Computer Engineering Department: Canada Corner, Sharanpur Road, Nashik-422 002
Computer Engineering Department: Canada Corner, Sharanpur Road, Nashik-422 002
Assignment Title: Testing of project problem statement using generated test data (using mathematical
models, GUI, Function testing principles, if any) selection and appropriate use of testing tools, testing of
UML diagram’s reliability.
Assignment No: 07
Guide Remark:……………………………………………………………………………………………………………………………
1. Automated Testing
Automation Testing, which is also known as test automation, is when tester writes sripts
and uses other software to test product. This process involves automation of a manual
process. Automation testing is used to re-run the test scenario that were perform
manually, quickly, and repeatedly. Apart from regression testing, automation testing is also
used to test coverage, improves accuracy, and saves time and memory in comparison to
manual testing.
2. Functional Testing
Functional testing is a software testing process used within software development in which
software is tested to ensure that it conforms with all requirements. Functional testing is a way
of checking software to ensure that it has all the required functionality that's specified within
its functional requirements.
3. Combinatorial Testing
Combination testing refers to tests that involve more than one variable.
A critical problem for multi-variable testing is called combinatorial explosion. The more
variables you combine, the higher the number of possible tests. Combination testing is about
picking a few tests that can teach us what we need to know about the space of combinations of
these variables.
4. Structural Testing
Structural testing, also known as glass box testing or white box testing is an approach where the
tests are derived from the knowledge of the software's structure or internal implementation.
The other names of structural testing includes clear box testing, open box testing, logic driven
testing or path driven testing.
Data flow testing is a family of test strategies based on selecting paths through the program's
control flow in order to explore sequences of events related to the status of variables or data
objects. Dataflow Testing focuses on the points at which variables receive values and the points
at which these values are used.
6. Model-Based Testing
Model-based testing is an application of model-based design for designing and optionally also
executing artifacts to perform software testing or system testing. Models can be used to
represent the desired behavior of a System Under Test (SUT), or to represent testing strategies
and a test environment.
8. Fault-Based Testing
A theory of fault-based program testing is defined and explained. Testing is fault-based when it
seeks to demonstrate that prescribed faults are not in a program. It is assumed that a program
can only be incorrect in a limited fashion specified by associating alternate expressions with
program expressions. Classes of alternate expressions can be infinite. Substituting an alternate
expression for a program expression yields an alternate program that is potentially correct. The
goal of fault-based testing is to produce a test set that differentiates the program from each of
its alternates. A particular form of fault-based testing based on symbolic execution is presented.
9. Test Execution
Test execution are done by comparing the previous system of it so that the test executions of
our current system can
be over it. And the disadvantages can also be covered with our proposed model. By taking a
survey of every
message sending algorithms an methods our approach gives a robust protection from brute
force attack. Statistical
code table here helps in encoding the data. Test execution in the runtime environment of our
software will result a
success as it will be developed.
10. Inspection
program analysis is the process of automatically analyzing the behavior of computer programs
regarding a property such as correctness, robustness, safety and liveness. Program analysis
focuses on two major areas: program optimization and program correctness. The first focuses o
i pro i g the progra ’s perfor a e hile redu i g the resour e usage hile the latter
focuses on ensuring that the program does what It is supposed to do.
DFD & UML Diagrams and Test Cases:
1. DFD Level 0
Test Case:
N/W Status(Complete/Inco
A User Validation(Yes/No) Valid user(Yes/No)
Connectivity(Yes/No) mplete)
B Static Analysis Atomicity(Yes/No) Consistency(Yes/No) Integrity(Yes/No) Durability(Yes/No)
Dynamic
C Atomicity(Yes/No) Consistency(Yes/No) Integrity(Yes/No) Durability(Yes/No)
Analysis
D DBN Atomicity(Yes/No) Consistency(Yes/No) Integrity(Yes/No) Durability(Yes/No)
2. DFD Level 1
N/W Status(Complete/Inco
A User Validation(Yes/No) Valid user(Yes/No)
Connectivity(Yes/No) mplete)
Static Analysis Atomicity
B Permissions(Yes/No) Validation(Yes/No) Access (Yes/No)
1 (Yes/No)
changing users
Static Analysis Atomicity
C SensitiveAPI(Yes/No) permissions Validation (Yes/No)
2 (Yes/No)
(Yes/No)
Dynamic Atomicity Dynamic
D Execution(Yes/No) Send Data (Yes/No)
Analysis (Yes/No) behaviour(Yes/No)
N/W
characterize Android
E DBN Connectivity Malware(Yes/No) Validation (Yes/No)
apps.
(Yes/No)
3. DFD Level 2
U CD-K Sampling.
No.of
No.of Inward
Class Connectivity Association Collaboration Mapping Outward
Class
Class
Online submitted
app()
User Login Login Login - 4
App integrity
checking()
Required
-User -User permission()
Static -User -
-Static Readable file() 1
Analysis 1
Analysis 2 AndroidManifest
.xml()
Static -User -User -User Sensitive API()
Analysis 2 -Static Disasse led files 1 -
Analysis 1 classes.dex()
Android APK()
Dynamic
-User -User -User DroidBox sandbox() 1 -
Analysis
Dynamic behavior().
-User -User -User Pre-trained()
Deep 1
-DBN -DBN -DBN Back propagation 2
Learning
for fi e-tuning()
RBM initialization()
-Deep -User -User CD-k Sampling()
DBN -Deep -Deep Updating 1 1
Learning
Learning Learning parameter()
RBM Assessment()
6. Test case for Use-Case diagram:
N/W Status(Complete/Inco
A User Validation(Yes/No) Valid user(Yes/No)
Connectivity(Yes/No) mplete)
Static Analysis Atomicity
B Permissions(Yes/No) Validation(Yes/No) Access (Yes/No)
1 (Yes/No)
changing users
Static Analysis Atomicity
C SensitiveAPI(Yes/No) permissions Validation (Yes/No)
2 (Yes/No)
(Yes/No)
Dynamic Atomicity Dynamic
D Execution(Yes/No) Send Data (Yes/No)
Analysis (Yes/No) behaviour(Yes/No)
N/W
characterize Android
E DBN Connectivity Malware(Yes/No) Validation (Yes/No)
apps.
(Yes/No)
Conclusion:
Hence we studies using generated test data (using mathematical models, GUI, Function testing
principles, if any) selection and appropriate use of testing tools, testing of
UML diagram’s reliability.