Empirical Evaluation of machine learning techniques for software effort estimation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Accurate estimation of software development effort is a very difficult job.Both under estimation as well as over estimation can lead to serious consequences. So its very important to find a technique which can yield accurate results for software effort estimation. Here in our paper we have evaluated various machine learning techniques for software effort estimation like bagging, decision trees, decision tables, multilayer perceptron and RBF networks. Two different datasets i.e. heiatheiat dataset and miyazaki94 dataset have been used in our research. Decision trees outperform all other models in term of MMRE value. Results of machine learning algorithms can be different from dataset to dataset.
Authors and Affiliations
NehaSaini
Auto Finding and Resolving Distributed Firewall Policy
Abstract: In the network environment firewall is one of the protection layers. A firewall policy defines how an organization’s firewalls should handle inbound and outbound network traffic for specifi c IP addresses...
Comparative Study between DCT and WaveletTransform Based Image Compression Algorithm
Abstract: Discrete cosine transform emerged as a popular mathematical tool in past decade and widely used inimage compression algorithm due to its high energy compaction capacity. But this energy compaction has som...
Implementation of AES Algorithm in MicroController Using PIC18F452
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encr...
Digital Image Compression using Hybrid Transform with Kekre Transform and Other Orthogonal Transforms
This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent  ...
A Study of Two Different Attacks to IPv6 Network
In the lights of today and future advancing technologies, the demand of IPv6 internet protocol, had becomes crucial for its usages & benefits. This paper investigates the use of information messages to build a visual per...