Article PDF Available

A Comparative Study of White Box, Black Box and Grey Box Testing Techniques

Abstract and Figures

Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes, errors and flaws in the developed software. There are many approaches to software testing, but effective testing of complex product is essentially a process of investigation, not merely a matter of creating and following route procedure. It is not possible to find out all the errors in the program. This fundamental problem in testing thus throws an open question, as to what would be the strategy we should adopt for testing. In our paper, we have described and compared the three most prevalent and commonly used software testing techniques for detecting errors, they are: white box testing, black box testing and grey box testing.

Content may be subject to copyright.

ResearchGate Logo

Discover the world's research

  • 20+ million members
  • 135+ million publications
  • 700k+ research projects

Join for free

Content may be subject to copyright.

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 3, No.6, 2012

12 | P a g e

www.ijacsa.thesai.org

A Comparative Study of White Box, Black Box and

Grey Box Testing Techniques

Mohd. Ehmer Khan

Department of Computer Science,

Singhania University,

Jhunjhunu, Rajasthan, India

Farmeena Khan

Department of Computer Science,

EIILM University,

Jorethang, Sikkim, India

AbstractSoftware testing is the process to uncover requirement,

design and coding errors in the program. It is used to identify the

correctness, completeness, security and quality of software

products against a specification. Software testing is the process

used to measure the quality of developed computer software. It

exhibits all mistakes, errors and flaws in the developed software.

There are many approaches to software testing, but effective

testing of complex product is essentially a process of

investigation, not merely a matter of creating and following route

procedure. It is not possible to find out all the errors in the

program. This fundamental problem in testing thus throws an

open question, as to what would be the strategy we should adopt

for testing. In our paper, we have described and compared the

three most prevalent and commonly used software testing

techniques for detecting errors, they are: white box testing, black

box testing and grey box testing.

Keywords- Black Box; Grey Box; White Box.

I. INTRODUCTION

Software testing identifies defects, flaws or errors in the

application code that must be fixed. We can also define

software testing as a process of accessing the functionality and

correctness of a software through analysis. The main purpose

of testing can be quality assurance, reliability estimation,

validation and verification. Software testing is a fundamental

component of software quality assurance and represents a

review of specification, design and coding. The main objective

of software testing is to affirm the quality of software system

by systematically testing the software in carefully controlled

circumstances, another objective is to identify the completeness

and correctness of the software, and finally it uncovers

undiscovered errors. [1] [2]

The three most important techniques that are used for

finding errors are: [1]

1) White Box Testing Technique: It is the detailed

investigation of internal logic and structure of the code. In

white box testing it is necessary for a tester to have full

knowledge of source code.

2) Black Box Testing Technique: It is a technique of

testing without having any knowledge of the internal working

of the application. It only examines the fundamental aspects of

the system and has no or little relevance with the internal

logical structure of the system.

3) Grey Box Testing Technique: White box + Black box =

Grey box, it is a technique to test the application with limited

knowledge of the internal working of an application and also

has the knowledge of fundamental aspects of the system.

II. WHITE BOX TESTING TECHNIQUE

Input Output

Figure 1. Represent white box testing

White box testing is a test case design method that uses the

control structure of the procedural design to derive test cases.

White box testing can uncover implementation errors such as

poor key management by analyzing internal workings and

structure of a piece of software. White box testing is applicable

at integration, unit and system levels of the software testing

process. In white box testing the tester needs to have a look

inside the source code and find out which unit of code is

behaving inappropriately. [3]

Some of the advantages and disadvantages of white box

testing technique are listed below: [3] [4]

Advantages

It reveals error in hidden code by removing extra lines

of code.

Side effects are beneficial.

Analyse

internal

working only

Risk analysis

Develop Strategy

Proper Test Plan

Execute test Cases

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 3, No.6, 2012

13 | P a g e

www.ijacsa.thesai.org

Maximum coverage is attained during test scenario

writing.

Disadvantages

It is very expensive as it requires a skilled tester to

perform it.

Many paths will remain untested as it is very difficult

to look into every nook and corner to find out hidden

errors.

Some of the codes omitted in the code could be missed

out.

Some of the synonyms of white box testing are glass box

testing, clear box testing, open box testing, transparent box

testing, structural testing, logic driven testing and design based

testing.

