SlideShare a Scribd company logo
1 of 8
Download to read offline
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3


               Detection of Reliable Software Using SPRT on
                           Interval Domain Data
                                            Krishna Mohan Gonuguntla
                            Reader, Dept. of Computer Science, P.B.Siddhartha college
                                        Vijayawada, Andhrapradesh, India.
                            Tel: 91-9440446847      E-mail: km_mm_2000@yahoo.com


                                                 Satya Prasad Ravi
             Associate Professor, Dept. of Computer Science & Engg., Acharya Nagrjuna University
                                  Nagarjuna Nagar, Guntur, Andhrapradesh, India
                                Tel: 91-9848487478      E-mail: profrsp@gmail.com


Abstract
In Classical Hypothesis testing volumes of data is to be collected and then the conclusions are drawn which
may take more time. But, Sequential Analysis of statistical science could be adopted in order to decide upon
the reliable / unreliable of the developed software very quickly. The procedure adopted for this is,
Sequential Probability Ratio Test (SPRT). In the present paper we proposed the performance of SPRT on
Interval domain data using Weibull model and analyzed the results by applying on 5 data sets. The
parameters are estimated using Maximum Likelihood Estimation.
Keywords: Weibull model, Sequential Probability Ratio Test, Maximum Likelihood Estimation, Decision
lines, Software Reliability, Interval domain data.
1. Introduction
Wald's procedure is particularly relevant if the data is collected sequentially. Sequential Analysis is different
from Classical Hypothesis Testing were the number of cases tested or collected is fixed at the beginning of
the experiment. In Classical Hypothesis Testing the data collection is executed without analysis and
consideration of the data. After all data is collected the analysis is done and conclusions are drawn.
However, in Sequential Analysis every case is analyzed directly after being collected, the data collected
upto that moment is then compared with certain threshold values, incorporating the new information
obtained from the freshly collected case. This approach allows one to draw conclusions during the data
collection, and a final conclusion can possibly be reached at a much earlier stage as is the case in Classical
Hypothesis Testing. The advantages of Sequential Analysis are easy to see. As data collection can be
terminated after fewer cases and decisions taken earlier, the savings in terms of human life and misery, and
financial savings, might be considerable.
In the analysis of software failure data we often deal with either Time Between Failures or failure count in a
given time interval. If it is further assumed that the average number of recorded failures in a given time
interval is directly proportional to the length of the interval and the random number of failure occurrences
in the interval is explained by a Poisson process then we know that the probability equation of the
stochastic process representing the failure occurrences is given by a homogeneous poisson process with the
expression

                                                         e  t  t 
                                                                         n

                                       P  N t   n 
                                                                                                         (1.1)
                                                                n!

                                                       86
Computer Engineering and Intelligent Systems                                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

(Stieber 1997) observes that if classical testing strategies are used, the application of software reliability
growth models may be difficult and reliability predictions can be misleading. However, he observes that
statistical methods can be successfully applied to the failure data. He demonstrated his observation by
applying the well-known sequential probability ratio test of (Wald 1947) for a software failure data to detect
unreliable software components and compare the reliability of different software versions. In this paper we
consider popular SRGM Weibull model and adopt the principle of Stieber in detecting unreliable software
components in order to accept or reject the developed software. The theory proposed by Stieber is presented
in Section 2 for a ready reference. Extension of this theory to the SRGM – Weibull is presented in Section 3.
Maximum Likelihood parameter estimation method is presented in Section 4. Application of the decision
rule to detect unreliable software components with respect to the proposed SRGM is given in Section 5.
2. Wald's Sequential Test for a Poisson Process
The sequential probability ratio test was developed by A.Wald at Columbia University in 1943. Due to its
usefulness in development work on military and naval equipment it was classified as ‘Restricted’ by the
Espionage Act (Wald 1947). A big advantage of sequential tests is that they require fewer observations
(time) on the average than fixed sample size tests. SPRTs are widely used for statistical quality control in
manufacturing processes. An SPRT for homogeneous Poisson processes is described below.
Let {N(t),t 0} be a homogeneous Poisson process with rate ‘’. In our case, N(t) = number of failures up
to time ‘t’ and ‘’ is the failure rate (failures per unit time ). Suppose that we put a system on test (for
example a software system, where testing is done according to a usage profile and no faults are corrected)
and that we want to estimate its failure rate ‘’. We can not expect to estimate ‘’ precisely. But we want
to reject the system with a high probability if our data suggest that the failure rate is larger than 1 and
accept it with a high probability, if it’s smaller than 0. As always with statistical tests, there is some risk to
get the wrong answers. So we have to specify two (small) numbers ‘α’ and ‘β’, where ‘α’ is the probability
of falsely rejecting the system. That is rejecting the system even if λ ≤ 0. This is the "producer’s" risk. β is
the probability of falsely accepting the system .That is accepting the system even if λ ≥ 1. This is the
“consumer’s” risk. With specified choices of 0 and 1 such that 0 < 0 < 1, the probability of finding N(t)
failures in the time span (0,t ) with 1,0 as the failure rates are respectively given by
                                                                N t 
                                                e 1t  1t 
                                             P
                                             1                                                                        (2.1)
                                                     N (t )!
                                                                   N t 
                                                  e 0t  0t 
                                             P0                                                                      (2.2)
                                                       N (t )!
The ratio P at any time ’t’ is considered as a measure of deciding the truth towards
           1                                                                                             0   or 1 , given a
          P0
sequence of time instants say                    t1  t2  t3  ........  t K         and the corresponding realizations

