Class hierarchy method to find Change-Proneness
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1
Abstract
Finding Proneness of software is necessary to identify fault rone and change prone classes at earlier stages of development, so that those classes can be given special ttention. Also to improves the quality and reliability of the software. For corrective and adaptive maintenance we require to make changes during the software evolution. As such changes cluster around number of key components in software, it is important to analyze the frequency of changes in individual classes and also to identify and show related hanges in multiple classes. Early detection of fault prone and change prone classes can enables the developers and experts to spend their valuable time and resources on these areas of software. Prediction of change-prone and fault prone classes f a software is an active topic in the area of software ngineering. Such prediction can be used to predict changes to different lasses of a system from one release of software to the next elease. Identifying the hange-prone and fault prone classes in advance can helps to focus attention on these classes. In this paper we are focusing on finding dependency of software that an be achieved by estimating the proneness of Object Oriented Software. Two main types of proneness are associated with O software. Fault Proneness and Change Proneness.
Authors and Affiliations
Prof. Malan V. Gaikwad , Prof. Aparna S. Nakil , Prof. Akhil Khare
Integration of Web mining and web crawler: Relevance and State of Art
This study presents the role of web crawler in web mining environment. As the growth of the World Wide Web exceeded all expectations,the research on Web mining is growing more and more.web mining research topic which com...
Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network
In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in which participating nodes hav...
ROLE OF DATA MINING IN RETAIL SECTOR
Data mining is proved to be one of the important tools for identifying useful information from very large amount of data bases in almost all the industries. Industries are using data mining to increase revenues and reduc...
Fingerprint Recognition Using Global and Local Structures
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. However considering the automatic fingerprint recognition a completely solved problem is a common mi...
DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY
Content-addressable memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing, and networking, that require high-speed searches due to its ability to improve application per...