An Innovative Framework for Automated Software Testing and Validation

Authors

  • Noman Arshid Department of Information Technology, Superior University, Lahore, 54000, Pakistan Author
  • Riasat Ali Department of Computer Science, Superior University, Lahore, 54000, Pakistan Author
  • Hafiz Shoaib Ur Rahman Department of Information Technology, Superior University, Lahore, 54000, Pakistan Author
  • Sadia Watara Department of Computer & Mathematical Sciences, New Mexico Highlands University Las Vegas, USA Author
  • Muhammad Waseem Iqbal Department of Software Engineering, Superior University, Lahore, 54000, Pakistan Author
  • Saleem Zubair Ahmad Department of Software Engineering, Superior University, Lahore, 54000, Pakistan Author
  • Sadaquat Ali Ruk Department of Computer Science, Shah Abdul Latif University, Ghotki Campus, Pakistan Author
  • Zulfiqar Ali Ayaz Department of Information Technology, Superior University, Lahore, 54000, Pakistan Author

DOI:

https://doi.org/10.61506/01.00234

Keywords:

V and V (Verification and Validation), Automation Systems, Framework for Windows, Method.

Abstract

The rising scale and the intricate nature of these systems make the verification & validation (V&V) of classifications that are automated more costly and to much time-taking. Furthermore, the V and V  of the following systems might be hampered if the techniques and procedures are not effectively documented, assessed, and selected. Practitioners must employ appropriate V and V methodologies and conduct acceptable V and V procedures to ensure the following systems perform as proposed and in  cost-effective way. Earlier efforts have produced several categorizations and models that may be used to categorize V and V approaches and technologies. The goal of this study is to give a wide, comprehensive, and simple framework for characterization needs, rather than focusing on particular parts of V and V methodologies and procedures. To that purpose, in this study, we provide a multi-domained and multi-dimensioned framework for characterizing and classifying V and V approaches and tools in an organized manner. The framework reflects a complete description of several key features of V&V. As an example of usage, a web-based repository has been created based upon the framework to gather information regarding the use of V and V approaches and tackles. Experts and scholars may readily learn about and select acceptable V and V procedures this way.

References

Ahamed, M., Tewolde, G., & Kwon, J. (2018). Software-in-the-Loop Modeling and Simulation Framework for Autonomous Vehicles (p. 0310).

Awais, M., Tahir, M., Farid, R., Zubair, S., Iqbal, M. waseem, & Hamid, K. (2023). Guide-A Tool To Detect The Gui Elements To Enhance The Efficiency Of Testing. 42, 55–69.

de la Vara, J. L., Ruiz, A., Attwood, K., Espinoza, H., Panesar-Walawege, R. K., López, Á., del Río, I., & Kelly, T. (2016). Model-based specification of safety compliance needs for critical systems: A holistic generic metamodel. Information and Software Technology, 72, 16–30.

Goncharov, S., Neves, R., & Proença, J. (2020). Implementing Hybrid Semantics: From Functional to Imperative. In V. K. I. Pun, V. Stolz, & A. Simao (Eds.), Theoretical Aspects of Computing – ICTAC 2020 (pp. 262–282). Springer International Publishing.

Hamid, K., Ibrar, M., Delshadi, A. M., Hussain, M., Iqbal, M. W., Hameed, A., & Noor, M. (2024). ML-based Meta-Model Usability Evaluation of Mobile Medical Apps. International Journal of Advanced Computer Science and Applications (IJACSA), 15(1), Article 1.

Hamid, K., Iqbal, M. waseem, Aqeel, M., Liu, X., & Arif, M. (2023). Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) (pp. 248–262).

Hamid, K., Iqbal, M. waseem, Aqeel, M., Rana, T., & Arif, M. (2023). Cyber Security: Analysis for Detection and Removal of Zero-Day Attacks (ZDA) (pp. 172–196).

Hamid, K., Iqbal, M. waseem, Ashraf, M. U., & Gardezi, A. (2022). Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks. Computers, Materials & Continua, 74, 4221–4238.

