has become a critical task for many companies.
Several models have been proposed to help diverse types of users with quality issues. The development of techniques for
building software has influenced the creation of models to assess the quality. Since 2000 the construction of software
started to depend on generated or manufactured components and gave rise to new challenges in assessing quality.
These components introduce new concepts such as configurability, reusability, availability, better quality and lower cost.
Consequently, the models are classified into basic models which were developed until 2000, and those based on
components called tailored quality models. The purpose of this article is to describe the main models with their strengths
and point out some deficiencies. In this work, we conclude that in the present age, aspects of communications play an
important factor in the quality of the software.
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...IJCNCJournal
Much research has been conducted to detect vulnerabilities of Web Applications; however, these never proposed a methodology to measure the vulnerabilities either qualitatively or quantitatively. In this paper, a methodology is proposed to investigate the quantification of vulnerabilities in Web Applications. We applied the Goal Question Metrics (GQM) methodology to determine all possible security factors and subfactors of Web Applications in the Department of Transportation (DOT) as our proof of concept. Then we
introduced a Multi-layered Fuzzy Logic (MFL) approach based on the security sub-factors’ prioritization in the Analytic Hierarchy Process (AHP). Using AHP, we weighted each security sub-factor before the quantification process in the Fuzzy Logic to handle imprecise crisp number calculation.
Impacts of Object Oriented Programming on Web Application DevelopmentEditor IJCATR
Development of web application nowadays can hardly survive without object oriented approach except for the purpose of just information display. The complexity of application development and the need for content organization has raised the need for web application developers to embrace object oriented programming approach. This paper exposes the impact of object oriented programming on web application development. The exposition was done through a detailed study and analysis of information from secondary sources. The internet was usefully employed to access journal articles for both national and international sources. Our study enables web developers and designers to understand web application features, tools and methodologies for developing web application. It also keeps researchers and scholars abreast of the boost which OOP has brought into Web Applications development.
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
To improve the reliability and efficiency of Web Software, the Testing Team should be creative and
innovative, the experience and intuition of Tester also matters a lot. And most often the destructive nature
of Tester brings reliable software to the user. Actually, Testing is the responsibility of everybody who is
involved in the Project. But, one’s personal curiosity and attention is more important than the various
techniques and tools available in the market for Web Testing due to the phenomena that Software Testing is
an art. In this study, we are actually discussing certain techniques and tools which can be helpful to
minimize bugs in Web Application and achieve reliability and efficiency to a certain level. Indeed, for
bettering the quality of Web Application, Testing may not be considered as the only effective method
because no one can certify that a system is bug-free. This paper presents some essential web testing
techniques, strategies, methods and tools which need to be focused on when performing Web Testing for
several web applications in order to achieve better results.
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
To improve the reliability and efficiency of Web Software, the Testing Team should be creative and innovative, the experience and intuition of Tester also matters a lot. And most often the destructive nature of Tester brings reliable software to the user. Actually, Testing is the responsibility of everybody who is
involved in the Project. But, one’s personal curiosity and attention is more important than the various techniques and tools available in the market for Web Testing due to the phenomena that Software Testing is an art. In this study, we are actually discussing certain techniques and tools which can be helpful to minimize bugs in Web Application and achieve reliability and efficiency to a certain level. Indeed, for
bettering the quality of Web Application, Testing may not be considered as the only effective method because no one can certify that a system is bug-free. This paper presents some essential web testing
techniques, strategies, methods and tools which need to be focused on when performing Web Testing for
several web applications in order to achieve better results.
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfkalichargn70th171
Remaining informed about evolving trends is crucial for both businesses and developers in the dynamic field of web development. The year 2024 heralds groundbreaking advancements poised to revolutionize website construction and interaction. From progressive web apps and voice search optimization to prioritizing accessibility and cybersecurity, staying attuned to these trends is imperative. In this blog, we delve deeper into the pivotal trends shaping the future of web development in the upcoming year.
