An effective method for improving software quality by automated test generation technique


  • Srinivasa Rao S
  • Karthik Reddy T
  • Prasanna Sai N
  • Vamsi Krishna Ch





Software Quality Assurance Report, Software Testing, Test Cases, Test Evaluation, Test Execution, Test Strategy, Test Summary Report.


The general undertaking of the product building is to guarantee conveyance of superb programming to the end client. To ensure great programming, it is required to test programming. Testing is a critical constituent of programming building. In programming testing there are number of fundamental issues like compelling age of experiments, prioritization of experiments which should be handled. This mechanized test structure predominantly relies upon these four angles: test system, experiment age, test execution and test assessment. Test methodology is an accumulation of systems that decides the testing way to deal with be trailed by the testing group. The experiment age alludes to the age of experiments in light of the given application. The test execution briefs about the execution of those tests at that point contrasting the normal outcome and genuine outcome. The test assessment explores the experiments and causes us to produce test rundown report and programming quality confirmation report consequently. The aim of delivering this device is to produce test cases naturally and to diminish the cost of testing notwithstanding collect the season of determining experiments physically. Subsequently this framework enhances general nature of the product.


[1] Mohammad Reza Keyvanpour, Hajar Homayouni and Hossein Shirazee, “Automatic Software Test Case Generation: An Analytical Classification Framework†at International Journal of Software Engineering and Its Applications Vol. 6, No. 4, October, 2012.

[2] Rosziati Ibrahim, Mohd Zainuri Saringat, Noraini Ibrahim and Noraida Ismail, “An Automatic Tool for Generating Test Cases from the System's Requirements†at Seventh International Conference on Computer and Information Technology.

[3] Mr. Navnath Shete, Mr. Avinash Jadhav “An Empirical Study of Test Cases in Software Testing†at ICICES2014 - S. A. Engineering College, Chennai, Tamil Nadu, India.

[4] Isabella and Emi Retna, “Study Paper On Test Case Generation For GUI Based Testing†at International Journal Of Software Engineering & Applications, Vol.3, No.1, January 2012.

[5] Nicha Kosindrdecha and Jirapun Daengdej, “A Test Case Generation Technique and Processâ€.

[6] Itti Hooda and Rajender Chhillar “A Review: Study of Test Case Generation Techniques†at International Journal of Computer Applications (0975 – 8887) Volume 107 – No. 16, December 2014.

[7] Karambir and Kuldeep Kaur, “Survey of Software Test Case Generation Techniques†at International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013.

[8] Steven P. Reiss, “Towards Creating Test Cases Using Code Search†at IEEE International Conference on Software Maintenance and Evolution 2014.

[9] A. Masood, R. Bhatti, A. Ghafoor, and A. Mathur, “Scalable and effective test generation for role based access control systems,†IEEE Trans. Softw. Eng., vol. 35, no. 5, pp. 654–668, 2009.

[10] W. Mallouli, J.M. Orset, A. Cavalli, N. Cuppens, and F. Cuppens, “A formal approach for testing security rules,†in Proc. 12th ACM. Symp. Access Control Models and Technologies, 2007, pp. 127–132.

[11] A. Pretschner, Y. L. Traon, and T. Mouelhi, “Model-based tests for access control policies,†in Proc. 1st Int. Conf. Software Testing Verification and Validation (ICST'08), Lillehamer, Norway, Apr. 2008.

[12] J. Julliand, P. A. Masson, and R. Tissot, “Generating security tests in addition to functional tests,†in Proc. 3rd Int. Workshop Automation of Software Test, 2008, pp. 41–44.

[13] H. Huang and H. Kirchner, “Formal specification and verification of modular security policy based on colored Petri nets,†IEEE Trans. Depend. Secure Comput., vol. 8, no. 6, pp. 852–865, Nov./Dec. 2011.

[14] K. H. Mortensen, “Automatic code generation method based on coloured Petri net models applied on an access control system,†in Application and Theory of Petri Nets. New York, NY, USA: Springer-Verlag, 2000, pp. 367–386.

[15] A. Marback, H. Do, K. He, S. Kondamarri, and D. Xu, “A threat model-based approach to security testing,†in Software: Practice and Experience, Expanded Version of the AST'09 Workshop Paper, Feb. 2013, vol. 43, pp. 241–258.

View Full Article: