An Innovative Framework for Automated Software Testing and Validation
DOI:
https://doi.org/10.61506/01.00234Keywords:
V and V (Verification and Validation), Automation Systems, Framework for Windows, Method.Abstract
The rising scale and the intricate nature of these systems make the verification & validation (V&V) of classifications that are automated more costly and to much time-taking. Furthermore, the V and V of the following systems might be hampered if the techniques and procedures are not effectively documented, assessed, and selected. Practitioners must employ appropriate V and V methodologies and conduct acceptable V and V procedures to ensure the following systems perform as proposed and in cost-effective way. Earlier efforts have produced several categorizations and models that may be used to categorize V and V approaches and technologies. The goal of this study is to give a wide, comprehensive, and simple framework for characterization needs, rather than focusing on particular parts of V and V methodologies and procedures. To that purpose, in this study, we provide a multi-domained and multi-dimensioned framework for characterizing and classifying V and V approaches and tools in an organized manner. The framework reflects a complete description of several key features of V&V. As an example of usage, a web-based repository has been created based upon the framework to gather information regarding the use of V and V approaches and tackles. Experts and scholars may readily learn about and select acceptable V and V procedures this way.
References
Ahamed, M., Tewolde, G., & Kwon, J. (2018). Software-in-the-Loop Modeling and Simulation Framework for Autonomous Vehicles (p. 0310).
Awais, M., Tahir, M., Farid, R., Zubair, S., Iqbal, M. waseem, & Hamid, K. (2023). Guide-A Tool To Detect The Gui Elements To Enhance The Efficiency Of Testing. 42, 55–69.
de la Vara, J. L., Ruiz, A., Attwood, K., Espinoza, H., Panesar-Walawege, R. K., López, Á., del Río, I., & Kelly, T. (2016). Model-based specification of safety compliance needs for critical systems: A holistic generic metamodel. Information and Software Technology, 72, 16–30.
Goncharov, S., Neves, R., & Proença, J. (2020). Implementing Hybrid Semantics: From Functional to Imperative. In V. K. I. Pun, V. Stolz, & A. Simao (Eds.), Theoretical Aspects of Computing – ICTAC 2020 (pp. 262–282). Springer International Publishing.
Hamid, K., Ibrar, M., Delshadi, A. M., Hussain, M., Iqbal, M. W., Hameed, A., & Noor, M. (2024). ML-based Meta-Model Usability Evaluation of Mobile Medical Apps. International Journal of Advanced Computer Science and Applications (IJACSA), 15(1), Article 1.
Hamid, K., Iqbal, M. waseem, Aqeel, M., Liu, X., & Arif, M. (2023). Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) (pp. 248–262).
Hamid, K., Iqbal, M. waseem, Aqeel, M., Rana, T., & Arif, M. (2023). Cyber Security: Analysis for Detection and Removal of Zero-Day Attacks (ZDA) (pp. 172–196).
Hamid, K., Iqbal, M. waseem, Ashraf, M. U., & Gardezi, A. (2022). Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks. Computers, Materials & Continua, 74, 4221–4238.
Hamid, K., Iqbal, M. waseem, Muhammad, H., Fuzail, Z., & Nazir, Z. (2022). ANOVA Based Usability Evaluation Of Kid’s Mobile Apps Empowered Learning Process. Qingdao Daxue Xuebao(Gongcheng Jishuban)/Journal of Qingdao University (Engineering and Technology Edition), 41, 142–169.
Hamid, K., Iqbal, M. waseem, Nazir, Z., Muhammad, H., & Fuzail, Z. (2022). Usability Empowered By User’s Adaptive Features In Smart Phones: The Rsm Approach. Tianjin Daxue Xuebao (Ziran Kexue Yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 55, 285–304. https://doi.org/10.17605/OSF.IO/6RUZ5
Hamid, K., Muhammad, H., Iqbal, M. waseem, Bukhari, S., Nazir, A., & Bhatti, S. (2022). ML-Based Usability Evaluation Of Educational Mobile Apps For Grown-Ups And Adults. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 41, 352–370.
Hamid, K., Muhammad, H., Iqbal, M. waseem, Hamza, M., Bhatti, S., Bukhari, S., & Bahadad, A. (2022). Extendable Banhatti Sombor Indices For Modeling Certain Computer Networks. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 41, 69–87.
Ibrahim, A., Al-Rajab, M., Hamid, K., Aqeel, M., Muneer, S., Parveen, M., & Saleem, M. (2023). Usability Evaluation of Kids’ Learning Apps (p. 10). IEEE Standard for System and Software—ProQuest. (n.d.). Retrieved April 28, 2024.
Iqbal, M. W., Hamid, K., Ibrar, M., & Delshadi, A. (2024). Meta-Analysis and Investigation of Usability Attributes for Evaluating Operating Systems. Migration Letters, 21, 1363–1380.
Rasool, N., Khan, S., Haseeb, U., Zubair, S., Iqbal, M. waseem, & Hamid, K. (2023). Scrum And The Agile Procedure’s Impact On Software Project Management. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 42, 380–392.
Salahat, M., Said, R., Hamid, K., Haseeb, U., Ghani, E., Abualkishik, A., Iqbal, M. waseem, & Inairat, M. (2023). Software Testing Issues Improvement in Quality Assurance (p. 6).
Schumann, J., & Goseva-Popstojanova, K. (2019). Verification and Validation Approaches for Model-Based Software Engineering (p. 518).
Syed, W., Ahmed, A., Zubair, S., Iqbal, M. waseem, Arif, S., & Hamid, K. (2023). Fuzzy-Based Expert System For Test Case Generation On Web Graphical User Interface For Usability Test Improvement. 42, 549–565.
Verification and Validation of Automated Systems’ Safety and Security | VALU3S Project | Results | H2020. (n.d.). CORDIS | European Commission. Retrieved April 28, 2024.
Verification and Validation: Overview. (n.d.). AcqNotes. Retrieved April 28, 2024.
Yang, Y., Mclaughlin, K., Littler, T., Sezer, S., Im, E. G., Yao, Z., Pranggono, B., & Wang, H. (2012). Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems. In IET Conference Publications (Vol. 2012, p. 8).
Zafar, Z., Hamid, K., Kafayat, M., Iqbal, M. waseem, Nazir, Z., & Ghani, A. (2023). AI-Based Cryptographical Framework Empowered Network Security. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 42, 497–510.