Level of Confidence in Software Effort Estimation by an Intelligent Fuzzy – Neuro - Genetic Approach
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
Organizations are struggling to deliver the expected software functionality and quality in scheduled time and prescribed budget. Despite availability of numerous advanced effort estimation techniques overestimation and underestimation occur on a vast scale and results in project failures and significant loss to the organization. The paper proposes machine learning based approach to calculate the optimized effort and level of confidence. Genetically trained neural network evaluates the optimum effort for given COCOMO II variables. The level of confidence is evaluated by fuzzy logic and indicates the percentage that the predicted effort will not exceed the limits.
Authors and Affiliations
Poonam Rijwani, Sonal Jain
Developing an Assessment Tool of ITIL Implementation in Small Scale Environments
Considering the problematic of IT Service Management (ITSM) frameworks Implementation in SMEs, among the various frameworks available for companies to manage their IT services, ITIL is recognized as the most structured a...
Systematic Literature Review of Identifying Issues in Software Cost Estimation Techniques
Software cost estimation plays a vital role in software project management. It is a process of predicting the effort and cost in terms of money and staff required for developing the software system. It is very much clear...
A study on Feature Selection Techniques in Bio-Informatics
The availability of massive amounts of experimental data based on genome-wide studies has given impetus in recent years to a large effort in developing mathematical, statistical and computational techniques to infer biol...
A Blockchain Technology Evolution Between Business Process Management (BPM) and Internet-of-Things (IoT)
A Blockchain is considered the main mechanism for Bitcoin concurrency. A Blockchain is known by a public ledger and public transactions stored in a chain. The properties of blockchain demonstrate in decentralization as d...
Analysis of Security Requirements Engineering: Towards a Comprehensive Approach
Software’s security depends greatly on how a system was designed, so it’s very important to capture security requirements at the requirements engineering phase. Previous research proposes different approaches, but each i...