SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 29
TEST CASE PRIORITIZATION USING HYPERLINK RANKING-
A GRAPH THEORY BASED APPROACH
Krithika L.B 1
, Selvakumar R 2
, Anand Mahendran3
1
Assistant Professor, SITE, VIT University, Vellore, India, krithika.lb@vit.ac.in
2
Senior Professor, SAS ,VIT University,Vellore India, rselvakumar@vit.ac.in
3
Associate Professor,SCSE, VIT University,Vellore India, manand@vit.ac.in
Abstract
Era of cloud computing where majority of the application is becoming web based enterprise computing. User prefer online web
application for easy of use and business continuity [1]. Software companies have come up in huge numbers for developing web based
enterprise application. Testing is an integral part of any software company which requires more effort. Enterprise applications are
complex and navigation is largely based on hyperlink connecting the web pages. Testing phase mostly associated with time constrain
to accomplish the task associated in this phase. Main activity of testing phase is execution of test case to test the application.
Exhaustive testing is not possible and release a software system without testing the entire application is risk [2]. This paper
demonstrates how graph theory can be used to prioritize the test case execution.
Keywords: Testing, Graph theory application
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Software testing immense challenges is that extensive testing
is not feasible. Planned time for test phase would often get
crunched into shorter deadline and release date, due to unseen
delay in the earlier phase of software development life cycle
[3].Testing activities in test phase are dependent on the test
scenarios and test case written for each scenario.
Tester lead by team leader executes the test case every time
the testing phase commences and tries to finish the predefined
number of test case to test the application. Test scenarios and
associated test case changes are associated with effort, along
with the evolving application under test. Below is the
Reference Test Case Specification Template. (IEEE 829-
1998)[4][5],
Table1: Partial test case template representing only required
attribute of the paper
Test
case
Id
Test
Scenario
Test
Case
Test
Steps
Result
Regression testing is a major part of testing phase. Regression
testing is to ensure that a change introduced into the software
because of new addition or bug fix dose not impact the
existing functionality of the system. Build regression and final
regression are the two variants of regression testing.
Build regression is a testing that happens without major
change and the system is still expecting development. Final
regression is the regression testing that happens before the
system goes live after many changes to the system.
Graph theory is an area of mathematics that deals with entities
(called nodes) and the connections (called links) between the
nodes [6][7].Test case prioritization can help to take strategic
decision on sequence order [8] but these are static in nature
and require revisit every build. In this paper, graph theory is
used to model the new approach ‘Test case prioritization using
Hyperlink ranking’. This model is more dynamic and
accommodates changes dynamically.
2. PROBLEM
Building regression happened after ever new addition to the
system. In other words, new features added to the old version
between two milestones in a project are carried out to ensure
that the system works as expected. The questions that
challenges the research at crunching deadline are as below [9],
(a) Do we require executing the regression test suite every
build?
The answer is quiet simple, yes
(b) Is there a way to optimize the effort?
We can use stakeholder input to precisely cut down effort
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 30
Irrespective to changes happening in the system the effort
required for build regression either remain constant without
change or effort grows when there is change happening in the
application. Using the generic way of testing the web
application effort remains same for every version regression
testing or may increase. Conventional procedure for testing the
application is given in four steps.
2.1 Four Steps Process:
1. Read FRD(Functional Requirement Document) and
DD(Design Document)
2. Prepare the Test scenarios
3. Write details test case for each scenarios
4. Test the application based on the detail test case.
Subsequent release with change in the application under test
• Follow Step 1 to Step 4
Subsequent release without changes in the application
• Follow Step 4
Figure 1 shows the flowchart of the above four steps. Any
software development faces the problem of deviation in effort
estimation in all phase of its life cycle.
Our focus is to reduce the effort required in subsequent
regression for web application.
Fig 1: Conventional procedure for testing the application is
given by flowchart
3. METHODOLOGY
Application we test can be represented as a graph [10]. Each
page in the application are represented as node, pages are
connected by hyperlink in each page. The connection between
the pages represents the link. The frequencies of usage
between the edges are the weight age. Every web application
is made up of screen and actions in the screen. The screens are