N (t1 ), N (t2 ),........N (tK )            of         N(t).                Simplification         of            P1    gives
                                                                                                                 P0
                                   N t 
P                      
 1
    exp(0  1 )t   1 
P0                     0 

The decision rule of SPRT is to decide in favor of               1 , in favor of 0         or to continue by observing the

number of failures at a later time than 't' according as P is greater than or equal to a constant say A, less
                                                          1
                                                         P0
than   or equal to a constant say B or in between the constants                       A and B. That is, we decide the given

                                                                87
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

software product as unreliable, reliable or continue (Satyaprasad 2007) the test process with one more
observation in failure data, according as

                                                P1
                                                   A                                                   (2.3)
                                                P0

                                                P1
                                                   B                                                   (2.4)
                                                P0

                                                     P
                                                B    1
                                                        A                                              (2.5)
                                                     P0

                                                                       1            
The approximate values of the constants A and B are taken as A               , B
                                                                                    1
Where ‘  ’ and ‘  ’ are the risk probabilities as defined earlier. A simplified version of the above decision
processes is to reject the system as unreliable if N(t) falls for the first time above the
line NU  t   a.t  b2                                                                               (2.6)
To accept the system to be reliable if N(t) falls for the first time below the line

N L  t   a.t  b1                                                                                   (2.7)

To continue the test with one more observation on (t, N(t)) as the random graph of [t, N(t)] is between the
two linear boundaries given by equations (2.6) and (2.7) where
                                                 1  0
                                        a                                                             (2.8)
                                                     
                                                log  1 
                                                     0 

                                                 1   
                                             log         
                                        b1                                                         (2.9)
                                                    
                                              log  1 
                                                    0 

                                                 1   
                                             log 
                                        b2                                                        (2.10)
                                                    
                                              log  1 
                                                    0 
The parameters     ,  , 0 and 1   can be chosen in several ways. One way suggested by Stieber is
       .log  q                 .log  q                      1
0                      1  q                 where q 
         q 1        ,              q 1                          0
If λ0 and λ1 are chosen in this way, the slope of NU (t) and NL (t) equals λ. The other two ways of choosing
λ0 and λ1 are from past projects (for a comparison of the projects) and from part of the data to compare the
reliability of different functional areas (components).

                                                             88
Computer Engineering and Intelligent Systems                                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3




3. Sequential Test for Software Reliability Growth Models
In Section 2,         for the             Poisson process we know that                   the expected value of N(t) = λt called the average
number of failures experienced in time 't' .This is also called the mean value function of the Poisson process.
On the other hand if we consider a Poisson process with a general function (not necessarily linear) m(t) as
its mean value function the probability equation of a such a process is

                          m(t )
                                          y

P  N (t )  Y                              .e m (t ) , y  0,1, 2,    
                                  y!
Depending on the forms of m(t) we get various                             Poisson processes called NHPP. For our Rayleigh model

the mean value function is given as m  t   a 1  ebt                          
                                                                                 2
                                                                                         where a  0, b  0 .

We may write

   e m1 (t ) . m1 (t )
                                   N (t )

P
1
              N (t )!

     e m0 (t ) . m0 (t )
                                    N (t )

P0 
                N (t )!

