Dependency Graph and Metrics for Defects Prediction

Size: px
Start display at page:

Download "Dependency Graph and Metrics for Defects Prediction"

Transcription

1 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 115 Dependency Graph and Metrics for Defects Prediction Hesham Abandah JUST University Jordan-Irbid heshama@just.edu.jo Izzat Alsmadi Yarmouk University Jordan-Irbid ialsmadi@yu.edu.jo ABSTRACT Software defects prediction was introduced to support development and maintenance activities and improve the software quality. Reliable defect predictors can significantly optimize the utilization of software projects resources and increase customers confidence in the developed software products. In this paper, three different classifiers (LMT, SMO and J48) are used to study the relations between dependency collected metrics and bugs collected for the software under study. ANT open source software is used in this case study. The selection of this open source was relation to the availability of source code and bug reports. Results varied between the three classifiers and showed J48 to be the best classifier in terms of predicating such correlation between dependency metrics and defects. In general the three classifiers showed that there is a high significant correlation between proposed and evaluated dependency metrics and software defects which showed that they can be used as important early predictors for the software quality in general. Author Keywords Software quality, software testing, coupling metrics, dependency metrics, call-graph, defects prediction. ACM Classification Keywords D.2.8 Software Engineering: Metrics: Product metrics. General Terms Software Engineering; Metrics; Product metrics. 1. INTRODUCTION For software project management, the ability to predict software quality is important for current and future activities. It is important to plan evaluation and testing for requirements, design, implementation and testing in the lifetime of the project. Further, it can help in planning future software maintenance and evolution activities after the release of the software. Software metrics are used to collect information related to one or more software attributes with the goal of evaluating such software. Software metrics can be related to the software product, development process, management activities, etc. For software products in particular, several aspects related to the software can be assessed. Tools can be used to collect such information automatically with the least effort and time from the users side. Those metrics are usually collected from the software design or code. There are important aspects for quality assurance and auditing. Call graph and dependency metrics give indication of the connectivity and the complexity of the software components interactions. While such interactions are necessary and without such interactions, software will not be able to perform its intended tasks; nevertheless, the large number of connections between software components can be a main factor for causing its complexity. Such complexity can be eventually a major contributor to the difficulty to maintain, extend or reuse such software. The rest of the paper is organized as the following: The next section involves a literature review for some related papers. Section three describes the methodology to develop call graph based metric tool and then based on ANT 1.7 open source code and bugs, study relation with bugs. Section four includes analysis and evaluation, section five includes experiments and the paper is concluded in section six. 2. LITERATURE REVIEW In this literature survey section, we will list several examples of research papers in two sections. In the first one, we will list examples of papers discussed the proposal and evaluation of dependency or call graph metrics in software products evaluation. The second section is in relation with using one or more software products aspects for defects prediction. Several research papers tried to develop metrics based on call graphs and derive dependency metrics, especially code metrics and size metrics. Values of such metrics are usually assessed based on defects prediction. Many researchers studied software modeling and found that modeling techniques were grouped into mainly two categories: Graphical modeling techniques that use a diagram with d symbols to represent the components and arcs that connect the symbols and represent the relationships and other notations to represent the constrains. Textual modeling techniques used a standardized notations and keywords to represent software components. The researchers in [2] considered the process of extracting call dependencies as one of the most important steps in software reengineering. They developed a tool for call graph extraction based on OINK framework. The researchers in [6] made an enhancement for the hierarchical edge bundling (HEB) technique to be used as a candidate visualization technique in their framework. An experiment is conducted to compare their enhancement (HEB) and Tulip graph visualization framework. Several large systems (Bison, Mozilla Firefox, and OINK) are analyzed to conclude with the differences between the two visualization

2 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 116 techniques. The results showed that (HEB) scheme performs better in typical comprehension tasks involving. The researchers in [3] introduced a new framework for call graph construction to be used for program analyses. They chose (ASM and Soot) as byte code readers for their environment to store information about the structure of the codes such as: classes, methods, files, and statements. As a next step in the proposed framework three algorithms have been implemented for call graph construction (CHA, RTA and CTA). Finally the authors concluded with an experimental study on a variety of source code programs in order to compare the two byte code readers. [3] The second section of related papers include references to papers used one or more software aspects for faults prediction. A number of approaches have been deployed for defect prediction, which they depend on different criteria and information. Some researchers turn to finding bugs in software code by analyzing the source code for that software and estimating its complexity. This approach is based on extracting specific metrics from source code, then use these metrics to decide which part (e.g. module) of the software code that is likely to be defected. On the other hand, other researchers prefer to use the system history to decide which part of them has a large probability to be defected. This is especially useful when the application has many releases. Research papers showed that the system history is more accurate for predicting defected parts of the system in comparison with code complexity. For these reasons other studies drawn that support the two approaches together and use them both in finding systems bugs. The researchers in [4] used decision tree learners to compare the influence of different metrics used in defect prediction and predicting defects densities. They collected the data needed (i.e. source code metrics and bug reports) in the experiment from seven versions of Mozilla open source code. They applied J48 algorithm in WEKA data miner on the data set, and based on different experiments data and constraints to formulate defects prediction hypotheses, they concluded that a simple tree learner can produce good results with various sets of input data, and in finding underlying roles for defect prediction. The researchers in [5] used code churn measures to introduce a new technique for prediction of defects density. The idea was drawn with a hypothesis that was based on the assumption that the code may evolve many times in the prerelease version then it will have a major chance to be defected in the post release. The authors conducted an experiment on W2K3 release and the release of W2K3 service pack and showed that code churn is a good defect predictor. They found out that the increase of the code churn measures leads to an increase on the defect density in any software. They conclude that their metrics set: LOC churned, Deleted LOC, Files churned, Churn count, Weeks of churn, churn count, and files count can report if a part of the system are defected or not with accuracy of 89 %. Software developers aim to evaluate the software in terms quality before delivering it to customers to predict possible future bugs or defects especially for critical systems that should be as free of such bugs and defects as possible. In [7, 8] researchers used CGBR metric to evaluate the ability of software metrics to predict faults. They used a case study of software from a local company and their results showed that false alarms in prediction of defects using this metric can be reduced. In one more paper [9] their results based on large software for a telecommunication company that 70% of the defects could be detected by inspecting only 3% of the code. 3. METHODOLOGY We developed a tool to build dynamically dependency graphs based on calls between the different code classes. [1] 4. ANALYSIS AND EVALUATION After refining the generated CSV file that represents the data set of our research with bug attribute then it will be ready to analyze and evaluate using tool WEKA as data miner tool. At this study we apply the following classifier algorithms such as J48 algorithm, Logistic Model Trees (LMT) Algorithm and Support Vector Machine Algorithm (SMO) classifier. The decision tree algorithm was chosen since we want to look at classifiers that were easy to understand, so we could see how valid the correlation between call graphs based metrics and bug. 4.1 Evaluation Measures Table 1 shows the source code metrics that are collected for the ANT project. Metric Metric Matrix Type LOC Fan In Fan Out CGBR # of executable and non-commented line code for each function # of callee function list # of called function list (1 d) + d * i CGBR(Ti) C(Ti) IFC IFC(M) = LOC(M) + [fan-in(m) x fan-out(m)] 2 Table 1. Call graph based matrices measurements [1] The five metrics we use at this research are related to size of the software or related to coupling and dependency between the components and functions of the application under investigation. LOC metric value represents the number of executable and non-commented lines of code. FanIn metric value for such function represents the number of function calling a given function. FanOut metric value for such function represents the number of function being called by a given function. CGBR metric is an abbreviation