connected to other screen via an action or a hyper link. The
user using the application navigates through the application by
click the required hyper link to navigate between pages.
We record each user session navigation path for entire usage
time. We keep tracking and prepare a repository of user
navigation on the entire web application. Using the repository
we have the Link map of entire application. Each link is given
weight age using simple usage metric.
When a user uses the link between the nodes to navigate we
increment the count by one. Every access of the link is
increment and stored in the repository. Link graph of the
application under test and weight age is based on user
interaction data.
4. SOLUTION
In this work, a web application that has 11 pages is
considered. These pages are connected bidirectional as per the
application flow. In Figure 2, the flow starts from the home
page and depending on the user input navigation is chosen
across the page and produces the desired result.
Fig2: Page map of application under test
Application mapped is represented as a graph with link
weight. This graph helps us statically traverse the application
for experiment. Application graph and Link weight age
representation is given as follows in Figure 3,
Home page a
page j
page b
page c
page f
page e
page k
page h
page ipage d
page g
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 31
Fig 3: Application graph and Link weight age
4.1 Test case
The sequential step on how to use the application, what input
to be given and what result is expected. The deviation in the
result as prescribed in the test case is considered to be note for
forte action.
Table 2: Repository of Regression suite with link weight
Test
case Id
Test
Scenario
Test
Case
weight
age
Test
Step
s
Result
A3s1 A3S= {a},{ab},{ac} a 35 … P/F
A3s2 A3S= {a},{ab},{ac} ab 30 … P/F
A3s3 A3S= {a},{ab},{ac} ac 5 … P/F
B2s2 B2S= {b},{ba},{bf} b 60 … P/F
B2s3 B2S= {b},{ba},{bf} ba 30 … P/F
B2s4 B2S= {b},{ba},{bf} bf 30 … P/F
C3s1
C3S=
{c},{ca},{ck},{ce}
c 10 … P/F
C3s2
C3S=
{c},{ca},{ck},{ce}
ca 5 … P/F
C3s3
C3S=
{c},{ca},{ck},{ce}
ck 3 … P/F
C3s4
C3S=
{c},{ca},{ck},{ce}
ce 2 … P/F
… … … … …
J2s3 J2S= {j},{ji},{jh} jh 23 … P/F
4.2 Ranking to Links
(a)Procedure
[1] A daemon keeps listing to session at the start of
testing
[2] Page link, parent page, source page, to page and the
click through is recorded
[3] Count is incrementally store after successful session
close.
[4] Data store is a repository of historic data from start of
the project to completion.
(b)Pseudo-algorithm
Start: session Start
Capture LinkClickPage && session
usage count ++ &&
session <> same Session
Repository DataStore
End: commit data to store
5. RESULTS
Using our approach we were able to come out with the below
scenario and test case associate with priority.
Table 3: Result
Session scenario Weight age Priority
a,b,f,g,d,i,j 160 1
a,b,f,k,h,j … …
a,b,j,k,h,j … …
a,k,h,j 61 4
a,c,e,h,j … …
a,c,k,h,j 54 6
… … …
CONCLUSIONS AND FUTURE WORK
Executing build regression is important but can be replaced
with thinner version of regression suite that is prioritized
based on end user usage. Using the usage metric we were able
to effectively reduce the number of test case and also control
bug leakage. Comparing to the full regression pack execution
for very build regression, our method requires lesser effort,
quick in identifying issues in important feature and
functionality.
Some very important scenarios are not frequently accessed. As
a result, the link weight age for those links would not be
recorded or not generated. We are currently employing test
leading assistance to identify those scenarios and manually
give weight age. In the future work we would like to have a
cumulative weight mechanism to optimize and increase
efficiency.
a
c
d
f
e
b
g
h
i
j
k
30
30
15
5
5
25
3
25
25
2 2
23
25
23
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 32
REFERENCES
[1] Miller, Michael. Cloud computing: Web-based
applications that change the way you work and collaborate
online Que publishing, 2008
[2] Myers, Glenford J., Corey Sandler, and Tom Badgett. The
art of software testing John Wiley & Sons, 2011
[3] Bresnahan, Timothy, Shane Greenstein, and Rebecca
Henderson. "Organizational Diseconomies of Scope and
Creative Destruction"
[4] Test Case Specification Template. (IEEE 829-1998)
[5] IEEE Standards Association, Software Engineering
standards, vol. 3 of Std. 1061: Standard for Software Quality
Methodology, IEEE, 1999 ed., 1999.
[6]Chartrand, Gary (1985), Introductory Graph Theory,
Dover, ISBN 0-486-24775-9.
[7]Shirinivas, S. G., S. Vetrivel, and N. M. Elango
"Applications of graph theory in computer science an
overview" International Journal of Engineering Science and
Technology 2.9 (2010): 4610-4621.
[8] Rothermel, Gregg, et al. "Test case prioritization: An
empirical study." Software Maintenance, 1999.(ICSM'99)
Proceedings. IEEE International Conference on IEEE, 1999
[9] Rothermel, Gregg, and Mary Jean Harrold. "A safe,
efficient regression test selection technique." ACM
Transactions on Software Engineering and Methodology
(TOSEM) 6.2 (1997): 173-210.
[10] Chen, Zheng, et al. "Building a web thesaurus from web
link structure." Proceedings of the 26th annual international
ACM SIGIR conference on Research and development in
informaion retrieval ACM, 2003

More Related Content

PDF
Measuring effort for modifying software package as reusable package using pac...
PDF
501 183-191
PDF
Measuring effort for modifying software package as
PDF
Reengineering framework for open source software using decision tree approach
PDF
IRJET- Sketch-Verse: Sketch Image Inversion using DCNN
PDF
Hh3512801283
PDF
Bug Triage: An Automated Process
PDF
Determination of Software Release Instant of Three-Tier Client Server Softwar...
Measuring effort for modifying software package as reusable package using pac...
501 183-191
Measuring effort for modifying software package as
Reengineering framework for open source software using decision tree approach
IRJET- Sketch-Verse: Sketch Image Inversion using DCNN
Hh3512801283
Bug Triage: An Automated Process
Determination of Software Release Instant of Three-Tier Client Server Softwar...

What's hot (17)

PDF
A Survey of Software Reusability
PDF
Class quality evaluation using class quality
PDF
A Hierarchical Feature Set optimization for effective code change based Defec...
PDF
AN APPROACH FOR TEST CASE PRIORITIZATION BASED UPON VARYING REQUIREMENTS
PDF
Identifying Thresholds for Distance Design-based Direct Class Cohesion (D3C2)...
PDF
Ijcatr04051006
PDF
An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
PDF
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
DOCX
Chapter three
PDF
Benchmarking machine learning techniques
PDF
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
PDF
Experiences in shift left test approach
PDF
How good is my software a simple approach for software rating based on syst...
PDF
Oo estimation through automation of the predictive object points sizing metric
PDF
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
PDF
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
PDF
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
A Survey of Software Reusability
Class quality evaluation using class quality
A Hierarchical Feature Set optimization for effective code change based Defec...
AN APPROACH FOR TEST CASE PRIORITIZATION BASED UPON VARYING REQUIREMENTS
Identifying Thresholds for Distance Design-based Direct Class Cohesion (D3C2)...
Ijcatr04051006
An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
Chapter three
Benchmarking machine learning techniques
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
Experiences in shift left test approach
How good is my software a simple approach for software rating based on syst...
Oo estimation through automation of the predictive object points sizing metric
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
Ad

Viewers also liked (20)