Some important types of white box testing techniques are

briefly described below: [3]

Control Flow Testing

Branch Testing

White Box Testing Basis Path Testing

Data Flow Testing

Loop Testing

Figure 2. Represent different forms of white box testing techniques

1) Control Flow Testing: It is a structural testing strategy

that uses the program control flow as a model control flow and

favours more but simpler paths over fewer but complicated

path.

2) Branch Testing: Branch testing has the objective to test

every option (true or false) on every control statement which

also includes compound decision.

3) Basis Path Testing: Basis path testing allows the test

case designer to produce a logical complexity measure of

procedural design and then uses this measure as an approach

for outlining a basic set of execution paths.

4) Data Flow Testing: In this type of testing the control

flow graph is annoted with the information about how the

program variables are define and used.

5) Loop Testing: It exclusively focuses on the validity of

loop construct.

III. BLACK BOX TESTING TECHNIQUE

Processing Unit

Input Output

Figure 3. Represent black box testing

Black box testing treats the software as a "Black Box" –

without any knowledge of internal working and it only

examines the fundamental aspects of the system. While

performing black box test, a tester must know the system

architecture and will not have access to the source code. [5]

Some of the advantages and disadvantages of black box

testing technique are listed below: [4] [5]

Advantages

Efficient for large code segment.

Tester perception is very simple.

Users perspective are clearly separated from

developers perspective (programmer and tester are

independent of each other).

Quicker test case development.

Disadvantages

Only a selected number of test scenarios are actually

performed. As a result, there is only limited coverage.

Without clear specification test cases are difficult to

design.

Inefficient testing.

Some of the synonyms of black box testing technique are

opaque testing, functional testing, close box testing, and

behavioural testing.

Some important types of black box testing techniques are

briefly described below: [5]

Equivalence Partitioning

Boundary Value Analysis

Fuzzing

Black Box Testing Cause-Effect Graph

Orthogonal Array Testing

All Pair Testing

State Transition Testing

Figure 4. Represent differnet forms of black box testing techniques

1) Equivalence Partitioning: It can reduce the number of

test cases, as it divides the input data of a software unit into

partition of data from which test cases can be derived.

2) Boundary Value Analysis: It focuses more on testing at

boundaries, or where the extreme boundary values are chosen.

It includes minimum, maximum, just inside/outside

boundaries, error values and typical values.

3) Fuzzing: Fuzz testing is used for finding

implementation bugs, using malformed/semi-malformed data

injection in an automated or semi-automated session.

4) Cause-Effect Graph: It is a testing technique, in which

testing begins by creating a graph and establishing the relation

between the effect and its causes. Identity, negation, logic OR

Analyse

Fundamental

aspects only

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 3, No.6, 2012

14 | P a g e

www.ijacsa.thesai.org

and logic AND are the four basic symbols which expresses the

interdependency between cause and effect.

5) Orthogonal Array Testing: OAT can be applied to

problems in which the input domain is relatively small, but too

large to accommodate exhaustive testing.

6) All Pair Testing: In all pair testing technique, test cases

are designs to execute all possible discrete combinations of

each pair of input parameters. Its main objective is to have a

set of test cases that covers all the pairs.

7) State Transition Testing: This type of testing is useful

for testing state machine and also for navigation of graphical

user interface.

IV. G REY BOX T ESTING T ECHNIQUE

Grey box testing technique will increase the testing

coverage by allowing us to focus on all the layers of any

complex system through the combination of all existing white

box and black box testing.

Processing Unit

Input Output

Figure 5. Represent grey box testing

In grey box testing the tester must have knowledge of

internal data structures and algorithm, for the purpose of

designing test cases. Examples of grey box testing technique

are: [6]

Architectural Model

Unified Modeling language (UML)

State Model (Finite State Machine)

In grey box testing the codes of two modules are studied

(white box testing method) for the design of test cases and

actual test are performed in the interfaces exposed (black box

testing method).

Some of the advantages of grey box testing technique are

listed below: [4] [6]

Grey box testing provides combined benefits of white

box and black box testing techniques.

In grey box testing, the tester relies on interface

definition and functional specification rather than

source code.

In grey box testing, the tester can design excellent test

scenarios.

The test is done from the user's point of view rather

than designer's point of view.

Create an intelligent test authoring.

Unbiased testing.

Some of the disadvantages of grey box testing technique

are listed below:

Test coverage is limited as the access to source code is

not available.

It is difficult to associate defect identification in

distributed applications.

Many program paths remain untested.

If the software designer has already run a test case, the

tests can be redundant.