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
In diverse industrial and academic environments, the quality of the software has been evaluated using
different analytic studies. The contribution of the present work is focused on the development of a
methodology in order to improve the evaluation and analysis of the reliability of web-based software
applications. The Personal Software Process (PSP) was introduced in our methodology for improving the
quality of the process and the product. The Evaluation + Improvement (Ei) process is performed in our
methodology to evaluate and improve the quality of the software system. We tested our methodology in a
web-based software system and used statistical modeling theory for the analysis and evaluation of the
reliability. The behavior of the system under ideal conditions was evaluated and compared against the
operation of the system executing under real conditions. The results obtained demonstrated the
effectiveness and applicability of our methodology
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...ijseajournal
In network communication age, information technology is being at the continuous and rapid evolution
process. Network access equipment, information system and Web Apps must rapidly and continuously update to meet the user interested requirements. Major challenge of Web Apps frequent changes is the security of user personal data and transactions information. Vulnerability scanning and penetration testing are the routine methods to improve the security of Web App. However, these two ways not only timeconsuming, but also require too many resources. For coping the continuous changes, in the limited resources, security testing not only need to be timely completed, but also should concern testing quality. Otherwise, every change mainte nance cannot avoid to cause the security risk of new version App. Based on reusable test cases, this paper proposes the continuous security testing procedure (CSTP), using test cases reusability to increase security test efficiency. In Web Apps maintenance process of limited resources, CSTP
can timely handle security testing and quickly identify Web Apps vulnerabilities and defects. Assisting Apps maintainer effectively repair security defects and concretely improve the security of user personal data and transaction information
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...IOSR Journals
Abstract: The diverse and dynamic nature of elements and techniques used to develop Web Application, due to
the lack of testing technique and effective programming principles which are used for implementing
basic software engineering principles, and undisciplined development processes insure by the high pressure
of a very short time to satisfy market request to develop Web application. This paper represent approaches of
reengineering in web that how reengineering process can be carried out to evolution activities in legacy
system as well we propose the V-model for re-engineering process. This paper presents the need of the
technologies and approaches for building new web-services from existing web-applications. In this
paper we present the processing of V-model for Reengineering in web application which is the extension of Vmodel
used in software domain. In our approach V-model incorporates with the methodology
throughout the phases of web development process to re-engineer the web system.
Keywords:Re-engineering, reverse engineering, forward engineering, V-model, application migration.
Quality Attributes of Web Software Applications ∗hasnainqayyum1
Quality Attributes of Web Software Applications
Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗
Quality Attributes of Web Software Applications ∗
A novel approach for evaluation of applying ajax in the web siteeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
New Model to Achieve Software Quality Assurance (SQA) in Web Applicationijsrd.com
The quality of product and services has become one of the most important factors that influence national and international business , Software Quality Assurance (SQA) is an integral part of the software development process; with the rapid technology and development in software application, we must enhance the quality of product; and with the rapid development in interaction between the customers and web service and the technological challenges in the quality provided , we proposed new model to achieve Software Quality in Web Application and the model divide into three parts, the first part: server side, second part: Client side and the third part :Server side intersection Client side and there party factors helps to enhance SQA .
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
The emergence of exactitude agriculture has been promoted by the numerous developments within
the field of wireless sensing element actor networks (WSAN). These WSANs offer important data
for gathering, work management, development of crops, and limitation of crop diseases. Goals of
this paper to introducing cloud computing as a brand new way (technique) to be utilized in addition
to WSANs to any enhance their application and benefits to the area of agriculture.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
A green building is an environmentally sustainable building, designed, constructed and
operated to minimise the total environmental impacts. Carbon dioxide (CO2) is the primary
greenhouse gas emitted through human activities. It is claimed that 5% of the world’s carbon dioxide
emission is attributed to cement industry, which is the vital constituent of concrete. Due to the
significant contribution to the environmental pollution, there is a need for finding an optimal solution
along with satisfying the civil construction needs. Apart from normal concrete bricks, a clay brick,
Foam concrete is a new innovative technology for sustainable building and civil construction which
fulfills the criteria of being a Green Material. This paper concludes that Foam Concrete can be an
effective sustainable material for construction and also focuses on the cost effectiveness in using
Foam Concrete as a building material in replacement with Clay Brick or other bricks.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Editor IJMTER
This paper proposes a single-phase thirteen-level inverter using seven switches, with a
novel pulse width-modulated (PWM) control scheme. The Proposed multilevel inverter output
voltage level increasing by using less number of switches driven by the multicarrier modulation
techniques. The inverter is capable of producing thirteen levels of output-voltage (Vdc, 5/6Vdc,
4/6Vdc, 3/6Vdc, 2/6Vdc, 1/6Vdc, 0, -5/6Vdc, -4/6Vdc, -3/6Vdc, -2/6Vdc, -1/6Vdc,-Vdc) from the
dc supply voltage. A digital multi carrier PWM algorithm was implemented in a Spartan 3E FPGA.
The proposed system was verified through simulation and implemented in a prototype.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Web Application Testing (Major Challenges and Techniques)
1. International Journal of Modern Trends in Engineering and
Research
www.ijmter.com
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 1
Web Application Testing
(Major Challenges and Techniques)
Pooja Sharma1
1
Dept. of CSE,CBS Group of Institutions, Fatehpuri (Jhajjar), India, sharma.pooja218@gmail.com
Abstract--Web-based systems represent a young, but rapidly growing technology. As the number of
web applications continues to grow, these systems enter a critical role in a multitude of companies.
The way web systems impact business aspects, combined with an ever-growing internet user mass,
emphasize the importance of developing high-quality products. Thus, proper testing plays a distinctive
part in ensuring reliable, robust and high performing operation of web applications. Issues such as the
security of the web application, the basic functionality of the site, its accessibility to handicapped users
and fully able users, as well as readiness for expected traffic and number of users and the ability to
survive a massive spike in user traffic, both of which are related to load testing. The testing of web
based applications has much in common with the testing of desktop systems like testing of
functionality, configuration, and compatibility. Web application testing consists of the analysis of the
web fault compared to the generic software faults. Other faults are strictly dependent on the interaction
mode because of web application multi-tier architecture. Some web specific faults are authentication
problem, incorrect multi language support, hyperlink problem, cross-browser portability problem,
incorrect form construction, incorrect cookie value, incorrect session management, incorrect
generation of error page, etc.
In this paper, main concern will be to bring up issues regarding testing web application functionality
implemented using numerous technologies. Generating a test environment to test this type of
application and exercise each of them is a quite tough task. Functional requirement testing of web
application will be considered in this paper. So after discussing challenges of web testing, focus of the
remainder paper will be on compendious of various existing testing techniques for web application.
Finally, there is a brief discussion about future trends of testing scopes in web applications and
concluding remarks.
Keywords— Web application, Web Testing, testing challenges and techniques.
I. INTRODUCTION
The Web has had a significant impact on all aspects of our society, from business, education,
government, entertainment sectors, industry, to our personal lives. The main advantages of adopting
the Web for developing software products include (1) No installation costs, (2) Automatic upgrade
with new features for all users, and (3) Universal access from any machine connected to the Internet.
On the downside, the use of server and browser technologies make web applications particularly error-
prone and challenging to test, causing serious dependability threats. In addition to financial costs,
errors in web applications result in loss of revenue and credibility. The difficulty in testing web
applications is many-fold. First, web applications are distributed through a client/server architecture,
with (asynchronous) HTTP request/response calls to synchronize the application state. Second, they
are heterogeneous, i.e., web applications are developed using different programming languages, for
instance, HTML, CSS, JavaScript on the client-side and PHP, Ruby, Java on the server-side. And third,
web applications have a dynamic nature; in many scenarios they also possess non-deterministic
characteristics.
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 2
According to Petersen et al. [1], a systematic mapping (SM) is a method to review, classify, and
structure papers related to a specific research field in software engineering. The goal is to obtain an
overview of existing approaches, outlining the coverage of the research field in different facets of the
classification scheme. Identified gaps in the field serve as a valuable basis for future research directions
[2, 3]. Results of SM studies can also be valuable resources for new researchers (e.g., PhD students) by
providing a detailed overview of a specific research area [4]. In recent years web applications have
come to play an increasingly important part in software engineering in general, and also play a vital
part in our everyday lives. As these systems offer more and more functionality to the user and enter
new markets and new business segments, testing of such systems becomes all the more relevant,
important and challenging. Being a relatively young technology there is a risk that existing tools and
methods are either imperfect or simply have not been employed by certain software vendors. The lack
of experience in testing web applications might be one reason why some companies find it tempting
to use ad hoc testing techniques and even make testing the big loser when time is running out. Testing
becomes an even more important factor when we consider the numerous properties of web systems
that we do not necessarily find in traditional software applications. We will address this, and highlight
the differences between traditional systems and web-based systems.
II. TECHNOLOGY
The first thing that probably strikes most of us when given the question of what distinguishes a web
application from other software, is that these applications are accessed through a browser. And even
though the use of a browser for any type of web system might suggest a standardized and less complex
way of dealing with software, the myriad of browser versions among the different vendors complicates
testing matters as well as the general quality assurance. Another distinct feature of web pages is the
hyperlink, offering the possibility to bring the user to a different site or to a particular web page.
Furthermore web systems do not require any installation in the way we are used to think of that term.
With the continuously updated prototype “shipped” to the production site and with all access or user
interaction with the application taking place via web browsers, the installation process is practically
non-existent.
Figure 1. Web System Architecture
Not only do web applications involve several third party products, but they also have several physical
points where potential slow-downs might occur. A typical three-tiered web system is shown in figure
above. Hence the performance of most web-based systems nowadays relies heavily on web servers,
application servers and database servers.
