SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 5 (July 2012), PP. 78-82


 Design of Hybrid Neural Network Model for Quality Evaluation
             of Object Oriented Software Modules
                             Amandeep Kaur1, Arjan Singh2, Baljit Singh3
       1,3
             Department of Computer Science Engineering, BBSB Engineering College, Fatehgarh Sahib. Punjab, India
                        2
                          Department of Mathematics, Punjabi University, Patiala-14002, Punjab, India.



Abstract––The aim of this paper is to evaluate the quality of object oriented modules. In this work neural network
approach is used along with PSO (particle swarm optimization) to find out fault prone components of software. The
evaluation measures used are Accuracy, MAE (Mean absolute error), RMSE (Root mean square error) and the results
are calculated on different iterations. The Accuracy, MAE, RMSE is improved as number of iterations increases.

Keywords––Software engineering, Fault proneness, Neural Network, Particle Swarm Optimization.

                                            I.          INTRODUCTION
           Software quality is the degree to which software possesses a desired combination of attributes such as reliability,
maintainability, efficiency, portability, usability, and reusability [1]. This desired combination of attributes must be clearly
defined. Various software metrics have been identified for the purpose of evaluating these characteristics of software
systems. The aim of software metrics is to predict the quality of the object oriented software products.
           Fault-proneness of a software module is the probability that the module contains faults. A corelation exists
between the fault-proneness of the software and the measurable attributes of the code and testing [9]. Accurate prediction of
fault-prone modules enables the verification and validation activities focused on the critical software components Yan Ma
and Bojan Cukic [3]. Therefore, software developers have a keen interest in software quality models. It is required that fault-
prone prediction models should be efficient and accurate.
           Predicting the number of faults in each module or identifying the fault-prone modules in the early stages of the
software development life cycle will help the development Renu Kumar Louisiana [2]. Software complexity metrics play a
useful role in this regard because they are numerical measures that can be obtained early in the software life cycle. There
exists a relationship between measures of software complexity and the number of errors later found in test and validation.
           Faults in software systems continue to be a major problem. Many systems are delivered to users with excessive
faults. It has long been recognized that seeking out fault-prone parts of the system and targeting those parts for increased
quality control and testing is an effective approach to fault reduction. It is difficult to identify a reliable approach to
identifying fault-prone software components Parvinder S. Sandhu [9].
           Basili et al. [4] empirically validated CK metrics and found no correlation among metrics. The paper stated that all
metrics were effective in predicting fault proneness except LCOM (Lack of Cohesion of Methods). However the metric suite
was applied to the source code because some of their metrics measure an inner complexity of a class, and such information
cannot be obtained until the algorithm and structure of the class are determined at the end of design phase.
           Khoshgoftarr et al. [6] introduced the use of the neural networks as a tool for predicting software quality. They
compared the neural-network model with a nonparametric discriminant model, and found the neural network model had
better predictive accuracy. This model used domain metrics derived from the complexity metric data. These metrics are not
adequate for detecting object-oriented faults. Since the object-oriented paradigm exhibits different characteristics from the
procedural paradigm, software metrics in object-oriented paradigm need to be used. With the increasing use of object-
oriented methods in new software development there is a growing need to improve current practice in object-oriented design
and development
           Toshihiro Kamiya et al. [7] presented a method to estimate the fault-proneness of the class in the early phase, using
several complexity metrics for object oriented software. They introduced four checkpoints into the
analysis/design/implementation phase, and estimate the fault-prone classes using the applicable metrics at each checkpoint.
They estimate the fault-proneness by using the multivariate logistic regression analysis.
           Atchara Mahaweerawat [8] proposed fault prediction model based on supervised learning using Multilayer
Perceptron Neural Network and the results are analyzed in terms of classification correctness and based on the results of
classification, faulty classes are further analyzed and classified according to the particular type of fault.
           Munson & Khoshgoftaar [10] use discriminant analysis technique to investigate some aspects of the relationship
between program complexity measures and program faults.
           Mie mie thet thwin, tong-seng quah [11] proposed neural network model along with object oriented metrics. This
empirical study presents the prediction of faults in three industrial real time system using multiple regression model and a
neural network model and found that neural network model can predict the number of faults more exactly than multiple
regression model.


                                                              78
Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules

          A variety of software fault predictions techniques have been proposed, but none has proven to be consistently
accurate. Therefore, there is a need to find the best prediction techniques for a given prediction problem.
     1. The techniques used in Khoshgoftarr et al. [6] used to predict faults that use traditional metrics are not generally
          applicable to object oriented system.
     2 The data collected in Basili et al. [4] is not of industry. So there can be increased complexity when it comes to
          large object oriented system of organization.
     3 CK metrics evaluate static complexity of object oriented software in Basili et al. [4], V. R. Basili [5]. Several OOD
          specifications include dynamic information. It is necessary to evaluate such dynamic complexity.
     4. Models used in Khoshgoftaar [12] take Increase time to design and develop quality cases.

So, in this study a PSO Technique is used along with Neural Network to predict fault prone modules in object oriented.

                                             II.   MATERIALS AND METHODS
          The proposed study find out the fault proneness of object oriented modules. The technique used in this study is
Particle swarm optimization along with Neural Network. The evaluation measures used are Accuracy, Mean Absolute Error,
Root Mean Squared Error.
     Step-1: Find the structural code and design attributes of software. The dataset taken is from NASA KC1.The dataset is
     related to software defect prediction which contains 2109 modules and 22 metrics.
     Step-2: Load the training data .In this step the 80% of KC1 dataset is used for training.
     Step-3: Perform Particle Swarm Optimization based Neural Network training. In this step Particle Swarm Optimization
     toolbox for Matlab is used and the training is performed with the help of this toolbox.
     Step-4: Load testing data. In this step 20% of kc1 dataset is used for testing.
     Step-5: In this step testing is done and the performance is calculated on the basis of Accuracy, MAE (Mean Absolute
     Error), RMSE (Root Mean Squared Error)

The evaluation measures that are used to carry out the results are discussed below:
        Mean absolute error (MAE)
        Root mean square error (RMSE)
        Accuracy

          Mean absolute error
     Mean absolute error, MAE is the average of the difference between predicted and actual value in all test cases; it is the
average prediction error. The formula for calculating MAE is given in equation shown below:



                                                                                              (1)
    a c  a c
     1   1    2           2
                               ...    a c
                                         n     n

                      n




Assuming that the actual output is a, expected output is c

          Root mean-squared error
RMSE is frequently used measure of differences between values predicted by a model or estimator and the values actually
observed from the thing being modeled or estimated.



     a1 c1  a 2  c 2  ...  a n  c n
                  2                           2              2                                      (2)

                                         n



The basic flow of proposed model is given below:




                                                                 79
Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules


                                                           Start


                                                 Find the structural code and
                                                 design attributes of S/W



                                                  Load the training data


                                               Perform the training of NN with
                                                             PSO



                                                     Load the testing data



                                              PSO trained with NN is evaluated
                                              against the testing data


                                              The performance is evaluated in
                                              terms of Accuracy, MAE (mean
                                              absolute error) and RMSE(root
                                              mean square error).



                                                            Stop

                               III.         RESULTS AND DISCUSSIONS
           The PSO technique along with Neural network is used to find the fault prone components of object oriented
software modules .The results are calculated on different iterations and neural network gives better results as umber of
iterations increases.




                               Fig1: Finding Gbest value by PSO by different iteration

                  No. of     Dimensi        No. of     Gbest        Accura       MAE          RMSE
                 particle      ons        iterations    value         cy
                                              100     21.4691        94.22       0.0299       0.1109
                                              500     21.8190        94.78       0.0290       0.1102
                    30          150          1000     21.8173        96.25       0.0279       0.1022
                                             1500     21.8609        96.98       0.0197       0.0990
                                             2000     21.8709        97.75       0.0178       0.0957
                            Table1: Performance on the basis of different iterations by PSO


                                                          80
Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules




                              Graph1:Showing performance by PSO on different iterations

PSO used with neural network is giving better results as the number of iterations increases.

The comparison is shown in table given below:
  S.no.   Algorithm                                             Accuracy           MAE                 RMSE
  1         PSO with NN                                         97.75              0.0178              0.0957
  2         Generalized regression network                      97.66              0.0265              0.1056


      Table 2: Comparison of PSO with NN with generalized regression network on the basis of different measures




                                       Graph 2 :Comparison on the basis of accuracy




           Graph3: Comparison on the basis of MAE                 Graph 4: Comparison on the basis of RMSE

                                           IV.           CONCLUSION
           A variety of software fault prediction techniques have been proposed, which have been already applied in software
engineering applications. A neural network is trained to reproduce a given set of correct classification examples, instead to
produce formula or rules. Neural networks are non linear techniques that are able to model complex functions. In this work
NN approach is used along with PSO to find out fault prone components of software. The evaluation measures used are
Accuracy, MAE, RMSE and the results are calculated on different iterations. Result is calculated on different iterations. The
accuracy is improved as the number of iterations increases. The results showed that proposed technique is better as compared
to traditional approach and give better results.

