slugEffective Software Testing Approach for Priority Based Testing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 5
Abstract
Testing is an important process that is performed to support quality assurance. Testing activities support quality assurance by gathering information about the nature of the software being studied. Software test cases prioritization is the process used for providing priority to the test cases which are built by dividing the number of test cases in to number of modules. Selection of test cases is also a challenge in the testing and priority of testing for various test cases are also required. In this paper, we put more work on priority of the test cases and also shown the comparison over priority of the test cases and without priority of the test cases. In this paper we have done experimentation based on the testing cases prioritization process with graphical user interface testing process.
Authors and Affiliations
Supriya, Manish Mahajan
A Study on Error Coding Techniques
There are numerous error coding techniques in the field of digital communication. They are utilized to detect/correct single bit or multiple bit errors. In this paper commonly used codes like Hamming codes, CRC and Reed...
Dehydrated greens as natural fortificant for Combating Micronutrient Deficiencies
Micronutrients are substances which are needed only in minuscule amounts. They are known as “magic wands” as they enable proper growth and development. These nutrients are needed by the body in minute amounts and play l...
Design and Stress Analysis of Metal Matrix Composite Single Cylinder 4 Stroke Engine Crankshaft
generally the crankshaft analysis is done in the analysis software ANSYS by designing in the modelling software UNIGRAPHICX NX8 as per standards, discretization of the model in the meshing tool HYPERMESH and analysis is...
Integration of Solar Renewable Energy Source with Dynamic Wireless Power Transfer in Recharging IR Based Receivers
In the existing device, restricted strength at each node in Wireless Sensor Networks (WSNs) is understood to be the principal hurdle of their design and operation. Wireless power transmission continues to be in a resear...
slugIssues of Privacy and Confidentiality in Cloud Computing
Cloud computing means entrusting data to information systems that are managed by external parties on remote servers “in the cloud.”Webmail and online documents (such as Google Docs) are well - known ex...