Assessing Software Reliability Using Exponential Imperfect Debugging Model
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Software reliability is one of the most important characteristics of software quality. As the usage of software reliability is growing rapidly, accessing the software reliability is a critical task in development of a software system. So, many Software Reliability Growth Models (SRGM) are used in order to decide upon the reliable or unreliable of the developed software very quickly. The well known software reliability growth model called as Exponential Imperfect Debugging model is a two parameter Non Homogeneous Poisson Process model which is widely used in software reliability growth modeling. In this paper, we propose to apply Statistical Process Control (SPC) to monitor software reliability process. A control mechanism is proposed based on the cumulative observations of failures which are grouped using mean value function of the Exponential Imperfect Debugging model. The Maximum Likelihood Estimation (MLE) approach is used to estimate the unknown parameters of the model. The process is illustrated by applying to real software failure data.
Authors and Affiliations
B Prameela Rani| Student, Department of Information Technology , V.R Siddhartha Engineering college Prameelarani507@gmail.com, A. Srisaila| Asst. Professor, Department of Information Technology V. R .Siddhartha Engg .College sr.saila@gmail.com, K. Sita Kumari| Assoc. Professor, Department of Information Technology V. R. Siddhartha Engg. College Sitakumari.kotha@gmail.com, M. V. D. N. S. Madhavi| Asst. Professor, Department of Mathematics, V. R .Siddhartha Engg .College Mvdnsmadhavi71@gmail.com
An Overview of 4G LTE Technologies – A Top down Approach
4G LTE design began in 2000 and was first implemented in 2010.commercially in DLTE technology introduced December 2009 by teliasonerain Norway and Sweden came to the U.S. in 2010.Data rates and supportable bandwidths...
E-medicinal services frameworks are ever trendier, a lot of private information for restorative standard is involved, and people begin to value that they would totally lose sort out over their individual data once it...
Disk Resident Taxonomy Mining for Large Temporal Datasets
Mining patterns under constraints in large data is a significant task to advantage from the multiple uses of the patterns embedded in these data sets. It is obviously a difficult task because of the exponential growt...
Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism
The term that flourished in the IT industry is the Cloud Computing. Inspired and Motivated by the tremendous growth and the huge success of cloud, we propose a new decentralized access control scheme for secure data...
A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud
Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockp...