Early Software Reliability

Size: px
Start display at page:

Download "Early Software Reliability"

Transcription

1 Neeraj Ajeet Kumar Pandey Kumar Goyal Early Software Reliability Prediction A Fuzzy Logic Approach ^ Springer

2 1 Introduction Need for Reliable and Quality Software Software Reliability Software Error, Fault, and Failure Measuring Software Reliability Limitation of Software Reliability Models Why Fault Prediction? Software Fault Prediction Software Metrics Capability Maturity Limitation of Early Reliability Model Level 6 Prediction Models Early Software Fault Prediction Model Residual Fault Prediction Model Software Development Life Cycle and Fault Density Software Metrics and Fault Density Indicator Quality of Large Software System Fault-Prone and Not Fault-Prone Software Modules Fault-Proneness Factors Need for Software Module Classification Limitations with Earlier Module Prediction Models Regression Testing and Software Reliability Software Reliability and Operational Profile Organization of the Book 14 References 15 2 Background: Software Quality and Reliability Prediction Introduction Software Reliability Models Failure Rate Models Failure or Fault Count Models Error or Fault-Seeding Models Reliability Growth Models 20 Xlll

3 xjv 2.3 Architecture-based Software Reliability Models Bayesian Models Early Software Reliability Prediction Models Reliability-Relevant Software Metrics Software Capability Maturity Models Software Defects Prediction Models Software Quality Prediction Models Regression Testing Operational Profile Observations 29 References 30 3 Early Fault Prediction Using Software Metrics and Process Maturity Introduction Brief Overview of Fuzzy Logic System Proposed Model Description of Metrics Considered for the Model Implementation of the Proposed Model Information Gathering Phase Information Processing Phase Defuzzification Fault Prediction Phase Case Studies Results and Discussion Summary 56 References 57 4 Multistage Model for Residual Fault Prediction Introduction Research Background Software Metrics Fault Density Indicator Overview of the Proposed Model Description of Software Metrics and their Nature Model Implementation Independent and Dependent Variables Development of Fuzzy Profiles Development of Fuzzy Rules Information Processing Residual Fault Prediction 74

4 _ xv 4.5 Case Study Dataset Used Metrics Considered in "qqdefects" Dataset Conversion of Dataset Results and Discussion Summary 79 References 79 5 Prediction and Ranking of Fault-Prone Software Modules Introduction Research Background Data Mining Software Metrics Fuzzy Set Theory Proposed Model Assumptions and Architecture of the Model Model Implementation Training Data Selection Decision Tree Construction Estimating Classifier Accuracy Module Ranking Procedure An Illustrative Example Proposed Procedure Case Study Dataset Used Converting Data in Appropriate Form Resultant Decision Tree Results and Discussion Summary 103 References Reliability Centric Test Case Prioritization Introduction Earlier Works Test Case Prioritization Test Case Prioritization Techniques APFD Metric Proposed Model Results and Discussion Summary 114 References 115

5 xvi 7 Software Reliability and Operational Profile Introduction Backgrounds and Related Works Embedded Systems'Testing Function Point Metric Operational Profile Proposed Model Premise Model Architecture Case Study: Automotive Embedded ECU Fog Light ECUs Functional Complexity of Fog Light ECU Operational Profile of Fog Light ECU Test Case Generation Test Case and Transition Probability Results and Discussion Summary 129 References 130 Appendix A 131 Appendix B 135 Appendix C 139 About the Author 153

Chapter 2 Background: Software Quality and Reliability Prediction

Chapter 2 Background: Software Quality and Reliability Prediction Chapter 2 Background: Software Quality and Reliability Prediction 2.1 Introduction Size, complexity, and human dependency on software-based products have grown dramatically during past decades. Software

More information

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation. Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Keywords document, agile documentation, documentation, Techno functional expert, Team Collaboration, document selection;

Keywords document, agile documentation, documentation, Techno functional expert, Team Collaboration, document selection; Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Document Driven

More information

Mining Metrics to Predict Component Failures

Mining Metrics to Predict Component Failures Mining Metrics to Predict Component Failures Nachiappan Nagappan, Microsoft Research Thomas Ball, Microsoft Research Andreas Zeller, Saarland University Overview Introduction Hypothesis and high level

More information

Utilizing Defect Management for Process Improvement. Kenneth Brown, CSQA, CSTE kdbqa@yahoo.com

Utilizing Defect Management for Process Improvement. Kenneth Brown, CSQA, CSTE kdbqa@yahoo.com Utilizing Defect Management for Process Improvement Kenneth Brown, CSQA, CSTE kdbqa@yahoo.com What This Presentation Will Cover How to Appropriately Classify and Measure Defects What to Measure in Defect

More information

Elektrobit (EB) Automotive Consulting Manage challenging automotive software projects

Elektrobit (EB) Automotive Consulting Manage challenging automotive software projects www.elektrobit.com Elektrobit (EB) Automotive Consulting Manage challenging automotive software projects EB Automotive Consulting Manage challenging automotive software projects The automotive industry

More information

Estimating Software Reliability In the Absence of Data

Estimating Software Reliability In the Absence of Data Estimating Software Reliability In the Absence of Data Joanne Bechta Dugan (jbd@virginia.edu) Ganesh J. Pai (gpai@virginia.edu) Department of ECE University of Virginia, Charlottesville, VA NASA OSMA SAS

More information

Software Defect Prediction Modeling

Software Defect Prediction Modeling Software Defect Prediction Modeling Burak Turhan Department of Computer Engineering, Bogazici University turhanb@boun.edu.tr Abstract Defect predictors are helpful tools for project managers and developers.

More information

CONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19

CONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19 PREFACE xi 1 INTRODUCTION 1 1.1 Overview 1 1.2 Definition 1 1.3 Preparation 2 1.3.1 Overview 2 1.3.2 Accessing Tabular Data 3 1.3.3 Accessing Unstructured Data 3 1.3.4 Understanding the Variables and Observations

More information

End-to-End Testing. Helping our Customers improve quality and reduce costs

End-to-End Testing. Helping our Customers improve quality and reduce costs End-to-End Testing Helping our Customers improve quality and reduce costs Introduction Concept Reply focuses on End-To-End (E2E) Testing, which means Testing, Validation and Quality Assurance (QA), specifically

More information

life science data mining

life science data mining life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.

More information

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Architecture Principles

Architecture Principles Danny Greefhorst Erik Proper Architecture Principles The Cornerstones of Enterprise Architecture 4y Springer Introduction 1 1.1 Challenges to Enterprises 1 1.2 Enterprise Architecture and Architecture

More information

ISO 26262 Introduction

ISO 26262 Introduction ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product

More information

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi Proceedings of the 10 th International Conference on Manufacturing Research ICMR 2012 ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING Mehran G.

More information

Bayesian Inference to Predict Smelly classes Probability in Open source software

Bayesian Inference to Predict Smelly classes Probability in Open source software Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Heena

More information

Business Intelligence. Data Mining and Optimization for Decision Making

Business Intelligence. Data Mining and Optimization for Decision Making Brochure More information from http://www.researchandmarkets.com/reports/2325743/ Business Intelligence. Data Mining and Optimization for Decision Making Description: Business intelligence is a broad category

More information

DATA MINING TECHNIQUES AND APPLICATIONS

DATA MINING TECHNIQUES AND APPLICATIONS DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,

More information

Master Data Management and Data Governance Second Edition

Master Data Management and Data Governance Second Edition Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore

More information

Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR

Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR BIJIT - BVICAM s International Journal of Information Technology Bharati Vidyapeeth s Institute of Computer Applications and Management (BVICAM), New Delhi Fuzzy Logic Based Revised Defect Rating for Software

More information

Data Mining + Business Intelligence. Integration, Design and Implementation

Data Mining + Business Intelligence. Integration, Design and Implementation Data Mining + Business Intelligence Integration, Design and Implementation ABOUT ME Vijay Kotu Data, Business, Technology, Statistics BUSINESS INTELLIGENCE - Result Making data accessible Wider distribution

