A Review on Quality Assurance of Component- Based SoftwareSystem
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Among the various challenges to industry, the major challenge is to offer products with high level ofquality andfunctionality at inexpensive value and short time and energy to market. Component-based softwaredevelopment(CBSD) approach have become quite popular from the point of view of quality assurance. The mostcaptivating reason for embracing CBSD approach is the conjecture of reuse. The goal of this study is tocomprehend categorize and inspect prevailing research in CBSD field from quality point of view. The mainfocus is given onproposals that are accustomed to assess the quality of component- based software system(CBSS). This paper represents the methodology through which the quality of component-based software systemcan be assured. Quality assurance is taken as a vital research term. In this paper, two main approaches forassuring quality are taken under consideration: encapsulation and composition rules. Functional and nonfunctional properties are encapsulated as an individual unit to be able to fulfill the product quality demands. Inthis paper, focus is given on two main quality attributes: predictability and reusability. This paper analyze theprior work being prepared for quality assurance and compare the work on the foundation of their researchmethodology. No matter what but it is very difficult to develop a software system by fulfilling all the qualitydemands and because of this reason a more determined attempt is required to meet an improved assessmentapproach in the future.
Authors and Affiliations
Parminder Kaur , Navdeep Batolar
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols
Abstract: In mobile adhoc network nodes dynamically forms networks, there is no any central infrastructure, thus routing becomes a very important issue. Routing protocols used in mobile ad hoc networks (MANET) must...
SQL Injection Prevention by Adaptive Algorithm
Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever t...
Efficient and Accurate Target Sensor Tracking in Wireless Sensor Networks
Abstract: In the tracking scheme illustrated, where the sensors are deployed in a triangular fashion in a hexagonal mesh such that the hexagon is divided into a number of equilateral triangles. Where the technique is use...
Minimization of Side Effects of Knowledge Hiding Based On Association Rule Mining
Abstract: Privacy is very important in Data Mining. Association rule mining, is a important technique, has already been applied in a wide range of areas. Large databases cannot be secured by encryption or other tec...