PDF
Fpga based low power and high performance address
PDF
Survey on cloud computing security techniques
PDF
Web phish detection (an evolutionary approach)
PDF
Performance analysis of various parameters by comparison of conventional pitc...
PDF
Design evaluation and optimization of steering yoke of an automobile
PDF
Influence of process parameters on depth of
PDF
Iterative qr decompostion channel estimation for
PDF
Flow and heat transfer of micro polar and viscous
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Energy saving model and application for smart phones
PDF
Design and implementation of autonomous maneuvering robotic vehicle using glo...
PDF
Studies on effect of mineral admixtures on durability
PDF
A study on cross layer metrics of wireless mesh network
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
Implementation of content based image retrieval using the cfsd algorithm
PDF
Kinematic model of a car
PDF
Design and verification of pipelined parallel architecture implementation in ...
PDF
Overall increase in efficiency in raw meals
PDF
Removal of chromium (vi) by activated carbon derived
PDF
Comparative review study of security of aran and aodv routing protocols in ma...
Fpga based low power and high performance address
Survey on cloud computing security techniques
Web phish detection (an evolutionary approach)
Performance analysis of various parameters by comparison of conventional pitc...
Design evaluation and optimization of steering yoke of an automobile
Influence of process parameters on depth of
Iterative qr decompostion channel estimation for
Flow and heat transfer of micro polar and viscous
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Energy saving model and application for smart phones
Design and implementation of autonomous maneuvering robotic vehicle using glo...
Studies on effect of mineral admixtures on durability
A study on cross layer metrics of wireless mesh network
Secure intrusion detection and countermeasure selection in virtual system usi...
Implementation of content based image retrieval using the cfsd algorithm
Kinematic model of a car
Design and verification of pipelined parallel architecture implementation in ...
Overall increase in efficiency in raw meals
Removal of chromium (vi) by activated carbon derived
Comparative review study of security of aran and aodv routing protocols in ma...
Ad

Similar to Test case prioritization using hyperlink rankinga (20)

PDF
Application of cloud computing based on e learning teaching tool
PDF
Bd36334337
PDF
Enhancing the performance of cluster based text summarization using support v...
PDF
Ie3514301434
PDF
Clone of an organization
PDF
Measurement model of software quality in user’s
PDF
Design of a graphical user interface for design
PDF
IRJET- A Study on Software Reliability Models
PDF
Life cycle assessment of construction materials using eio lca
PDF
Extreme software estimation (xsoft estimation)
PDF
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
PDF
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
PDF
Extreme software estimation (xsoft estimation)
PDF
Activity schedule and affective control of component based project
PDF
Implementation of reducing features to improve code change based bug predicti...
PDF
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
PDF
G code based data receiving and control system
PDF
Issues of Embedded System Component Based Development in Mesh Networks
PDF
1841 1843
PDF
1841 1843
Application of cloud computing based on e learning teaching tool
Bd36334337
Enhancing the performance of cluster based text summarization using support v...
Ie3514301434
Clone of an organization
Measurement model of software quality in user’s
Design of a graphical user interface for design
IRJET- A Study on Software Reliability Models
Life cycle assessment of construction materials using eio lca
Extreme software estimation (xsoft estimation)
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
Ijartes v2-i1-001Evaluation of Changeability Indicator in Component Based Sof...
Extreme software estimation (xsoft estimation)
Activity schedule and affective control of component based project
Implementation of reducing features to improve code change based bug predicti...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
G code based data receiving and control system
Issues of Embedded System Component Based Development in Mesh Networks
1841 1843
1841 1843

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
PDF
Disaster recovery sustainable housing
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Disaster recovery sustainable housing

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
composite construction of structures.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Geodesy 1.pptx...............................................
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Welding lecture in detail for understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Well-logging-methods_new................
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
composite construction of structures.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Geodesy 1.pptx...............................................
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
UNIT 4 Total Quality Management .pptx
additive manufacturing of ss316l using mig welding
Welding lecture in detail for understanding
bas. eng. economics group 4 presentation 1.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Well-logging-methods_new................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
CYBER-CRIMES AND SECURITY A guide to understanding
Arduino robotics embedded978-1-4302-3184-4.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx

Test case prioritization using hyperlink rankinga

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 29 TEST CASE PRIORITIZATION USING HYPERLINK RANKING- A GRAPH THEORY BASED APPROACH Krithika L.B 1 , Selvakumar R 2 , Anand Mahendran3 1 Assistant Professor, SITE, VIT University, Vellore, India, krithika.lb@vit.ac.in 2 Senior Professor, SAS ,VIT University,Vellore India, rselvakumar@vit.ac.in 3 Associate Professor,SCSE, VIT University,Vellore India, manand@vit.ac.in Abstract Era of cloud computing where majority of the application is becoming web based enterprise computing. User prefer online web application for easy of use and business continuity [1]. Software companies have come up in huge numbers for developing web based enterprise application. Testing is an integral part of any software company which requires more effort. Enterprise applications are complex and navigation is largely based on hyperlink connecting the web pages. Testing phase mostly associated with time constrain to accomplish the task associated in this phase. Main activity of testing phase is execution of test case to test the application. Exhaustive testing is not possible and release a software system without testing the entire application is risk [2]. This paper demonstrates how graph theory can be used to prioritize the test case execution. Keywords: Testing, Graph theory application ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Software testing immense challenges is that extensive testing is not feasible. Planned time for test phase would often get crunched into shorter deadline and release date, due to unseen delay in the earlier phase of software development life cycle [3].Testing activities in test phase are dependent on the test scenarios and test case written for each scenario. Tester lead by team leader executes the test case every time the testing phase commences and tries to finish the predefined number of test case to test the application. Test scenarios and associated test case changes are associated with effort, along with the evolving application under test. Below is the Reference Test Case Specification Template. (IEEE 829- 1998)[4][5], Table1: Partial test case template representing only required attribute of the paper Test case Id Test Scenario Test Case Test Steps Result Regression testing is a major part of testing phase. Regression testing is to ensure that a change introduced into the software because of new addition or bug fix dose not impact the existing functionality of the system. Build regression and final regression are the two variants of regression testing. Build regression is a testing that happens without major change and the system is still expecting development. Final regression is the regression testing that happens before the system goes live after many changes to the system. Graph theory is an area of mathematics that deals with entities (called nodes) and the connections (called links) between the nodes [6][7].Test case prioritization can help to take strategic decision on sequence order [8] but these are static in nature and require revisit every build. In this paper, graph theory is used to model the new approach ‘Test case prioritization using Hyperlink ranking’. This model is more dynamic and accommodates changes dynamically. 2. PROBLEM Building regression happened after ever new addition to the system. In other words, new features added to the old version between two milestones in a project are carried out to ensure that the system works as expected. The questions that challenges the research at crunching deadline are as below [9], (a) Do we require executing the regression test suite every build? The answer is quiet simple, yes (b) Is there a way to optimize the effort? We can use stakeholder input to precisely cut down effort
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 30 Irrespective to changes happening in the system the effort required for build regression either remain constant without change or effort grows when there is change happening in the application. Using the generic way of testing the web application effort remains same for every version regression testing or may increase. Conventional procedure for testing the application is given in four steps. 2.1 Four Steps Process: 1. Read FRD(Functional Requirement Document) and DD(Design Document) 2. Prepare the Test scenarios 3. Write details test case for each scenarios 4. Test the application based on the detail test case. Subsequent release with change in the application under test • Follow Step 1 to Step 4 Subsequent release without changes in the application • Follow Step 4 Figure 1 shows the flowchart of the above four steps. Any software development faces the problem of deviation in effort estimation in all phase of its life cycle. Our focus is to reduce the effort required in subsequent regression for web application. Fig 1: Conventional procedure for testing the application is given by flowchart 3. METHODOLOGY Application we test can be represented as a graph [10]. Each page in the application are represented as node, pages are connected by hyperlink in each page. The connection between the pages represents the link. The frequencies of usage between the edges are the weight age. Every web application is made up of screen and