III. PROBLEM DEFFINATION
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 3
The problems and challenges that come in the wake of testing web systems are many and diverse. First
of all there seems to be inadequate technical expertise in the field and also a lack of mature testing
tools for these applications. The main cause for this is most likely web systems, and the testing of
these, being a relatively “juvenile” and rapidly changing technology. The temptation for software
vendors to ad hoc software engineering processes might also lead to a somewhat informal version
management, thus complicating testing matters by not having a properly working version to revert to.
This makes analyzing defects even harder since one has to deal with an environment that is becoming
increasingly complex. There are also testing concerns from a more technical point of view. Web
systems are built on partly separate development technologies related to programming language, user
interface and user interaction. They depend on COTS products – Commercial Off-The-Shelf – that
cannot be fully controlled, such as Flash, Java Applet, Acrobat Reader and ActiveX to name a few.
Multiple users sharing the same resources, like a web server, increases the possibility of the user
experiencing some kind of trouble, especially when the number of users wanting to use a particular
service exceeds the threshold for what the system can handle. Another complicating factor is the
pressure of making time-to-market as short as possible. This has led the web industry into shorter
iterations, implying that test passes ought to or must be performed in step with the development cycles.
This in turn means that testing activities will take place more frequently than what is the case for
traditional software engineering. The tests to be performed will have to focus on detecting errors that
may cause unacceptable levels of robustness. The latter rises the challenges of finding methods tailored
to testing of web systems and assess their suitability for the robustness of such applications. All of the
issues mentioned above, combined with the multitude of different browser versions among different
vendors, make testing and quality assurance in the context of web-based systems a challenging
prospect on more than one level.
IV. WEB APPLICATION TESTING CHALLENGES
Testing of web application employing new technologies (like AJAX, Flash, Active X plug-in
component, Ruby on rails, etc.) is an area that has not been investigated so far. In this paper work focus
will be on web application testing because with the advent of these new technologies, novel testing
problems raised and added to the list of already existing problems in web testing area. These novel
problems turn out to be main sources of faults in web application. Web applications are fault prone
because of state full client, asynchronous communication, delta updates, unwritten JavaScript, client
side DOM manipulation, event handling, timing, back / forward button and browser dependence.
A web application faces various challenges during testing and should be able to conduct tests for:
• Browser compatibility
• Operating System compatibility
• Windows application compatibility where required (especially for backend testing)
Web application testing allows a user to specify how virtual users are involved in the testing
environment i.e. either increasing users or constant users or periodic users load.
• Increasing user load, step by step is called Ramp [5] where virtual users are increased from 0 to
hundreds, where, Ramp test is the test which uses escalating numbers of users over a given
time frame to determine the maximum number of users the web server can accommodate before
producing error messages.
• Constant user load maintains specified user load at all time.
• Periodic user load tends to increase and decrease the user load from time to time.
Websites offer new challenges to developers, as well as testers. Scalability and performance are two
areas that are significant in the e-commerce and web applications space. However, when new
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 4
technology is used to make web applications perform well and scalable, new testing methodologies
have to be created along with those technologies. Performance is critical, and based on a study from
the Newport Group, more than half the recently deployed transaction-based web applications did not
meet expectations for how many simultaneous users their applications could handle[6].
Challenges of web testing because of embedded features of current web technologies are as follows:
A. Asynchronous behavior
Web application nondeterministic behavior because of asynchronous behavior is also a great testing
challenge. This non-deterministic behavior can be because of network delays, asynchronous
client/server interaction, non-sequential handling of requests by the server, randomly produced or
constantly changing data on real time web application. Some problems of asynchronous behavior are
swapped call back. Assume that in swapped call back there are two semantically interacting events e1,
e2.Let r1 and r2 be the associated request sent to the server and let c1, c2 are corresponding call backs.
The following execution sequence may occur: <r1, r2, c2, c1>. In this sequence c2 starts before c1. It
produces an incorrect final state. The reasons of c2 starts before c1 may be network delays, scheduling
of threads on the server (second thread terminates before first starts), scheduling of callback activation
on client (second callback scheduled before first one), etc. Other problem is dependent request. So, all
the asynchronous communication problems are problems for current web application testing also. This
asynchronous challenge may reach to an incorrect final state or some output values may be different
from the expected ones [7].
B. Transition Navigation
Testing of methods triggered by user events or server message and modifying the DOM is also a
tedious task. With regard to transition, Marchetto [7] suggested that method invocation triggered by
user events or server messages can affect DOM states. All other method invocations have no effect on
the DOM state, so can be ignored [8, 7]. In Transition testing, identify set of method reacting to events
and possibly affecting the DOM can be possible through static code analysis. The output of this
analysis determines the set of methods that need to be traced. DOM state is logged after the invocation
of each such method. Process of assessing the correctness of test case output is a challenging task
because Static analysis will miss complex run time behavior and when state space is huge, it becomes
quite tedious task. One example of dynamic Dom manipulation is that the individual sections are
editable right on the main page, and to customize the page, one can simply grab them with their mouse
and drag them to their new location. So this type of DOM behavior makes testing problematic.