3 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 117 to call graph based ranking and proposed by [7, 8]. This metric depends on the page ranking algorithm that used by almost of the search engines, where the ranking methodology is adopted to functions of the software. This metric hypothesis that more frequently used functions and less used modules should have different defects and bugs characteristic. IFC metric is abbreviated to information flow complexity (IFC) and represents the measurement of the total level of information flow of given function. 4.2 Principle Component Analysis using SPSS The purpose of this analysis is to show how metrics in developed tool correlate to each other. Table (2) described PCA analysis for call graph based metrics in developed tool results in 2 orthogonal dimension components were identified from 5 call graph based metrics that have Eigen value more than 1. According to this, medium redundancy presented among these measures. In the Table 4.2, Eigen values, the variance of the data set explained by the PC (in percent), and the cumulative variance are provided for each PC. Values above 0.6 are set in boldface. The 2 PCs capture % of the variance in the data set. Component 1 2 Eigen value % of Variance Cumulative % CGBR LOC IFC FanIn FanOut Table 2. Rotated Component Matrix for developed tool The PCs are interpreted as follows: PC1: CBGR, LOC, FanIn, and FanOut are coupling and size metrics. We have size and coupling metrics in this dimension. This shows that there are classes with high internal methods (methods defined in the class) and external methods (methods called by the class). This means coupling is related to number of methods and attributes in the class. PC2: IFC measure the total level of information flow of a module and reflect the degree of flow complexity among classes. 5. EXPERMENTS At the first step, we collect the source code for the application of the study, ANT 1.7. We enter the source code for the application to a developed C# tool in order to generate call graph model for it. After that, the developed tool computes the desired metrics for each function extracted. Then compute the same metrics to classes and output the results into CSV file that represent the data set to be tested. The next step is refining the data set with bug report related to each application under investigation. Finally, evaluate the value of the metrics in terms bug and defect detection. The format of the data set should be ARRF file, since the classifier algorithms such as J48 algorithm and M5P algorithm accepts only the files with that format. The accuracy is calculated with ten-fold cross validation. The attributes of the file listed in the figure (1) Figure 1. Attributes of the data set The attribute bug is classified into three categories based on the number of bugs for each class. Table (3) illustration the all types of bugs. Bug Categories Two Three 5.1 Experimental Results Metric Matrix VL == 0 errors / L == 1 error / M == 2 errors / H == 3 errors / VH == > 3 error L == 0 errors / M == 1-2 errors / H == > 2 errors False == no errors / True == exist errors Table 3. Categories of bugs The results of experiments show that there is an obvious correlation between the call graph based metrics and the bug and defects of the application. Table (4) will summarize all the result of the experiment. Bug Category Category Category Category Two Three % % % Table 4. Summary of the experiments results in terms of bug categories

4 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 118 As we show in the figure (2) that correlation between bug and the desired software metrics will be high when we split the bug class into small number of categories, like category three that split the bug class into two categories. So we take category three as criteria to compare the J48 classifier on the applications under investigation output to other classifier output such as Logistic Model Trees (LMT) classifier and Support Vector Machine Algorithm (SMO) classifier % 75.00% 74.00% 73.00% 72.00% Figure 2. Summary of the experiments results in terms of bug categories As we show in the Table (5) and figure (3) the results of three classifier algorithm are approximately have similar values, where that leads us to conclude that correlation is very high between the call graph metrics and bugs of the application under investigation. Classifier algorithm J84 LMT SMO % `% % Table 5. Summary of the experiments result in terms of algorithm types % 80.00% 60.00% 40.00% 20.00% 0.00% Category 74.51% 73.54% Category Category Two Three 75.65% J84 LMT SMO Figure 3. Summary of the experiments result in terms of algorithm types Finally, we make some normalization to our data set by excluding the non public functions such as private and protected functions from the computation of the call graph metrics for the applications under investigation, and we list the results of analysis at Table (6) Classifier algorithm J84 LMT SMO % % % Table 6. Summary of the experimental results of data set excluding non-public functions As we show in the Table (6) and figure (4) the results of three classifier algorithm are approximately have similar values, where that leads us to conclude that correlation is very high between the call graph metrics that computed without non public functions and bugs of the application under investigation % 80.00% 60.00% 40.00% 20.00% 0.00% Figure 4. Summary of the experiments results of data set excluding non-public functions After studying the results in Table (5) and results in Table (6), we show that the percentage of the proposed correlation between call graph based metrics and bugs in software design is raised up when the J48 classifier algorithm is used. 6. CONCLUSION J84 LMT SMO Coupling metrics can be significant indicators on the complexity of the software products. They indicate the level of interaction between software components. In software maintenance and software quality, techniques are used to predict software quality using current software products, tools or samples of those products. The goal is to be able to predict quality of the developed software with the least amount of possible human effort.