actions in the screen. The screens are connected to other screen via an action or a hyper link. The user using the application navigates through the application by click the required hyper link to navigate between pages. We record each user session navigation path for entire usage time. We keep tracking and prepare a repository of user navigation on the entire web application. Using the repository we have the Link map of entire application. Each link is given weight age using simple usage metric. When a user uses the link between the nodes to navigate we increment the count by one. Every access of the link is increment and stored in the repository. Link graph of the application under test and weight age is based on user interaction data. 4. SOLUTION In this work, a web application that has 11 pages is considered. These pages are connected bidirectional as per the application flow. In Figure 2, the flow starts from the home page and depending on the user input navigation is chosen across the page and produces the desired result. Fig2: Page map of application under test Application mapped is represented as a graph with link weight. This graph helps us statically traverse the application for experiment. Application graph and Link weight age representation is given as follows in Figure 3, Home page a page j page b page c page f page e page k page h page ipage d page g
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 31 Fig 3: Application graph and Link weight age 4.1 Test case The sequential step on how to use the application, what input to be given and what result is expected. The deviation in the result as prescribed in the test case is considered to be note for forte action. Table 2: Repository of Regression suite with link weight Test case Id Test Scenario Test Case weight age Test Step s Result A3s1 A3S= {a},{ab},{ac} a 35 … P/F A3s2 A3S= {a},{ab},{ac} ab 30 … P/F A3s3 A3S= {a},{ab},{ac} ac 5 … P/F B2s2 B2S= {b},{ba},{bf} b 60 … P/F B2s3 B2S= {b},{ba},{bf} ba 30 … P/F B2s4 B2S= {b},{ba},{bf} bf 30 … P/F C3s1 C3S= {c},{ca},{ck},{ce} c 10 … P/F C3s2 C3S= {c},{ca},{ck},{ce} ca 5 … P/F C3s3 C3S= {c},{ca},{ck},{ce} ck 3 … P/F C3s4 C3S= {c},{ca},{ck},{ce} ce 2 … P/F … … … … … J2s3 J2S= {j},{ji},{jh} jh 23 … P/F 4.2 Ranking to Links (a)Procedure [1] A daemon keeps listing to session at the start of testing [2] Page link, parent page, source page, to page and the click through is recorded [3] Count is incrementally store after successful session close. [4] Data store is a repository of historic data from start of the project to completion. (b)Pseudo-algorithm Start: session Start Capture LinkClickPage && session usage count ++ && session <> same Session Repository DataStore End: commit data to store 5. RESULTS Using our approach we were able to come out with the below scenario and test case associate with priority. Table 3: Result Session scenario Weight age Priority a,b,f,g,d,i,j 160 1 a,b,f,k,h,j … … a,b,j,k,h,j … … a,k,h,j 61 4 a,c,e,h,j … … a,c,k,h,j 54 6 … … … CONCLUSIONS AND FUTURE WORK Executing build regression is important but can be replaced with thinner version of regression suite that is prioritized based on end user usage. Using the usage metric we were able to effectively reduce the number of test case and also control bug leakage. Comparing to the full regression pack execution for very build regression, our method requires lesser effort, quick in identifying issues in important feature and functionality. Some very important scenarios are not frequently accessed. As a result, the link weight age for those links would not be recorded or not generated. We are currently employing test leading assistance to identify those scenarios and manually give weight age. In the future work we would like to have a cumulative weight mechanism to optimize and increase efficiency. a c d f e b g h i j k 30 30 15 5 5 25 3 25 25 2 2 23 25 23
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 32 REFERENCES [1] Miller, Michael. Cloud computing: Web-based applications that change the way you work and collaborate online Que publishing, 2008 [2] Myers, Glenford J., Corey Sandler, and Tom Badgett. The art of software testing John Wiley & Sons, 2011 [3] Bresnahan, Timothy, Shane Greenstein, and Rebecca Henderson. "Organizational Diseconomies of Scope and Creative Destruction" [4] Test Case Specification Template. (IEEE 829-1998) [5] IEEE Standards Association, Software Engineering standards, vol. 3 of Std. 1061: Standard for Software Quality Methodology, IEEE, 1999 ed., 1999. [6]Chartrand, Gary (1985), Introductory Graph Theory, Dover, ISBN 0-486-24775-9. [7]Shirinivas, S. G., S. Vetrivel, and N. M. Elango "Applications of graph theory in computer science an overview" International Journal of Engineering Science and Technology 2.9 (2010): 4610-4621. [8] Rothermel, Gregg, et al. "Test case prioritization: An empirical study." Software Maintenance, 1999.(ICSM'99) Proceedings. IEEE International Conference on IEEE, 1999 [9] Rothermel, Gregg, and Mary Jean Harrold. "A safe, efficient regression test selection technique." ACM Transactions on Software Engineering and Methodology (TOSEM) 6.2 (1997): 173-210. [10] Chen, Zheng, et al. "Building a web thesaurus from web link structure." Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval ACM, 2003