Professional Documents
Culture Documents
Nformation Management System
Nformation Management System
Nformation Management System
net/publication/305722703
Article in International Journal of Software Engineering and Its Applications · July 2016
DOI: 10.14257/ijseia.2016.10.7.10
CITATIONS READS
0 13,539
4 authors, including:
Asadullah Shah
International Islamic University Malaysia
224 PUBLICATIONS 2,173 CITATIONS
SEE PROFILE
All content following this page was uploaded by Abdul Salam Shah on 24 December 2016.
Abdul Salam Shah1*, Muhammad Fayaz2, Asadullah Shah3 and Shahnawaz Shah4
1
SZABIST, Islamabad, Pakistan
2
University of Malakand, KPK, Pakistan
3
International Islamic University Malaysia (IIUM), Kuala Lumpur, Malaysia
4
University of Sindh, Jamshoro, Pakistan
1*
shahsalamss@gmail.com, 2hamaz_khan@yahoo.com,
3
asadullah@iium.edu.my, 4shahnawaz@usindh.edu.pk
Abstract
The police stations have adequate importance in the society to control the law and
order situations of the country. In Pakistan, police stations manage criminal records and
information manually. We have previously developed and improved a desktop application
for the record keeping of the different registers of the police stations. The data of police
stations is sensitive and that need to be handled within secured and fully functional
software to avoid any unauthorized access. For the proper utilization of the newly
developed software, it is necessary to test and analyze the system before deployment into
the real environment. In this paper, we have performed the testing of an application. For
this purpose, we have used Ranorex, automated testing tool for the functional and
performance testing, and reported the results of test cases as pass or fail.
1. Introduction
The software developed for the Police Stations of Pakistan needs a proper assessment
of its functionalities. The developed application (software) will store data in an organized
form and searching of records will be easier as compared to the manual system. It also
enhances the efficiency of the Police without extra efforts required for record keeping and
accessing [1]. The improvement in the software quality is totally dependent on the level of
understanding of what the software is performing and how it is performing the tasks?
The better analysis and understanding of the development process of software plays
and important role in both; the scientific and practice area of software engineering [2].
The assessments can be classified into developer oriented, carried by developer and
customer oriented carried by the customer or third party [3-4]. Another dominant areas of
research in the software assessment are how to combine the metrics to get the higher level
of assessment value for the software and its processes? [5]. The analysis tools take less
time and cost, but they are not fully reliable, the expert based assessment takes place
manually and that takes too much time and higher cost. The professionalism and expertise
level of the experts are the key factors for the success of analysis [2]. The availability of
developer at the time of customer oriented assessment makes the assessment easier
because the developer understands the software better and can perform more analytical
evaluations [6-7].
However, the availability of developer during assessment has disadvantages. Often, the
developer might not want to tell the flaws of software to others due to his reputation [2].
*
Corresponding Author
The comparison of developer and customer oriented assessment is not easier in terms of
the difficulty.
The assessment is also dependent upon the expertise of the people and the level of the
complexity of assessment [2, 8]. In human based assessment, there is also subjectivity
factor that needs to be minimized. The assessment from the developer has some factor of
bias too, but the assessment from the third party is free from the personal bias. The
personal assessment is important and cannot be neglected because the software is also
developed by human developers, not the machines or software and the humans can better
analyze it than others. Even some automated tools require personal attention and analysis
of every step to improve and maintain the quality of the software, so we cannot totally
rely upon the software assessment tools [2, 9].
The data of police is quite sensitive, so the developed application needs to be tested
properly, and before the deployment, it needs to pass almost 90% of the tests in order to
ensure reliability, security and functionality of the application. The critical components of
the application must be tested against as much as possible test cases. The test cases can be
from installation, login, and layout to complex functioning of the system like crime
register and its search options but here it will not be possible to perform the exhaustive
testing because it takes extra time [8-9].
In this study, we have performed the testing of important functionalities of developed
software for the police department which is not yet tested for the implementation in the
police stations [1]. The manual testing of the system takes time and extra effort to avoid
that we have used Ranorex which is an automated testing tool, further we have also used
manual testing wherever required.
