Regression Test Suite Prioritization Using Hill Climbing Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: Regression testing is an expensive, but important action in software testing. Unfortunately, there may be bereft assets to acquiesce for the re-execution of all analysis cases during corruption testing. In this situation, analysis case prioritization techniques aim to advance the capability of corruption testing by acclimation the analysis cases so that a lot of benign are accomplished first. In this cardboard we adduce a new analysis case prioritization technique Using Hill climbing Algorithm. The proposed address prioritizes subsequences of the Original analysis apartment so that the new suite, which is run a time-constrained beheading environment, will accept the above amount of accountability apprehension if compared of randomlyPrioritized analysis suites. This agreement analyzes Hill Climbing algorithm with attention to capability and time aerial by utilizing structurally-based archetype to accent test Cases. An Average Percentage of FaultsDetected (APFD) metric is acclimated to actuate the capability of the new analysis case orderings.
Authors and Affiliations
D. Vivekananda Reddy , Dr. A. Rama Mohan Reddy
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...
Survey on Security Vulnerabilities in Cloud Computing Environment
Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. Cloud services are becoming an...
The Vulnerabilities of Cloud Computing: Security Threats
Clouds give an intense figuring stage that empowers people and associations to perform assortment levels of undertakings, for example, utilization of online storage room, selection of business applications, improvement o...
Improving search time for contentment based image retrieval via, LSH, MTRee, and EMD bounds
Comparison of images requires a distance metric that is sensitive to the spatial location of objects and features. The Earth Mover’s Distance was introduced in Computer Vision to better approach human perceptua...
Advanced Lightweight BFT Process ForTrustworthy Management inWeb Services Computing System
Abstract: The project entitled as “Trustworthy Coordination of Web Services Atomic Transactions”. The consumer will enter their customer id and PIN for accessing their account details. They can view all the account...