5 The Research Bulletin of Jordan ACM, Volume II(III) P a g e 119 In this paper, we used the information collected from several code coupling or dependency metrics to evaluate their correlation with software defects and hence their ability to predict the current or future existence of those defects. ANT open source code is used for the evaluation study. Both metrics and bug reports are collected automatically based on a locally developed tool. Results showed a significant correlation between evaluated metrics and software bugs. Given that the whole process is automated, those techniques can provide important assets for quality assurance and auditing. References 1. Abandah, H. and Alsmadi I., Call Graph Based Metrics To Evaluate Software Design Quality, International Journal of Software Engineering and Its s IJSEIA, Bohnet, J., and Döllner, J. (2006). Visual exploration of function call graphs for feature location in complex software systems. Proceedings of the 2006 ACM symposium on Software visualization SoftVis 06, Vol. 1, pp ACM Press. Retrieved from Honar, E. and Jahromi, M., (2010). A Framework for Call Graph Construction, Student thesis At School of Computer Science, Physics and Mathematics 4. Knab, P, Pinzger, M and Bernstein, A. (2006). Predicting defect densities in source code files with decision tree learners. Proceedings of the 2006 international workshop on Mining software repositories, May 22-23, 2006, Shanghai, China [doi> / ] 5. Nagappan, N., Ball, T., (2005), Use of relative code churn measures to predict system defect density, Proceedings of the 27th international conference on Software engineering, pp: , May 15-21, 2005, St. Louis, MO, USA [doi> / ] 6. Telea, A., Hoogendorp, H., Ersoy, O., and Reniers, D. (2009). Extraction and visualization of call dependencies for large C/C++ code bases: A comparative study th IEEE International Workshop on Visualizing Software for Understanding and Analysis, pp: IEEE. Retrieved from rnumber= Turhan, B., and Bener, A. (2008). Data sampling for cross company defect predictors, Technical Report, Computer Engineering, Bogazici University. 8. Turhan, B., and Bener, A. (2007). A multivariate analysis of static code attributes for defect prediction. Quality software, QSIC 07. In Seventh international conference (pp ). 9. Turhan, B., Gozde K., and Bener, A. Data mining source code for locating software bugs: A case study in telecommunication industry, Expert Systems with s 36 (2009)

Replication of Defect Prediction Studies

Replication of Defect Prediction Studies Replication of Defect Prediction Studies Problems, Pitfalls and Recommendations Thilo Mende University of Bremen, Germany PROMISE 10 12.09.2010 1 / 16 Replication is a waste of time. " Replicability is

More information

PREDICTION OF DEFECT DENSITY FOR OPEN SOURCE SOFTWARE USING REPOSITORY METRICS

PREDICTION OF DEFECT DENSITY FOR OPEN SOURCE SOFTWARE USING REPOSITORY METRICS Journal of Web Engineering, Vol. 6, No.3&4 (207) 293-30 Rinton Press PREDICTION OF DEFECT DENSITY FOR OPEN SOURCE SOFTWARE USING REPOSITORY METRICS DINESH VERMA Jaypee University of Engineering and Technology,

More information

Software Data Analytics. Nevena Lazarević

Software Data Analytics. Nevena Lazarević Software Data Analytics Nevena Lazarević 1 Selected Literature Perspectives on Data Science for Software Engineering, 1st Edition, Tim Menzies, Laurie Williams, Thomas Zimmermann The Art and Science of

More information

Software Fault Prediction Using Single Linkage Clustering Method

Software Fault Prediction Using Single Linkage Clustering Method Software Fault Prediction Using Single Linkage Clustering Method K.C. Sujitha, S. Leninisha PG Student, Dept. of IT, Easwari Engineering College, Chennai, Tamilnadu, India 1 Assistant Professor, Dept.

More information

Of Changes and their History: Ideas for New IDEs

Of Changes and their History: Ideas for New IDEs Of Changes and their History: Ideas for New IDEs Harald Gall University of Zurich Department of Informatics http://seal.ifi.uzh.ch "The study of products is vastly more important than the study of production,

More information

Impact of Restricted Forward Greedy Feature Selection Technique on Bug Prediction

Impact of Restricted Forward Greedy Feature Selection Technique on Bug Prediction Impact of Restricted Forward Greedy Feature Selection Technique on Bug Prediction K Muthukumaran, N L Bhanu Murthy BITS Pilani Hyderabad Campus Shameerpet, RR District, AP 500078 {p2011415, bhanu }@hyderabad.bits-pilani.ac.in

More information

Introduction to Software Metrics

Introduction to Software Metrics Introduction to Software Metrics Outline Today we begin looking at measurement of software quality using software metrics We ll look at: What are software quality metrics? Some basic measurement theory

More information

SOFTWARE FAULT PREDICTION: A REVIEW

SOFTWARE FAULT PREDICTION: A REVIEW Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

A Comparative Study of Filter-based Feature Ranking Techniques

A Comparative Study of Filter-based Feature Ranking Techniques Western Kentucky University From the SelectedWorks of Dr. Huanjing Wang August, 2010 A Comparative Study of Filter-based Feature Ranking Techniques Huanjing Wang, Western Kentucky University Taghi M. Khoshgoftaar,

More information

M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, "A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content",

M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content, M. Zhao, C. Wohlin, N. Ohlsson and M. Xie, "A Comparison between Software Design and Code Metrics for the Prediction of Software Fault Content", Information and Software Technology, Vol. 40, No. 14, pp.