The remaining paper is: in Section 2 literature review is presented, Section 3 discusses
some challenges, Section 4 Methodology, Section 5 Testing Tools Used, Section 6 testing
environment, Section 7 coding, Section 8 Verification and Validation Process, and finally
in Section 9 the conclusion of the study is provided.
2. Literature Review
Remencius et. al., in [2], have performed the assessment for Italian public
administrative applications and reported in the form of case study. The Italy
administration has provided software for the assessment in terms of security, quality and
performance. They have more concern to ensure that software is protected from
unauthorized access and only the authorized users can access their system data and the
system can handle 2000 clients at a time. The different components of software have to be
deployed on more than one servers and also two different databases i. e., Oracle and
MySQL. The software has been developed in Java. The assessment of the system was
carried out in the six parts and in agile like fashion; with feedbacks about the assessment
from the administration and ensuring that everything is according to their needs.
The assessment of the structure of code was performed in code metrics, which were
calculated with the static code analysis tool. The analysis was carried out by experts of
Java and JavaScript and the configuration of the system was also analyzed [10-11]. Some
automated assessment tools has been used, but the results were not reliable, that’s why
authors have used manual assessment.
The expert’s opinions were used, at the end, no serious issues were identified with the
spring framework code. In the case of ambiguities, the guesses were used and as well as
experts opinions. The assessment from the client side has been easier because of the best
practice guide from IBM. The major part of the analysis of Dojo Toolkit was also manual
and performed by the experts. The system has some issue with the speed; it performed
slower with the older versions of the internet explorer. The reason of slower speed can be
the code or other external or internal factors. The system has been tested against Mozilla,
Chrome, and Internet Explorer. To test performance of the system as per requirement of
the administration as 2000 users live at the same time, Apache J-Meter has been used
[12]. Multiple distributed machines have been used for the testing, some performance
issues have been identified during stress testing. The experts have done assessment
manually, first, the detailed inspection of code has been carried out to detect the
configuration and design issues. Then, security exposures have been identified by sending
some unauthorized requests of data modification and introducing malicious activities with
the help of Apache J-Meter.
Sarigiannidis, et. al., in [13], have carried out a study on software development projects
for the investigation of the relationship between people quality, process quality, and risk.
The structural modeling techniques were used to analyze the empirical data. The people
quality has a negative impact on the project risk level as concluded from the main results
of the study. On the other side, the process quality has slightly limited effects, the only
risk due to the project team.
The software’s success depends on its quality, effectiveness, and completeness. The
management of the software development projects is quite difficult besides the issue of
the quality of the software, the software's incorporate complex characteristic, the same are
not associated with other projects of different fields of study. The software has risk
associated like budget overrun, delays in the projects, weakness to respond the
requirements of the users [14].
The study has been carried on the 220 different Greek software related companies that
are developing different projects in the country. The participating companies had to
choose the project under development at that time, also the other important requirement
that they have to tell about the human resource involved in that project. The process
quality and people quality were used to measure the total project quality. The research
depends on different kind of data collected from different nature of projects teams having
different characteristics, which covered several perspectives of people with dissimilar
levels of responsibilities in the development process. Among the all factors the software
requirements have the highest exposure to risk and the organizational environment at the
lowest level. These findings of the study suggest that the proper training of staff and
communication with their personnel and proper staffing according to the skills of staff
must be ensured in the software companies of Greek.
Zhi et. al., in [15] have summarized the published literature of software documentation
cost, benefit, and quality. The literature has been selected by systematic mapping
technology. The investigation of the document like requirement, design, implementation
and test, in addition, the code comments were carried out. The time that has been
consumed during software development and the effort of the software development team
are referred here as the cost of the project. The major cost driver during the software
development process is the efforts consumed in documentation.
The artifact which is developed requires enough amount of cost in terms of time and
other facts, the same artifact should be used for the development and maintenance phase
otherwise the cost spent on it will be useless and is a huge loss. The benefits of an artifact
can be mentioned in terms of reduction in the duration of the task, improvement in the
quality of code, increase the productivity, but not limited to these can be of any type of
improvements related to software development. They have targeted on the documents of
development phase in terms of cost, benefit and quality. The study has focused on the
development documentation. The documents about the software structure known as
architecture documentation, are considered as the type of design, which define that how
the system will be built and the other technical details about the software.