C. State Navigation
State navigation was prime concern at the time of web testing. A process is required to fetch all
dynamically updating states. State information may only be determined dynamically through event-
driven changes in the browser’s DOM. It is difficult to find changes in before and after events also
because of various reasons like the entire page does not repaint, users may not perceive that anything
has changed, address bar does not change even if the page changes. If users expect the back button to
work using AJAX web application, it is difficult to manipulate changed parts of the page. Web
applications run time manipulation creates difficulty in fetching all states and their behavior for testing.
Problems may arise in detecting all dynamically generated and updated states.
D. State full behavior
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 5
The biggest problem with web applications is saving state and accommodating the familiar progression
of the history controls (Back/forward buttons). AJAX web application technology allows the document
to become state full, but when the user instinctively goes for the history controls in the browser, a fault
often occurs in AJAX the broken back button of the browser. A dynamically changed state does not
register itself with the browser history engine [9]. State full behavior is a challenging task because states
itself contains many information and state behavior change because of content inside that. A method
is required to test content of states and validate changes on the basis of content of a particular state.
E. Delta server message
Delta-Server messages [9] from the server response are hard to analyze. Most of such delta updates
become meaningful after they have been processed by the client side engine on the browser and
injected into the DOM. In testing process, retrieving and indexing the delta state changes from the
server. Delta states can be retrieved only through proxy between the client and the server and this could
have the side-effect of losing the context and actual meaning of the changes. That is why delta state
testing is really a challenging task. Most of such delta updates become meaningful after they have been
processed by the JAVA SCRIPT engine on the client and injected into the DOM [10].
V. WEB APPLICATION TESTING TECHNIQUE
Marchetto [11] discussed in his work that existing web testing techniques are not suitable appropriate
to test the specific characteristics with respect to AJAX. Similarly, for other current web technologies
also existing web testing techniques are not appropriate. However, we summarize long familiar
effective web testing techniques, which are diffused in current web testing scenario.
A. White Box Testing
White box testing designs test cases on the basis of code representation of application under test. To
traditional software, white box testing of web application is based on internal structure information of
the system under test. White box testing approach has applied to web applications using two main
families of structural models. Either on the basis of level of abstraction of code of the application or
using navigation model between pages of application. Various web testing techniques has been
introduced under this category. The White box technique proposed by Ricca and Tonella is Model
based testing technique[12, 13, 14, 15]. Mainly Model based techniques uses reverse engineering and web
crawling techniques to build a model of a web application. Navigation model based testing built a
model using graph in which each node is a web page and edge is a link. Limits of this navigation model
are that it does not test asynchronous behavior and dynamic changes of a web application. This
navigation model does not consider response of a request, does not includes the states that a HTML
page can reach during application execution. This approach cannot dynamically analyze the whole
web application structure.
Code coverage based testing [8] follows primarily two testing methods. Object based data flow testing
and Control flow model based testing. Object based data flow testing[16] client tier interaction behavior
not server tier interaction behavior of a web application. Object based data flow model captures the
data flow information of web applications and consist of two models- object model and structural
model. Object model component are modeled as objects that contain attributes and operations and
structural model captures the data flow information of functions within or across objects. In this four
types of graphs are employed- Control flow graph, inter procedural control flow graph, object control
flow graph, composite control flow graph. Restriction in this approach related for testing web
application is that the client server request, response, navigation and redirect relationship not
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 6
representing in object model and even not testing Extreme dynamism of web application. Control flow
based testing uses reverse engineering and web crawling techniques to build a test model of a web
application. In this techniques nodes represents statements that are executed by a web server and edges
represent control transfer. This technique can be applied to web application with alteration like change
in technological nature of coverage tool. Coverage tool should support and trace web code of mix of
web application technologies like: HTML, Java Script, JSP and AJAX etc. This approach appears to
be partially adequate due to high dynamicity of web applications and asynchronous behavior of web
application nowadays. These days’ web applications are designed using DOM element during
execution and add a dynamically constructed callback to it. Callback cannot be traced using this
approach.
Other than these techniques logging user session data on the server is also used for the purpose of
automatic test generation [17, 18].This requires sufficient interaction of real web users with the system
to generate the necessary logging data. Session based testing are merely focused on synchronous re-
quests to the server and lack of complete state information required in AJAX testing.
B. Black Box Testing
Black box testing is to generate test cases on the basis of mentioned functionality of the system under
test. This testing technique does not check code structure and implementation of system under test.