More information

Practical Considerations in Deploying Statistical Methods for Defect Prediction: A Case Study within the Turkish Telecommunications Industry

Practical Considerations in Deploying Statistical Methods for Defect Prediction: A Case Study within the Turkish Telecommunications Industry Manuscript Click here to view linked References Practical Considerations in Deploying Statistical Methods for Defect Prediction: A Case Study within the Turkish Telecommunications Industry Ayşe Tosun 1,

More information

DESIGN AND DEVELOPMENT OF SOFTWARE FAULT PREDICTION MODEL TO ENHANCE THE SOFTWARE QUALITY LEVEL

DESIGN AND DEVELOPMENT OF SOFTWARE FAULT PREDICTION MODEL TO ENHANCE THE SOFTWARE QUALITY LEVEL International Journal of Information Technology and Management Information Systems (IJITMIS) Volume 1, Issue 2007, Jan Dec 2007, pp. 01 06 Available online at http://www.iaeme.com/ijitmis/issues.asp?jtype=ijitmis&vtype=1&itype=2007

More information

Information and Software Technology

Information and Software Technology Information and Software Technology 55 (2013) 1479 1495 Contents lists available at SciVerse ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Predicting

More information

Enhanced Cost Sensitive Boosting Network for Software Defect Prediction

Enhanced Cost Sensitive Boosting Network for Software Defect Prediction Enhanced Cost Sensitive Boosting Network for Software Defect Prediction Sreelekshmy. P M.Tech, Department of Computer Science and Engineering, Lourdes Matha College of Science & Technology, Kerala,India

More information

Quality Assessment Method for Software Development Process Document based on Software Document Characteristics Metric

Quality Assessment Method for Software Development Process Document based on Software Document Characteristics Metric Quality Assessment Method for Software Development Process Document based on Software Document Characteristics Metric Patra Thitisathienkul, Nakornthip Prompoon Department of Computer Engineering Chulalongkorn

More information

Mining Software Repositories

Mining Software Repositories Mining Software Repositories What is MSR? Mining Software Repositories (MSR) uses data available in repositories to support development activities For example, defect assignment, software validation, evolution

More information

Evaluating Software Development Environments

Evaluating Software Development Environments Evaluating Software Development Environments Brendan Murphy Microsoft Research Cambridge Talk Overview History of Software Metrics Defining Clear Goals Review of Metrics Contextual Constraints Progression

More information

Introduction to Software Metrics

Introduction to Software Metrics Introduction to Software Metrics Outline Today we begin looking at measurement of software quality using software metrics We ll look at: What are software quality metrics? Some basic measurement theory

More information

Association rules model of e-banking services

Association rules model of e-banking services Association rules model of e-banking services V. Aggelis Department of Computer Engineering and Informatics, University of Patras, Greece Abstract The introduction of data mining methods in the banking

More information

Association rules model of e-banking services

Association rules model of e-banking services In 5 th International Conference on Data Mining, Text Mining and their Business Applications, 2004 Association rules model of e-banking services Vasilis Aggelis Department of Computer Engineering and Informatics,

More information

AMERICAN SOCIETY FOR QUALITY CERTIFIED RELIABILITY ENGINEER (CRE) BODY OF KNOWLEDGE

AMERICAN SOCIETY FOR QUALITY CERTIFIED RELIABILITY ENGINEER (CRE) BODY OF KNOWLEDGE AMERICAN SOCIETY FOR QUALITY CERTIFIED RELIABILITY ENGINEER (CRE) BODY OF KNOWLEDGE The topics in this Body of Knowledge include additional detail in the form of subtext explanations and the cognitive

More information

APPLY ANT COLONY ALGORITHM TO TEST CASE PRIORITIZATION

APPLY ANT COLONY ALGORITHM TO TEST CASE PRIORITIZATION APPLY ANT COLONY ALGORITHM TO TEST CASE PRIORITIZATION Chien-Li Shen* and Eldon Y. Li, Department of Information Management, College of Commerce National Chengchi University, Taiwan E-mail: 99356508@nccu.edu.tw,

More information

mywbut.com Software Reliability and Quality Management

mywbut.com Software Reliability and Quality Management Software Reliability and Quality Management 1 Software Reliability Issues 2 Specific Instructional Objectives At the end of this lesson the student would be able to: Differentiate between a repeatable

More information

Fraud Detection for MCC Manipulation

Fraud Detection for MCC Manipulation 2016 International Conference on Informatics, Management Engineering and Industrial Application (IMEIA 2016) ISBN: 978-1-60595-345-8 Fraud Detection for MCC Manipulation Hong-feng CHAI 1, Xin LIU 2, Yan-jun

More information

Are Change Metrics Good Predictors for an Evolving Software Product Line?

Are Change Metrics Good Predictors for an Evolving Software Product Line? Are Change Metrics Good Predictors for an Evolving Software Product Line? Sandeep Krishnan Dept. of Computer Science Iowa State University Ames, IA 50014 sandeepk@iastate.edu Chris Strasburg Iowa State

More information

Forecasting mobile games retention using Weka

Forecasting mobile games retention using Weka 22 Forecasting mobile games retention using Weka Forecasting mobile games retention using Weka Roxana Ioana STIRCU Bucharest University of Economic Studies roxana.stircu@gmail.com Abstract: In the actual

More information

Chapter 8 Analytical Procedures

Chapter 8 Analytical Procedures Slide 8.1 Principles of Auditing: An Introduction to International Standards on Auditing Chapter 8 Analytical Procedures Rick Hayes, Hans Gortemaker and Philip Wallage Slide 8.2 Analytical procedures Analytical

More information

Exploration into Costs and Mitigation Strategies for Invalid Defects in Systems Development

Exploration into Costs and Mitigation Strategies for Invalid Defects in Systems Development Exploration into Costs and Mitigation Strategies for Invalid Defects in Systems Development Keith N. Mort Marist College Department of Information Systems Poughkeepsie, NY keith@mort.net Abstract Organizations

More information

Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine

Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine R. Sathya Assistant professor, Department of Computer Science & Engineering Annamalai University

More information

TNM033 Data Mining Practical Final Project Deadline: 17 of January, 2011

TNM033 Data Mining Practical Final Project Deadline: 17 of January, 2011 TNM033 Data Mining Practical Final Project Deadline: 17 of January, 2011 1 Develop Models for Customers Likely to Churn Churn is a term used to indicate a customer leaving the service of one company in

