SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. IV (Jan – Feb. 2015), PP 49-54
www.iosrjournals.org
DOI: 10.9790/0661-17144954 www.iosrjournals.org 49 | Page
Burr Type III Software Reliability Growth Model
Ch.Smitha Chowdary1
, Dr.R.Satya Prasad2
, K.Sobhana3
1
Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam,
Andhra Pradesh. INDIA-521001
2
Associate Professor, Dept. of Computer Science & Engineering Acharya Nagarjuna University,
Nagarjuna Nagar- INDIA-522510
3
Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam,
Andhra Pradesh. INDIA-521001
Abstract : Software Reliability Growth Model (SRGM) is used to assess software reliability quantitatively for
tracking and measuring the growth of reliability. The potentiality of SRGM is judged by its capability to fit the
software failure data. In this paper we propose Burr type III software reliability growth model based on Non
Homogeneous Poisson Process (NHPP) with time domain data. The Maximum Likelihood (ML) estimation
method is used for finding unknown parameters in the model on ungrouped data. How good does a
mathematical model fit to the data is also being calculated. To assess the performance of the considered SRGM,
we have carried out the parameter estimation on real software failure data sets. We also present an analysis of
goodness of fit and reliability for given failure data sets.
Keywords: Burr type III, Goodness of fit, NHPP, ML estimation, Software Reliability, Time domain data.
I. Introduction
Software reliability is the probability of failure-free operation of software in a specified environment
during specified duration [1][2][3]. Over the decades, different statistical models have been discussed for
assessing the software reliability where Wood (1996), Pham (2005), Goel & Okumoto (1979), Satya Prasad
(2007) and Satya Prasad & Geetha Rani (2011) are some examples [4][5][6][7][8]. The models applicable for
the assessment of software reliability are called Software Reliability Growth Models (SRGMs). SRGM is a
mathematical model of how software reliability improves as faults are detected and repaired [9]. One of the
important classes of SRGM that has been studied widely is Non Homogeneous Poisson Process (NHPP), which
forms one of the main classes of the existing SRGMs due to its mathematical traceability and wide applicability.
The NHPP based software reliability growth models have been proved quite successful in practical software
reliability engineering [3].
Software reliability can be estimated after the determination of the mean value function. To determine
this mean value function, model parameters can be estimated by using Maximum Likelihood Estimation (MLE).
These Parameter values can be obtained by using Newton-Raphson Method.
The success of mathematical modeling approach to reliability evaluation heavily depends upon quality
of failure data collected and its goodness of fit. If the selected model does not fit relatively well into the
collected software testing data, we may expect a low prediction ability of this model and the decision makings
based on the analysis of this model may be far from what is considered to be optimal decision [10].
This paper presents Burr type III model to analyze the reliability of a software system using time
domain data. The layout of the paper is as follows: Section 2 gives the details of formulation and interpretation
of the model for the underlying NHPP. Section 3 describes the background of Burr type III model. Section 4
discusses parameter estimation of Burr type III model based on time domain data. Section 5 describes the
techniques used for software failure data analysis for live data. Section 6 gives the performance analysis of the
presented model and Section 7 contains the conclusion.
II. NHPP Model
Software reliability models can be classified according to probabilistic assumptions based on the type
of failure process. First one is, when a Markov process represents the failure process, the resultant model is
Markovian Model. Second one is fault counting model that describes the failure phenomenon by stochastic
process like Homogeneous Poisson Process (HPP), Non Homogeneous Poisson Process (NHPP) and Compound
Poisson Process (CPP) etc. Most of the failure count models are based upon NHPP and are described in the
following lines.
A software system is subject to failures at random times which are caused by errors present in the
system. Suppose {N(t), t >0} is a counting process, then the cumulative number of failures are represented by
time „t‟. As there were no failures at t=0 we have
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 50 | Page
N(0) = 0
The assumption is, that the number of software failures during non overlapping time intervals will not
affect each other. In other way, for any finite collection of times t1<t2<…. <tn the „n‟ random variables N(t1),
{N(t2)-N(t1)}, ….. {N(tn) - N(tn-1)} are independent. This implies that the counting process {N(t), t>0} has
independent increments. Suppose m(t) represents the expected number of software failures by time „t‟, then the
expected number of errors remaining in the system at any time is finite, hence m(t) is a bounded, non decreasing
function of „t‟ with the following boundary conditions.









ta
t
tm
,
0,0
)(
Here the above mentioned „a‟ is meant for expected number of software errors to be eventually
detected. Let N(t) be known to have a Poisson probability mass function with parameters m(t) i.e.
      )(
!
tm
n
e
n
tm
ntNP 
 , n=0, 1, 2,…∞
Then the stochastic behavior of software failure phenomenon can be described through the N(t) process. In this
paper we consider m(t) as given by
   bc
tatm

 1 ---------------- (2.1)
Where [m(t)/a] is the cumulative distribution function of Burr type III distribution for the present
choice.
      )(
!
tm
n
e
n
tm
ntNP 

  
!
.
lim
n
ae
ntNP
na
n

 
This is also a Poisson model with mean „a‟. Let the number of errors remaining in the system at time‟t‟ be N(t).
  b
aa
tma





c-
t1-=
)(
E[N(t)]-)]E[N(=]E[N(t)
N(t)-)N(=N(t)
Suppose Sk be the time between (k-1)th
and kth
failure of the software product and Xk be the time up to
the kth
failure, then to find out the probability time between (k-1)th
and kth
failures the software reliability
function is given below.
 )()(
1 )/( smsxm
kk exsXRS 
  --------- (2.2)
This expression is referred as Software Reliability.
III. Background Theory
This section presents the theory that underlines Burr Type III based NHPP model. The Burr type XII
uses a wide range of skewness and kurtosis, which may be used to fit any given set of unimodal data [11]. The
„reciprocal Burr‟ (Burr Type III) covers a wide region that includes the region covered by Burr Type XII. Burr
has suggested a number of forms of cumulative distribution functions (cdf) that would be useful for fitting data
[12]. The Burr Type XII distribution F(x) is given as
F(x) =1-(1+xc
)-b
, x>0, c>0, b>0. ------ (3.1)
Here both‟ c‟ and‟ b‟ are shape parameters.
Let X be the random variable with cdf given by equation (3.1) and consider the transformation t=1/X.
F(t)=(1+t-c
)-b
--------- (3.2)
Which is one of the many forms of distribution functions (Burr Type III) given by Burr.
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 51 | Page
IV. Parameters Of Burr Type III Based Time Domain Data
Burr [12] had introduced twelve different forms of cumulative distribution functions for modeling data.
The task of building a mathematical model is incomplete until the unknown parameters i.e. the model
parameters are estimated and validated on actual software failure data sets. In this section we develop
expressions to estimate the parameters of the Burr type III model based on time domain data. Parameter
estimation is given primary importance for software reliability prediction. Parameter estimation can be achieved
by applying a technique of MLE which is the most important and widely used estimation technique. A set of
failure data is usually collected in one of two common ways, time domain data and interval domain data. Here
the failure data is collected through time domain data.
The mean value function of Burr type III model as given in equation (2.1) is
   bc
tatm

 1 t>0 a, b, c > 0
To assess the software reliability, „a‟, „b‟ and „c‟ are to be known or else they can be estimated from
software failure data. For estimating „a‟, „b‟ and „c‟ for the Burr type III model expressions are derived as
mentioned below. Assuming that the data are given for the occurrence times of the failures or the times of
successive failures, i.e., the realization of random variables Tj for j = 1, 2,..n. Given that the data provide n
successive times of observed failures Tj for 0 t1≤t2≤...tn, we can convert these data into the time between failures
xi where xi = ti-ti-1 for i = 1, 2,…, n. Given the recorded data on the time of failures, the log likelihood function
(LLF) takes on the following form:
  )()(log
1
n
n
i
i tmtLLF  
 --------- (4.1)
 










n
i
bc
n
bc
i
c
i t
a
tt
abc
LogL
1
11
1)1(
log -------- (4.2)
 
      






n
i
c
iibc
n
tbtccba
t
a
LogL
1
1log1log1logloglog
1
----- (4.3)
Accordingly parameters „a‟, „b‟ and „c‟ would be solutions of the equations
0


a
LogL
  bc
ntna 
 1 --------- (4.4)
0


b
LogL

   


 n
i
ni tnt
n
b
1
11
1log1log
----------- (4.5)
The parameter „c‟ is estimated by iterative Newton-Raphson Method using
 
 i
i
ii
cg
cg
cc
'
1  where g(c) and
gꞌ(c) are expressed as follows.
0


c
LogL
    










 
c
i
n
i
ic
n
n
t
t
c
n
t
tn
cg
1
2
1log
1
log
1
------ (4.6)
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 52 | Page
02
2



c
LogL
    
 
 
  



