SlideShare a Scribd company logo
1 of 6
Download to read offline
Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam
International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 81
Pareto Type II Based Software Reliability Growth Model
Dr.R.Satya Prasad profrsp@gmail.com
Associate Professor, Dept.of Computer Science & Engg.
Acharya Nagarjuna University,
Nagarjuna Nagar- 520510.
INDIA.
N.Geetha Rani geetha.neppala@gmail.com
Associate Professor, Department of Computer Science,
Abhinav Institute of Management & Tech.
Singaryakonda – INDIA
Prof.R.R.L.Kantam kantam_rrl@rediffmail.com
Professor, Department of Statistics
Acharya Nagarjuna University,
Nagarjuna Nagar- 520510.
INDIA.
Abstract
The past 4 decades have seen the formulation of several software reliability growth models to
predict the reliability and error content of software systems. This paper presents Pareto type II
model as a software reliability growth model, together with expressions for various reliability
performance measures. Theory of probability, distribution function, probability distributions plays
major role in software reliability model building. This paper presents estimation procedures to
access reliability of a software system using Pareto distribution, which is based on
Non Homogenous Poisson Process (NHPP).
Keywords: Software Reliability, NHPP, Pareto Type II Distribution, Parameter Estimation.
1. INTRODUCTION
Software reliability is the probability of failure free operation of software in a specified
environment during specified duration [Musa 1998]. Several models have been proposed during
the past 4 decades for accessing reliability of a software system for example Crow and
Basu(1988), Goel and Okumoto (1979,1984), Musa(1980), Pham(2005), Ramamurthy and
Bastani(1982), Zhang,Teng and Pham(2003), Malaiya, Karunanithi and Verma(1992) and
Wood(1996). The objective of such models is to improve software performance. These models
are concerned with forecasting future system operability from the failure data collected during the
testing phase of a software product. Most of the models assume that the time between failure
follows an exponential distribution with parameter that varies with the number of errors remaining
in the software system. A software system is a product of human work and is very likely to
contain faults. The accuracy of software reliability growth models when validated using the very
few available data sets varies significantly and thus despite the existence of numerous models,
none of them can be recommended unreservedly to potential users.
This paper presents a Pareto type II model to analyze the reliability of a software system. Our
objective is to develop a parsimonious model whose parameters have a physical interpretation
and which can yield quantitative measure for software performance assessment. The layout of
the paper is as follows: Section 2 describes the development and interpretation of the mean value
function for the underlying NHPP. Section 3 discusses parameter estimation of Pareto type II
model based on time between failure data. Section 4 describes the techniques used for software
failure data analysis for a live data and Section 5 contains conclusions.
Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam
International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 82
2. PARETO MODEL DEVELOPMENT
Software reliability models can be classified according to probabilistic assumptions. When a
Markov process represents the failure process, the resultant model is called Markovian Model.
Second one is fault counting model which describes the failure phenomenon by stochastic
process like Homogeneous Poisson Process (HPP), Non Homogeneous Poisson Process
(NHPP) and Compound Poisson Process etc. A majority of failure count models are based upon
NHPP described in the following lines.
