Change-Proneness of Software Components
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : In this research paper, we have done a statistical study on the factors that influence the rate of change of piece of code (class or groups of class of working together).After conducting systematic literature survey with stake holders of a various software development. It was found that during the life cycle of the application development ,it undergoes many organic changes due to change in objectives of building the software, and it is now normal that the software remains in continuous change and measuring change in the software process is critical for the software to remain in use as well as for its relevant, hence ,In this paper we have found the trend on which the change-proneness can be modeled as function, a relationship equation that can help us to predict what will happen [good or bad] if a particular metric value changes. Previous work have assumed that all trends relationship are linear in nature, while dataset collected for shows it is highly non-linear. Therefore, in our current research work we have found non-linear data fitting algorithm bi-square robust gives best possible results as it more accurate with realistic with trend and pass through most of test of significances ,thus we get a promising approach to measure change-proneness of the software development process .
Authors and Affiliations
Ankita Urvashi , Anamika Chhabra
Fake Reviewer Groups’ Detection System
We have the cyber space occupied with most of the opinions, comments and reviews. We also see the use of opinions in decision making process of many organizations. Not only organizations use these reviews but&...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspired Elephant Based Swarm Optimization
: The robust and complex real-time applications and dramatically increased sensor capabilities may play a vital role in enhancing the lifespan of WSNs. On the other hand majority of WSNs operate on battery powe...
Image Steganography Based On Hill Cipher with Key Hiding Technique
In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic...
Automatic Text Extraction System for Complex Images
Abstract : The Intelligent text extraction system automatically identifies and extracts the text present in different types of images. The growth of digital world Detection and Extraction of text regions in an image are...
A Review of DOS Attacks in Cloud Computing
Abstract: Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Cloud offers services in three levels namely infrastructure, platform and software to...