More information

Predicting Defects in Software Using Grammar-Guided Genetic Programming

Predicting Defects in Software Using Grammar-Guided Genetic Programming Predicting Defects in Software Using Grammar-Guided Genetic Programming Athanasios Tsakonas and Georgios Dounias University of the Aegean, Department of Finance and Management Engineering, Fostini 31 str.,

More information

A Classification based Predictive Cost Model for Measuring Reusability Level of Open Source Software

A Classification based Predictive Cost Model for Measuring Reusability Level of Open Source Software 7688, Vol. 5, Issue 1, March 2018, pp. 19-23 A Classification based Predictive Cost Model for Measuring Reusability Level of Open Source Software Divanshi Priyadarshni Wangoo 1 and Archana Singh 2 1 Amity

More information

An exploratory study of package metrics as change size indicators in evolving object-oriented software

An exploratory study of package metrics as change size indicators in evolving object-oriented software Comput Syst Sci & Eng (2013) 4: 251 257 2013 CRL Publishing Ltd International Journal of Computer Systems Science & Engineering An exploratory study of package metrics as change size indicators in evolving

More information

Software Engineering Tools and Environments. Ch. 9 1

Software Engineering Tools and Environments. Ch. 9 1 Software Engineering Tools and Environments Ch. 9 1 Outline How did the field evolve? How can tools and environments be classified and compared? What are the main categories? How can tools be integrated?

More information

Salford Predictive Modeler. Powerful machine learning software for developing predictive, descriptive, and analytical models.

Salford Predictive Modeler. Powerful machine learning software for developing predictive, descriptive, and analytical models. Powerful machine learning software for developing predictive, descriptive, and analytical models. The Company Minitab helps companies and institutions to spot trends, solve problems and discover valuable

More information

Software Quality Engineering Courses Offered by The Westfall Team

Software Quality Engineering Courses Offered by The Westfall Team Building Skills is a 3-day course that is a subset of our course. The course is designed to provide a fundamental knowledge base and practical skills for anyone interested in implementing or improving

More information

On the Correlation between Testing Effort and Software Complexity Metrics

On the Correlation between Testing Effort and Software Complexity Metrics On the Correlation between Testing Effort and Software Complexity Metrics Adnan Muslija, Eduard Enoiu, Email: muslija.adnan@gmail.com, eduard.enoiu@mdh.se Mälardalen University, Västerås, Sweden. Abstract

More information

On the Correlation between Testing Effort and Software Complexity Metrics

On the Correlation between Testing Effort and Software Complexity Metrics On the Correlation between Testing Effort and Software Complexity Metrics Adnan Muslija, Eduard Enoiu, Mälardalen University, Västerås, Sweden. Abstract Software complexity metrics, such as code size and

More information

Software Quality Engineering Courses Offered by The Westfall Team

Software Quality Engineering Courses Offered by The Westfall Team Courses is a 2-day course that is a subset of our course. The course is designed to provide an overview of techniques and practices. This course starts with an overview of software quality engineering

More information

e-trans Association Rules for e-banking Transactions

e-trans Association Rules for e-banking Transactions In IV International Conference on Decision Support for Telecommunications and Information Society, 2004 e-trans Association Rules for e-banking Transactions Vasilis Aggelis University of Patras Department

More information

Hierarchy Based Reusability Assessment Model for Component Qualification in Reusable Verification Environment

Hierarchy Based Reusability Assessment Model for Component Qualification in Reusable Verification Environment Hierarchy Based Reusability Assessment Model for Qualification in Reusable Verification Environment Dr. V. Subedha,Professor & Head Department of CSE Panimalar Institute of Technology Chennai, India subedha@gmail.com

More information

Fault-prone Module Prediction Using Version Histories.

Fault-prone Module Prediction Using Version Histories. Title Author(s) Fault-prone Module Prediction Using Version Histories Hata, Hideaki Citation Issue Date Text Version ETD URL http://hdl.handle.net/11094/2569 DOI rights Fault-prone Module Prediction Using

More information

An Approach to Efficient Software Bug Prediction using Regression Analysis and Neural Networks

An Approach to Efficient Software Bug Prediction using Regression Analysis and Neural Networks An Approach to Efficient Software Bug Prediction using Regression Analysis and Neural Networks Surbhi Parnerkar 1, Ati Jain 2, Vijay Birchha 3 Student, Department of Computer Science & Engineering, SVCE,

More information

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques Book Outline Software Testing and Analysis: Process, Principles, and Techniques Mauro PezzèandMichalYoung Working Outline as of March 2000 Software test and analysis are essential techniques for producing

More information

Predicting Corporate Influence Cascades In Health Care Communities

Predicting Corporate Influence Cascades In Health Care Communities Predicting Corporate Influence Cascades In Health Care Communities Shouzhong Shi, Chaudary Zeeshan Arif, Sarah Tran December 11, 2015 Part A Introduction The standard model of drug prescription choice

More information

Masters in Business Statistics (MBS) /2015. Department of Mathematics Faculty of Engineering University of Moratuwa Moratuwa. Web:

Masters in Business Statistics (MBS) /2015. Department of Mathematics Faculty of Engineering University of Moratuwa Moratuwa. Web: Masters in Business Statistics (MBS) - 2014/2015 Department of Mathematics Faculty of Engineering University of Moratuwa Moratuwa Web: www.mrt.ac.lk Course Coordinator: Prof. T S G Peiris Prof. in Applied

More information

Understanding the Impact of Code and Process Metrics on Post-release Defects: A Case Study on the Eclipse Project

Understanding the Impact of Code and Process Metrics on Post-release Defects: A Case Study on the Eclipse Project Understanding the Impact of Code and Process Metrics on Post-release Defects: A Case Study on the Eclipse Project Emad Shihab, Zhen Ming Jiang, Walid M. Ibrahim, Bram Adams and Ahmed E. Hassan Software