A software system is subject to failures at random times caused by errors present in the system.
Let {N(t), t >0} be a counting process representing the cumulative number of failures by time t.
Since there are no failures at t=0 we have
N(0) = 0
It is to assume that the number of software failures during non overlapping time intervals do not
affect each other. In other words, for any finite collection of times t1<t2<….<tn the ‘n’ random
variables N(t1), {N(t2)-N(t1)}, ….. {N(tn) - N(tn-1)} are independent. This implies that the counting
process {N(t), t>0} has independent increments.
Let m(t) represent the expected number of software failures by time ‘t’. Since the expected
number of errors remaining in the system at any time is finite, m(t) is bounded, non decreasing
function of ‘t’ with the following boundary conditions.
m(t) = 0, t = 0
= a, t → ∞
where a is the expected number of software errors to be eventually detected.
Suppose N(t) is known to have a Poisson probability mass function with parameters m(t) i.e.
, n=0,1,2,…∞
then N(t) is called an NHPP. Thus the stochastic behavior of software failure phenomena can be
described through the N(t) process. Various time domain models have appeared in the literature
(Kantam and Subbarao, 2009) which describe the stochastic failure process by an NHPP which
differ in the mean value functions m(t).
In this paper we consider m(t) as given by
(2.1)
where [m(t)/a] is the cumulative distribution function of Pareto type II distribution (Johnson et al,
2004) for the present choice.
=
which is also a Poisson model with mean ‘a’.
Let N(t) be the number of errors remaining in the system at time ‘t’
Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam
International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 83
N(t) = N(∞) – N(t)
E[N(t) ] = E[N(∞)] - E[N(t)]
= a - m(t)
= a -
=
Let be the time between (k-1)th and kth failure of the software product. Let be the time up to
the kth failure. Let us find out the probability that time between (k-1)th and kth failures, i.e.
exceeds a real number ‘s’ given that the total time up to the (k-1)th failure is equal to x, i.e. P[ >
s / = x]
R (s / x) = (2.2)
This Expression is called Software Reliability.
3. PARAMETER ESTIMATION OF PARETO TYPE II MODEL
In this section we develop expressions to estimate the parameters of the Pareto type II model
based on time between failure data. Expressions are now derived for estimating ‘a’, ‘b’ and ‘c’ for
the model.
Let …. be a sequence of times between successive software failures associated with an
NHPP N(t). Let be equal to
, k = 1, 2, 3 ….
which represents the time to failure k. Suppose we are given ‘n’ software failure times
say , there are ‘n’ time instants at which the first, second, third … nth failures of a
software are observed. This is a special case of a life testing experiment in which only one
product is put to test and its successive failures are recorded alternatively separated by error
detections and debugging.
The mean value function of Pareto type II model is given by
, t ≥ 0 (3.1)
The constants ‘a’ , ‘b’ and ‘c’ which appear in the mean value function and various other
expressions are called parameters of the model. In order to have an assessment of the software
reliability a, b and c are to be known or they are to be estimated from software failure data.
Expressions are now derived for estimating ‘a’, ‘b’ and ‘c’ for the model.
The required likelihood function is given by
L= . ) (3.2)
values of a, b and c that would maximize L are called maximum likelihood estimators (MLEs) and
the method is called maximum likelihood (ML) method of estimation.
L = . (3.3)
Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam
International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 84
Then the log likelihood equation to estimate the unknown parameters a, b and c are given by
LogL=
( )
( ) ( )
1
1 log log log 1 log
b n
ib
in
c
a a b b c b x c
x c =
 
− − + + + − + +    
+  
∑ (3.4)
Accordingly parameters ‘a’, ‘b’ and ‘c’ would be solutions of the equations
, , ,
,
Substituting the expressions for m(t) (3.1) in the above equations, taking logarithms,
differentiating with respect to ‘a’, ‘b’, ‘c’ and equating to zero, after some joint simplications we get
a = (3.5)
g(b)= + – (3.6)
Second order partial derivative of L with respect to the parameter ‘b’
g’(b) = -n log - (3.7)
g(c) = + - (3.8)
Second order partial derivative of L with respect to the parameter ‘c’
g’(c) = - - + (3.9)
The values of ‘b’ and ‘c’ in the above equations can be obtained using Newton Raphson Method.
Solving the above equations simultaneously, yields the point estimates of the parameters a, b
and c. These equations are to be solved iteratively and their solutions in turn when substituted in
the log likelihood equation of ‘a’ would give analytical solution for the MLE of ‘a’. However when
‘b’ is assumed to be known only one equation that of ‘c’ has to be solved by numerical methods to
proceed for further evaluation of reliability measures.
4. NTDS SOFTWARE FAILURE DATA ANALYSIS
In this Section, we present the analysis of NTDS software failure data, taken from Jelinski and
Mornda(1972). The data are originally from the U.S. Navy Fleet Computer Programming Centre,
and consists of the errors in the development of software for the real time, multi computer
complex which forms the core of the Naval Tactical Data Systems (NTDS). The NTDS software
consisted of some 38 different modules. Each module was supposed to follow three stages; the
production (development) phase, the test phase and the user phase. The data are based on the
trouble reports or ‘software anomaly reports’ for one of the larger modules denoted as A-module.
The times (days) between software failures and additional information for this module are
summarized in the below table.
Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam
International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 85
Error
Number
n
Time
between
Errors
Sk days
Cumulative
Time
xn =
days
Production (Checkout) Phase
1 9 9
2 12 21
3 11 32
4 4 36
5 7 43
6 2 45
7 5 50
8 8 58
9 5 63
10 7 70
11 1 71
12 6 77
13 1 78
14 9 87
15 4 91
16 1 92
17 3 95
18 3 98
19 6 104
20 1 105
21 11 116
22 33 149
23 7 156
24 91 247
25 2 249
26 1 250
Test Phase
27 87 337
28 47 384
29 12 396
30 9 405
31 135 540
User Phase
32 258 798
Test Phase
33 16 814
34 35 849
TABLE 4.1 NTDS Data
The data set consists of 26 failures in 250 days. 26 software errors were found during production
phase and five additional errors during test phase. One error was observed during the user
phase and two more errors are noticed in a subsequent test phase indicating that a network of
the module had taken place after the user error was found.
Solving equations in section 3 by Newton Raphson Method (N-R) method for the NTDS software
failure data, the iterative solutions for MLEs of a, b and c are
a^ = 55.018710
b^ = 0.998899
c^ = 278.610091
Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam
International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 86
Hence, we may accept these three values as MLEs of a, b, c. The estimator of the reliability
function from the equation (2.2) at any time x beyond 250 days is given by
R (s / x) =
R (250/50) =
= 0.081677
5. CONCLUSION
In this paper we have presented Pareto software reliability growth model with a mean value
function. It provides a plausible description of the software failure phenomenon. This is called
Pareto Type II Model. This is a simple method for model validation and is very convenient for
practitioners of software reliability.
6. REFERENCES
[1] CROW, .H, and BASU, A.P. (1988). “Reliability growth estimation with missing data-II”,
Proceeding annual Reliability and Maintainability Symposium, 26-28.
[2] Goel, A.L., Okumoto, K., 1979. Time- dependent error-detection rate model for software
reliability and other performance measures. IEEE Trans. Reliab. R-28, 206-211.
[3] Jelinski, Z and Moranda, P.B (1972) “Software reliability research”, In:W.Freiberger,(Ed)
Statistical Computer Performance Evaluation, New York:Academic Press 465-497.
[4] Musa J.D, Software Reliability Engineering MCGraw-Hill, 1998.
[5] Musa,J.D. (1980) “The Measurement and Management of Software Reliability”, Proceeding
of the IEEE vol.68, No.9, 1131-1142.
[6] Pham. H (2005) “A Generalized Logistic Software Reliability Growth Model”, Opsearch,
Vol.42, No.4, 332-331.
[7] Ramamurthy, C.V., and Bastani, F.B.(1982). “Software Reliability Status and Perspectives”,
IEEE Transactions on Software Engineering, Vol.SE-8, 359-371.
[8] R.R.L.Kantam and R.Subbarao, 2009. “Pareto Distribution: A Software Reliability Growth
Model”. International Journal of Performability Engineering, Volume 5, Number 3, April
2009, Paper 9, PP: 275- 281.
[9] J.D.Musa and K.Okumoto,”A Logorithmic Poisson Execution time model for software
reliability measure-ment”, proceeding seventh international conference on software
engineering, orlando, pp.230-238,1984.
[10] ZHANG,X., TENG,X. and PHAM,H. CONSIDERING FAULT REMOVAL EFFICIENCY IN
SOFTWARE RELIABILITY ASSESSMENT, IEEE Transactions on Systems, Man and
Cybernetics-part A, Vol.33, No.1, 2003; 114-120.
[11] MALAIYA, Y.K., KARUNANITHI, N., and VERMA, P. PREDICTABILITY OF SOFTWARE
RELIABILITY MODELS, IEEE Transactions on Reliability, Vol, No.4. 1992; 539-546.
[12] WOOD, A. predicting software Reliability, IEEE Computer, 1996; 2253-2264.