The other name of grey box testing is translucent testing.

Different forms of grey box testing techniques are briefly

described below: [6]

Orthogonal Array Testing

Matrix Testing

Grey Box Testing Regression Testing

Pattern Testing

Figure 6. Represent different forms of grey box testing techniques

1) Orthogonal Array Testing: This type of testing use as

subset of all possible combinations.

2) Matrix Testing: In matrix testing the status report of the

project is stated.

3) Regression Testing: If new changes are made in

software, regression testing implies running of test cases.

4) Pattern Testing: Pattern testing verifies the good

application for its architecture and design.

V. FUTURE OF S OFTWARE T ESTING

With the changing trends in the software industry, software

testing too changes. The existing new technologies like Service

Oriented Architecture (SOA), wireless technologies, mobile

services etc. has opened new path to testing. Some of the

changes which we will see in the industry over the next few

years are listed below: [8]

Testers will provide light weight models that

developers can run against their codes.

Early review and modeling will exposes many

ambiguous bugs.

As in the future developer's code is full of testability

hooks, errors will be more detectable.

Static analyser (detection tools) will come in main

stream.

Useful matrices such as spec coverage, model coverage

and code coverage drives the projects.

Combinatorial tools will allow testers to prioritize their

testing.

The testers will provide visible and value added

services throughout the software development process.

Tester can develop test harnesses stubs and drivers

written in and interacting with a variety of

programmatic languages.

Partially analyse

internal working

+

Fundamental aspects

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 3, No.6, 2012

15 | P a g e

www.ijacsa.thesai.org

Tomorrows' tester will be professionally more educated, examine and accredited professional.

TABLE I. C OMPARISON B ETWEEN T HREE FORMS OF TESTING TECHNIQUES [6] [7]

Analyses fundamental aspects

only i.e. no proved edge of

internal working

Partial knowledge of internal

working

Full knowledge of internal

working

Performed by end users and also

by tester and developers (user

acceptance testing)

Performed by end users and also

by tester and developers (user

acceptance testing)

It is performed by developers

and testers

Testing is based on external

exceptions internal behaviour

of the program is ignored

Test design is based on high

level database diagrams, data

flow diagrams, internal states,

knowledge of algorithm and

architecture

It is least exhaustive and time

consuming

It is somewhere in between

Potentially most exhaustive and

time consuming

It can test only by trial and error

method

Data domains and internal

boundaries can be tested and

over flow, if known

Test better: data domains and

internal boundaries

Not suited for algorithm testing

Not suited for algorithm testing

It is suited for algorithm testing

(suited for all)

In the near future we will see a shift towards new

techniques and testing transformed business operations, the

way people interact with the systems and information it

provides, and therefore mitigating the risk and increasing the

benefits of business change.

VI. CONCLUSION

We can define software testing as an activity aimed at

evaluating an attribute, or capability of a program to determine,

that it meets its required specification. Software testing can

provide an independent view of the software to allow the

business to appreciate and understand the risk of software

implementation.

To carry out software testing in a more effective manner, in

our paper we have described and compared three main software

testing techniques.

REFERENCES

[1] Mohd. Ehmer Khan, "Different Forms of Software Testing Techniques

for Finding Errors," IJCSI, Vol. 7, Issue 3, No 1, pp 11-16, May 2010

[2] Software Testing Methodologies by Azhar available at http://azhar-

paperpresentation.blogspot.com/2010/04/software-testing-

methodologies.html

[3] Mohd. Ehmer Khan, "Different Approaches to White Box testing

Technique for Finding Errors," IJSEIA, Vol. 5, No. 3, pp 1-13, July

2011

[4] Software Testing Methods available at

http://www.tutorialspoint.com/software_testing/testing_methods.htm

[5] Mohd. Ehmer Khan, "Different Approaches to Black Box Testing

Technique for Finding Errors," IJSEA, Vol. 2, No. 4, pp 31-40, October

2011

[6] Grey Box Testing from Wikipedia available at

http://en.wikipedia.org/wiki/Gray_box_testing

[7] Comparison among Black Box Testing, Gray Box Testing & White Box

Testing available at

http://www.softwaretestinggenius.com/articalDetails?qry=404

[8] Predicting the Future of Testing by Harry Robinson available at

http://www.stickyminds.com/sitewide.asp?Function=edetail&ObjectType

=COL&ObjectId=6887

AUTHORS PROFILE

Mohd. Ehmer Khan

I completed my B.Sc in 1997 and M.C.A. in 2001 from Aligarh Muslim

University, Aligarh, India, and pursuing Ph.D (Computer Science) from

Singhania University, Jhunjhunu, India. I have worked as a lecturer at Aligarh

College Engineering & Management, Aligarh, India from 1999 to 2003. From

2003 to 2005 worked as a lecturer at Institute of Foreign Trade &

Management, Moradabad, India. From 2006 to present working as a lecturer

in the Department of Information Technology, Al Musanna College of

Technology, Ministry of Manpower, Sultanate of Oman. I am recipient of PG

Merit Scholarship in MCA. My research area is software engineering with

special interest in driving and monitoring program executions to find bugs,

using various software testing techniques.

Farmeena Khan

I completed my BCA in 2003 from Dr. B. R. Ambedkar University, Agra,

India and MBA in 2011 from Janardan Rai Nagar Rajasthan Vidyapeeth

University, Rajasthan, India, and pursuing M.Sc (Computer Science) from

EIILM University, Jorethang, Sikkim, India.

... The structure of the software is examined by executing the code. In this type of testing, a tester must have full knowledge about source code [21]; Grey-Box testing integrate both white box and black-box testing. The program in this technique is tested with poor knowledge of the internal structure as well as a basic understanding of the system [4]. ...

... This is a simple method that only searches the search space by randomly selecting solutions and evaluating their suitability. Although it is a relatively unspecific strategy, it can be implemented with little effort [21]. ...

Software testing is an important phase in software development. Faults can cause serious and costly problems if they are neglected in software development, such as programs used in the fields of medicine, aviation, and military operations. A genetic algorithm (GA) is an evolutionary algorithm that can help to generate test data very quickly and accurately, generating test cases that fit the software under test. in this research, we generate test data for software that contains pointers using GA where these test data are valid for the software regardless of which path to use. The results of the experiments demonstrate that the Genetic Algorithm gives good results once used as test data generators to test pointer data type; such that the test target in all programs under test is reached which means that the percentage of the coverage was (100 %). Also, it shows the effect of using pointers in the source code, where the results were less in terms of execution time and the6 same in terms of the number of generations for a program that does not contain pointers than the same program which contains pointers.

... This essay credits current research programs in OBwhere phenomena and paradigms are viewed and interpreted by offering theory to answer research questionsin the white box. Such a depiction and understanding of a white box is borrowed from computer science and software model testing as a space where there is sufficient conceptual knowledge (Khan & Khan, 2012). The white box model has also been used by scientists in biology (Leifsson, 2008) and cryptography (Bock, 2019). ...

  • Jestine Philip Jestine Philip

Purpose Emerging technologies are capable of enhancing organizational- and individual-level outcomes. The organizational behavior (OB) field is beginning to pursue opportunities for researching emerging technologies. This study aims to describe a framework consisting of white, black and grey boxes to demonstrate the tight coupling of phenomena and paradigms in the field and discusses deconstructing OB's white box to encourage data-driven phenomena to coexist in the spatial framework. Design/methodology/approach A scoping literature review was conducted to offer a preliminary assessment of technology-oriented research currently occurring in OB. Findings The literature search revealed two findings. First, the number of published papers on emerging technologies in top management journals has been increasing at a steady pace. Second, various theoretical perspectives at the micro- and macro- organizational level have been used so far for conducting technology-oriented research. Originality/value By conducting a scoping review of emerging technologies research in OB literature, this paper reveals a conceptual black box relating to technology-oriented research. The essay advocates for loosening OB's tightly coupled white box to incorporate emerging technologies both as a phenomenon and as data analytical techniques.

... Lastly, in software fuzz testing, test generation can be classified into white-box, gray-box, and black-box methods, depending on whether the inner workings of the software is known to the tester [32], [33], [34], [35]. Our application is different, in that the planner is reactive, tightly interacting with a physical environment simulator. ...

High-performance autonomy often must operate at the boundaries of safety. When external agents are present in a system, the process of ensuring safety without sacrificing performance becomes extremely difficult. In this paper, we present an approach to stress test such systems based on the rapidly exploring random tree (RRT) algorithm. We propose to find faults in such systems through adversarial agent perturbations, where the behaviors of other agents in an otherwise fixed scenario are modified. This creates a large search space of possibilities, which we explore both randomly and with a focused strategy that runs RRT in a bounded projection of the observable states that we call the objective space. The approach is applied to generate tests for evaluating overtaking logic and path planning algorithms in autonomous racing, where the vehicles are driving at high speed in an adversarial environment. We evaluate several autonomous racing path planners, finding numerous collisions during overtake maneuvers in all planners. The focused RRT search finds several times more crashes than the random strategy, and, for certain planners, tens to hundreds of times more crashes in the second half of the track.

... The lack of detailed understanding of what knowledge DNNs possess makes it difficult to fully rely on them in many safetycritical domains such as navigation of autonomous cars and 1 Arguably, it would be more precise to use the term 'grey box' to describe DNNs, as 'black box' implies that the system is intransparent and its insides might be completely inaccessible [67] , whereas 'grey box' refers to a system that is less transparent than 'white box', but for which we still have some limited knowledge of its inner workings and fundamental principles it is built upon [12,40] . However, taking into account the prevalence of the term 'black box' in ML literature as well as the connotations of mystery evoked by 'black' but not by 'grey', it is unlikely that the term 'grey box' will gain currency in the AI community. ...

Deep neural networks (DNNs) have achieved state-of-the-art results in a broad range of tasks, in particular the ones dealing with the perceptual data. However, full-scale application of DNNs in safety-critical areas is hindered by their black box-like nature, which makes their inner workings nontransparent. As a response to the black box problem, the field of explainable artificial intelligence (XAI) has recently emerged and is currently rapidly growing. The present survey is concerned with perturbation-based XAI methods, which allow to explore DNN models by perturbing their input and observing changes in the output. We present an overview of the most recent research focusing on the differences and similarities in the applications of perturbation-based methods to different data types, from extensively studied perturbations of images to the just emerging research on perturbations of video, natural language, software code, and reinforcement learning entities.

Injection of faults has been studied in various research works since last decades. Several hardware targets have been studied with respect to the efficiency of fault injections. In this paper we address the security evaluation of embedded systems in constrained environments called black-box analyses. This is not considered by standards of evaluation as they require conducting the analysis in the most relaxed conditions, often called white-box analysis which focuses on specific security modules provided that the finer details are available. However, black-box analysis has a much larger view by focusing on all the system as potential target. It is closer to a real world attacker. This allows measuring the impact of real attack scenarios, and therefore thinking and building the most adequate protections. We put forward a six steps evaluation methodology along with a practical use-case on a real end-user device. This shall give a better understanding and also an evaluation framework of black-box analysis.

In recent decades, building design and operation have been an important field of study, due to the significant share of buildings in global primary energy consumption and the time that most people spend indoors. As such, multiple studies focus on aspects of building energy consumption and occupant comfort optimization. The scientific community has discerned the importance of operation optimization through retrofitting actions for on-site building energy systems, achieved by the use of simulation techniques, surrogate modeling, as well as the guidance of existing building performance and indoor occupancy standards. However, more knowledge should be attained on the matter of whether this methodology can be extended towards the early stages of thermal system and/or building design. To this end, the present study provides a building thermal system design optimization methodology. A data set of minimum thermal system power, for a typical range of building characteristics, is generated, according to the criterion of occupant discomfort in degree hours. Respectively, a surrogate model, providing a configurable correlation of the above set of thermal system dimensioning solutions is developed, using regression model fitting techniques. Computational results indicate that such a model could provide both desirable calculative simplification and accuracy on par with existing respective thermal load calculation standards and simplified system dimensioning methods.

  • Bhawna Kumari
  • Naresh Chauhan
  • M Tech Scholar
  • Sameer Mohammad Sameer Mohammad

Automated testing is a way to test the software system using an automation tool. Automated testing was proposed to reduce manual efforts. In this paper , manual testing model and automated testing model have been discussed. These models have been used on web based applications. There were a lot of drawbacks in manual testing ; to overcome these drawbacks automated testing has been performed. A description about the automation tool selenium has been given in this paper. In this paper ,there is a comparison between manual testing and automated testing. And also a trial has been made to show the impacts of automation in testing field.