The total number of 69 papers in the relevant field has been selected. The relationship
model was derived between the entities during the documentation process for the analysis
of cost or benefit of documentation. The development and maintenance tasks are
performed by the practitioner, the tasks consume a particular amount of effort that can be
measured in units that can be considered as an attribute of the task. The task is further
divided into pre-maintenance and maintenance tasks. The maintenance tasks can be
further divided into corrective, perfective, adaptive and preventive maintenance tasks.
Each maintenance task is further divided into two steps as comprehension of the program
and subsequent manipulation of modification. The typical document management system
of infrastructure to access software documents is mostly utilized by software practitioner
for easiness of the management of the documents. It is understood that the well-
structured documents are easier to read as compared to the unstructured and fuzzy
documents, that why the documents structure has the direct impact on the quality of the
document.
The papers, authors have considered objects, related to the software systems and other
human-related subjects.
4. Methodology
The test automation activities can be best summarized in the Figure 1 which is
basically taken from the web [16].
Here we have tried to follow the guidelines of the above steps of the Figure 1, the
proposed methodology of the paper can be described as:
1. Prioritizing Test Cases
2. Dividing Test Cases into Different Categories
3. Selection of Testing Tool and Testing Environment
The column and rows of result grid must be displayed with proper spacing.
The resulting grid should exclude the duplicate records.
The data of dynamic columns must be checked.
6. Testing Environment
The testing was carried out with the following software, hardware specification and
other additional resources.
Processor: i3-2310M CPU @ 2.10 Ghz
RAM: 8.00 GB
System Type: 64bit
Operating System: Windows 10 Professional
Development Environment: VB.NET 2010
Automated Testing Tool: Ranorex
7. Coding
The coding of some important test is provided here like the username and password
validation, search module and add entry module. The authors have not contributed in
terms of coding the same has been taken from [22].
Validation of RE-001:
For the validation of RE-001 we have performed testing. For a given scenario we have
executed Five test cases among them two are valid and three un-valid. All test cases were
carried out on Login Form only.
Post-Condition The user has successfully login to the system and directed
towards the main screen of the application.
Suggestion The authentic user must create account for login.
login button.
Post-Condition The user has successfully login to the system and directed towards
the main screen of the application.
Suggestion The authentic user must create account for login.
Validation of RE-002:
For the validation of RE-002 we have performed testing. For a given scenario we
have executed Ten test cases among them Eight are valid and two un-valid. All test
cases were carried out on Main Form only.
number,
CNIC etc.
Post-Condition FIR data displayed.
Result Result
1. Launch the Delete Button and Its The Record The record Failed
Application. codding. must be not deleted.
2. Select the FIR deleted with
No. proper
3. Click Crime message via
Delete Button. dialog box.
Post-Condition Record not deleted and message of failure displayed.
9. Conclusion
The developed system will help a lot to maintain the record of police station, although it
is not a complete system, still some improvements are needed in the developed components
and there is a need to add some additional necessary components. Further, all the registers
are not digitized, this system covered few important registers which have more use in daily
routine crime cases and are most frequently used. The proper testing of the software is
important that enhances the quality of the software. The testing of important components
has been carried out but further testing is required for the improvement. It is concluded that
the developed software is efficient, reliable, portable and user-friendly and can be easily
implemented in police stations as a trial basis and system can be further improved after
identification of the problems during implementation in real environment and real data of
Police stations.
References
[1] A. S. Shah, M. Fayaz, A. Shah and S. Shah, “An Application Development for Record
Keeping of Police Stations in Pakistan”, Journal of Scientific Research and Advances, vol. 2,
no. 4, (2015), pp. 144-150.
[2] T. Remencius, A. Sillitti and G. Succi, “Assessment of Software Developed by a Third-Party: A Case
Study and Comparison”, Information Sciences, vol. 328, (2016), pp. 237-249.
[3] I. D. Coman and A. Sillitti, “An Empirical Exploratory Study on Inferring Developers Activities from
Low-Level Data”, In: Proceedings of the 19th International Conference on Software Engineering and
Knowledge Engineering (SEKE), Boston, MA, USA, (2007).
[4] G. L. Kovács, S. Drozdik, P. Zuliani and G. Succi, “Open Source Software for the Public
Administration”, In: Proceedings of the Sixth International Workshop on Computer Science and
Information Technologies, Budapest, Hungary, (2004).