More Related Content

What's hot

IRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning AlgorithmsIRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning AlgorithmsIRJET Journal
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III pkaviya
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERijcsit
 
An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...
An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...
An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...theijes
 
A tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithmsA tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithmsTharindu Weerasinghe
 
Towards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationTowards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationIDES Editor
 
IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software IRJET Journal
 
An Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using ClusteringAn Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using Clusteringidescitation
 
Intrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross ValidationIntrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross Validationinventionjournals
 
8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithmLaura Petrosanu
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...ijdpsjournal
 
Eckovation machine learning project
Eckovation machine learning projectEckovation machine learning project
Eckovation machine learning projectVinod Jatav
 

What's hot (18)

IRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning AlgorithmsIRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
 
Ecbs2000
Ecbs2000Ecbs2000
Ecbs2000
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...
An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...
An Efficient Unsupervised AdaptiveAntihub Technique for Outlier Detection in ...
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
 
Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...
 
A tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithmsA tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithms
 
Open modeling and simulation framework for evolutive analysis
Open modeling and simulation framework for evolutive analysisOpen modeling and simulation framework for evolutive analysis
Open modeling and simulation framework for evolutive analysis
 
Algorithms
AlgorithmsAlgorithms
Algorithms
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Towards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationTowards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key Generation
 
IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software
 
An Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using ClusteringAn Empirical Study for Defect Prediction using Clustering
An Empirical Study for Defect Prediction using Clustering
 
Intrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross ValidationIntrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross Validation
 
8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
 
Eckovation machine learning project
Eckovation machine learning projectEckovation machine learning project
Eckovation machine learning project
 

Similar to Pareto Type II Based Software Reliability Growth Model

Burr Type III Software Reliability Growth Model
Burr Type III Software Reliability Growth ModelBurr Type III Software Reliability Growth Model
Burr Type III Software Reliability Growth ModelIOSR Journals
 
SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithmsijseajournal
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachIJCSEA Journal
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach IJCSEA Journal
 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSIAEME Publication
 
Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy techniqueFunction Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy techniqueijceronline
 
Information-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upInformation-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upEswar Publications
 
Comparative performance analysis
Comparative performance analysisComparative performance analysis
Comparative performance analysiscsandit
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...csandit
 
Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...
Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...
Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...Waqas Tariq
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEIOSR Journals
 
Cl32990995
Cl32990995Cl32990995
Cl32990995IJMER
 
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...cscpconf
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated ProcessIRJET Journal
 

Similar to Pareto Type II Based Software Reliability Growth Model (20)

Burr Type III Software Reliability Growth Model
Burr Type III Software Reliability Growth ModelBurr Type III Software Reliability Growth Model
Burr Type III Software Reliability Growth Model
 
I017144954
I017144954I017144954
I017144954
 
SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithms
 
50120130405032
5012013040503250120130405032
50120130405032
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICS
 
Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy techniqueFunction Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy technique
 
Information-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upInformation-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks up
 
Comparative performance analysis
Comparative performance analysisComparative performance analysis
Comparative performance analysis
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 
Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...
Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...
Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimat...
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLE
 
Cl32990995
Cl32990995Cl32990995
Cl32990995
 
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
EARLY STAGE SOFTWARE DEVELOPMENT EFFORT ESTIMATIONS – MAMDANI FIS VS NEURAL N...
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated Process
 

More from Waqas Tariq

The Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetThe Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
 
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
 
A Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledA Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
 
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
 
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI designWaqas Tariq
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
 
An overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceAn overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
 
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
 
Principles of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesPrinciples of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesWaqas Tariq
 
Progress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaProgress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaWaqas Tariq
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
 
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
 
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
 
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorDynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
 

More from Waqas Tariq (20)

The Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetThe Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a Widget
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image
 
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
 
A Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledA Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab Disabled
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor Filter
 
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
 
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational Knolwedge
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI design
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
 
An overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceAn overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer Interface
 
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
 
Principles of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesPrinciples of Good Screen Design in Websites
Principles of Good Screen Design in Websites
 
Progress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaProgress of Virtual Teams in Albania
Progress of Virtual Teams in Albania
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
 
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
 
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
 
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorDynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity Removal
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Pareto Type II Based Software Reliability Growth Model

  • 1. Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 81 Pareto Type II Based Software Reliability Growth Model Dr.R.Satya Prasad profrsp@gmail.com Associate Professor, Dept.of Computer Science & Engg. Acharya Nagarjuna University, Nagarjuna Nagar- 520510. INDIA. N.Geetha Rani geetha.neppala@gmail.com Associate Professor, Department of Computer Science, Abhinav Institute of Management & Tech. Singaryakonda – INDIA Prof.R.R.L.Kantam kantam_rrl@rediffmail.com Professor, Department of Statistics Acharya Nagarjuna University, Nagarjuna Nagar- 520510. INDIA. Abstract The past 4 decades have seen the formulation of several software reliability growth models to predict the reliability and error content of software systems. This paper presents Pareto type II model as a software reliability growth model, together with expressions for various reliability performance measures. Theory of probability, distribution function, probability distributions plays major role in software reliability model building. This paper presents estimation procedures to access reliability of a software system using Pareto distribution, which is based on Non Homogenous Poisson Process (NHPP). Keywords: Software Reliability, NHPP, Pareto Type II Distribution, Parameter Estimation. 1. INTRODUCTION Software reliability is the probability of failure free operation of software in a specified environment during specified duration [Musa 1998]. Several models have been proposed during the past 4 decades for accessing reliability of a software system for example Crow and Basu(1988), Goel and Okumoto (1979,1984), Musa(1980), Pham(2005), Ramamurthy and Bastani(1982), Zhang,Teng and Pham(2003), Malaiya, Karunanithi and Verma(1992) and Wood(1996). The objective of such models is to improve software performance. These models are concerned with forecasting future system operability from the failure data collected during the testing phase of a software product. Most of the models assume that the time between failure follows an exponential distribution with parameter that varies with the number of errors remaining in the software system. A software system is a product of human work and is very likely to contain faults. The accuracy of software reliability growth models when validated using the very few available data sets varies significantly and thus despite the existence of numerous models, none of them can be recommended unreservedly to potential users. This paper presents a Pareto type II model to analyze the reliability of a software system. Our objective is to develop a parsimonious model whose parameters have a physical interpretation and which can yield quantitative measure for software performance assessment. The layout of the paper is as follows: Section 2 describes the development and interpretation of the mean value function for the underlying NHPP. Section 3 discusses parameter estimation of Pareto type II model based on time between failure data. Section 4 describes the techniques used for software failure data analysis for a live data and Section 5 contains conclusions.
  • 2. Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 82 2. PARETO MODEL DEVELOPMENT Software reliability models can be classified according to probabilistic assumptions. When a Markov process represents the failure process, the resultant model is called Markovian Model. Second one is fault counting model which describes the failure phenomenon by stochastic process like Homogeneous Poisson Process (HPP), Non Homogeneous Poisson Process (NHPP) and Compound Poisson Process etc. A majority of failure count models are based upon NHPP described in the following lines. A software system is subject to failures at random times caused by errors present in the system. Let {N(t), t >0} be a counting process representing the cumulative number of failures by time t. Since there are no failures at t=0 we have N(0) = 0 It is to assume that the number of software failures during non overlapping time intervals do not affect each other. In other words, for any finite collection of times t1<t2<….<tn the ‘n’ random variables N(t1), {N(t2)-N(t1)}, ….. {N(tn) - N(tn-1)} are independent. This implies that the counting process {N(t), t>0} has independent increments. Let m(t) represent the expected number of software failures by time ‘t’. Since the expected number of errors remaining in the system at any time is finite, m(t) is bounded, non decreasing function of ‘t’ with the following boundary conditions. m(t) = 0, t = 0 = a, t → ∞ where a is the expected number of software errors to be eventually detected. Suppose N(t) is known to have a Poisson probability mass function with parameters m(t) i.e. , n=0,1,2,…∞ then N(t) is called an NHPP. Thus the stochastic behavior of software failure phenomena can be described through the N(t) process. Various time domain models have appeared in the literature (Kantam and Subbarao, 2009) which describe the stochastic failure process by an NHPP which differ in the mean value functions m(t). In this paper we consider m(t) as given by (2.1) where [m(t)/a] is the cumulative distribution function of Pareto type II distribution (Johnson et al, 2004) for the present choice. = which is also a Poisson model with mean ‘a’. Let N(t) be the number of errors remaining in the system at time ‘t’
  • 3. Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 83 N(t) = N(∞) – N(t) E[N(t) ] = E[N(∞)] - E[N(t)] = a - m(t) = a - = Let be the time between (k-1)th and kth failure of the software product. Let be the time up to the kth failure. Let us find out the probability that time between (k-1)th and kth failures, i.e. exceeds a real number ‘s’ given that the total time up to the (k-1)th failure is equal to x, i.e. P[ > s / = x] R (s / x) = (2.2) This Expression is called Software Reliability. 3. PARAMETER ESTIMATION OF PARETO TYPE II MODEL In this section we develop expressions to estimate the parameters of the Pareto type II model based on time between failure data. Expressions are now derived for estimating ‘a’, ‘b’ and ‘c’ for the model. Let …. be a sequence of times between successive software failures associated with an NHPP N(t). Let be equal to , k = 1, 2, 3 …. which represents the time to failure k. Suppose we are given ‘n’ software failure times say , there are ‘n’ time instants at which the first, second, third … nth failures of a software are observed. This is a special case of a life testing experiment in which only one product is put to test and its successive failures are recorded alternatively separated by error detections and debugging. The mean value function of Pareto type II model is given by , t ≥ 0 (3.1) The constants ‘a’ , ‘b’ and ‘c’ which appear in the mean value function and various other expressions are called parameters of the model. In order to have an assessment of the software reliability a, b and c are to be known or they are to be estimated from software failure data. Expressions are now derived for estimating ‘a’, ‘b’ and ‘c’ for the model. The required likelihood function is given by L= . ) (3.2) values of a, b and c that would maximize L are called maximum likelihood estimators (MLEs) and the method is called maximum likelihood (ML) method of estimation. L = . (3.3)
  • 4. Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 84 Then the log likelihood equation to estimate the unknown parameters a, b and c are given by LogL= ( ) ( ) ( ) 1 1 log log log 1 log b n ib in c a a b b c b x c x c =   − − + + + − + +     +   ∑ (3.4) Accordingly parameters ‘a’, ‘b’ and ‘c’ would be solutions of the equations , , , , Substituting the expressions for m(t) (3.1) in the above equations, taking logarithms, differentiating with respect to ‘a’, ‘b’, ‘c’ and equating to zero, after some joint simplications we get a = (3.5) g(b)= + – (3.6) Second order partial derivative of L with respect to the parameter ‘b’ g’(b) = -n log - (3.7) g(c) = + - (3.8) Second order partial derivative of L with respect to the parameter ‘c’ g’(c) = - - + (3.9) The values of ‘b’ and ‘c’ in the above equations can be obtained using Newton Raphson Method. Solving the above equations simultaneously, yields the point estimates of the parameters a, b and c. These equations are to be solved iteratively and their solutions in turn when substituted in the log likelihood equation of ‘a’ would give analytical solution for the MLE of ‘a’. However when ‘b’ is assumed to be known only one equation that of ‘c’ has to be solved by numerical methods to proceed for further evaluation of reliability measures. 