Manufacturing advanced fiber-reinforced polymer composite structures e.g. in aerospace sector is known to be a highly complex task, subjected to a stringent framework of process qualifications and structural substantiation. Conversely, Industry 4.0 is an emerging set of sensing, network and predictive technologies and tools which can enable better decision-making towards risk reduction, supported by data-driven models, representing a novel and fruitful intersection between information technologies and manufacturing. This study aims to investigate and develop innovative applications of artificial intelligence, machine learning and data-driven approaches in support of manufacturing advanced composites, including the model building process of analyses, optimization, inverse problems and experimental investigations. This article presents an Industry 4.0-based composite process modeling pipeline, including both dataset- and model-based knowledge engineering activities pertinent to industrial considerations, with the novel approach of integrating domain expertise directly into the dataset and model building activities. This is investigated through a case study on the autoclave cure process of the Hexcel AS4/8552 carbon prepreg material. In particular, surrogate and highly interpretable models such as Logistic Rule Regression are combined with domain expert knowledge under a fuzzy scoring to provide a tool for assessing the quality (knowledgeability) of complex manufacturing datasets, prior to training black-box models. Further, specificity as a global indicator is combined with the novel Decision Boundary Crispness Score (DBSC) as a local indicator, to better quantify the overall confidence of the users in the model's prediction in the context of small perturbations in manufacturing conditions. Results demonstrate that the DBSC yields a more granular and conservative assessment of both dataset and model quality. Such explainability and local assessment features is deemed vital for production engineers in practice, especially when deploying black-box models for high-risk, in-situ decision-making.

  • Christopher Lange

Lastspitzen verursachen hohe und unvorhersehbare Belastungen der Stromnetze sowie erhöhte Übertragungsverluste in den Verteilnetzen. Die Kompensation kurzzeitig hoher Nachfragen nach elektrischer Energie erfordert zudem ineffiziente und teure Spitzenlastkraftwerke sowie entsprechend dimensionierte Netzkomponenten. Um einen gleichmäßigeren Bezug größerer Stromabnehmer zu erreichen, werden seitens der Netzbetreiber finanzielle Anreize gesetzt. Dazu gehört der Leistungspreis, welcher mit der im Abrechnungszeitraum maximal aufgetretenen Leistung verrechnet wird. Eine Reduktion der Lastspitzen eröffnet Industrie- und Gewerbebetrieben dadurch hohe Einsparpotentiale. In der vorliegenden Arbeit werden das Vorgehen und die Anwendung einer Energiesektoren-übergreifenden Reduktion von Lastspitzen sowie der Einfluss auf das zugrunde liegende Energiesystem untersucht. Im Gegensatz zur bestehenden Literatur werden neben elektrischen Speichern zusätzlich Anlagen aus dem thermischen Bereich für die Lastspitzenreduktion verwendet, um das Reduktionspotential zu erhöhen. Dazu gehören Versorgungsanlagen aus der Wärme- und Kältetechnik, welche häufig einen Bestandteil von industriellen Energiesystemen darstellen. Schwerpunktmäßig werden ein Blockheizkraftwerk mit Wärmespeicher sowie eine Kälteerzeugungsanlage mit Kältespeicher betrachtet. Die Vorgehensweise ist dabei auch auf andere Komponenten übertragbar. Die Energiespeicher ermöglichen die nötige Flexibilität, um eine zusätzliche Nutzung der Anlagen für die Lastspitzenreduktion zu erreichen. Die Einzelkomponenten (Anlagen, Speicher und Peripherie) werden mit Hilfe von datenbasierten Modellen abgebildet, um eine simulative und somit nicht-invasive Untersuchung der Energiesektoren-übergreifenden Lastspitzenreduktion zu ermöglichen. Für den Einsatz der Anlagen zur Lastspitzenreduktion werden Algorithmen und Betriebsstrategien entwickelt, welche die Notwendigkeit einer Lastspitzenreduktion erkennen, Sollwerte berechnen sowie den Normal- und Lastspitzenbetrieb sicherstellen. Im Vergleich zum Stand der Wissenschaft und Technik werden dabei alle relevanten Charakteristika der Komponenten (z. B. Anfahrvorgänge) vollständig berücksichtigt. Die Betriebsstrategien werden als Zustandsautomaten formuliert, um eine Realisierung auf realen Anlagensteuerungen zu ermöglichen. Die Methoden lassen sich zudem auf in der vorliegenden Arbeit nicht betrachtete Bereiche übertragen, wie z. B. auf Druckluftkompressoren mit Druckluftspeicher. Das übergeordnete Ziel ist dabei die Einhaltung einer vorgegebenen Bezugsgrenze. Diese kann auch zeitlich variabel sein, was die Anwendung von individuellen Netzentgelten, insbesondere der atypischen Netznutzung, ermöglicht. Auch die Erreichung einer Jahresbenutzungsdauer von 7000 Stunden im Kontext der intensiven Netznutzung wird thematisiert. Die Modelle und Betriebsstrategien werden in einer erweiterbaren und flexiblen Simulationsumgebung zusammengeführt und verknüpft, um konkrete Szenarien darzustellen und zu untersuchen sowie die Komponenten und Parameter zu optimieren. Innerhalb der Simulation werden die Komponenten dynamisch über eine Netzliste verknüpft, was Erweiterungen stark vereinfacht und dadurch umfangreiche Untersuchungen ermöglicht. Die Simulationen zeigen, dass zur zuverlässigen Einhaltung einer Bezugsgrenze stets eine Batterie notwendig ist, da diese eine schnelle Reaktionszeit sowie eine stufenlose Ausgangsleistung aufweist. Das Batteriesystem wird im ersten Szenario isoliert betrachtet. Für die Parameter eines Referenzsystems, welches Lastspitzen in der Größenordnung von einem Megawatt aufweist, wird ein Reduktionspotential von etwa 10 % ermittelt. Dies führt zu einer Amortisationszeit von unter fünf Jahren. Bei der zusätzlichen Berücksichtigung eines Blockheizkraftwerks mit Wärmespeicher steigt dieser Wert auf ca. 18 %. In Kombination mit einem Kältespeicher wird das Potential weiter gesteigert auf 21 %. Bei einem Leistungspreis von 100 Euro pro Kilowatt führt das zu einer jährlichen Ersparnis von etwa 21 Tausend Euro. Ein zweiter Jahresdatensatz aus dem Referenzsystem zeigt einen ähnlichen Einfluss der Maßnahmen auf die Gesamtersparnis. Wird auch der wärmegeführte Betrieb des BHKW berücksichtigt, liegt die Ersparnis in einer Größenordnung von 139 Tausend Euro pro Jahr, was in einer Amortisationszeit von unter drei Jahren resultiert. Da die Ergebnisse stark von den Anlagendimensionen abhängig sind, wird zudem eine Methode zur Berechnung des Reduktionspotentials unter Variation der Nennleistungen und -kapazitäten gezeigt und für zahlreiche Parametersätze angewandt. Die Betriebsstrategien wurden im Referenzsystem implementiert, welches Messergebnisse für die Validierung der Simulationen bereitstellt. Die Simulationen zeigen im Vergleich zu den Messungen sehr geringe Abweichungen in der resultierenden Trafoleistung bei einem mittleren absoluten Fehler von maximal vier Kilowatt. Die vorliegende Arbeit liefert somit die Vorgehensweise für die Planung und Umsetzung einer erfolgreichen Energiesektoren-übergreifenden Lastspitzenreduktion und beleuchtet die exemplarische Anwendung der Dimensionierung von Komponenten, Optimierung von Algorithmusparametern sowie die Implementierung der Betriebsstrategien in einem realen System.

