Assessing Software Reliability Using Exponential Imperfect Debugging Model
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Software reliability is one of the most important characteristics of software quality. As the usage of software reliability is growing rapidly, accessing the software reliability is a critical task in development of a software system. So, many Software Reliability Growth Models (SRGM) are used in order to decide upon the reliable or unreliable of the developed software very quickly. The well known software reliability growth model called as Exponential Imperfect Debugging model is a two parameter Non Homogeneous Poisson Process model which is widely used in software reliability growth modeling. In this paper, we propose to apply Statistical Process Control (SPC) to monitor software reliability process. A control mechanism is proposed based on the cumulative observations of failures which are grouped using mean value function of the Exponential Imperfect Debugging model. The Maximum Likelihood Estimation (MLE) approach is used to estimate the unknown parameters of the model. The process is illustrated by applying to real software failure data.
Authors and Affiliations
B Prameela Rani| Student, Department of Information Technology , V.R Siddhartha Engineering college Prameelarani507@gmail.com, A. Srisaila| Asst. Professor, Department of Information Technology V. R .Siddhartha Engg .College sr.saila@gmail.com, K. Sita Kumari| Assoc. Professor, Department of Information Technology V. R. Siddhartha Engg. College Sitakumari.kotha@gmail.com, M. V. D. N. S. Madhavi| Asst. Professor, Department of Mathematics, V. R .Siddhartha Engg .College Mvdnsmadhavi71@gmail.com
A Technique To Sieve Annoying Communications From Osn Client Walls
Internet safety or online social network safety is the security of people and their information when using the Internet. Social media safety means protecting your personal information and terminates the untrusted inf...
Bridge Construction for New Broad Guage Line
From the moment human started exploring he started to travel across the world after the world- war II due to the industrial revolution these became even intense to travel for overseas human used only ships but to tra...
Attribute Based Secure Military Data Retrieval System for Decentralized Disruption Tolerant Networks
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are...
A New Approach to Intra-Sub-Cluster File Searching implemented in p2p File System
In internet p2p file sharing system generates more traffic. To get better file query performance cluster the common interested peers based on physical proximity. In this project proposing a proximity aware interest รข...
A Secure Protocol for M-commerce Secure SMS Mobile Payment
The worldwide utilization of the Internet has profoundly supplied the development of e-commerce. Technological advancement in mobile phones (e.g. Mobile phones) has likewise added to doing ecommerce by means of mobile...