4. NTDS SOFTWARE FAILURE DATA ANALYSIS In this Section, we present the analysis of NTDS software failure data, taken from Jelinski and Mornda(1972). The data are originally from the U.S. Navy Fleet Computer Programming Centre, and consists of the errors in the development of software for the real time, multi computer complex which forms the core of the Naval Tactical Data Systems (NTDS). The NTDS software consisted of some 38 different modules. Each module was supposed to follow three stages; the production (development) phase, the test phase and the user phase. The data are based on the trouble reports or ‘software anomaly reports’ for one of the larger modules denoted as A-module. The times (days) between software failures and additional information for this module are summarized in the below table.
  • 5. Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 85 Error Number n Time between Errors Sk days Cumulative Time xn = days Production (Checkout) Phase 1 9 9 2 12 21 3 11 32 4 4 36 5 7 43 6 2 45 7 5 50 8 8 58 9 5 63 10 7 70 11 1 71 12 6 77 13 1 78 14 9 87 15 4 91 16 1 92 17 3 95 18 3 98 19 6 104 20 1 105 21 11 116 22 33 149 23 7 156 24 91 247 25 2 249 26 1 250 Test Phase 27 87 337 28 47 384 29 12 396 30 9 405 31 135 540 User Phase 32 258 798 Test Phase 33 16 814 34 35 849 TABLE 4.1 NTDS Data The data set consists of 26 failures in 250 days. 26 software errors were found during production phase and five additional errors during test phase. One error was observed during the user phase and two more errors are noticed in a subsequent test phase indicating that a network of the module had taken place after the user error was found. Solving equations in section 3 by Newton Raphson Method (N-R) method for the NTDS software failure data, the iterative solutions for MLEs of a, b and c are a^ = 55.018710 b^ = 0.998899 c^ = 278.610091
  • 6. Dr.R.Satya Prasad, N.Geetha Rani & Prof.R.R.L. Kantam International Journal of Software Engineering (IJSE), Volume (2) : Issue (4) : 2011 86 Hence, we may accept these three values as MLEs of a, b, c. The estimator of the reliability function from the equation (2.2) at any time x beyond 250 days is given by R (s / x) = R (250/50) = = 0.081677 5. CONCLUSION In this paper we have presented Pareto software reliability growth model with a mean value function. It provides a plausible description of the software failure phenomenon. This is called Pareto Type II Model. This is a simple method for model validation and is very convenient for practitioners of software reliability. 6. REFERENCES [1] CROW, .H, and BASU, A.P. (1988). “Reliability growth estimation with missing data-II”, Proceeding annual Reliability and Maintainability Symposium, 26-28. [2] Goel, A.L., Okumoto, K., 1979. Time- dependent error-detection rate model for software reliability and other performance measures. IEEE Trans. Reliab. R-28, 206-211. [3] Jelinski, Z and Moranda, P.B (1972) “Software reliability research”, In:W.Freiberger,(Ed) Statistical Computer Performance Evaluation, New York:Academic Press 465-497. [4] Musa J.D, Software Reliability Engineering MCGraw-Hill, 1998. [5] Musa,J.D. (1980) “The Measurement and Management of Software Reliability”, Proceeding of the IEEE vol.68, No.9, 1131-1142. [6] Pham. H (2005) “A Generalized Logistic Software Reliability Growth Model”, Opsearch, Vol.42, No.4, 332-331. [7] Ramamurthy, C.V., and Bastani, F.B.(1982). “Software Reliability Status and Perspectives”, IEEE Transactions on Software Engineering, Vol.SE-8, 359-371. [8] R.R.L.Kantam and R.Subbarao, 2009. “Pareto Distribution: A Software Reliability Growth Model”. International Journal of Performability Engineering, Volume 5, Number 3, April 2009, Paper 9, PP: 275- 281. [9] J.D.Musa and K.Okumoto,”A Logorithmic Poisson Execution time model for software reliability measure-ment”, proceeding seventh international conference on software engineering, orlando, pp.230-238,1984. [10] ZHANG,X., TENG,X. and PHAM,H. CONSIDERING FAULT REMOVAL EFFICIENCY IN SOFTWARE RELIABILITY ASSESSMENT, IEEE Transactions on Systems, Man and Cybernetics-part A, Vol.33, No.1, 2003; 114-120. [11] MALAIYA, Y.K., KARUNANITHI, N., and VERMA, P. PREDICTABILITY OF SOFTWARE RELIABILITY MODELS, IEEE Transactions on Reliability, Vol, No.4. 1992; 539-546. [12] WOOD, A. predicting software Reliability, IEEE Computer, 1996; 2253-2264.