Where, m1 (t ) , m0 (t ) are values of the mean value function at specified sets of its parameters indicating


reliable software and unreliable software respectively. Let                                    P0 , P1   be values of the NHPP at two


specifications of b say                       b0 , b1 where  b0  b1  respectively. It can be shown that for our models

m  t  at b1 is greater than that at b0 . Symbolically m0  t   m1  t  . Then the SPRT procedure is as follows:


                                                         P
Accept the system to be reliable if                       1
                                                            B
                                                         P0

        e m1 (t ) . m1 (t )
                                 N (t )

i.e.,                                     B
        e m0 (t ) . m0 (t )
                                 N (t )




                     
               log         m1 (t )  m0 (t )
i.e., N (t ) 
                    1                                                                                                         (3.1)
                  log m1 (t )  log m0 (t )


                                                                            89
Computer Engineering and Intelligent Systems                                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3


                                                          P
Decide the system to be unreliable and reject if           1
                                                             A
                                                          P0

                    1  
               log         m1 (t )  m0 (t )
i.e., N (t ) 
                                                                                                                      (3.2)
                  log m1 (t )  log m0 (t )
Continue the test procedure as long as

                                              1  
log         m1 (t )  m0 (t )            log         m1 (t )  m0 (t )
     1                        N (t )                                                                            (3.3)
   log m1 (t )  log m0 (t )                   log m1 (t )  log m0 (t )
Substituting the appropriate expressions of the respective mean value function – m(t) of Rayleigh we get
the respective decision rules and are given in followings lines
Acceptance region:
                                  
                                                   
                                                  b0 t 
                                                                e  b1t        
                                                           2                  2
                            log      a e                                                                              (3.4)
                   N (t )       1 
                                         1  e  b1t        
                                                         2


                                    log                       
                                         1  e  b0t 2      
                                                              
Rejection region:
                                 1  
                                                   
                                          a e  0   e  b1t                  
                                                          2       2
                                                  b t
                            log 
                                    
                                                                                                                         (3.5)
                   N (t ) 
                                          1  e  b1t  
                                                         2


                                    log                    
                                          1  e  b0t 2 
                                                           
Continuation region:

      
                     
                     b0t 
                                e  b1t                   1            b0t 
                                                                                         e  b1t      
                             2              2                                          2              2
log      a e                                          log       a e
     1                                     N t                                                                (3.6)
             1  e  b1t                                           1  e  b1t  
                            2                                                         2


        log                                                    log                    
             1  e  b0t 2                                         1  e b0t 2 
                                                                                      


It may be noted that in the above model the decision rules are exclusively based on the strength of the

sequential procedure (, ) and the values of the respective mean value functions namely,                        m0 (t ) , m1 (t ) .
If the mean value function is linear in ‘t’ passing through origin, that is, m(t) = λt                        the decision rules
become decision lines as described by (Stieber 1997). In that sense equations (3.1), (3.2) , (3.3) can be
regarded as generalizations to the decision procedure of                      Stieber. The applications of these results for live
software failure data are presented with analysis in Section 5.
4. ML (Maximum Likelihood) Parameter Estimation
Parameter estimation is of primary importance in software reliability prediction. Once the analytical
                                                                   90
Computer Engineering and Intelligent Systems                                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3


solution for m  t  is known for a given model, parameter estimation is achieved by applying a technique

of Maximum Likelihood Estimate (MLE). Depending on the format in which test data are available, two
different approaches are frequently used. A set of failure data is usually collected in one of two common
ways, time domain data and interval domain data.

The idea behind maximum likelihood parameter estimation is to determine the parameters that maximize
the probability (likelihood) of the sample data. The method of maximum likelihood is considered to be
more robust (with some exceptions) and yields estimators with good statistical properties. In other words,
MLE methods are versatile and apply to many models and to different types of data. Although the
methodology for maximum likelihood estimation is simple, the implementation is mathematically intense.
Using today's computer power, however, mathematical complexity is not a big obstacle.                        Assuming that
the data are given for the cumulative number of detected errors yi in a given time-interval (0,ti) where i =
1,2, …, n. and 0 < t1 < t2 <…< tn then the log likelihood function (LLF) takes on the following form.

                                                               n
Likely hood function by using λ(t) is:                  L =   (ti )
                                                              i 1



The logarithmic likelihood function for interval domain data (Pham 2006) is given by:

           n
Log L =    y
          i 1
                 i    yi 1  .log  m(ti )  m  ti 1   m(tn )
                                                         


The maximum likelihood estimators (MLE) of 1 ,2 ,                         ,k are obtained by maximizing L or  , where
 is ln L . By maximizing  , which is much easier to work with than L, the maximum likelihood

                                                                                                     
estimators of 1 ,2 ,        ,k are the simultaneous solutions of k equations such that:                   0 , j=1,2,…,k
                                                                                                      j

The parameters ‘a’ and ‘b’ are estimated using iterative Newton Raphson Method, which is given as

                 g ( xn )
x n 1  x n 
                 g ' ( xn ) .
5. SPRT Analysis of Live Data Sets
We see that the developed SPRT methodology is for a software failure data which is of the form [t, N(t)]
where N(t) is the failure number of software system or its sub system in ‘t’ units of time. In this section we
evaluate the decision rules based on the considered mean value function for Five different data sets of the
above form, borrowed from (Pham 2006), (Pham 2007), (Ohba 1984a), (Misra 1983). Based on the
estimates of the parameter ‘b’ in each mean value function, we have chosen the specifications of
b0  b   , b1  b   equidistant on either side of estimate of b obtained through a data set to apply SPRT
such that b0 < b < b1. Assuming the value of   0.125 , the estimates are given in the following table.




                                                                       91
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3




Table 1: Estimates of a,b & Specifications of b0, b1
   Data Set          Estimate of ‘a’        Estimate of ‘b’                      b0                  b1
     DS 1              44.88134                0.070928                   -0.054072               0.195928
     DS 2              28.129276               0.070566                   -0.054434               0.195566
     DS 3              81.026164               0.040014                   -0.084986               0.165014
     DS 4              54.765902               0.062527                   -0.062473               0.187527
     DS 5             164.246019               0.036012                   -0.088988               0.161012



Using the selected b0 , b1        and subsequently the        m0 (t ), m1 (t )     for the model, we calculated the

decision rules given by Equations 3.1, 3.2, sequentially at each ‘t’ of the data sets taking the strength ( α, β )
as (0.05, 0.2). These are presented for the model in Tables 2.
Table 2: SPRT analysis for 5 data sets
                                   R.H.S of equation (3.4)            R.H.S of Equation (3.5)
   Data Set     T       N(t)                                                                          Decision
                                   Acceptance region (≤)                Rejection Region(≥)
     DS 1        1       3              0.000412292                              1.67079809               Reject
                 1       1              -0.2274684                               1.45403022
     DS 2        2       1              0.798963147                              2.44603498            Accept
                 3       2               2.1655486                               3.75685608
     DS 3        1       6              0.026389907                              3.26524210               Reject
                 1       2              0.054639651                              2.01065464
     DS 4        2       3              2.113395933                              4.02819412            Accept
                 3       4              4.869322753                              6.71755071
     DS 5        1       9              1.129459108                              4.75355492               Reject


From the above table we see that a decision either to accept or reject the system is reached much in advance
of the last time instant of the data.
6. Conclusion
The table 2 shows that Weibull model as exemplified for 5 Data Sets indicate that the model is performing
well in arriving at a decision. Out of 5 Data Sets the procedure applied on the model has given a decision of
rejection for 3, acceptance for 2 and continue for none at various time instants of the data as follows. DS1,
DS3 and DS5 are rejected at 1st instant of time. DS2 and DS4 are accepted at 3 rd instant of time. Therefore,

                                                       92
Computer Engineering and Intelligent Systems                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

we may conclude that, applying SPRT on data sets we can come to an early conclusion of reliable /
unreliable of software.
References
Misra, P. (1983). "Software Reliability Analysis," IBM Systems Journal, vol. 22, pp. 262–270.
Ohba, M. (1984a), “Inflection S-shaped software reliability growth models”, Stochastic Models in
Reliability Theory (Osaki,S.and Hatoyama, Y. Editors), pp. 144-162, Springer Verlag Merlin.
Pham, H. (2007). “An Imperfect-debugging Fault-detection Dependent-parameter Software”, International
Journal of Automation and Computing, 04(4), October, 325-328, DOI: 10.1007/s11633-007-0325-8.
Pham. H., (2006). “System software reliability”, Springer.
Satya Prasad, R., (2007). ”Half logistic Software reliability growth model “, Ph.D Thesis of ANU, India.
Stieber, H.A. (1997). “Statistical Quality Control: How To Detect Unreliable Software Components”,
Proceedings the 8th International Symposium on Software Reliability Engineering, 8-12.
Wald. A., (1947). “Sequential Analysis”, John Wiley and Son, Inc, New York.
Wood, A. (1996). “Predicting Software Reliability”, IEEE Computer, 2253-2264.


Author Profile:
First Author:
                Mr. G. Krishna Mohan is working as a Reader in the Department of Computer         Science,
                P.B.Siddhartha College, Vijayawada. He obtained his M.C.A degree from             Acharya
                Nagarjuna University in 2000, M.Tech from JNTU, Kakinada, M.Phil from             Madurai
                Kamaraj University and pursuing Ph.D at Acharya Nagarjuna University. His         research
                interests lies in Data Mining and Software Engineering.


Second Author:
                Dr. R. Satya Prasad received Ph.D. degree in Computer Science in the faculty of
               Engineering in 2007 from Acharya Nagarjuna University, Andhra Pradesh. He received
               gold medal from Acharya Nagarjuna University for his outstanding performance in Masters
               Degree. He is currently working as Associate Professor and H.O.D, in the Department of
               Computer Science & Engineering, Acharya Nagarjuna University. His current research is
focused on Software Engineering. He has published several papers in National & International Journals.