More information

Detecting and Pruning Introns for Faster Decision Tree Evolution

Detecting and Pruning Introns for Faster Decision Tree Evolution Detecting and Pruning Introns for Faster Decision Tree Evolution Jeroen Eggermont and Joost N. Kok and Walter A. Kosters Leiden Institute of Advanced Computer Science Universiteit Leiden P.O. Box 9512,

More information

Churn Prediction Model Using Linear Discriminant Analysis (LDA)

Churn Prediction Model Using Linear Discriminant Analysis (LDA) IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 86-93 www.iosrjournals.org Churn Prediction Model Using Linear Discriminant

More information

Impact of ERP Implementation on Supply Chain Performance of Transport and Logistics Companies in Sri Lanka

Impact of ERP Implementation on Supply Chain Performance of Transport and Logistics Companies in Sri Lanka ISSN: 2513-2520 R4TLI Conference Proceedings 2017 Impact of ERP Implementation on Supply Chain Performance of Transport and Logistics Companies in Sri Lanka 1. Introduction Dilini Yapa University of Moratuwa,

More information

FOUNDATIONAL CONCEPTS FOR MODEL DRIVEN SYSTEM DESIGN

FOUNDATIONAL CONCEPTS FOR MODEL DRIVEN SYSTEM DESIGN FOUNDATIONAL CONCEPTS FOR MODEL DRIVEN SYSTEM DESIGN Loyd Baker, Paul Clemente, Bob Cohen, Larry Permenter, Byron Purves, and Pete Salmon INCOSE Model Driven System Interest Group Abstract. This paper

More information

A STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF GENE MICROARRAY DATASET

A STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF GENE MICROARRAY DATASET A STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF GENE MICROARRAY DATASET 1 J.JEYACHIDRA, M.PUNITHAVALLI, 1 Research Scholar, Department of Computer Science and Applications,

More information

Chapter-3. Software Metrics and Reliability

Chapter-3. Software Metrics and Reliability Chapter-3 \ functions under given conditions for a specified period of time." The reliability of the delivered code is related to the quality of all of the processes and products of software development;

More information

Building the In-Demand Skills for Analytics and Data Science Course Outline

Building the In-Demand Skills for Analytics and Data Science Course Outline Day 1 Module 1 - Predictive Analytics Concepts What and Why of Predictive Analytics o Predictive Analytics Defined o Business Value of Predictive Analytics The Foundation for Predictive Analytics o Statistical

More information

Main Message. Workshop 1a: Software Measurement. Dietmar Pfahl

Main Message. Workshop 1a: Software Measurement. Dietmar Pfahl Software Economics Fall 2015 Workshop 1a: Software Measurement Main Message Software measures can be misleading, so Either you don t use them Dietmar Pfahl (based on slides by Marlon Dumas & Anton Litvinenko)

More information

SOFTWARE MAINTENANCE PROCESS MODEL AFTER DELIVERY WITH QUALIFIED OUTPUT

SOFTWARE MAINTENANCE PROCESS MODEL AFTER DELIVERY WITH QUALIFIED OUTPUT SOFTWARE MAINTENANCE PROCESS MODEL AFTER DELIVERY WITH QUALIFIED OUTPUT SALEEM AL-ZOUBI Faculty of Information Technology, Irbid National University E-mail: it@inu.edu.jo Abstract-Software maintenance

More information

When to Book: Predicting Flight Pricing

When to Book: Predicting Flight Pricing When to Book: Predicting Flight Pricing Qiqi Ren Stanford University qiqiren@stanford.edu Abstract When is the best time to purchase a flight? Flight prices fluctuate constantly, so purchasing at different

More information

Is This a Bug or an Obsolete Test?

Is This a Bug or an Obsolete Test? Is This a Bug or an Obsolete Test? Dan Hao 1, Tian Lan 1, Hongyu Zhang 2, Chao Guo 1, Lu Zhang 1 1 Key Laboratory of High Confidence Software Technologies (Peking University), MoE Institute of Software,

More information

A Study on Factors Affecting Maintainability and Maintainability Models

A Study on Factors Affecting Maintainability and Maintainability Models A Study on s Affecting Maintainability and Maintainability Models Deepa N 1, P. V. Indu Bhanu 2, C. S. Kausthubhi 3, M Sai Sriya 4 1,2,3,4 School of Information Technology & Engineering, VIT University

More information

Discriminant models for high-throughput proteomics mass spectrometer data

Discriminant models for high-throughput proteomics mass spectrometer data Proteomics 2003, 3, 1699 1703 DOI 10.1002/pmic.200300518 1699 Short Communication Parul V. Purohit David M. Rocke Center for Image Processing and Integrated Computing, University of California, Davis,

More information

Business Mathematics / Quantitative Research Methods I

Business Mathematics / Quantitative Research Methods I Faculty of Economics and Business Administration Exam: Code: Examinator: Co-reader: Business Mathematics / Quantitative Research Methods I E_BK1_BUSM / E_IBA1_BUSM / E_EBE1_QRM1 dr. R. Heijungs dr. G.J.

More information

E-Commerce Sales Prediction Using Listing Keywords

E-Commerce Sales Prediction Using Listing Keywords E-Commerce Sales Prediction Using Listing Keywords Stephanie Chen (asksteph@stanford.edu) 1 Introduction Small online retailers usually set themselves apart from brick and mortar stores, traditional brand

More information

Time Series Motif Discovery

Time Series Motif Discovery Time Series Motif Discovery Bachelor s Thesis Exposé eingereicht von: Jonas Spenger Gutachter: Dr. rer. nat. Patrick Schäfer Gutachter: Prof. Dr. Ulf Leser eingereicht am: 10.09.2017 Contents 1 Introduction

More information

Enterprise Modeling and its Applications in Company Management Systems

Enterprise Modeling and its Applications in Company Management Systems Enterprise Modeling and its Applications in Company Management Systems Ladaislav Madarász 1, Maroš Timko 2, Michal Raček 3 1 Department of Cybernetics and Artificial Intelligence, FEI TU Košice, Letná