More information

Data Mining. Concepts, Models, Methods, and Algorithms. 2nd Edition

Data Mining. Concepts, Models, Methods, and Algorithms. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2171322/ Data Mining. Concepts, Models, Methods, and Algorithms. 2nd Edition Description: This book reviews state-of-the-art methodologies

More information

Software Quality Management

Software Quality Management Software Lecture 9 Software Engineering CUGS Spring 2011 Kristian Sandahl Department of Computer and Information Science Linköping University, Sweden A Software Life-cycle Model Which part will we talk

More information

Measurement Information Model

Measurement Information Model mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides

More information

Contents. Dedication List of Figures List of Tables. Acknowledgments

Contents. Dedication List of Figures List of Tables. Acknowledgments Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description

More information

The Data Mining Process

The Data Mining Process Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data

More information

Software Defect Prediction for Quality Improvement Using Hybrid Approach

Software Defect Prediction for Quality Improvement Using Hybrid Approach Software Defect Prediction for Quality Improvement Using Hybrid Approach 1 Pooja Paramshetti, 2 D. A. Phalke D.Y. Patil College of Engineering, Akurdi, Pune. Savitribai Phule Pune University ABSTRACT In

More information

Software Requirements, Third Edition

Software Requirements, Third Edition j Microsoft Software Requirements, Third Edition Karl Wiegers and Joy Beatty Contents Introduction Acknowledgments xxv xxxi PART I SOFTWARE REQUIREMENTS: WHAT, WHY, AND WHO Chapter 1 The essential software

More information

Essential Components of an Integrated Data Mining Tool for the Oil & Gas Industry, With an Example Application in the DJ Basin.

Essential Components of an Integrated Data Mining Tool for the Oil & Gas Industry, With an Example Application in the DJ Basin. Essential Components of an Integrated Data Mining Tool for the Oil & Gas Industry, With an Example Application in the DJ Basin. Petroleum & Natural Gas Engineering West Virginia University SPE Annual Technical

More information

Fuzzy Probability Distributions in Bayesian Analysis

Fuzzy Probability Distributions in Bayesian Analysis Fuzzy Probability Distributions in Bayesian Analysis Reinhard Viertl and Owat Sunanta Department of Statistics and Probability Theory Vienna University of Technology, Vienna, Austria Corresponding author:

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)

More information

Automatic Validation of Diagnostic Services

Automatic Validation of Diagnostic Services Development ProcessES Diagnostics Automatic Validation of Diagnostic Services For the first time, a fully automated test case generator has been introduced in diagnostics validation at General Motors Europe

More information

Fundamentals of Measurements

Fundamentals of Measurements Objective Software Project Measurements Slide 1 Fundamentals of Measurements Educational Objective: To review the fundamentals of software measurement, to illustrate that measurement plays a central role

More information

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.

More information

A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data

A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection

More information

Grid Density Clustering Algorithm

Grid Density Clustering Algorithm Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2

More information

Customer Relationship Management

Customer Relationship Management V. Kumar Werner Reinartz Customer Relationship Management Concept, Strategy, and Tools ^J Springer Part I CRM: Conceptual Foundation 1 Strategic Customer Relationship Management Today 3 1.1 Overview 3

More information

Determining optimum insurance product portfolio through predictive analytics BADM Final Project Report

Determining optimum insurance product portfolio through predictive analytics BADM Final Project Report 2012 Determining optimum insurance product portfolio through predictive analytics BADM Final Project Report Dinesh Ganti(61310071), Gauri Singh(61310560), Ravi Shankar(61310210), Shouri Kamtala(61310215),

More information

Intelligent and Automated Software Testing Methods Classification

Intelligent and Automated Software Testing Methods Classification Intelligent and Automated Software Testing Methods Classification Seyed Reza Shahamiri Department of Software Engineering Faculty of Computer Science and Information s University Teknologi Malaysia (UTM)