n
i
c
i
i
c
i
c
n
c
nn
t
tt
c
n
t
ttn
cg
1
2
2
22
2
1
log2
1
log
' ------------ (4.7)
The value of „c‟ in the above equations (4.6) (4.7) can be obtained using Newton-Raphson iterative
method. Solving the above equation yields the point estimate of the parameter „c‟.
V. Data Validity Analysis
The set of software errors analyzed here is borrowed from software development project as published
in Pham [13, 14]. Data set is truncated into different proportions and used for estimating the parameters of the
proposed basic discrete time model. Table 1 shows the time between failures for different software products
presenting as per the size of the data set.
NTDS Data
The data set consists of 26 failures in 250 days. During the production phase 26 software errors are
found and during the test phase five additional errors are found. During the user phase one error is observed and
two more errors are noticed in a subsequent test phase indicating that a network of the module has taken place
after the user error is found. In this paper, a numerical conversion of data (Failure Time (hours)*0.01) is done in
order to facilitate the parameter estimation [15] [16] [17].
Table-1: NTDS Data Set
Failure
Number n
Time between
Failures Sk days
Cumulative Time
Xn = 𝑆 𝑘 days
Failure Time(hours)*0.01
Production (Checkout) Phase
1 9 9 0.09
2 12 21 0.21
3 11 32 0.32
4 4 36 0.36
5 7 43 0.43
6 2 45 0.45
7 5 50 0.5
8 8 58 0.58
9 5 63 0.63
10 7 70 0.7
11 1 71 0.71
12 6 77 0.77
13 1 78 0.78
14 9 87 0.87
15 4 91 0.91
16 1 92 0.92
17 3 95 0.95
18 3 98 0.98
19 6 104 1.04
20 1 105 1.05
21 11 116 1.16
22 33 149 1.49
23 7 156 1.56
24 91 247 2.47
25 2 249 2.49
26 1 250 2.5
Test Phase
27 87 337 3.37
28 47 384 3.84
29 12 396 3.96
30 9 405 4.05
31 135 540 5.4
User Phase
32 258 798 7.98
Test Phase
33 16 814 8.14
34 35 849 8.49
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 53 | Page
Solving equations in Section 3 by Newton-Raphson Method (N-R) method for the NTDS software
failure data, the iterative solutions for MLEs of a, b and c are as below.
34.465706

a
1.763647

b
1.810222

c
Table-2: Parameters Estimated through MLE
Data set (no) Number of samples
Estimated Parameter
A b C
NTDS 26 34.465706 1.763647 1.810222
AT&T 22 26.839829 1.658692 1.000000
SONATA 30 79.831359 6.742810 0.602440
XIE 30 33.310426 2.270095 1.371974
IBM 15 20.624785 1.711630 1.447815
Here, these three values can be accepted as MLEs of „a‟, „b‟ and „c‟. The estimator of the reliability
function from the equation (2.2) at any time x beyond 250 days is given by
 )()(
1 )/( smsxm
kk exsXRS 
 
= 𝑒− [ 𝑚 (50+250) – 𝑚 (250)]
=0.999221
VI. Performance Analysis For Goodness Of Fit
The potentiality of SRGM is judged by its capability to fit the software failure data, where the term
goodness of fit denotes the question of “How good does a mathematical model fit to the data?” Experiments on
a set of actual software failure data have been performed to validate the model under study and to assess its
performance. The considered model fits more to the data set whose Log Likelihood is most negative. The
application of the considered distribution function and its Log Likelihood on different datasets collected from
real world failure data is given below in table 3.
Table-3: Log likelihood on different data sets
Data set (no) Log L (MLE)
Reliability tn+50
(MLE)
NTDS -168.070414 0.999221
AT&T -160.264155 0.995543
SONATA -218.086332 0.917342
XIE -256.630664 0.999247
IBM -109.246261 0.998116
VII. Conclusion
In this paper we propose a Burr type III software reliability growth model. This model is useful
primarily for estimating and monitoring software reliability that is viewed as a measure of software quality.
Equations are developed to obtain the maximum likelihood estimates of the parameters based on time domain
data. The proposed discrete time models have been validated and evaluated on actual software failure data cited
from real software development projects and compared with existing discrete time NHPP based model. The
results are encouraging in terms of goodness of fit and predictive validity due to their applicability and
flexibility. To validate the proposed approach, the parameter estimation is carried out on the data sets collected
[18][19]. The data set Xie has the best fit among all datasets as it is having the highest negative value for the log
likelihood. The reliability of all the data sets are given in Table 3.The reliability of the model over Xie data is
the highest among the data sets which are considered.
References
[1]. Musa J.D, Software Reliability Engineering MCGraw-Hill, 1998.
[2]. Lyu, M.R., (1996). “Handbook of Software Reliability Engineering”, McGraw-Hill, New York.
[3]. Musa, J.D., Iannino, A., Okumoto, k., 1987. “Software Reliability: Measurement Prediction Application” McGraw -Hill, New
York.
[4]. Wood. A (1996), “Predicting Software Reliability”, IEEE Computer, 2253-2264.
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 54 | Page
[5]. Pham. H (2005) “A Generalized Logistic Software Reliability Growth Model”, Opsearch, Vol.42, No.4, 332-331.MC Graw Hill,
New York.
[6]. Goel, A.L., Okumoto, K., 1979. Time- dependent error-detection rate model for software reliability and other performance
measures. IEEE Trans. Reliab. R-28, 206-211.
[7]. Satya Prasad, R (2007) “Half logistic Software reliability growth model”, Ph.D Thesis of ANU, India.
[8]. Satya Prasad, R and Geetha Rani, N (2011), “Pareto type II software reliability growth model”, International Journal of Software
Engineering, Volume 2, Issue(4) 81-86
[9]. Quadri, S.M.K and Ahmad, N., (2010). “Software Reliability Growth modelling with new modified Weibull testing-effort and
optimal release policy”, International Journal of Computer Applications, Vol.6, No.12.
[10]. Xie, M., Yang, B. and Gaudoin, O. (2001), “Regression goodness-of-fit Test for Software reliability model validation”, ISSRE and
Chillarege Corp.
[11]. Tadikamalla, Pandu R. “A Look at the Burr and Related Distributions.” International Statistical Review / Revue Internationale de
Statistique 48(3)(Dec., 1980): 337–344.
[12]. Burr (1942), “Cumulative Frequency Functions”, Annals of Mathematical Statistics, 13, pp. 215-232.
[13]. Pham. H., 2003. “Handbook of Reliability Engineering” Springer.
[14]. Pham. H., 2006. “System software reliability” Springer.
[15]. N. R. Barraza., “Parameter Estimation for the Compound Poisson Software Reliability Model”, International Journal of Software
Engineering and Its Applications, http://www.sersc.org/journals/IJSEIA/vol7_no1_2013/11.pdf, vol. 7, no. 1, (2013) January, pp.
137-148.
[16]. Inayat, M. Asim Noor and Z. Inayat, “Parameter Successful Product-based Agile Software Development without Onsite Customer:
An Industrial Case Study”, International Journal of Software Engineering and Its
Applications,http://www.sersc.org/journals/IJSEIA/vol6_no2_2012/1.pdf, vol. 6, no. 2, (2012) April, pp. 1-14.
[17]. Hassan Najadat and Izzat Alsmadi., “Enhance Rule Based Detection for Software Fault Prone Modules”, International Journal of
Software Engineering and Its Applications, Vol. 6, No.1, pp. 75-86, January
(2012)http://www.serc.org/journals/IJSEIA/vol6_no1_2012/6.pdf.
[18]. Xie, M., Goh. T.N., Ranjan.P, (2002) “Some effective control chart procedures for reliability monitoring” -Reliability engineering
and System Safety 77 143 -150 ꞌ2002.
[19]. Ashoka, M., (2010), “Sonata Software Limited” data set, Bangalore.

More Related Content

What's hot

mit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intentmit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intentAlan Turransky
 
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...cscpconf
 
Full parameterization process
Full parameterization processFull parameterization process
Full parameterization processOsama Awad
 
mit-watch-what-i-do-chronology
mit-watch-what-i-do-chronologymit-watch-what-i-do-chronology
mit-watch-what-i-do-chronologyAlan Turransky
 
An optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkAn optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkISA Interchange
 
Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling csijjournal
 
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...ijfls
 
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...Dr. Amir Mosavi, PhD., P.Eng.
 
A hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationA hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationijfcstjournal
 
An Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSPAn Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSPSougata Das
 
Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...Premier Publishers
 
FurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_finalFurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_finalMohammad Abdo
 
Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018Ramadan Babers, PhD
 
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...IJCI JOURNAL
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...MuskanRath1
 

What's hot (18)

mit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intentmit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intent
 
Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...
 
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
 
Full parameterization process
Full parameterization processFull parameterization process
Full parameterization process
 
mit-watch-what-i-do-chronology
mit-watch-what-i-do-chronologymit-watch-what-i-do-chronology
mit-watch-what-i-do-chronology
 
Pxc3899333
Pxc3899333Pxc3899333
Pxc3899333
 
An optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkAn optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic Network
 
Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling
 
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
 
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
 
A hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationA hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimation
 
An Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSPAn Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSP
 
Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...
 
FurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_finalFurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_final
 
Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018
 
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...
 

Viewers also liked

Comparative Study of Geotechnical Properties of Abia State Lateritic Deposits
Comparative Study of Geotechnical Properties of Abia State Lateritic DepositsComparative Study of Geotechnical Properties of Abia State Lateritic Deposits
Comparative Study of Geotechnical Properties of Abia State Lateritic DepositsIOSR Journals
 
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...IOSR Journals
 
Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...
Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...
Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...IOSR Journals
 
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...IOSR Journals
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsIOSR Journals
 
An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...
An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...
An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...IOSR Journals
 
Implementation of Emotional Intelligence in a machine
Implementation of Emotional Intelligence in a machineImplementation of Emotional Intelligence in a machine
Implementation of Emotional Intelligence in a machineIOSR Journals
 
Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...
Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...
Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...IOSR Journals
 
Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)
Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)
Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)IOSR Journals
 
Visual Representations in High School Edublogs
Visual Representations in High School EdublogsVisual Representations in High School Edublogs
Visual Representations in High School EdublogsIOSR Journals
 
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...IOSR Journals
 
Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...
Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...
Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...IOSR Journals
 
Manual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
Manual Unpacking Of Upx Packed Executable Using Ollydbg and ImportrecManual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
Manual Unpacking Of Upx Packed Executable Using Ollydbg and ImportrecIOSR Journals
 
Spinor Transformation and Antiferromagnetism in Iron Based Superconductors
Spinor Transformation and Antiferromagnetism in Iron Based SuperconductorsSpinor Transformation and Antiferromagnetism in Iron Based Superconductors
Spinor Transformation and Antiferromagnetism in Iron Based SuperconductorsIOSR Journals
 
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...IOSR Journals
 
The Development of Software for Assessment of Environmental Impact Indicators...
The Development of Software for Assessment of Environmental Impact Indicators...The Development of Software for Assessment of Environmental Impact Indicators...
The Development of Software for Assessment of Environmental Impact Indicators...IOSR Journals
 

Viewers also liked (20)

Comparative Study of Geotechnical Properties of Abia State Lateritic Deposits
Comparative Study of Geotechnical Properties of Abia State Lateritic DepositsComparative Study of Geotechnical Properties of Abia State Lateritic Deposits
Comparative Study of Geotechnical Properties of Abia State Lateritic Deposits
 
K010437073
K010437073K010437073
K010437073
 
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
 
Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...
Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...
Study of Effect of Rotor Speed, Combing-Roll Speed and Type of Recycled Waste...
 
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slots
 
B0560713
B0560713B0560713
B0560713
 
F1303013440
F1303013440F1303013440
F1303013440
 
An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...
An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...
An Analysis of Consumer Perceptions and Usage of Mobile Telecommunications Br...
 
Implementation of Emotional Intelligence in a machine
Implementation of Emotional Intelligence in a machineImplementation of Emotional Intelligence in a machine
Implementation of Emotional Intelligence in a machine
 
Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...
Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...
Institutional Transformation Aimed To Support the Farmers Empowerment Strateg...
 
P01754110117
P01754110117P01754110117
P01754110117
 
Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)
Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)
Evolution of the coastline of Saidia - Cap Water (Northeastern Morocco)
 
Visual Representations in High School Edublogs
Visual Representations in High School EdublogsVisual Representations in High School Edublogs
Visual Representations in High School Edublogs
 
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
 
Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...
Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...
Impact of Poultry Feed Price and Price Variability on Commercial Poultry Prod...
 
Manual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
Manual Unpacking Of Upx Packed Executable Using Ollydbg and ImportrecManual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
Manual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
 
Spinor Transformation and Antiferromagnetism in Iron Based Superconductors
Spinor Transformation and Antiferromagnetism in Iron Based SuperconductorsSpinor Transformation and Antiferromagnetism in Iron Based Superconductors
Spinor Transformation and Antiferromagnetism in Iron Based Superconductors
 
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...
 
The Development of Software for Assessment of Environmental Impact Indicators...
The Development of Software for Assessment of Environmental Impact Indicators...The Development of Software for Assessment of Environmental Impact Indicators...
The Development of Software for Assessment of Environmental Impact Indicators...
 

Similar to Burr Type III Software Reliability Growth Model

SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithmsijseajournal
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelWaqas Tariq
 
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATADETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATAIJCSEA Journal
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachIJCSEA Journal
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach IJCSEA Journal
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEIOSR Journals
 
Comparing between maximum
Comparing between maximumComparing between maximum
Comparing between maximumijseajournal
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTIRJET Journal
 
76201929
7620192976201929
76201929IJRAT
 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSIAEME Publication
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)ieijjournal1
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET Journal
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsCharlton Inao
 
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...iosrjce
 

Similar to Burr Type III Software Reliability Growth Model (20)

SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithms
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power Model
 
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATADETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
 
50120130405032
5012013040503250120130405032
50120130405032
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLE
 
Comparing between maximum
Comparing between maximumComparing between maximum
Comparing between maximum
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLT
 
76201929
7620192976201929
76201929
 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICS
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systems
 
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Burr Type III Software Reliability Growth Model

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. IV (Jan – Feb. 2015), PP 49-54 www.iosrjournals.org DOI: 10.9790/0661-17144954 www.iosrjournals.org 49 | Page Burr Type III Software Reliability Growth Model Ch.Smitha Chowdary1 , Dr.R.Satya Prasad2 , K.Sobhana3 1 Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh. INDIA-521001 2 Associate Professor, Dept. of Computer Science & Engineering Acharya Nagarjuna University, Nagarjuna Nagar- INDIA-522510 3 Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh. INDIA-521001 Abstract : Software Reliability Growth Model (SRGM) is used to assess software reliability quantitatively for tracking and measuring the growth of reliability. The potentiality of SRGM is judged by its capability to fit the software failure data. In this paper we propose Burr type III software reliability growth model based on Non Homogeneous Poisson Process (NHPP) with time domain data. The Maximum Likelihood (ML) estimation method is used for finding unknown parameters in the model on ungrouped data. How good does a mathematical model fit to the data is also being calculated. To assess the performance of the considered SRGM, we have carried out the parameter estimation on real software failure data sets. We also present an analysis of goodness of fit and reliability for given failure data sets. Keywords: Burr type III, Goodness of fit, NHPP, ML estimation, Software Reliability, Time domain data. I. Introduction Software reliability is the probability of failure-free operation of software in a specified environment during specified duration [1][2][3]. Over the decades, different statistical models have been discussed for assessing the software reliability where Wood (1996), Pham (2005), Goel & Okumoto (1979), Satya Prasad (2007) and Satya Prasad & Geetha Rani (2011) are some examples [4][5][6][7][8]. The models applicable for the assessment of software reliability are called Software Reliability Growth Models (SRGMs). SRGM is a mathematical model of how software reliability improves as faults are detected and repaired [9]. One of the important classes of SRGM that has been studied widely is Non Homogeneous Poisson Process (NHPP), which forms one of the main classes of the existing SRGMs due to its mathematical traceability and wide applicability. The NHPP based software reliability growth models have been proved quite successful in practical software reliability engineering [3]. Software reliability can be estimated after the determination of the mean value function. To determine this mean value function, model parameters can be estimated by using Maximum Likelihood Estimation (MLE). These Parameter values can be obtained by using Newton-Raphson Method. The success of mathematical modeling approach to reliability evaluation heavily depends upon quality of failure data collected and its goodness of fit. If the selected model does not fit relatively well into the collected software testing data, we may expect a low prediction ability of this model and the decision makings based on the analysis of this model may be far from what is considered to be optimal decision [10]. This paper presents Burr type III model to analyze the reliability of a software system using time domain data. The layout of the paper is as follows: Section 2 gives the details of formulation and interpretation of the model for the underlying NHPP. Section 3 describes the background of Burr type III model. Section 4 discusses parameter estimation of Burr type III model based on time domain data. Section 5 describes the techniques used for software failure data analysis for live data. Section 6 gives the performance analysis of the presented model and Section 7 contains the conclusion. II. NHPP Model Software reliability models can be classified according to probabilistic assumptions based on the type of failure process. First one is, when a Markov process represents the failure process, the resultant model is Markovian Model. Second one is fault counting model that describes the failure phenomenon by stochastic process like Homogeneous Poisson Process (HPP), Non Homogeneous Poisson Process (NHPP) and Compound Poisson Process (CPP) etc. Most of the failure count models are based upon NHPP and are described in the following lines. A software system is subject to failures at random times which are caused by errors present in the system. Suppose {N(t), t >0} is a counting process, then the cumulative number of failures are represented by time „t‟. As there were no failures at t=0 we have
  • 2. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 50 | Page N(0) = 0 The assumption is, that the number of software failures during non overlapping time intervals will not affect each other. In other way, for any finite collection of times t1<t2<…. <tn the „n‟ random variables N(t1), {N(t2)-N(t1)}, ….. {N(tn) - N(tn-1)} are independent. This implies that the counting process {N(t), t>0} has independent increments. Suppose m(t) represents the expected number of software failures by time „t‟, then the expected number of errors remaining in the system at any time is finite, hence m(t) is a bounded, non decreasing function of „t‟ with the following boundary conditions.          ta t tm , 0,0 )( Here the above mentioned „a‟ is meant for expected number of software errors to be eventually detected. Let N(t) be known to have a Poisson probability mass function with parameters m(t) i.e.       )( ! tm n e n tm ntNP   , n=0, 1, 2,…∞ Then the stochastic behavior of software failure phenomenon can be described through the N(t) process. In this paper we consider m(t) as given by    bc tatm   1 ---------------- (2.1) Where [m(t)/a] is the cumulative distribution function of Burr type III distribution for the present choice.       )( ! tm n e n tm ntNP      ! . lim n ae ntNP na n    This is also a Poisson model with mean „a‟. Let the number of errors remaining in the system at time‟t‟ be N(t).   b aa tma      c- t1-= )( E[N(t)]-)]E[N(=]E[N(t) N(t)-)N(=N(t) Suppose Sk be the time between (k-1)th and kth failure of the software product and Xk be the time up to the kth failure, then to find out the probability time between (k-1)th and kth failures the software reliability function is given below.  )()( 1 )/( smsxm kk exsXRS    --------- (2.2) This expression is referred as Software Reliability. III. Background Theory This section presents the theory that underlines Burr Type III based NHPP model. The Burr type XII uses a wide range of skewness and kurtosis, which may be used to fit any given set of unimodal data [11]. The „reciprocal Burr‟ (Burr Type III) covers a wide region that includes the region covered by Burr Type XII. Burr has suggested a number of forms of cumulative distribution functions (cdf) that would be useful for fitting data [12]. The Burr Type XII distribution F(x) is given as F(x) =1-(1+xc )-b , x>0, c>0, b>0. ------ (3.1) Here both‟ c‟ and‟ b‟ are shape parameters. Let X be the random variable with cdf given by equation (3.1) and consider the transformation t=1/X. F(t)=(1+t-c )-b --------- (3.2) Which is one of the many forms of distribution functions (Burr Type III) given by Burr.
  • 3. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 51 | Page IV. Parameters Of Burr Type III Based Time Domain Data Burr [12] had introduced twelve different forms of cumulative distribution functions for modeling data. The task of building a mathematical model is incomplete until the unknown parameters i.e. the model parameters are estimated and validated on actual software failure data sets. In this section we develop expressions to estimate the parameters of the Burr type III model based on time domain data. Parameter estimation is given primary importance for software reliability prediction. Parameter estimation can be achieved by applying a technique of MLE which is the most important and widely used estimation technique. A set of failure data is usually collected in one of two common ways, time domain data and interval domain data. Here the failure data is collected through time domain data. The mean value function of Burr type III model as given in equation (2.1) is    bc tatm   1 t>0 a, b, c > 0 To assess the software reliability, „a‟, „b‟ and „c‟ are to be known or else they can be estimated from software failure data. For estimating „a‟, „b‟ and „c‟ for the Burr type III model expressions are derived as mentioned below. Assuming that the data are given for the occurrence times of the failures or the times of successive failures, i.e., the realization of random variables Tj for j = 1, 2,..n. Given that the data provide n successive times of observed failures Tj for 0 t1≤t2≤...tn, we can convert these data into the time between failures xi where xi = ti-ti-1 for i = 1, 2,…, n. Given the recorded data on the time of failures, the log likelihood function (LLF) takes on the following form:   )()(log 1 n n i i tmtLLF    --------- (4.1)             n i bc n bc i c i t a tt abc LogL 1 11 1)1( log -------- (4.2)                n i c iibc n tbtccba t a LogL 1 1log1log1logloglog 1 ----- (4.3) Accordingly parameters „a‟, „b‟ and „c‟ would be solutions of the equations 0   a LogL   bc ntna   1 --------- (4.4) 0   b LogL         n i ni tnt n b 1 11 1log1log ----------- (4.5) The parameter „c‟ is estimated by iterative Newton-Raphson Method using    i i ii cg cg cc ' 1  where g(c) and gꞌ(c) are expressed as follows. 0   c LogL                  c i n i ic n n t t c n t tn cg 1 2 1log 1 log 1 ------ (4.6)
  • 4. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 52 | Page 02 2    c LogL                n i c i i c i c n c nn t tt c n t ttn cg 1 2 2 22 2 1 log2 1 log ' ------------ (4.7) The value of „c‟ in the above equations (4.6) (4.7) can be obtained using Newton-Raphson iterative method. Solving the above equation yields the point estimate of the parameter „c‟. V. Data Validity Analysis The set of software errors analyzed here is borrowed from software development project as published in Pham [13, 14]. Data set is truncated into different proportions and used for estimating the parameters of the proposed basic discrete time model. Table 1 shows the time between failures for different software products presenting as per the size of the data set. NTDS Data The data set consists of 26 failures in 250 days. During the production phase 26 software errors are found and during the test phase five additional errors are found. During the user phase one error is observed and two more errors are noticed in a subsequent test phase indicating that a network of the module has taken place after the user error is found. In this paper, a numerical conversion of data (Failure Time (hours)*0.01) is done in order to facilitate the parameter estimation [15] [16] [17]. Table-1: NTDS Data Set Failure Number n Time between Failures Sk days Cumulative Time Xn = 𝑆 𝑘 days Failure Time(hours)*0.01 Production (Checkout) Phase 1 9 9 0.09 2 12 21 0.21 3 11 32 0.32 4 4 36 0.36 5 7 43 0.43 6 2 45 0.45 7 5 50 0.5 8 8 58 0.58 9 5 63 0.63 10 7 70 0.7 11 1 71 0.71 12 6 77 0.77 13 1 78 0.78 14 9 87 0.87 15 4 91 0.91 16 1 92 0.92 17 3 95 0.95 18 3 98 0.98 19 6 104 1.04 20 1 105 1.05 21 11 116 1.16 22 33 149 1.49 23 7 156 1.56 24 91 247 2.47 25 2 249 2.49 26 1 250 2.5 Test Phase 27 87 337 3.37 28 47 384 3.84 29 12 396 3.96 30 9 405 4.05 31 135 540 5.4 User Phase 32 258 798 7.98 Test Phase 33 16 814 8.14 34 35 849 8.49
