An Integrated Approach to Measurement Software Defect using Software Matrices
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2012, Vol 2, Issue 4
Abstract
Software measurement is a quantified attribute of a characteristic of a software product or the software process. It is a discipline within software engineering. Measurement programs in software organizations are an important source of control over quality, defects evaluation and cost in software development.Software measurement has evolved into a key software engineering discipline. It introduces the concept of software measurement and its broad application areas. An effective measurement process requires continuous evaluation of different software metrics and integrating them into the software development process. This paper presents our approach analyses the metrics results using a number of statistical techniques. Interesting relationships between system size and the calculatedmetrics are explored. A software quality estimation model allows the software development team to track and detect potential software defects relatively early on during development. Recovering design patterns based on matrices and weights.Software metrics evaluation and analysis application and provides metrics results by applying Chidamber & Kemerer and MOOD metrics. A software metrics database can serve this purpose
Authors and Affiliations
Dheeraj Agrawal1 , Prof. Megha Mishra2
Security Issues and Data Management In Cloud Computing
Cloud computing placed IT to higher and new limits by providing the market environment data storage and capacity with flexible and scalable and processing power to reach the demand and supply while reducing the capital e...
Effective Searching Shortest Path In Graph Using Prim’s Algorithm
Prims algorithm is studied the shortest path problem in the greedy method which is used to select a subset of the edge such that spanning tree is formed and the weight of the edges is minimal. There are various shortest...
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the...
DAEMON Decisional Access in Emission Mechanism Of Networks
The Decisional access method of mining is a process of retrieving data with some assumption decision from the data bases which are inter connected with databases Many of the organizations are providing design of th...
Robust Data Clustering Algorithms for Network Intrusion Detection
IDS (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This project mainly focuses on intrusion detection based on data min...