  • Mohd Ehmer Khan

Software testing is the process of analyzing software to find the difference between required and existing condition. Software testing is performed throughout the development cycle of software and it is also performed to build quality software, for this purpose two basic testing approaches are used, they are white box testing and black box testing. One of the software testing technique which I have explain in my paper is Black Box Testing, it is a method of generating test cases that are independent of software internal structure, I have also briefly explore various different approaches to black box testing technique for finding errors. Since black box testing is always based either directly or indirectly on the software specification so it is also called specification based testing.

  • Mohd. Ehmer Khan

Software testing is an activity which is aimed for evaluating an attribute or capability of a program and ensures that it meets the required result. There are many approaches to software testing, but effective testing of complex product is essentially a process of investigation, not merely a matter of creating and following route procedure. It is often impossible to find all the errors in the program. This fundamental problem in testing thus throws open question, as to what would be the strategy that we should adopt for testing. Thus, the selection of right strategy at the right time will make the software testing efficient and effective. In this paper I have described software testing techniques which are classified by purpose.

  • Farmeena Khan

Farmeena Khan I completed my BCA in 2003 from Dr. B. R. Ambedkar University, Agra, India and MBA in 2011 from Janardan Rai Nagar Rajasthan Vidyapeeth University, Rajasthan, India, and pursuing M.Sc (Computer Science) from EIILM University, Jorethang, Sikkim, India.