More information

Proposal for ISyE6416 Project

Proposal for ISyE6416 Project Profit-based classification in customer churn prediction: a case study in banking industry 1 Proposal for ISyE6416 Project Profit-based classification in customer churn prediction: a case study in banking

More information

Filter-Wrapper based Feature Ranking Technique for Dynamic Software Quality Attributes

Filter-Wrapper based Feature Ranking Technique for Dynamic Software Quality Attributes Filter-Wrapper based Feature Ranking Technique for Dynamic Software Quality Attributes Siti Sakira Kamaruddin 1, Jamaiah Yahaya 2 Aziz Deraman 3, and Ruzita Ahmad 4 1 Universiti Utara Malaysia, Malaysia,

More information

Software Development Life Cycle (SDLC) Tata Consultancy Services ltd. 12 October

Software Development Life Cycle (SDLC) Tata Consultancy Services ltd. 12 October Software Development Life Cycle (SDLC) Tata Consultancy Services ltd. 12 October 2006 1 Objectives (1/2) At the end of the presentation, participants should be able to: Realise the need for a systematic

More information

Lectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1

Lectures 2 & 3. Software Processes. Software Engineering, COMP201 Slide 1 Lectures 2 & 3 Software Processes Software Engineering, COMP201 Slide 1 What is a Process? When we provide a service or create a product we always follow a sequence of steps to accomplish a set of tasks

More information

Evaluating Workflow Trust using Hidden Markov Modeling and Provenance Data

Evaluating Workflow Trust using Hidden Markov Modeling and Provenance Data Evaluating Workflow Trust using Hidden Markov Modeling and Provenance Data Mahsa Naseri and Simone A. Ludwig Abstract In service-oriented environments, services with different functionalities are combined

More information

Code Compulsory Module Credits Continuous Assignment

Code Compulsory Module Credits Continuous Assignment CURRICULUM AND SCHEME OF EVALUATION Compulsory Modules Evaluation (%) Code Compulsory Module Credits Continuous Assignment Final Exam MA 5210 Probability and Statistics 3 40±10 60 10 MA 5202 Statistical

More information

Requirements Engineering and Software Architecture Project Description

Requirements Engineering and Software Architecture Project Description Requirements Engineering and Software Architecture Project Description Requirements Engineering Project Description The project is student-driven. There will be external sponsors, users, and others that

More information

Multivariate Logistic Regression Prediction of Fault-Proneness in Software Modules

Multivariate Logistic Regression Prediction of Fault-Proneness in Software Modules Multivariate Logistic Regression Prediction of Fault-Proneness in Software Modules Goran Mauša *, Tihana Galinac Grbac * and Bojana Dalbelo Bašić ** * Faculty of Engineering, University of Rijeka, Rijeka,

More information

Churn Prediction for Game Industry Based on Cohort Classification Ensemble

Churn Prediction for Game Industry Based on Cohort Classification Ensemble Churn Prediction for Game Industry Based on Cohort Classification Ensemble Evgenii Tsymbalov 1,2 1 National Research University Higher School of Economics, Moscow, Russia 2 Webgames, Moscow, Russia etsymbalov@gmail.com

More information

Optimization Problems and Algorithms in Supply-Chain Management

Optimization Problems and Algorithms in Supply-Chain Management Optimization Problems and Algorithms in Supply-Chain Management 1 Botond Bertok, 1 Robert Adonyi, 2 Sandor Bodrogi, and 1 Zoltan Kovacs 1 University of Pannonia, Faculty of Information Technology Department

More information

SOFTWARE DEVELOPMENT PRODUCTIVITY FACTORS IN PC PLATFORM

SOFTWARE DEVELOPMENT PRODUCTIVITY FACTORS IN PC PLATFORM SOFTWARE DEVELOPMENT PRODUCTIVITY FACTORS IN PC PLATFORM Abbas Heiat, College of Business, Montana State University-Billings, Billings, MT 59101, 406-657-1627, aheiat@msubillings.edu ABSTRACT CRT and ANN

More information

Studying the Fix-Time for Bugs in Large Open Source Projects

Studying the Fix-Time for Bugs in Large Open Source Projects Studying the Fix-Time for Bugs in Large Open Source Projects Lionel Marks School of Computing Queen s University, Canada Ying Zou Dept. of Elec. and Comp. Eng. Queen s University, Canada ying.zou@queensu.ca

More information

Workshop 1: Software Measurement. Marlon Dumas

Workshop 1: Software Measurement. Marlon Dumas Software Economics Fall 2013 Workshop 1: Software Measurement Marlon Dumas (based on slides by Anton Litvinenko) Main message Software measures can be misleading, so Either you don t use them Or you better

More information

Mining for Cost Estimating Relations from Limited Complex Data

Mining for Cost Estimating Relations from Limited Complex Data Mining for Cost Estimating Relations from Limited Complex Data Modeling Approaches for NASA Robotic Earth/Space Science Projects 2015 ICEAA Workshop 6/11/15 Shawn Hayes and Mark Jacobs Victory Solutions

More information

Traffic Accident Analysis from Drivers Training Perspective Using Predictive Approach

Traffic Accident Analysis from Drivers Training Perspective Using Predictive Approach Traffic Accident Analysis from Drivers Training Perspective Using Predictive Approach Hiwot Teshome hewienat@gmail Tibebe Beshah School of Information Science, Addis Ababa University, Ethiopia tibebe.beshah@gmail.com

More information

2. Materials and Methods

2. Materials and Methods Identification of cancer-relevant Variations in a Novel Human Genome Sequence Robert Bruggner, Amir Ghazvinian 1, & Lekan Wang 1 CS229 Final Report, Fall 2009 1. Introduction Cancer affects people of all

More information

9. Verification, Validation, Testing

9. Verification, Validation, Testing 9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification

More information

Describing DSTs Analytics techniques

Describing DSTs Analytics techniques Describing DSTs Analytics techniques This document presents more detailed notes on the DST process and Analytics techniques 23/03/2015 1 SEAMS Copyright The contents of this document are subject to copyright