Hamid, K., Iqbal, M. waseem, Muhammad, H., Fuzail, Z., & Nazir, Z. (2022). ANOVA Based Usability Evaluation Of Kid’s Mobile Apps Empowered Learning Process. Qingdao Daxue Xuebao(Gongcheng Jishuban)/Journal of Qingdao University (Engineering and Technology Edition), 41, 142–169.

Hamid, K., Iqbal, M. waseem, Nazir, Z., Muhammad, H., & Fuzail, Z. (2022). Usability Empowered By User’s Adaptive Features In Smart Phones: The Rsm Approach. Tianjin Daxue Xuebao (Ziran Kexue Yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 55, 285–304. https://doi.org/10.17605/OSF.IO/6RUZ5

Hamid, K., Muhammad, H., Iqbal, M. waseem, Bukhari, S., Nazir, A., & Bhatti, S. (2022). ML-Based Usability Evaluation Of Educational Mobile Apps For Grown-Ups And Adults. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 41, 352–370.

Hamid, K., Muhammad, H., Iqbal, M. waseem, Hamza, M., Bhatti, S., Bukhari, S., & Bahadad, A. (2022). Extendable Banhatti Sombor Indices For Modeling Certain Computer Networks. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 41, 69–87.

Ibrahim, A., Al-Rajab, M., Hamid, K., Aqeel, M., Muneer, S., Parveen, M., & Saleem, M. (2023). Usability Evaluation of Kids’ Learning Apps (p. 10). IEEE Standard for System and Software—ProQuest. (n.d.). Retrieved April 28, 2024.

Iqbal, M. W., Hamid, K., Ibrar, M., & Delshadi, A. (2024). Meta-Analysis and Investigation of Usability Attributes for Evaluating Operating Systems. Migration Letters, 21, 1363–1380.

Rasool, N., Khan, S., Haseeb, U., Zubair, S., Iqbal, M. waseem, & Hamid, K. (2023). Scrum And The Agile Procedure’s Impact On Software Project Management. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 42, 380–392.

Salahat, M., Said, R., Hamid, K., Haseeb, U., Ghani, E., Abualkishik, A., Iqbal, M. waseem, & Inairat, M. (2023). Software Testing Issues Improvement in Quality Assurance (p. 6).

Schumann, J., & Goseva-Popstojanova, K. (2019). Verification and Validation Approaches for Model-Based Software Engineering (p. 518).

Syed, W., Ahmed, A., Zubair, S., Iqbal, M. waseem, Arif, S., & Hamid, K. (2023). Fuzzy-Based Expert System For Test Case Generation On Web Graphical User Interface For Usability Test Improvement. 42, 549–565.

Verification and Validation of Automated Systems’ Safety and Security | VALU3S Project | Results | H2020. (n.d.). CORDIS | European Commission. Retrieved April 28, 2024.

Verification and Validation: Overview. (n.d.). AcqNotes. Retrieved April 28, 2024.

Yang, Y., Mclaughlin, K., Littler, T., Sezer, S., Im, E. G., Yao, Z., Pranggono, B., & Wang, H. (2012). Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems. In IET Conference Publications (Vol. 2012, p. 8).

Zafar, Z., Hamid, K., Kafayat, M., Iqbal, M. waseem, Nazir, Z., & Ghani, A. (2023). AI-Based Cryptographical Framework Empowered Network Security. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 42, 497–510.

Downloads

Published

2024-03-25

Issue

Section

Articles

How to Cite

Arshid, N., Ali, R., Rahman, H. S. U. ., Watara, S. ., Iqbal, M. W. ., Ahmad, S. Z. ., Ruk, S. A. ., & Ayaz, Z. A. . (2024). An Innovative Framework for Automated Software Testing and Validation. Bulletin of Business and Economics (BBE), 13(1). https://doi.org/10.61506/01.00234

Similar Articles

1-10 of 129

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)