[5] K. Mordal, N. Anquetil, J. Laval, A. Serebrenik, B. Vasilescu and S. Ducasse, “Software Quality
Metrics Aggregation in Industry”, Journal of Software Evolution Process, vol. 25, no. 10, (2013), pp.
1117–1135.
[6] G. Garousi, V. Garousi, G. Ruhe, J. Zhi, M. Moussavi and B. Smith, “Usage and Usefulness of
Technical Software Documentation: An Industrial Case Study”, Information and Software Technology,
vol. 57, (2015), pp. 664-682.
[7] G. Garousi, V. Garousi, M. Moussavi, G. Ruhe and B. Smith, “Evaluating Usage and Quality of
Technical Software Documentation: An Empirical Study”, In: Proceedings of the 17th International
Conference on Evaluation and Assessment in Software Engineering, New York, (2013), pp. 24-35.
[8] J. M. Memon, A. Khan, A. Baig and A. Shah, “A Study of Software Protection Techniques”,
Innovations Advanced Techniques in Computer and Information Sciences and Engineering, Springer
Netherlands, (2007), pp. 249-253.
[9] A. Shah, A. Raza, B. Hassan and A. S. Shah, “A Review Of Slicing Techniques In Software
Engineering”, In: International Conference on Engineering and Technology, Srilanka, (2015)
March 17-18, pp. 1-15.
[10] Spring Framework, http://spring.io/. Retrieved 2016-06-09.
[11] E. Petrinja, A. Sillitti and G. Succi, “Comparing OpenBRR, QSOS, and OMM Assessment Models”, In:
Proceedings of the Sixth International Conference on Open Source Systems (OSS 2010), Notre Dame,
IN,USA, (2010), pp. 224-238.
[12] http://jmeter.apache.org/ Retrieved 2016-02-07.
[13] L. Sarigiannidis, and P.D. Chatzoglou, “Quality VS Risk: An Investigation of Their Relationship in
Software Development Projects”, International Journal of Project Management, vol. 32, no. 6, (2014),
pp. 1073-1082.
[14] L. Sarigiannidis and P. Chatzoglou, “Software Development Project Risk Management: A New
Conceptual Framework”, Journal of Software Engineering and Applications, vol. 4, no. 5, (2011), pp.
293-305.
[15] J. Zhi, V. Garousi-Yusifo-glu, B. Sun, G. Garousi, S. Shahnewaz and G. Ruhe, “Cost, Benefits and
Quality of Software Development Documentation: A Systematic Mapping”, Journal of Systems and
Software, vol. 99, (2015), pp. 175-198.
[16] http://www.ranorex.com/blog/how-to-automate-your-tests-without-programming-skills-preparation/
Retrieved 2016-06-09.
[17] https://www.linkedin.com/pulse/180-sample-test-cases-testing-web-desktop-tushar-singhal Retrieved 07/02/2016.
[18] http://www.softwaretestinghelp.com/sample-test-cases-testing-web-desktop-applications/ Retrieved 07/02/2016.
[19] http://www.ranorex.com/Documentation/Ranorex-Tutorial.pdf.
[20] https://en.wikipedia.org/wiki/Ranorex. Retrieved 2016-02-06.
[21] "Ranorex – UI Test Automation Tool for Professionals Award". QA Testing Tools. Retrieved 2016-02-
06.
[22] http://www.ranorex.com/support/user-guide-20/code-examples.html.
Authors
Abdul Salam Shah, has completed MS degree in Computer
Science from SZABIST, Islamabad, Pakistan in 2016. He did his BS
degree in Computer Science from Isra University Hyderabad, Sindh
Pakistan in 2012. In addition to his degree, he has completed short
courses and diploma certificates in Databases, Machine Learning,
Artificial Intelligence, Cybercrime, Cybersecurity, Networking, and
Software Engineering. He has published articles in various journals
of high repute. He is a young professional and he started his career in
the Ministry of Planning, Development and Reforms, Islamabad
Pakistan. His research area includes Machine Learning, Artificial
Intelligence, Digital Image Processing and Data Mining.
Mr. Shah has contributed in a book titled "Research
Methodologies; an Islamic perspectives," International Islamic
University Malaysia, November, 2015.