More information

COMPARATIVE STUDY OF SOFTWARE TESTING TOOLS ON THE BASIS OF SOFTWARE TESTING METHODOLOGIES

COMPARATIVE STUDY OF SOFTWARE TESTING TOOLS ON THE BASIS OF SOFTWARE TESTING METHODOLOGIES International Journal of Advance Research In Science And Engineering http://www.ijarse.com COMPARATIVE STUDY OF SOFTWARE TESTING TOOLS ON THE BASIS OF SOFTWARE TESTING METHODOLOGIES 1 Lav Kumar Dixit,

More information

4. General information about the company and proposed Inspection Support System (ISS)

4. General information about the company and proposed Inspection Support System (ISS) Template for the reply to the request for information 4. General information about the company and proposed Inspection Support System (ISS) Name of the Company: 30 October 2014 r. Table of contents 1.

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association

More information

Leveraging Ensemble Models in SAS Enterprise Miner

Leveraging Ensemble Models in SAS Enterprise Miner ABSTRACT Paper SAS133-2014 Leveraging Ensemble Models in SAS Enterprise Miner Miguel Maldonado, Jared Dean, Wendy Czika, and Susan Haller SAS Institute Inc. Ensemble models combine two or more models to

More information

Predictive Dynamix Inc

Predictive Dynamix Inc Predictive Modeling Technology Predictive modeling is concerned with analyzing patterns and trends in historical and operational data in order to transform data into actionable decisions. This is accomplished

More information

Database Marketing, Business Intelligence and Knowledge Discovery

Database Marketing, Business Intelligence and Knowledge Discovery Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski

More information

Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach

Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach Journal of Information Processing Systems, Vol.7, No.3, September 2011 http://dx.doi.org/10.3745/jips.2011.7.3.473 Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach Jagat Sesh Challa*,

More information

Software Test Plan (STP) Template

Software Test Plan (STP) Template (STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This

More information

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

Requirements Engineering

Requirements Engineering Murali Chemuturi Requirements Engineering and Management for Software Development Projects Foreword by Tom Gilb ^ Springer Contents 1 Introduction to Requirements Engineering and Management... 1 1.1 What

More information

,., ; -,- ;., : _»/.. t,, '," 1, Mike Biere

,., ; -,- ;., : _»/.. t,, ', 1, Mike Biere ,., ; -,- ;., : _»/.. t,, '," 1, Mike Biere Contents Chapter 1 Introduction to Business Intelligence Today 1 Setting Expectations 3 The Face of Business Intelligence Now 5 The Characteristics of a BI Vision

More information

Bank Customers (Credit) Rating System Based On Expert System and ANN

Bank Customers (Credit) Rating System Based On Expert System and ANN Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,

More information

Machine Learning in Hospital Billing Management. 1. George Mason University 2. INOVA Health System

Machine Learning in Hospital Billing Management. 1. George Mason University 2. INOVA Health System Machine Learning in Hospital Billing Management Janusz Wojtusiak 1, Che Ngufor 1, John M. Shiver 1, Ronald Ewald 2 1. George Mason University 2. INOVA Health System Introduction The purpose of the described

More information

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati tnpatil2@gmail.com, ss_sherekar@rediffmail.com

More information

A Cloud Based Solution with IT Convergence for Eliminating Manufacturing Wastes

A Cloud Based Solution with IT Convergence for Eliminating Manufacturing Wastes A Cloud Based Solution with IT Convergence for Eliminating Manufacturing Wastes Ravi Anand', Subramaniam Ganesan', and Vijayan Sugumaran 2 ' 3 1 Department of Electrical and Computer Engineering, Oakland

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Final Project Report

Final Project Report CPSC545 by Introduction to Data Mining Prof. Martin Schultz & Prof. Mark Gerstein Student Name: Yu Kor Hugo Lam Student ID : 904907866 Due Date : May 7, 2007 Introduction Final Project Report Pseudogenes

More information

Defect Prediction Leads to High Quality Product

Defect Prediction Leads to High Quality Product Journal of Software Engineering and Applications, 2011, 4, 639-645 doi:10.4236/jsea.2011.411075 Published Online November 2011 (http://www.scirp.org/journal/jsea) 639 Naheed Azeem, Shazia Usmani Department

More information

The following was presented at DMT 14 (June 1-4, 2014, Newark, DE).