                                                             81
Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules

                                                       REFERENCES
 [1].    [1]IEEE Standard for a Software Quality Metrics Methodology, Institute of Electrical and electronics engineers Inc.1993.
 [2].    [2] Renu Kumar Louisiana State University Baton Rouge Suresh Rai Louisiana State University Baton Rouge Jerry L. Trahan
         Louisiana State University Baton Rouge Neural-Network Techniques for Software-Quality Evaluation
 [3].    [3] Yan Ma, Lan Guo and Bojan Cukic, “A Statistical Framework for the Prediction of Fault-Proneness”, Department of
         Statistics, West Virginia University, Morgantown.
 [4].    [4] S. Chidamber, and C. Kemerer, "A metrics suite for object-oriented design", IEEE Transactions on Software Engineering,
         20(6), 1994, pp.476-493.
 [5].    [5] V. R. Basili, L. C. Briand, W. L. Mélo((1996)): A validation of object-oriented design metrics as quality indicators, IEEE
         Trans. on Software Eng., Vol. 20, No. 22, pp. 751-761.
 [6].    [6] P.M. Khoshgoftaar, E.B. Allen, J.P. Hudepohl, and S.J.Aud, “Application of neural networks to software quality modeling of
         a very large telecommunications system”, IEEE Transactions on Neural Network, vol. 8, pp. 902-909, 1997.
 [7].    [7] T. Kamiya, Kusumoto, S., K. Inoue,”Prediction of fault proneness at early phase in object-oriented development”,
         Proceedings of the Second IEEE International Svmposium on Object-Oriented Real-Time Distributed Computing, pp., 253-
         258,1999.
 [8].    [8]Mahaweerawat, A. (2004), “Fault-Prediction in object oriented software‟s using neural network techniques”, Advanced
         Virtual and Intelligent Computing Center (AVIC), Department of Mathematics, Faculty of Science, Chulalongkorn University,
         Bangkok, Thailand, pp.1-8.Proceedings of the 9th International Conference on Neural Information Processing (ICONIP„OZ) ,
         Vol. 5 Lip0 W a g Jagath C. Rajapakse, Kunihiko Fukushima,Soo-Young Lee, and Xin Yao (Editors)
 [9].    [9] Parvinder S. Sandhu, Satish Kumar Dhiman, Anmol Goyal World Academy of Science, Engineering and Technology 60
         2009.
[10].    A Genetic Algorithm Based Classification Approach for Finding Fault Prone Classes
[11].    [10] Munson, J. C. & Khoshgoftaar, T. M., "The detection of fault-prone programs", IEEE Transactions on Software
         Engineering, (1992), 18(5), 423-433.
[12].    [11] Mie Mie Thet Thwin Tong-Seng Quah School of Electronic & Electrical Engineering Nanyang Technological University
         Application of neural network for predicting software development faults using object-oriented design metrics.
[13].    [12] Khoshgoftaar, T. M., Allen, E. B., Ross, F. D., Munikoti, R., Goel, N. & Nandi, A., "Predicting fault -prone modules with
         case-based reasoning". ISSRE 1997, the Eighth International Symposium on Software Engineering (pp. 27 -35), IEEE Computer
         Society (1997).




                                                                82

Más contenido relacionado

La actualidad más candente

A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class qualityIAEME Publication
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET Journal
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET Journal
 
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET Journal
 
An Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using ClusteringAn Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using Clusteringidescitation
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET Journal
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
On the Use of Different Statistical Tests for Alert Correlation -- Short Paper
On the Use of Different Statistical Tests for Alert Correlation -- Short PaperOn the Use of Different Statistical Tests for Alert Correlation -- Short Paper
On the Use of Different Statistical Tests for Alert Correlation -- Short Papercloudly
 
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUESTOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUESShakas Technologies
 
Itab innovative assessement tool
Itab innovative assessement toolItab innovative assessement tool
Itab innovative assessement toolMartin J Ippel
 
A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...IDES Editor
 
Unsupervised Distance Based Detection of Outliers by using Anti-hubs
Unsupervised Distance Based Detection of Outliers by using Anti-hubsUnsupervised Distance Based Detection of Outliers by using Anti-hubs
Unsupervised Distance Based Detection of Outliers by using Anti-hubsIRJET Journal
 

La actualidad más candente (19)

Cv32608610
Cv32608610Cv32608610
Cv32608610
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class quality
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real Network
 
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
 
An Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using ClusteringAn Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using Clustering
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
Pdf2
Pdf2Pdf2
Pdf2
 
On the Use of Different Statistical Tests for Alert Correlation -- Short Paper
On the Use of Different Statistical Tests for Alert Correlation -- Short PaperOn the Use of Different Statistical Tests for Alert Correlation -- Short Paper
On the Use of Different Statistical Tests for Alert Correlation -- Short Paper
 
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUESTOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
 
V2I6_IJERTV2IS60721
V2I6_IJERTV2IS60721V2I6_IJERTV2IS60721
V2I6_IJERTV2IS60721
 
Itab innovative assessement tool
Itab innovative assessement toolItab innovative assessement tool
Itab innovative assessement tool
 
A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...
 
Unsupervised Distance Based Detection of Outliers by using Anti-hubs
Unsupervised Distance Based Detection of Outliers by using Anti-hubsUnsupervised Distance Based Detection of Outliers by using Anti-hubs
Unsupervised Distance Based Detection of Outliers by using Anti-hubs
 

Destacado

Gaurav assignment
Gaurav assignmentGaurav assignment
Gaurav assignmentgauravamity
 
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...Global Risk Forum GRFDavos
 
SOCIAL MEDIA WORKSHOP
SOCIAL MEDIA WORKSHOPSOCIAL MEDIA WORKSHOP
SOCIAL MEDIA WORKSHOPVinod Mehra
 
Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...Global Risk Forum GRFDavos
 
Memòria i avaluació del projecte 2003 aprofundiment anglès
Memòria i avaluació del projecte 2003 aprofundiment anglèsMemòria i avaluació del projecte 2003 aprofundiment anglès
Memòria i avaluació del projecte 2003 aprofundiment anglèsceippuigdenvalls
 
Swiss early warning system for natural hazards
Swiss early warning system for natural hazardsSwiss early warning system for natural hazards
Swiss early warning system for natural hazardsGlobal Risk Forum GRFDavos
 
Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.Rhea Myers
 
The role of economics in making better sustainable flood risk management deci...
The role of economics in making better sustainable flood risk management deci...The role of economics in making better sustainable flood risk management deci...
The role of economics in making better sustainable flood risk management deci...Global Risk Forum GRFDavos
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Formation mechanism, process and risk evaluation system of disaster chain
Formation mechanism, process and risk evaluation system of disaster chainFormation mechanism, process and risk evaluation system of disaster chain
Formation mechanism, process and risk evaluation system of disaster chainGlobal Risk Forum GRFDavos
 
3.1 memòria i avaluació projecte aprofundiment curs 11 12
3.1 memòria i avaluació projecte aprofundiment curs 11 123.1 memòria i avaluació projecte aprofundiment curs 11 12
3.1 memòria i avaluació projecte aprofundiment curs 11 12ceippuigdenvalls
 
Family provide the canvas and paints; the individual is the artist.
Family provide the canvas and paints; the individual is the artist.Family provide the canvas and paints; the individual is the artist.
Family provide the canvas and paints; the individual is the artist.Rhea Myers
 
θεατρικός όμιλος
θεατρικός όμιλοςθεατρικός όμιλος
θεατρικός όμιλοςgymzosim
 
Capacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological ResilienceCapacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological ResilienceGlobal Risk Forum GRFDavos
 
Advertisment and planing
Advertisment and planingAdvertisment and planing
Advertisment and planingsamarpita27
 
User requirements assessment to support the integrated risk management decisi...
User requirements assessment to support the integrated risk management decisi...User requirements assessment to support the integrated risk management decisi...
User requirements assessment to support the integrated risk management decisi...Global Risk Forum GRFDavos
 

Destacado (20)

Gaurav assignment
Gaurav assignmentGaurav assignment
Gaurav assignment
 
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
 
SOCIAL MEDIA WORKSHOP
SOCIAL MEDIA WORKSHOPSOCIAL MEDIA WORKSHOP
SOCIAL MEDIA WORKSHOP
 
Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...
 
Networking
NetworkingNetworking
Networking
 
Memòria i avaluació del projecte 2003 aprofundiment anglès
Memòria i avaluació del projecte 2003 aprofundiment anglèsMemòria i avaluació del projecte 2003 aprofundiment anglès
Memòria i avaluació del projecte 2003 aprofundiment anglès
 
Swiss early warning system for natural hazards
Swiss early warning system for natural hazardsSwiss early warning system for natural hazards
Swiss early warning system for natural hazards
 
Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.Do not look where you fell, but where you slipped.
Do not look where you fell, but where you slipped.
 
The role of economics in making better sustainable flood risk management deci...
The role of economics in making better sustainable flood risk management deci...The role of economics in making better sustainable flood risk management deci...
The role of economics in making better sustainable flood risk management deci...
 
Vaa0809
Vaa0809Vaa0809
Vaa0809
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Formation mechanism, process and risk evaluation system of disaster chain
Formation mechanism, process and risk evaluation system of disaster chainFormation mechanism, process and risk evaluation system of disaster chain
Formation mechanism, process and risk evaluation system of disaster chain
 
3.1 memòria i avaluació projecte aprofundiment curs 11 12
3.1 memòria i avaluació projecte aprofundiment curs 11 123.1 memòria i avaluació projecte aprofundiment curs 11 12
3.1 memòria i avaluació projecte aprofundiment curs 11 12
 
Family provide the canvas and paints; the individual is the artist.
Family provide the canvas and paints; the individual is the artist.Family provide the canvas and paints; the individual is the artist.
Family provide the canvas and paints; the individual is the artist.
 
Моя кубань
Моя кубаньМоя кубань
Моя кубань
 
θεατρικός όμιλος
θεατρικός όμιλοςθεατρικός όμιλος
θεατρικός όμιλος
 
Capacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological ResilienceCapacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological Resilience
 
Advertisment and planing
Advertisment and planingAdvertisment and planing
Advertisment and planing
 
Davos bationo full pc
Davos bationo full pcDavos bationo full pc
Davos bationo full pc
 
User requirements assessment to support the integrated risk management decisi...
User requirements assessment to support the integrated risk management decisi...User requirements assessment to support the integrated risk management decisi...
User requirements assessment to support the integrated risk management decisi...
 

Similar a IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy techniqueFunction Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy techniqueijceronline
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksEditor IJCATR
 
Analysis of Software Complexity Measures for Regression Testing
Analysis of Software Complexity Measures for Regression TestingAnalysis of Software Complexity Measures for Regression Testing
Analysis of Software Complexity Measures for Regression TestingIDES Editor
 
A survey of fault prediction using machine learning algorithms
A survey of fault prediction using machine learning algorithmsA survey of fault prediction using machine learning algorithms
A survey of fault prediction using machine learning algorithmsAhmed Magdy Ezzeldin, MSc.
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESTOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESijaia
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...IOSR Journals
 
IRJET - A Novel Approach for Software Defect Prediction based on Dimensio...
IRJET -  	  A Novel Approach for Software Defect Prediction based on Dimensio...IRJET -  	  A Novel Approach for Software Defect Prediction based on Dimensio...
IRJET - A Novel Approach for Software Defect Prediction based on Dimensio...IRJET Journal
 
IRJET- Deep Learning Model to Predict Hardware Performance
IRJET- Deep Learning Model to Predict Hardware PerformanceIRJET- Deep Learning Model to Predict Hardware Performance
IRJET- Deep Learning Model to Predict Hardware PerformanceIRJET Journal
 
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET Journal
 
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...cscpconf
 
Performance prediction for software architectures
Performance prediction for software architecturesPerformance prediction for software architectures
Performance prediction for software architecturesMr. Chanuwan
 
Performancepredictionforsoftwarearchitectures 100810045752-phpapp02
Performancepredictionforsoftwarearchitectures 100810045752-phpapp02Performancepredictionforsoftwarearchitectures 100810045752-phpapp02
Performancepredictionforsoftwarearchitectures 100810045752-phpapp02NNfamily
 
A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...IJECEIAES
 
Class quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsClass quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsIAEME Publication
 
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...ijseajournal
 
IRJET- Analysis of Software Cost Estimation Techniques
IRJET- Analysis of Software Cost Estimation TechniquesIRJET- Analysis of Software Cost Estimation Techniques
IRJET- Analysis of Software Cost Estimation TechniquesIRJET Journal
 

Similar a IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy techniqueFunction Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy technique
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
 
Analysis of Software Complexity Measures for Regression Testing
Analysis of Software Complexity Measures for Regression TestingAnalysis of Software Complexity Measures for Regression Testing
Analysis of Software Complexity Measures for Regression Testing
 
A survey of fault prediction using machine learning algorithms
A survey of fault prediction using machine learning algorithmsA survey of fault prediction using machine learning algorithms
A survey of fault prediction using machine learning algorithms
 
J034057065
J034057065J034057065
J034057065
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESTOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
 
IRJET - A Novel Approach for Software Defect Prediction based on Dimensio...
IRJET -  	  A Novel Approach for Software Defect Prediction based on Dimensio...IRJET -  	  A Novel Approach for Software Defect Prediction based on Dimensio...
IRJET - A Novel Approach for Software Defect Prediction based on Dimensio...
 
IRJET- Deep Learning Model to Predict Hardware Performance
IRJET- Deep Learning Model to Predict Hardware PerformanceIRJET- Deep Learning Model to Predict Hardware Performance
IRJET- Deep Learning Model to Predict Hardware Performance
 
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
 
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
 
Performance prediction for software architectures
Performance prediction for software architecturesPerformance prediction for software architectures
Performance prediction for software architectures
 
Performancepredictionforsoftwarearchitectures 100810045752-phpapp02
Performancepredictionforsoftwarearchitectures 100810045752-phpapp02Performancepredictionforsoftwarearchitectures 100810045752-phpapp02
Performancepredictionforsoftwarearchitectures 100810045752-phpapp02
 
Cm24585587
Cm24585587Cm24585587
Cm24585587
 
A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...
 
Class quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsClass quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecards
 
20 54-1-pb
20 54-1-pb20 54-1-pb
20 54-1-pb
 
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
The Impact of Software Complexity on Cost and Quality - A Comparative Analysi...
 
IRJET- Analysis of Software Cost Estimation Techniques
IRJET- Analysis of Software Cost Estimation TechniquesIRJET- Analysis of Software Cost Estimation Techniques
IRJET- Analysis of Software Cost Estimation Techniques
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 78-82 Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules Amandeep Kaur1, Arjan Singh2, Baljit Singh3 1,3 Department of Computer Science Engineering, BBSB Engineering College, Fatehgarh Sahib. Punjab, India 2 Department of Mathematics, Punjabi University, Patiala-14002, Punjab, India. Abstract––The aim of this paper is to evaluate the quality of object oriented modules. In this work neural network approach is used along with PSO (particle swarm optimization) to find out fault prone components of software. The evaluation measures used are Accuracy, MAE (Mean absolute error), RMSE (Root mean square error) and the results are calculated on different iterations. The Accuracy, MAE, RMSE is improved as number of iterations increases. Keywords––Software engineering, Fault proneness, Neural Network, Particle Swarm Optimization. I. INTRODUCTION Software quality is the degree to which software possesses a desired combination of attributes such as reliability, maintainability, efficiency, portability, usability, and reusability [1]. This desired combination of attributes must be clearly defined. Various software metrics have been identified for the purpose of evaluating these characteristics of software systems. The aim of software metrics is to predict the quality of the object oriented software products. Fault-proneness of a software module is the probability that the module contains faults. A corelation exists between the fault-proneness of the software and the measurable attributes of the code and testing [9]. Accurate prediction of fault-prone modules enables the verification and validation activities focused on the critical software components Yan Ma and Bojan Cukic [3]. Therefore, software developers have a keen interest in software quality models. It is required that fault- prone prediction models should be efficient and accurate. Predicting the number of faults in each module or identifying the fault-prone modules in the early stages of the software development life cycle will help the development Renu Kumar Louisiana [2]. Software complexity metrics play a useful role in this regard because they are numerical measures that can be obtained early in the software life cycle. There exists a relationship between measures of software complexity and the number of errors later found in test and validation. Faults in software systems continue to be a major problem. Many systems are delivered to users with excessive faults. It has long been recognized that seeking out fault-prone parts of the system and targeting those parts for increased quality control and testing is an effective approach to fault reduction. It is difficult to identify a reliable approach to identifying fault-prone software components Parvinder S. Sandhu [9]. Basili et al. [4] empirically validated CK metrics and found no correlation among metrics. The paper stated that all metrics were effective in predicting fault proneness except LCOM (Lack of Cohesion of Methods). However the metric suite was applied to the source code because some of their metrics measure an inner complexity of a class, and such information cannot be obtained until the algorithm and structure of the class are determined at the end of design phase. Khoshgoftarr et al. [6] introduced the use of the neural networks as a tool for predicting software quality. They compared the neural-network model with a nonparametric discriminant model, and found the neural network model had better predictive accuracy. This model used domain metrics derived from the complexity metric data. These metrics are not adequate for detecting object-oriented faults. Since the object-oriented paradigm exhibits different characteristics from the procedural paradigm, software metrics in object-oriented paradigm need to be used. With the increasing use of object- oriented methods in new software development there is a growing need to improve current practice in object-oriented design and development Toshihiro Kamiya et al. [7] presented a method to estimate the fault-proneness of the class in the early phase, using several complexity metrics for object oriented software. They introduced four checkpoints into the analysis/design/implementation phase, and estimate the fault-prone classes using the applicable metrics at each checkpoint. They estimate the fault-proneness by using the multivariate logistic regression analysis. Atchara Mahaweerawat [8] proposed fault prediction model based on supervised learning using Multilayer Perceptron Neural Network and the results are analyzed in terms of classification correctness and based on the results of classification, faulty classes are further analyzed and classified according to the particular type of fault. Munson & Khoshgoftaar [10] use discriminant analysis technique to investigate some aspects of the relationship between program complexity measures and program faults. Mie mie thet thwin, tong-seng quah [11] proposed neural network model along with object oriented metrics. This empirical study presents the prediction of faults in three industrial real time system using multiple regression model and a neural network model and found that neural network model can predict the number of faults more exactly than multiple regression model. 78
  • 2. Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules A variety of software fault predictions techniques have been proposed, but none has proven to be consistently accurate. Therefore, there is a need to find the best prediction techniques for a given prediction problem. 1. The techniques used in Khoshgoftarr et al. [6] used to predict faults that use traditional metrics are not generally applicable to object oriented system. 2 The data collected in Basili et al. [4] is not of industry. So there can be increased complexity when it comes to large object oriented system of organization. 3 CK metrics evaluate static complexity of object oriented software in Basili et al. [4], V. R. Basili [5]. Several OOD specifications include dynamic information. It is necessary to evaluate such dynamic complexity. 4. Models used in Khoshgoftaar [12] take Increase time to design and develop quality cases. So, in this study a PSO Technique is used along with Neural Network to predict fault prone modules in object oriented. II. MATERIALS AND METHODS The proposed study find out the fault proneness of object oriented modules. The technique used in this study is Particle swarm optimization along with Neural Network. The evaluation measures used are Accuracy, Mean Absolute Error, Root Mean Squared Error. Step-1: Find the structural code and design attributes of software. The dataset taken is from NASA KC1.The dataset is related to software defect prediction which contains 2109 modules and 22 metrics. Step-2: Load the training data .In this step the 80% of KC1 dataset is used for training. Step-3: Perform Particle Swarm Optimization based Neural Network training. In this step Particle Swarm Optimization toolbox for Matlab is used and the training is performed with the help of this toolbox. Step-4: Load testing data. In this step 20% of kc1 dataset is used for testing. Step-5: In this step testing is done and the performance is calculated on the basis of Accuracy, MAE (Mean Absolute Error), RMSE (Root Mean Squared Error) The evaluation measures that are used to carry out the results are discussed below:  Mean absolute error (MAE)  Root mean square error (RMSE)  Accuracy  Mean absolute error Mean absolute error, MAE is the average of the difference between predicted and actual value in all test cases; it is the average prediction error. The formula for calculating MAE is given in equation shown below: (1) a c  a c 1 1 2 2  ...  a c n n n Assuming that the actual output is a, expected output is c  Root mean-squared error RMSE is frequently used measure of differences between values predicted by a model or estimator and the values actually observed from the thing being modeled or estimated. a1 c1  a 2  c 2  ...  a n  c n 2 2 2 (2) n The basic flow of proposed model is given below: 79
  • 3. Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules Start Find the structural code and design attributes of S/W Load the training data Perform the training of NN with PSO Load the testing data PSO trained with NN is evaluated against the testing data The performance is evaluated in terms of Accuracy, MAE (mean absolute error) and RMSE(root mean square error). Stop III. RESULTS AND DISCUSSIONS The PSO technique along with Neural network is used to find the fault prone components of object oriented software modules .The results are calculated on different iterations and neural network gives better results as umber of iterations increases. Fig1: Finding Gbest value by PSO by different iteration No. of Dimensi No. of Gbest Accura MAE RMSE particle ons iterations value cy 100 21.4691 94.22 0.0299 0.1109 500 21.8190 94.78 0.0290 0.1102 30 150 1000 21.8173 96.25 0.0279 0.1022 1500 21.8609 96.98 0.0197 0.0990 2000 21.8709 97.75 0.0178 0.0957 Table1: Performance on the basis of different iterations by PSO 80
  • 4. Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules Graph1:Showing performance by PSO on different iterations PSO used with neural network is giving better results as the number of iterations increases. The comparison is shown in table given below: S.no. Algorithm Accuracy MAE RMSE 1 PSO with NN 97.75 0.0178 0.0957 2 Generalized regression network 97.66 0.0265 0.1056 Table 2: Comparison of PSO with NN with generalized regression network on the basis of different measures Graph 2 :Comparison on the basis of accuracy Graph3: Comparison on the basis of MAE Graph 4: Comparison on the basis of RMSE IV. CONCLUSION A variety of software fault prediction techniques have been proposed, which have been already applied in software engineering applications. A neural network is trained to reproduce a given set of correct classification examples, instead to produce formula or rules. Neural networks are non linear techniques that are able to model complex functions. In this work NN approach is used along with PSO to find out fault prone components of software. The evaluation measures used are Accuracy, MAE, RMSE and the results are calculated on different iterations. Result is calculated on different iterations. The accuracy is improved as the number of iterations increases. The results showed that proposed technique is better as compared to traditional approach and give better results. 81
  • 5. Design of Hybrid Neural Network Model for Quality Evaluation of Object Oriented Software Modules REFERENCES [1]. [1]IEEE Standard for a Software Quality Metrics Methodology, Institute of Electrical and electronics engineers Inc.1993. [2]. [2] Renu Kumar Louisiana State University Baton Rouge Suresh Rai Louisiana State University Baton Rouge Jerry L. Trahan Louisiana State University Baton Rouge Neural-Network Techniques for Software-Quality Evaluation [3]. [3] Yan Ma, Lan Guo and Bojan Cukic, “A Statistical Framework for the Prediction of Fault-Proneness”, Department of Statistics, West Virginia University, Morgantown. [4]. [4] S. Chidamber, and C. Kemerer, "A metrics suite for object-oriented design", IEEE Transactions on Software Engineering, 20(6), 1994, pp.476-493. [5]. [5] V. R. Basili, L. C. Briand, W. L. Mélo((1996)): A validation of object-oriented design metrics as quality indicators, IEEE Trans. on Software Eng., Vol. 20, No. 22, pp. 751-761. [6]. [6] P.M. Khoshgoftaar, E.B. Allen, J.P. Hudepohl, and S.J.Aud, “Application of neural networks to software quality modeling of a very large telecommunications system”, IEEE Transactions on Neural Network, vol. 8, pp. 902-909, 1997. [7]. [7] T. Kamiya, Kusumoto, S., K. Inoue,”Prediction of fault proneness at early phase in object-oriented development”, Proceedings of the Second IEEE International Svmposium on Object-Oriented Real-Time Distributed Computing, pp., 253- 258,1999. [8]. [8]Mahaweerawat, A. (2004), “Fault-Prediction in object oriented software‟s using neural network techniques”, Advanced Virtual and Intelligent Computing Center (AVIC), Department of Mathematics, Faculty of Science, Chulalongkorn University, Bangkok, Thailand, pp.1-8.Proceedings of the 9th International Conference on Neural Information Processing (ICONIP„OZ) , Vol. 5 Lip0 W a g Jagath C. Rajapakse, Kunihiko Fukushima,Soo-Young Lee, and Xin Yao (Editors) [9]. [9] Parvinder S. Sandhu, Satish Kumar Dhiman, Anmol Goyal World Academy of Science, Engineering and Technology 60 2009. [10]. A Genetic Algorithm Based Classification Approach for Finding Fault Prone Classes [11]. [10] Munson, J. C. & Khoshgoftaar, T. M., "The detection of fault-prone programs", IEEE Transactions on Software Engineering, (1992), 18(5), 423-433. [12]. [11] Mie Mie Thet Thwin Tong-Seng Quah School of Electronic & Electrical Engineering Nanyang Technological University Application of neural network for predicting software development faults using object-oriented design metrics. [13]. [12] Khoshgoftaar, T. M., Allen, E. B., Ross, F. D., Munikoti, R., Goel, N. & Nandi, A., "Predicting fault -prone modules with case-based reasoning". ISSRE 1997, the Eighth International Symposium on Software Engineering (pp. 27 -35), IEEE Computer Society (1997). 82