                                                    93

More Related Content

Similar to 8 krishna mohan gonuguntla 86--93

Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...IAEME Publication
 
Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...IAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Pareto Type II Based Software Reliability Growth Model
Pareto Type II Based Software Reliability Growth ModelPareto Type II Based Software Reliability Growth Model
Pareto Type II Based Software Reliability Growth ModelWaqas Tariq
 
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...IJCSEA Journal
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Alexander Decker
 
Basic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusBasic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusNANDINI SHARMA
 
SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithmsijseajournal
 
01 - Analysis of Efficiency.pptx
01 - Analysis of Efficiency.pptx01 - Analysis of Efficiency.pptx
01 - Analysis of Efficiency.pptxIshtiaq Rasool Khan
 
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Cemal Ardil
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...ijtsrd
 
A Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierA Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierCSCJournals
 
Lecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdf
Lecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdfLecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdf
Lecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdfssuserb4d806
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
Psteceql a novel event query language
Psteceql a novel event query languagePsteceql a novel event query language
Psteceql a novel event query languageijfcstjournal
 
Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Deepak John
 
17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)IAESIJEECS
 

Similar to 8 krishna mohan gonuguntla 86--93 (20)

Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...
 
Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...Cognitive radio spectrum sensing and performance evaluation of energy detecto...
Cognitive radio spectrum sensing and performance evaluation of energy detecto...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Pareto Type II Based Software Reliability Growth Model
Pareto Type II Based Software Reliability Growth ModelPareto Type II Based Software Reliability Growth Model
Pareto Type II Based Software Reliability Growth Model
 
S1140183 Presentation
S1140183 PresentationS1140183 Presentation
S1140183 Presentation
 
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
 
HPC_NIST_SHA3
HPC_NIST_SHA3HPC_NIST_SHA3
HPC_NIST_SHA3
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
 
Basic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusBasic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV Syllabus
 
SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithms
 
01 - Analysis of Efficiency.pptx
01 - Analysis of Efficiency.pptx01 - Analysis of Efficiency.pptx
01 - Analysis of Efficiency.pptx
 
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
Bip based-alarm-declaration-and-clearing-in-sonet-networks-employing-automati...
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
9.venkata naga vamsi. a
9.venkata naga vamsi. a9.venkata naga vamsi. a
9.venkata naga vamsi. a
 
A Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target ClassifierA Non Parametric Estimation Based Underwater Target Classifier
A Non Parametric Estimation Based Underwater Target Classifier
 
Lecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdf
Lecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdfLecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdf
Lecture06-Arithmetic Code-2-Algorithm Implementation-P2.pdf
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
Psteceql a novel event query language
Psteceql a novel event query languagePsteceql a novel event query language
Psteceql a novel event query language
 
Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1
 
17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

8 krishna mohan gonuguntla 86--93

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Detection of Reliable Software Using SPRT on Interval Domain Data Krishna Mohan Gonuguntla Reader, Dept. of Computer Science, P.B.Siddhartha college Vijayawada, Andhrapradesh, India. Tel: 91-9440446847 E-mail: km_mm_2000@yahoo.com Satya Prasad Ravi Associate Professor, Dept. of Computer Science & Engg., Acharya Nagrjuna University Nagarjuna Nagar, Guntur, Andhrapradesh, India Tel: 91-9848487478 E-mail: profrsp@gmail.com Abstract In Classical Hypothesis testing volumes of data is to be collected and then the conclusions are drawn which may take more time. But, Sequential Analysis of statistical science could be adopted in order to decide upon the reliable / unreliable of the developed software very quickly. The procedure adopted for this is, Sequential Probability Ratio Test (SPRT). In the present paper we proposed the performance of SPRT on Interval domain data using Weibull model and analyzed the results by applying on 5 data sets. The parameters are estimated using Maximum Likelihood Estimation. Keywords: Weibull model, Sequential Probability Ratio Test, Maximum Likelihood Estimation, Decision lines, Software Reliability, Interval domain data. 1. Introduction Wald's procedure is particularly relevant if the data is collected sequentially. Sequential Analysis is different from Classical Hypothesis Testing were the number of cases tested or collected is fixed at the beginning of the experiment. In Classical Hypothesis Testing the data collection is executed without analysis and consideration of the data. After all data is collected the analysis is done and conclusions are drawn. However, in Sequential Analysis every case is analyzed directly after being collected, the data collected upto that moment is then compared with certain threshold values, incorporating the new information obtained from the freshly collected case. This approach allows one to draw conclusions during the data collection, and a final conclusion can possibly be reached at a much earlier stage as is the case in Classical Hypothesis Testing. The advantages of Sequential Analysis are easy to see. As data collection can be terminated after fewer cases and decisions taken earlier, the savings in terms of human life and misery, and financial savings, might be considerable. In the analysis of software failure data we often deal with either Time Between Failures or failure count in a given time interval. If it is further assumed that the average number of recorded failures in a given time interval is directly proportional to the length of the interval and the random number of failure occurrences in the interval is explained by a Poisson process then we know that the probability equation of the stochastic process representing the failure occurrences is given by a homogeneous poisson process with the expression e  t  t  n P  N t   n    (1.1) n! 86
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 (Stieber 1997) observes that if classical testing strategies are used, the application of software reliability growth models may be difficult and reliability predictions can be misleading. However, he observes that statistical methods can be successfully applied to the failure data. He demonstrated his observation by applying the well-known sequential probability ratio test of (Wald 1947) for a software failure data to detect unreliable software components and compare the reliability of different software versions. In this paper we consider popular SRGM Weibull model and adopt the principle of Stieber in detecting unreliable software components in order to accept or reject the developed software. The theory proposed by Stieber is presented in Section 2 for a ready reference. Extension of this theory to the SRGM – Weibull is presented in Section 3. Maximum Likelihood parameter estimation method is presented in Section 4. Application of the decision rule to detect unreliable software components with respect to the proposed SRGM is given in Section 5. 2. Wald's Sequential Test for a Poisson Process The sequential probability ratio test was developed by A.Wald at Columbia University in 1943. Due to its usefulness in development work on military and naval equipment it was classified as ‘Restricted’ by the Espionage Act (Wald 1947). A big advantage of sequential tests is that they require fewer observations (time) on the average than fixed sample size tests. SPRTs are widely used for statistical quality control in manufacturing processes. An SPRT for homogeneous Poisson processes is described below. Let {N(t),t 0} be a homogeneous Poisson process with rate ‘’. In our case, N(t) = number of failures up to time ‘t’ and ‘’ is the failure rate (failures per unit time ). Suppose that we put a system on test (for example a software system, where testing is done according to a usage profile and no faults are corrected) and that we want to estimate its failure rate ‘’. We can not expect to estimate ‘’ precisely. But we want to reject the system with a high probability if our data suggest that the failure rate is larger than 1 and accept it with a high probability, if it’s smaller than 0. As always with statistical tests, there is some risk to get the wrong answers. So we have to specify two (small) numbers ‘α’ and ‘β’, where ‘α’ is the probability of falsely rejecting the system. That is rejecting the system even if λ ≤ 0. This is the "producer’s" risk. β is the probability of falsely accepting the system .That is accepting the system even if λ ≥ 1. This is the “consumer’s” risk. With specified choices of 0 and 1 such that 0 < 0 < 1, the probability of finding N(t) failures in the time span (0,t ) with 1,0 as the failure rates are respectively given by N t  e 1t  1t  P 1 (2.1) N (t )! N t  e 0t  0t  P0  (2.2) N (t )! The ratio P at any time ’t’ is considered as a measure of deciding the truth towards 1 0 or 1 , given a P0 sequence of time instants say t1  t2  t3  ........  t K and the corresponding realizations N (t1 ), N (t2 ),........N (tK ) of N(t). Simplification of P1 gives P0 N t  P   1  exp(0  1 )t   1  P0  0  The decision rule of SPRT is to decide in favor of 1 , in favor of 0 or to continue by observing the number of failures at a later time than 't' according as P is greater than or equal to a constant say A, less 1 P0 than or equal to a constant say B or in between the constants A and B. That is, we decide the given 87
