An Integrated Approach to Measurement Software Defect using Software Matrices
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 4
Abstract
Software measurement is a quantified attribute of a characteristic of a software product or the software process. It is a discipline within software engineering. Measurement programs in software organizations are an important source of control over quality, defects evaluation and cost in software development.Software measurement has evolved into a key software engineering discipline. It introduces the concept of software measurement and its broad application areas. An effective measurement process requires continuous evaluation of different software metrics and integrating them into the software development process. This paper presents our approach analyses the metrics results using a number of statistical techniques. Interesting relationships between system size and the calculatedmetrics are explored. A software quality estimation model allows the software development team to track and detect potential software defects relatively early on during development. Recovering design patterns based on matrices and weights.Software metrics evaluation and analysis application and provides metrics results by applying Chidamber & Kemerer and MOOD metrics. A software metrics database can serve this purpose
Authors and Affiliations
Dheeraj Agrawal1 , Prof. Megha Mishra2
A Novel Encryption approach in Database Security
Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be keptas very secret. Database security&nb...
Effective Searching Shortest Path In Graph Using Prim’s Algorithm
Prims algorithm is studied the shortest path problem in the greedy method which is used to select a subset of the edge such that spanning tree is formed and the weight of the edges is minimal. There are various shortest...
Image Steganography Using Dynamic LSB with Blowfish Algorithm
The past few years have seen an increasing interest in using images as cover media for Steganography communication.The basic structure of Steganography is made up of three components: cover image, message, and the...
DAEMON Decisional Access in Emission Mechanism Of Networks
The Decisional access method of mining is a process of retrieving data with some assumption decision from the data bases which are inter connected with databases Many of the organizations are providing design of th...
HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing
At present cloud computing is going to be very famous technology in IT enterprises. For a company, the data stored is huge and it is very precious. All functions are performed through networks. Thus, it becomes very impo...