More information

PMBOK Guide Fifth Edition Pre Release Version October 10, 2012

PMBOK Guide Fifth Edition Pre Release Version October 10, 2012 5.3.1 Define Scope: Inputs PMBOK Guide Fifth Edition 5.3.1.1 Scope Management Plan Described in Section 5.1.3.1.The scope management plan is a component of the project management plan that establishes

More information

A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management

A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:

More information

HUMAN RESOURCE PLANNING AND ENGAGEMENT DECISION SUPPORT THROUGH ANALYTICS

HUMAN RESOURCE PLANNING AND ENGAGEMENT DECISION SUPPORT THROUGH ANALYTICS HUMAN RESOURCE PLANNING AND ENGAGEMENT DECISION SUPPORT THROUGH ANALYTICS Janaki Sivasankaran 1, B Thilaka 2 1,2 Department of Applied Mathematics, Sri Venkateswara College of Engineering, (India) ABSTRACT

More information

Bug Prediction. SW-Wartung & Evolution. Emanuel Giger. University of Zurich Department of Informatics. software evolution & architecture lab

Bug Prediction. SW-Wartung & Evolution. Emanuel Giger. University of Zurich Department of Informatics. software evolution & architecture lab Bug Prediction SW-Wartung & Evolution Emanuel Giger University of Zurich Department of Informatics software evolution & architecture lab Software has Bugs! 2 Software has Bugs! 2 Software has Bugs! 2 Software

More information

VIBRATION ANALYSIS FOR ROTATING MACHINES HEALTH MONITORING

VIBRATION ANALYSIS FOR ROTATING MACHINES HEALTH MONITORING LOGISTICS FOR DEFENSE VIBRATION ANALYSIS FOR ROTATING MACHINES HEALTH MONITORING 2017/05/09 José Barriga Mangas Telecommunication Engineer Index 01 Key Takeaways 02 Introduction to Organization and Business

More information

ReUse: Challenges and Business Success Harald Gall

ReUse: Challenges and Business Success Harald Gall ReUse: Challenges and Business Success Harald Gall Department of Informatics software evolution and architecture lab seal.ifi.uzh.ch/gall Objects and reuse some practical observations 2 Outline Challenges

More information

ESTIMATION OF ASPECT ORIENTED PROGRAMMING USING DIFFERENT METRICES

ESTIMATION OF ASPECT ORIENTED PROGRAMMING USING DIFFERENT METRICES International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 1460 ESTIMATION OF ASPECT ORIENTED PROGRAMMING USING DIFFERENT METRICES Annu Student, M.Tech Deptt. Of Computer

More information

Predicting Popularity of Messages in Twitter using a Feature-weighted Model

Predicting Popularity of Messages in Twitter using a Feature-weighted Model International Journal of Advanced Intelligence Volume 0, Number 0, pp.xxx-yyy, November, 20XX. c AIA International Advanced Information Institute Predicting Popularity of Messages in Twitter using a Feature-weighted

More information

Brief Summary of Last Lecture. Model checking of timed automata: general approach

Brief Summary of Last Lecture. Model checking of timed automata: general approach Brief Summary of Last Lecture Formal verification Types: deductive (theorem proving) and algorithmic (model checking) ields proof that a (formal) specification is fulfilled Formalization of specs e.g.

More information

C. Wohlin, P. Runeson and A. Wesslén, "Software Reliability Estimations through Usage Analysis of Software Specifications and Designs", International

C. Wohlin, P. Runeson and A. Wesslén, Software Reliability Estimations through Usage Analysis of Software Specifications and Designs, International C. Wohlin, P. Runeson and A. Wesslén, "Software Reliability Estimations through Usage Analysis of Software Specifications and Designs", International Journal of Reliability, Quality and Safety Engineering,

More information

Using Factor Analysis to Generate Clusters of Agile Practices

Using Factor Analysis to Generate Clusters of Agile Practices Using Factor Analysis to Generate Clusters of Agile Practices (A Guide for Agile Process Improvement) Noura Abbas University of Southampton School of Electronics and Computer Science Southampton, UK, SO17

More information

Testing and Inspections (3C05/D22) Unit 11: Testing and Inspection. What is Testing?

Testing and Inspections (3C05/D22) Unit 11: Testing and Inspection. What is Testing? Testing and Inspections (3C05/D22) Unit 11: Testing and Inspection Objectives To introduce software testing and to develop its role within the software development process. To introduce the use of formal

More information

FEATURES AND BENEFITS

FEATURES AND BENEFITS SGS MINERALS SERVICES T3 SGS 1079 MET PLATFORM SGS Minerals Services is the industry leader in providing support and creating solutions for mining projects worldwide. SGS offers advanced process control

More information

A Comparative Study on the existing methods of Software Size Estimation

A Comparative Study on the existing methods of Software Size Estimation A Comparative Study on the existing methods of Software Size Estimation Manisha Vatsa 1, Rahul Rishi 2 Department of Computer Science & Engineering, University Institute of Engineering & Technology, Maharshi

More information

INFORMS Analytics Maturity Model. User Guide

INFORMS Analytics Maturity Model. User Guide INFORMS Analytics Maturity Model User Guide Introducing the INFORMS Scorecard INFORMS, the leading association for advanced analytics professionals, seeks to advance the practice, research, methods, and

More information

GQM: Goal Question Metrics

GQM: Goal Question Metrics GQM: Goal Question Metrics Introduction Main reference Understanding Measurement and Practical Implementation of GQM, V. R. Basili, C. B. Seaman, 2010 Leveraging Measurement Many organizations collect

More information

Metrics based field problem prediction. Paul Luo Li ISRI SE - CMU

Metrics based field problem prediction. Paul Luo Li ISRI SE - CMU Metrics based field problem prediction Paul Luo Li ISRI SE - CMU Field problems happen Program testing can be used to show the presence of bugs, but never to show their absence! -Dijkstra Statement coverage,

More information

CROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload

CROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload CROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload Xing Yang, Xiang Li, Yipeng Ji, and Mo Sha School of Computer Science, Beihang University, Beijing, China {yangxing,

More information