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 software product as unreliable, reliable or continue (Satyaprasad 2007) the test process with one more observation in failure data, according as P1 A (2.3) P0 P1 B (2.4) P0 P B 1 A (2.5) P0 1   The approximate values of the constants A and B are taken as A  , B  1 Where ‘  ’ and ‘  ’ are the risk probabilities as defined earlier. A simplified version of the above decision processes is to reject the system as unreliable if N(t) falls for the first time above the line NU  t   a.t  b2 (2.6) To accept the system to be reliable if N(t) falls for the first time below the line N L  t   a.t  b1 (2.7) To continue the test with one more observation on (t, N(t)) as the random graph of [t, N(t)] is between the two linear boundaries given by equations (2.6) and (2.7) where 1  0 a (2.8)   log  1   0  1    log   b1     (2.9)   log  1   0  1    log  b2      (2.10)   log  1   0  The parameters  ,  , 0 and 1 can be chosen in several ways. One way suggested by Stieber is .log  q  .log  q  1 0  1  q where q  q 1 , q 1 0 If λ0 and λ1 are chosen in this way, the slope of NU (t) and NL (t) equals λ. The other two ways of choosing λ0 and λ1 are from past projects (for a comparison of the projects) and from part of the data to compare the reliability of different functional areas (components). 88
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 3. Sequential Test for Software Reliability Growth Models In Section 2, for the Poisson process we know that the expected value of N(t) = λt called the average number of failures experienced in time 't' .This is also called the mean value function of the Poisson process. On the other hand if we consider a Poisson process with a general function (not necessarily linear) m(t) as its mean value function the probability equation of a such a process is  m(t ) y P  N (t )  Y   .e m (t ) , y  0,1, 2,     y! Depending on the forms of m(t) we get various Poisson processes called NHPP. For our Rayleigh model the mean value function is given as m  t   a 1  ebt    2 where a  0, b  0 . We may write e m1 (t ) . m1 (t ) N (t ) P 1 N (t )! e m0 (t ) . m0 (t ) N (t ) P0  N (t )! Where, m1 (t ) , m0 (t ) are values of the mean value function at specified sets of its parameters indicating reliable software and unreliable software respectively. Let P0 , P1 be values of the NHPP at two specifications of b say b0 , b1 where  b0  b1  respectively. It can be shown that for our models m  t  at b1 is greater than that at b0 . Symbolically m0  t   m1  t  . Then the SPRT procedure is as follows: P Accept the system to be reliable if 1 B P0 e m1 (t ) . m1 (t ) N (t ) i.e., B e m0 (t ) . m0 (t ) N (t )    log    m1 (t )  m0 (t ) i.e., N (t )   1  (3.1) log m1 (t )  log m0 (t ) 89
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 P Decide the system to be unreliable and reject if 1 A P0  1   log    m1 (t )  m0 (t ) i.e., N (t )     (3.2) log m1 (t )  log m0 (t ) Continue the test procedure as long as     1   log    m1 (t )  m0 (t ) log    m1 (t )  m0 (t )  1   N (t )     (3.3) log m1 (t )  log m0 (t ) log m1 (t )  log m0 (t ) Substituting the appropriate expressions of the respective mean value function – m(t) of Rayleigh we get the respective decision rules and are given in followings lines Acceptance region:       b0 t   e  b1t   2 2 log  a e (3.4) N (t )   1   1  e  b1t   2 log    1  e  b0t 2    Rejection region:  1     a e  0   e  b1t   2 2  b t log      (3.5) N (t )   1  e  b1t   2 log    1  e  b0t 2    Continuation region:      b0t   e  b1t   1    b0t    e  b1t   2 2 2 2 log  a e log  a e  1   N t      (3.6)  1  e  b1t    1  e  b1t   2 2 log   log    1  e  b0t 2   1  e b0t 2      It may be noted that in the above model the decision rules are exclusively based on the strength of the sequential procedure (, ) and the values of the respective mean value functions namely, m0 (t ) , m1 (t ) . If the mean value function is linear in ‘t’ passing through origin, that is, m(t) = λt the decision rules become decision lines as described by (Stieber 1997). In that sense equations (3.1), (3.2) , (3.3) can be regarded as generalizations to the decision procedure of Stieber. The applications of these results for live software failure data are presented with analysis in Section 5. 4. ML (Maximum Likelihood) Parameter Estimation Parameter estimation is of primary importance in software reliability prediction. Once the analytical 90
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 solution for m  t  is known for a given model, parameter estimation is achieved by applying a technique of Maximum Likelihood Estimate (MLE). Depending on the format in which test data are available, two different approaches are frequently used. A set of failure data is usually collected in one of two common ways, time domain data and interval domain data. The idea behind maximum likelihood parameter estimation is to determine the parameters that maximize the probability (likelihood) of the sample data. The method of maximum likelihood is considered to be more robust (with some exceptions) and yields estimators with good statistical properties. In other words, MLE methods are versatile and apply to many models and to different types of data. Although the methodology for maximum likelihood estimation is simple, the implementation is mathematically intense. Using today's computer power, however, mathematical complexity is not a big obstacle. Assuming that the data are given for the cumulative number of detected errors yi in a given time-interval (0,ti) where i = 1,2, …, n. and 0 < t1 < t2 <…< tn then the log likelihood function (LLF) takes on the following form. n Likely hood function by using λ(t) is: L =   (ti ) i 1 The logarithmic likelihood function for interval domain data (Pham 2006) is given by: n Log L =  y i 1 i  yi 1  .log  m(ti )  m  ti 1   m(tn )   The maximum likelihood estimators (MLE) of 1 ,2 , ,k are obtained by maximizing L or  , where  is ln L . By maximizing  , which is much easier to work with than L, the maximum likelihood   estimators of 1 ,2 , ,k are the simultaneous solutions of k equations such that:  0 , j=1,2,…,k  j The parameters ‘a’ and ‘b’ are estimated using iterative Newton Raphson Method, which is given as g ( xn ) x n 1  x n  g ' ( xn ) . 5. SPRT Analysis of Live Data Sets We see that the developed SPRT methodology is for a software failure data which is of the form [t, N(t)] where N(t) is the failure number of software system or its sub system in ‘t’ units of time. In this section we evaluate the decision rules based on the considered mean value function for Five different data sets of the above form, borrowed from (Pham 2006), (Pham 2007), (Ohba 1984a), (Misra 1983). Based on the estimates of the parameter ‘b’ in each mean value function, we have chosen the specifications of b0  b   , b1  b   equidistant on either side of estimate of b obtained through a data set to apply SPRT such that b0 < b < b1. Assuming the value of   0.125 , the estimates are given in the following table. 91
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Table 1: Estimates of a,b & Specifications of b0, b1 Data Set Estimate of ‘a’ Estimate of ‘b’ b0 b1 DS 1 44.88134 0.070928 -0.054072 0.195928 DS 2 28.129276 0.070566 -0.054434 0.195566 DS 3 81.026164 0.040014 -0.084986 0.165014 DS 4 54.765902 0.062527 -0.062473 0.187527 DS 5 164.246019 0.036012 -0.088988 0.161012 Using the selected b0 , b1 and subsequently the m0 (t ), m1 (t ) for the model, we calculated the decision rules given by Equations 3.1, 3.2, sequentially at each ‘t’ of the data sets taking the strength ( α, β ) as (0.05, 0.2). These are presented for the model in Tables 2. Table 2: SPRT analysis for 5 data sets R.H.S of equation (3.4) R.H.S of Equation (3.5) Data Set T N(t) Decision Acceptance region (≤) Rejection Region(≥) DS 1 1 3 0.000412292 1.67079809 Reject 1 1 -0.2274684 1.45403022 DS 2 2 1 0.798963147 2.44603498 Accept 3 2 2.1655486 3.75685608 DS 3 1 6 0.026389907 3.26524210 Reject 1 2 0.054639651 2.01065464 DS 4 2 3 2.113395933 4.02819412 Accept 3 4 4.869322753 6.71755071 DS 5 1 9 1.129459108 4.75355492 Reject From the above table we see that a decision either to accept or reject the system is reached much in advance of the last time instant of the data. 6. Conclusion The table 2 shows that Weibull model as exemplified for 5 Data Sets indicate that the model is performing well in arriving at a decision. Out of 5 Data Sets the procedure applied on the model has given a decision of rejection for 3, acceptance for 2 and continue for none at various time instants of the data as follows. DS1, DS3 and DS5 are rejected at 1st instant of time. DS2 and DS4 are accepted at 3 rd instant of time. Therefore, 92
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 we may conclude that, applying SPRT on data sets we can come to an early conclusion of reliable / unreliable of software. References Misra, P. (1983). "Software Reliability Analysis," IBM Systems Journal, vol. 22, pp. 262–270. Ohba, M. (1984a), “Inflection S-shaped software reliability growth models”, Stochastic Models in Reliability Theory (Osaki,S.and Hatoyama, Y. Editors), pp. 144-162, Springer Verlag Merlin. Pham, H. (2007). “An Imperfect-debugging Fault-detection Dependent-parameter Software”, International Journal of Automation and Computing, 04(4), October, 325-328, DOI: 10.1007/s11633-007-0325-8. Pham. H., (2006). “System software reliability”, Springer. Satya Prasad, R., (2007). ”Half logistic Software reliability growth model “, Ph.D Thesis of ANU, India. Stieber, H.A. (1997). “Statistical Quality Control: How To Detect Unreliable Software Components”, Proceedings the 8th International Symposium on Software Reliability Engineering, 8-12. Wald. A., (1947). “Sequential Analysis”, John Wiley and Son, Inc, New York. Wood, A. (1996). “Predicting Software Reliability”, IEEE Computer, 2253-2264. Author Profile: First Author: Mr. G. Krishna Mohan is working as a Reader in the Department of Computer Science, P.B.Siddhartha College, Vijayawada. He obtained his M.C.A degree from Acharya Nagarjuna University in 2000, M.Tech from JNTU, Kakinada, M.Phil from Madurai Kamaraj University and pursuing Ph.D at Acharya Nagarjuna University. His research interests lies in Data Mining and Software Engineering. Second Author: Dr. R. Satya Prasad received Ph.D. degree in Computer Science in the faculty of Engineering in 2007 from Acharya Nagarjuna University, Andhra Pradesh. He received gold medal from Acharya Nagarjuna University for his outstanding performance in Masters Degree. He is currently working as Associate Professor and H.O.D, in the Department of Computer Science & Engineering, Acharya Nagarjuna University. His current research is focused on Software Engineering. He has published several papers in National & International Journals. 93