Main issue with black box testing is the use of suitable model for specifying the behavior of the web
application to be tested. Black box testing approach proposed by Andrew is Finite State Machine
(FSM) for generating test cases from web application. This approach takes state dependent behavior
of web application in consideration and derive test case from them [14]. Andrew proposed a system-
level testing technique that combines Test Generation based on Finite State Machines with constraints
[14]. The approach builds hierarchies of Finite State Machines (FSMs) that model subsystems of the
Web applications, and then generates test requirements as subsequences of states in the FSMs. Several
methods for deriving tests from FSMs have also been proposed [19, 14, 20, 21]. The constraints are used
to select a reduced set of inputs with the goal of reducing the state space explosion otherwise inherent
in using FSMs. Web applications can be completely modeled with FSMs, however, even simple Web
pages can suffer from the state space explosion problem. So, web application behavior depends on
state of data managed by application and user input, with the consequence of state explosion problem.
For resolving this problem, various solutions are investigated and presented in the literature. Sachoun
Park presented a method for avoidance of state explosion problem using dependency analysis in model
checking control flow graph [22]. The FSM is a model for describing the control flow aspects. FSM,
like a State charts, supports concurrency, hierarchy and global variables. In this paper presented the
model reduction technique based on dependency analysis to avoid the state explosion problem. There
are two more solutions available to solve this problem. First solution given by Di Lucca[23] that exploits
decision table as a combinatorial model for representing the behavior of web application and
generating test cases. Second solution proposed by Andrew that model state ma-chine using state
dependent behavior of web application and generates test cases.
Second approach is user session based testing approach suggested by Elbaum [17]. User session based
testing collect user interaction and transforms them in to test cases. Data to be captured include clients
request in form of URL’s and apply strategies to these generated test cases. User session based testing
having many advantages over white box testing technique. Advantages are as follows: (a) User session
based testing generates test cases without analyzing the internal structure of the web application that
reduce cost and time of finding inputs, (b) less dependent on heterogeneous and distributed web
application technologies, (c)user session based testing depends on data collected. This technique will
provide efficient result for wider user session data set. The tedious task of this approach is to capture
web application states. Elbaum presenting an approach in which he is integrating white box and user
7. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 7
session based testing and showing results of that and proving the effectiveness of technique applied.
There are some limitations in this testing technique. Web sites are incorporated with extreme
dynamism these days so how to control unwanted source of variation is main issue. There should be
any fault taxonomy to find faults in web application and to evaluate adequacy of web applications.
Simulation of existing fault with current testing technique is required.
VI. STATE OF ART OF WEB TESTING
To bridge the gap between existing web testing techniques and main new feature provided by web
application. The server side can be tested using any conventional testing technique. Client side testing
can be performed at various levels. The selenium tool is very popular capture-replay tool and allows
DOM based testing by capturing user session i.e. events fired by user. Such tool can access the DOM
and shows expected UI behavior and replay the user session. So today’s need is a testing tool which
can test user session and generate test cases on the basis of expected UI behavior as per event fired by
user.
A. State Based Testing
Marchetto proposed a state based testing technique[7, 8]. Idea is that the states of client side components
of an AJAX application need to be taken into account during testing phase [7]. State based testing
technique for AJAX is based on the analysis of all the states that can be reached by the client-side
pages of the application during its execution. Using AJAX, HTML elements like TEXTAREA, FORM,
INPUT, A, LI, SELECT, OL, UL, DIV, SPAN, etc. can be changed at runtime according to the user
interactions. In this testing the HTML elements of a client-side page characterize the state of an AJAX
Web page, and their corresponding values are used for building its finite state model. State based
technique results indicate that state based testing is powerful and can reveal faults otherwise unnoticed
or very hard to detect using existing techniques. Marchetto used traces of the application to construct
a finite state machine [7]. This technique was based on the dynamic extraction of finite state machine
for a given AJAX application. Whereas in Marchetto’s work, dynamic analysis was partial, using
manual validation or refinement steps for model extraction. He accepted in his work that FSM recovery
needs an improvement and is an unexplored area. Dynamic extraction of states is quite tough to explore
and needs constant attention in AJAX testing. In Marchetto’s work, dynamic extraction of states was
manual and needs a proper approach. There is a need for Automatic Dynamic analysis for model
construction. Later in his work Marchetto was mainly concerned to identify sets of semantically
interactingǁ events sequence, used to generate test suite of test cases [7]. His intuition was that longer
interaction sequences have higher faults. The Conducted experiments showing that longer interaction
sequence have higher fault exposing capability[7,8,24,25].This technique generates high number of test
cases involving unrelated events, for minimizing test cases using notion of semantically interacting
events. So here Marchetto’s main contribution is for analysis of semantically interacting events
sequence and result proves that more faults at the time of long interacting sequence analysis. Sequences
of semantically interacting events in the model are used to generate test cases once the model is refined
by the tester. In this work, he applied search-based algorithm, hill climbing and simulated annealing,
to the problem of generating event sequence of various lengths. A FSM based testing technique
generates high number of test cases. These high number of test cases reaches to a State Explosion
Problem. In Marchetto’s work for minimizing test cases used notion of semantically interacting Events
and using abstraction function. However, in his work not explored state abstraction function
completely. I worked mainly for semantically interacting events for minimizing test cases. It minimizes
only few asynchronous communication test cases. It is not suitable to test case minimization for other
8. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 8
AJAX features. He accepted in his work [24] that FSM recovery needs improvement, in order to
automatically infer proper abstraction function.
