Development of Software Testing Techniques for Early Fault Detection

Autor: Dr Piyush Kumar Pareek
Jazyk: angličtina
Rok vydání: 2021
Předmět:
DOI: 10.5281/zenodo.4432315
Popis: The study in the paper instigates about the techniques of finding the early fault finding in the software. The research work is associated with the fact of finding the problems in analytical way and by taking the action ranging from automation to the code identification to parallel implementation to code redundancy etc. The result of the study releases the multiple factors in finding the different stages of testing. That may lead to the quality, flexibility and good quality of production. The research shows that there are more problems found at the test point. Most of the research study is based on CTD - Combinatorial Test Design (CTD) techniques. One of the most popular CTD is OATS which is Orthogonal Array Based Testing Strategy, which decides on variable interactions.
{"references":["Shan, C., Chen, B., Hu, C., Xue, J., & Li, N. (2014). Software defect prediction model based on LLE and SVM.","Moyo, S., & Mnkandla, E. (2020). A Novel Lightweight Solo Software Development Methodology With Optimum Security Practices. IEEE Access, 8, 33735-33747.","Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Mathov, Y., Bhairav, S., ... & Elovici, Y. (2019). Security testbed for internet-of-things devices. IEEE Transactions on Reliability, 68(1), 23-44.","Zhao, X., Xue, J., Hu, C., Ma, R., & Zhang, S. (2014). Research on software behavior modeling based on extended finite state automata.","Dong, H., Li, C., Li, T., Du, Y., & Xu, G. (2014). Research on the security model of mobile application.","Márquez, G., Astudillo, H., & Taramasco, C. (2020). Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access, 8, 10933-10950.","Eom, T., Hong, J. B., An, S., Park, J. S., & Kim, D. S. (2019). A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. Ieee Access, 7, 137432-137445.","Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P. (2019). Smart contract security: A software lifecycle perspective. IEEE Access, 7, 150184-150202.","Cornish, P. L., Knowles, S. R., Marchesano, R., Tam, V., Shadowitz, S., Juurlink, D. N., & Etchells, E. E. (2005). Unintended medication discrepancies at the time of hospital admission. Archives of internal medicine, 165(4), 424-429.","T Tam, V. C., Knowles, S. R., Cornish, P. L., Fine, N., Marchesano, R., & Etchells, E. E. (2005). Frequency, type and clinical importance of medication history errors at admission to hospital: a systematic review. Cmaj, 173(5), 510-515."]}
Databáze: OpenAIRE