The following was presented at DMT 14 (June 1-4, 2014, Newark, DE). DMT 2014 The following was presented at DMT 14 (June 1-4, 2014, Newark, DE). The contents are provisional and will be superseded by a paper in the DMT 14 Proceedings. See also presentations and Proceedings

More information

Data Mining - Evaluation of Classifiers

Data Mining - Evaluation of Classifiers Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010

More information

IBM Software Testing and Development Control - How to Measure Risk

IBM Software Testing and Development Control - How to Measure Risk IBM Software Group Practical Approaches to Development Governance 2007 IBM Corporation Program parameters (cost, schedule, effort, quality, ) are random variables Area under curve describes probability

More information

A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case study: Ahanpishegan co.)

A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case study: Ahanpishegan co.) www.ijcsi.org 425 A Comparison Between Data Mining Prediction Algorithms for Fault Detection (Case study: Ahanpishegan co.) Golriz Amooee 1*, Behrouz Minaei-Bidgoli 2, Malihe Bagheri-Dehnavi 3 1 Department

More information

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction

Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction Huanjing Wang Western Kentucky University huanjing.wang@wku.edu Taghi M. Khoshgoftaar

More information

Impact of IT Outsourcing on Business & IT Alignment

Impact of IT Outsourcing on Business & IT Alignment x Impact of IT Outsourcing on Business & IT Alignment Summary IT outsourcing does not matter from an alignment perspective This dissertation is the end result of over four years of research, and over fifteen

More information

Web Application Regression Testing: A Session Based Test Case Prioritization Approach

Web Application Regression Testing: A Session Based Test Case Prioritization Approach Web Application Regression Testing: A Session Based Test Case Prioritization Approach Mojtaba Raeisi Nejad Dobuneh 1, Dayang Norhayati Abang Jawawi 2, Mohammad V. Malakooti 3 Faculty and Head of Department

More information

Pattern Insight Clone Detection

Pattern Insight Clone Detection Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology

More information

Data mining for prediction

Data mining for prediction Data mining for prediction Prof. Gianluca Bontempi Département d Informatique Faculté de Sciences ULB Université Libre de Bruxelles email: gbonte@ulb.ac.be Outline Extracting knowledge from observations.

More information

Monitoring MySQL database with Verax NMS

Monitoring MySQL database with Verax NMS Monitoring MySQL database with Verax NMS Table of contents Abstract... 3 1. Adding MySQL database to device inventory... 4 2. Adding sensors for MySQL database... 7 3. Adding performance counters for MySQL

More information

A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities

A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities The first article of this series presented the capability model for business analytics that is illustrated in Figure One.

More information

Using multiple models: Bagging, Boosting, Ensembles, Forests

Using multiple models: Bagging, Boosting, Ensembles, Forests Using multiple models: Bagging, Boosting, Ensembles, Forests Bagging Combining predictions from multiple models Different models obtained from bootstrap samples of training data Average predictions or

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Confirmation Bias as a Human Aspect in Software Engineering

Confirmation Bias as a Human Aspect in Software Engineering Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD Data Science Laboratory, Department of Mechanical and Industrial Engineering, Ryerson University Why Human Aspects in Software

More information

Machine Learning. Mausam (based on slides by Tom Mitchell, Oren Etzioni and Pedro Domingos)

Machine Learning. Mausam (based on slides by Tom Mitchell, Oren Etzioni and Pedro Domingos) Machine Learning Mausam (based on slides by Tom Mitchell, Oren Etzioni and Pedro Domingos) What Is Machine Learning? A computer program is said to learn from experience E with respect to some class of

More information

White Paper. Data Mining for Business

White Paper. Data Mining for Business White Paper Data Mining for Business January 2010 Contents 1. INTRODUCTION... 3 2. WHY IS DATA MINING IMPORTANT?... 3 FUNDAMENTALS... 3 Example 1...3 Example 2...3 3. OPERATIONAL CONSIDERATIONS... 4 ORGANISATIONAL

More information

Learning is a very general term denoting the way in which agents:

Learning is a very general term denoting the way in which agents: What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);

More information

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,

More information

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York Software Project Management A Process-Driven Approach Ashfaque Ahmed CRC Press Taylor Si Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Croup, an Informa business

More information

Quality Management. Objectives

Quality Management. Objectives Quality Management Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 27 Slide 1 Objectives To introduce the quality management process and key quality management activities To explain the

More information

Quality Management. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 27 Slide 1

Quality Management. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 27 Slide 1 Quality Management Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 27 Slide 1 Objectives To introduce the quality management process and key quality management activities To explain the

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York Quality Management Theory and Application PETER D. MAUCH Ltfi) CRC Press \ V J Taylor & Francis Group ^ ^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an Informa business

More information

Certified Tester. Advanced Level Overview

Certified Tester. Advanced Level Overview Version 2012 Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. Copyright (hereinafter called ISTQB ). Advanced Level Working Group: Mike Smith

More information

Prediction of Stock Performance Using Analytical Techniques

Prediction of Stock Performance Using Analytical Techniques 136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University

More information

Predicting the Software Fault Using the Method of Genetic Algorithm

Predicting the Software Fault Using the Method of Genetic Algorithm Predicting the Software Fault Using the Method of Genetic Algorithm Mrs.Agasta Adline 1, Ramachandran.M 2 Assistant Professor (Sr.Grade), Easwari Engineering College, Chennai, Tamil Nadu, India. 1 PG student,

More information

Software Project Level Estimation Model Framework based on Bayesian Belief Networks

Software Project Level Estimation Model Framework based on Bayesian Belief Networks Software Project Level Estimation Model Framework based on Bayesian Belief Networks Hao Wang Siemens Ltd. China CT SE Beijing, China wanghao@siemens.com Fei Peng Siemens Ltd. China CT SE Beijing, China

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

Reference Books. Data Mining. Supervised vs. Unsupervised Learning. Classification: Definition. Classification k-nearest neighbors

Reference Books. Data Mining. Supervised vs. Unsupervised Learning. Classification: Definition. Classification k-nearest neighbors Classification k-nearest neighbors Data Mining Dr. Engin YILDIZTEPE Reference Books Han, J., Kamber, M., Pei, J., (2011). Data Mining: Concepts and Techniques. Third edition. San Francisco: Morgan Kaufmann

More information

Education. Award. Experience. Teaching Assignment. Research Project

Education. Award. Experience. Teaching Assignment. Research Project Dr. Satwinder Singh Assistant Professor Centre for Computer Science Technology School of Engineering & Technology Central University of Punjab Bathinda-151100 email:satwindercse@gmail.com Education Ph.

More information

VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance

VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance Key indicators and classification capabilities in Stratusphere FIT and Stratusphere UX Whitepaper INTRODUCTION This whitepaper

More information

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,

More information

Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe

Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe Abstract Effective website personalization is at the heart of many e-commerce applications. To ensure that customers

More information

Data-Driven Performance Management in Practice for Online Services

Data-Driven Performance Management in Practice for Online Services Data-Driven Performance Management in Practice for Online Services Dongmei Zhang Principal Researcher/Research Manager Software Analytics group, Microsoft Research Asia October 29, 2012 Landscape of Online

More information

Quality Management. Managing the quality of the software process and products

Quality Management. Managing the quality of the software process and products Quality Management Managing the quality of the software process and products Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 24 Slide 1 Objectives To introduce the quality management process

More information

Microcontrollers in Practice

Microcontrollers in Practice M. Mitescu I. Susnea Microcontrollers in Practice With 117 Figures, 34 Tables and CD-Rom 4y Springer Contents Resources of Microcontrollers, 1 1.1 In this Chapter 1 1.2 Microcontroller Architectures 1

More information

Credit Risk Management in the Automotive Industry

Credit Risk Management in the Automotive Industry Alexander Hener Credit Risk Management in the Automotive Industry Structuring of loan and lease securitizations as integrative solution With a foreword by Prof. Dr. Johannes Schneider Deutscher Universitats-Verlag

More information