An Innovative Approach to Investigate Various Software Testing Techniques and Strategies

Software testing is a way of finding errors from the system. It helps us to identify and debug mistakes, errors, faults and failures of a system. There are many techniques and strategies emerged since the concept of software development emerged. The aim of testing is to make the quality of software as efficient as possible.in this paper we discuss most widely used techniques and strategies. Where they can be used and how they can be used. How they work and how they differ (from each other).They are the following. Techniques: Black Box Testing, White Box Testing, And Grey Box Testing. Strategies: Unit Testing, System Testing, And Acceptance Testing.

[1]  Mohd. Ehmer Khan Different Approaches To Black box Testing Technique For Finding Errors , 2011 .

[2]  Mian Ahmad Jan,et al.  A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .

[3]  Salman,et al.  A Novel Survey on : Mobility Based Routing in Vehicular Ad-Hoc Networks ( Vanets ) , 2014 .

[4]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[5]  William Lewis,et al.  Software Testing and Continuous Quality Improvement , 2000 .

[6]  Roger S. Pressman,et al.  Software Engineering: A Practitioner's Approach , 1982 .

[7]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[8]  Fazlullah Khan,et al.  Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[9]  Mian Ahmad Jan,et al.  Energy-efficient routing and secure communication in wireless sensor networks , 2016 .

[10]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[11]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[13]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[14]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[15]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[16]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[17]  Srinivas Nidhra,et al.  BLACK BOX AND WHITE BOX TESTING TECHNIQUES -A LITERATURE REVIEW , 2012 .