B. Invariant Based Testing
Static analysis techniques are not able to reveal faults due to dynamic behavior of modern rich web
application. Generating test cases for dynamic run time interaction of a web application is really a
tedious task. Mesbah proposed an invariant based automatic testing of AJAX user interfaceǁ. In his
work, first task was crawling of the AJAX application using CRAWLJAX1 tool, simulating real user
events on the user interface and infer the abstract model from state flow graph[9,27].This CRAWLJAX
tool design state flow graph of all(client side) user interface states. Mesbah identified AJAX specific
faults that can occur in such states. In this work automatically generating test cases from the path
discovered during crawling process. Mesbah testing AJAX states through invariants. Mesbah’s
suggested further AJAX research topic in his paper research issues in the automated testing of Ajax
applications [10]. Out of all research issues one issue is to automatic invariant detection. His invariant
based testing was de-pendent on CRWLAJAX and in current research issues described in his paper
best path seeding practice in web application is capture and replay which was not used in his work.
Mesbah proposed in his latest work that invariant based testing is a weak form of an oracle, which can
be used to conduct basic sanity check on the DOM-tree or transition in the de-rived GUI state machine
[25]. For dynamic extraction of states best approach is using any capture and replay tool like Selenium
otherwise AJAX is too dynamic that not able to test that correctly. State space reduction is also current
issue related to state based web testing. State space reduction is an unexplored area. Indeed, path
seeding capture replay technique will help in state space reduction.
VII. FUTURE WORK AND CONCLUSION
In this research paper, the importance of website testing have been highlighted which is one of the new
breed of testing for the past few years. A survey on web testing methods and challenges described
some issues and challenges and ways to avoid same issues. As more and more web technologies have
moved a long way to create web application. Web testing plays an important role. Here in this paper
we discussed two well-known testing techniques:-state based testing and invariant based testing. While
these approaches are tested successful on various case studies, many problem remains, related to
mainly scalability issue. How to capture user session data? How to avoid state explosion problem or
how to reduce state spaces? How to improve FSM recovery steps, in order to automatically infer user
session based test cases. In this research work, DOM manipulation of code into an FSM needs a proper
technique. The experiments conducted in this direction are able to generate test case for semantically
interacting events and proofs are available that long sequences generates huge test cases and having
higher fault exposing capability [25]. Future work can be to reduce state space reduction by applying
any path seeding algorithm for automatically generating FSM.
In this paper, we have covered resemblance and differences between web application testing and
traditional software testing. We considered web testing with respect to various web testing techniques
and Web testing tools. This research paper is providing help to get information about existing web
testing technique, current scenario of web testing and proposing new research direction in web testing
field. The main conclusion is that all testing are fully dependent on implementation technologies and
future testing techniques have to adapt heterogeneous and dynamic nature of web application. This
finding remarks that, there is a need to generate a test environment to test latest web technology
designed web application and exercise each of them. New testing issues can arise for testing web
services for improving effectiveness and efficiency of web.
9. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 9
REFERENCES
[1] K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson. Systematic mapping studies in software
engineering. In 12th International Conference on Evaluation and Assessment in Software
Engineering (EASE), pages 71– 80, 2008.
[2] B. Kitchenham, D. Budgen, and P. Brereton. The value of mapping studies - a participant-observer
case study. In PProceedings of Evaluation and Assessment in Software Engineering, 2010.
[3] B. A. Kitchenham, D. Budgen, and O. P. Brereton. Using mapping studies as the basis for further
research: A participant-observer case study. Journal of Information and Software Technology,
53:638–651, 2011.
[4] D. Budgen, M. Turner, P. Brereton, and B. Kitchenham. Using Mapping Studies in Software
Engineering. In Proceedings of PPIG 2008, pages 195–204. Lancaster University, 2008.