  • 5. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 53 | Page Solving equations in Section 3 by Newton-Raphson Method (N-R) method for the NTDS software failure data, the iterative solutions for MLEs of a, b and c are as below. 34.465706  a 1.763647  b 1.810222  c Table-2: Parameters Estimated through MLE Data set (no) Number of samples Estimated Parameter A b C NTDS 26 34.465706 1.763647 1.810222 AT&T 22 26.839829 1.658692 1.000000 SONATA 30 79.831359 6.742810 0.602440 XIE 30 33.310426 2.270095 1.371974 IBM 15 20.624785 1.711630 1.447815 Here, these three values can be accepted as MLEs of „a‟, „b‟ and „c‟. The estimator of the reliability function from the equation (2.2) at any time x beyond 250 days is given by  )()( 1 )/( smsxm kk exsXRS    = 𝑒− [ 𝑚 (50+250) – 𝑚 (250)] =0.999221 VI. Performance Analysis For Goodness Of Fit The potentiality of SRGM is judged by its capability to fit the software failure data, where the term goodness of fit denotes the question of “How good does a mathematical model fit to the data?” Experiments on a set of actual software failure data have been performed to validate the model under study and to assess its performance. The considered model fits more to the data set whose Log Likelihood is most negative. The application of the considered distribution function and its Log Likelihood on different datasets collected from real world failure data is given below in table 3. Table-3: Log likelihood on different data sets Data set (no) Log L (MLE) Reliability tn+50 (MLE) NTDS -168.070414 0.999221 AT&T -160.264155 0.995543 SONATA -218.086332 0.917342 XIE -256.630664 0.999247 IBM -109.246261 0.998116 VII. Conclusion In this paper we propose a Burr type III software reliability growth model. This model is useful primarily for estimating and monitoring software reliability that is viewed as a measure of software quality. Equations are developed to obtain the maximum likelihood estimates of the parameters based on time domain data. The proposed discrete time models have been validated and evaluated on actual software failure data cited from real software development projects and compared with existing discrete time NHPP based model. The results are encouraging in terms of goodness of fit and predictive validity due to their applicability and flexibility. To validate the proposed approach, the parameter estimation is carried out on the data sets collected [18][19]. The data set Xie has the best fit among all datasets as it is having the highest negative value for the log likelihood. The reliability of all the data sets are given in Table 3.The reliability of the model over Xie data is the highest among the data sets which are considered. References [1]. Musa J.D, Software Reliability Engineering MCGraw-Hill, 1998. [2]. Lyu, M.R., (1996). “Handbook of Software Reliability Engineering”, McGraw-Hill, New York. [3]. Musa, J.D., Iannino, A., Okumoto, k., 1987. “Software Reliability: Measurement Prediction Application” McGraw -Hill, New York. [4]. Wood. A (1996), “Predicting Software Reliability”, IEEE Computer, 2253-2264.
  • 6. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 54 | Page [5]. Pham. H (2005) “A Generalized Logistic Software Reliability Growth Model”, Opsearch, Vol.42, No.4, 332-331.MC Graw Hill, New York. [6]. Goel, A.L., Okumoto, K., 1979. Time- dependent error-detection rate model for software reliability and other performance measures. IEEE Trans. Reliab. R-28, 206-211. [7]. Satya Prasad, R (2007) “Half logistic Software reliability growth model”, Ph.D Thesis of ANU, India. [8]. Satya Prasad, R and Geetha Rani, N (2011), “Pareto type II software reliability growth model”, International Journal of Software Engineering, Volume 2, Issue(4) 81-86 [9]. Quadri, S.M.K and Ahmad, N., (2010). “Software Reliability Growth modelling with new modified Weibull testing-effort and optimal release policy”, International Journal of Computer Applications, Vol.6, No.12. [10]. Xie, M., Yang, B. and Gaudoin, O. (2001), “Regression goodness-of-fit Test for Software reliability model validation”, ISSRE and Chillarege Corp. [11]. Tadikamalla, Pandu R. “A Look at the Burr and Related Distributions.” International Statistical Review / Revue Internationale de Statistique 48(3)(Dec., 1980): 337–344. [12]. Burr (1942), “Cumulative Frequency Functions”, Annals of Mathematical Statistics, 13, pp. 215-232. [13]. Pham. H., 2003. “Handbook of Reliability Engineering” Springer. [14]. Pham. H., 2006. “System software reliability” Springer. [15]. N. R. Barraza., “Parameter Estimation for the Compound Poisson Software Reliability Model”, International Journal of Software Engineering and Its Applications, http://www.sersc.org/journals/IJSEIA/vol7_no1_2013/11.pdf, vol. 7, no. 1, (2013) January, pp. 137-148. [16]. Inayat, M. Asim Noor and Z. Inayat, “Parameter Successful Product-based Agile Software Development without Onsite Customer: An Industrial Case Study”, International Journal of Software Engineering and Its Applications,http://www.sersc.org/journals/IJSEIA/vol6_no2_2012/1.pdf, vol. 6, no. 2, (2012) April, pp. 1-14. [17]. Hassan Najadat and Izzat Alsmadi., “Enhance Rule Based Detection for Software Fault Prone Modules”, International Journal of Software Engineering and Its Applications, Vol. 6, No.1, pp. 75-86, January (2012)http://www.serc.org/journals/IJSEIA/vol6_no1_2012/6.pdf. [18]. Xie, M., Goh. T.N., Ranjan.P, (2002) “Some effective control chart procedures for reliability monitoring” -Reliability engineering and System Safety 77 143 -150 ꞌ2002. [19]. Ashoka, M., (2010), “Sonata Software Limited” data set, Bangalore.