[5] Retrieved from the World Wide Web: http://www.paessler.com/webstress/features
[6] Shea, B. (2000, May/June). Avoiding Scalability Shock. Software Testing & Quality Engineering
Magazine, 42-46.
[7] Marchetto, A., Tonella, P., and Ricca, F. (2008b). State-based testing of Ajax web applications. In
Proc. 1st IEEE Int. Conference on Sw. Testing Verification and Validation (ICST'08), pages 121-
130. IEEE Computer Proceedings of the 23rd International Conference on Software Engineering,
pages 25-34,Society.
[8] Marchetto, A., Ricca, F., and Tonella, P. (2008a). A case study-based compari-son of web testing
techniques applied to ajax web applications. Int. Journal on Software Tools for Technology
Transfer, 10(6):477-492.
[9] Mesbah, A.,Van Deursen, A., Invariant-based automatic testing of Ajax user interfaces. In
Proceedings of the 31st International Conference on Software Engineering (ICSE'09), IEEE
Computer Society, 2009, pages 210-220.
[10] Van Deursen, A.,Mesbah , A., Research Issues in the Automated Testing of Ajax Applications.
In Proceedings 36th International Conference on Current Trend in Theory and Practice of
Computer Science (SOFSEM), pp. 16-28. Lec-ture Notes in Computer Science 5901, Springer-
Verlag, 2010.
[11] Marchetto, A., Ricca, F., and Tonella, P. (2008a). A case study-based compari-son of web
testing techniques applied to ajax web applications. Int. Journal on Software Tools for Technology
Transfer, 10(6):477-492.
[12] Bellettini, C., Marchetto, A., Trentini, A.: Testuml: User-metric driver web applications
testing. In: ACM Symposium on Applied Computing (SAC), New Mexico, USA (2005).
[13] Ricca, F. , Tonella,P. Analysis and testing of web applications, In ICSE ’01 Proceedings of the
23rd International Conference on Software Engineering, pages 25–34, 2001.
[14] Andrews, A., Offutt, J., Alexander, R.: Testing web applications by modeling with FSMs.
Softw. Syst. Model. 4(3) (2005)
[15] Ricca, F. and Tonella,P., Web Testing: a Roadmap for the Empirical Research in WSE'05
Proceedings of the Seventh IEEE International Symposium on Web Site Evolution , pages , 2005
[16] C. Liu, D.C. Kung, P. Hsia, C. Hsu, Object-based data flow testing of Web applications, in:
Proceedinds of the First Asia-Pacific Conference on Quality Software, IEEE Computer Society
Press, Los Alamitos (CA), 2000, pp. 7–16.
[17] Elbaum, S. ,Karre,S., Rothermel,G., Improving web application testing with user session data.
In International conference of software Engineering, pages 49-59, 2003.
10. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 10
[18] Sprenkle,S., Pollock, L., Esquivel, H., Hazelwood,B.,Ecott,S., Automated oracle comparators
for testing web applications. In Proc. 18th IEEE Int. Symp. on Sw. Reliability (ISSRE'07), pages
117-126. IEEE Computer Society, 2007.
[19] Fujiwara, S., Bochmann, G., Khendek, F., Amalou, M., Ghedasmi, A. , Test selection based on
finite state models, IEEE Transactions on Software Engi-neering 17(6):591-603, June 1991
[20] Chow T (1978) Testing software designs modeled by finite state machines. IEEE Transactions
on Software Engineering SE-4(3):178-187, May
[21] Hower, R., Web site Test Tools and Site management Tools. Software QA and testing resource
center.http://www.softwareqatest.com/qatweb1.html>2011 (accessed Aug 23, 2011)
[22] Park,S., Kwon,G.: Avoidance of State Explosion Using Dependency Analysis in Model
Checking Control Flow Model. ICCSA (5) 2006: 905-911
[23] G. A. D. Lucca and A. R. Fasolino, ―Testing Web-based Applications: The State of the Art
and Future Trendsǁ, Information and Software Technology, vol. 48, 2006, pp. 1172-1186.
[24] Marchetto, A., Tonella, P., Search-based testing of ajax web applications. In: Proc. of IEEE
international symposium on search based software engineering (SSBSE). IEEE Computer Society,
Windsor 2009 , pp 3-13.
[25] Marchetto, A., Tonella, P., Using search-based algorithms for Ajax event se-quence generation
during testing, 2010.
[26] Mesbah, A., Bozdag, E., and van Deursen, A. (2008). Crawling Ajax by infer-ring user
interface state changes. In Proc. 8th Int. Conference on Web Engi-neering (ICWE'08), pages 122-
134. IEEE Computer Society.