SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. IV (Jan – Feb. 2015), PP 49-54
www.iosrjournals.org
DOI: 10.9790/0661-17144954 www.iosrjournals.org 49 | Page
Burr Type III Software Reliability Growth Model
Ch.Smitha Chowdary1
, Dr.R.Satya Prasad2
, K.Sobhana3
1
Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam,
Andhra Pradesh. INDIA-521001
2
Associate Professor, Dept. of Computer Science & Engineering Acharya Nagarjuna University,
Nagarjuna Nagar- INDIA-522510
3
Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam,
Andhra Pradesh. INDIA-521001
Abstract : Software Reliability Growth Model (SRGM) is used to assess software reliability quantitatively for
tracking and measuring the growth of reliability. The potentiality of SRGM is judged by its capability to fit the
software failure data. In this paper we propose Burr type III software reliability growth model based on Non
Homogeneous Poisson Process (NHPP) with time domain data. The Maximum Likelihood (ML) estimation
method is used for finding unknown parameters in the model on ungrouped data. How good does a
mathematical model fit to the data is also being calculated. To assess the performance of the considered SRGM,
we have carried out the parameter estimation on real software failure data sets. We also present an analysis of
goodness of fit and reliability for given failure data sets.
Keywords: Burr type III, Goodness of fit, NHPP, ML estimation, Software Reliability, Time domain data.
I. Introduction
Software reliability is the probability of failure-free operation of software in a specified environment
during specified duration [1][2][3]. Over the decades, different statistical models have been discussed for
assessing the software reliability where Wood (1996), Pham (2005), Goel & Okumoto (1979), Satya Prasad
(2007) and Satya Prasad & Geetha Rani (2011) are some examples [4][5][6][7][8]. The models applicable for
the assessment of software reliability are called Software Reliability Growth Models (SRGMs). SRGM is a
mathematical model of how software reliability improves as faults are detected and repaired [9]. One of the
important classes of SRGM that has been studied widely is Non Homogeneous Poisson Process (NHPP), which
forms one of the main classes of the existing SRGMs due to its mathematical traceability and wide applicability.
The NHPP based software reliability growth models have been proved quite successful in practical software
reliability engineering [3].
Software reliability can be estimated after the determination of the mean value function. To determine
this mean value function, model parameters can be estimated by using Maximum Likelihood Estimation (MLE).
These Parameter values can be obtained by using Newton-Raphson Method.
The success of mathematical modeling approach to reliability evaluation heavily depends upon quality
of failure data collected and its goodness of fit. If the selected model does not fit relatively well into the
collected software testing data, we may expect a low prediction ability of this model and the decision makings
based on the analysis of this model may be far from what is considered to be optimal decision [10].
This paper presents Burr type III model to analyze the reliability of a software system using time
domain data. The layout of the paper is as follows: Section 2 gives the details of formulation and interpretation
of the model for the underlying NHPP. Section 3 describes the background of Burr type III model. Section 4
discusses parameter estimation of Burr type III model based on time domain data. Section 5 describes the
techniques used for software failure data analysis for live data. Section 6 gives the performance analysis of the
presented model and Section 7 contains the conclusion.
II. NHPP Model
Software reliability models can be classified according to probabilistic assumptions based on the type
of failure process. First one is, when a Markov process represents the failure process, the resultant model is
Markovian Model. Second one is fault counting model that describes the failure phenomenon by stochastic
process like Homogeneous Poisson Process (HPP), Non Homogeneous Poisson Process (NHPP) and Compound
Poisson Process (CPP) etc. Most of the failure count models are based upon NHPP and are described in the
following lines.
A software system is subject to failures at random times which are caused by errors present in the
system. Suppose {N(t), t >0} is a counting process, then the cumulative number of failures are represented by
time „t‟. As there were no failures at t=0 we have
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 50 | Page
N(0) = 0
The assumption is, that the number of software failures during non overlapping time intervals will not
affect each other. In other way, for any finite collection of times t1<t2<…. <tn the „n‟ random variables N(t1),
{N(t2)-N(t1)}, ….. {N(tn) - N(tn-1)} are independent. This implies that the counting process {N(t), t>0} has
independent increments. Suppose m(t) represents the expected number of software failures by time „t‟, then the
expected number of errors remaining in the system at any time is finite, hence m(t) is a bounded, non decreasing
function of „t‟ with the following boundary conditions.









ta
t
tm
,
0,0
)(
Here the above mentioned „a‟ is meant for expected number of software errors to be eventually
detected. Let N(t) be known to have a Poisson probability mass function with parameters m(t) i.e.
      )(
!
tm
n
e
n
tm
ntNP 
 , n=0, 1, 2,…∞
Then the stochastic behavior of software failure phenomenon can be described through the N(t) process. In this
paper we consider m(t) as given by
   bc
tatm

 1 ---------------- (2.1)
Where [m(t)/a] is the cumulative distribution function of Burr type III distribution for the present
choice.
      )(
!
tm
n
e
n
tm
ntNP 

  
!
.
lim
n
ae
ntNP
na
n

 
This is also a Poisson model with mean „a‟. Let the number of errors remaining in the system at time‟t‟ be N(t).
  b
aa
tma





c-
t1-=
)(
E[N(t)]-)]E[N(=]E[N(t)
N(t)-)N(=N(t)
Suppose Sk be the time between (k-1)th
and kth
failure of the software product and Xk be the time up to
the kth
failure, then to find out the probability time between (k-1)th
and kth
failures the software reliability
function is given below.
 )()(
1 )/( smsxm
kk exsXRS 
  --------- (2.2)
This expression is referred as Software Reliability.
III. Background Theory
This section presents the theory that underlines Burr Type III based NHPP model. The Burr type XII
uses a wide range of skewness and kurtosis, which may be used to fit any given set of unimodal data [11]. The
„reciprocal Burr‟ (Burr Type III) covers a wide region that includes the region covered by Burr Type XII. Burr
has suggested a number of forms of cumulative distribution functions (cdf) that would be useful for fitting data
[12]. The Burr Type XII distribution F(x) is given as
F(x) =1-(1+xc
)-b
, x>0, c>0, b>0. ------ (3.1)
Here both‟ c‟ and‟ b‟ are shape parameters.
Let X be the random variable with cdf given by equation (3.1) and consider the transformation t=1/X.
F(t)=(1+t-c
)-b
--------- (3.2)
Which is one of the many forms of distribution functions (Burr Type III) given by Burr.
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 51 | Page
IV. Parameters Of Burr Type III Based Time Domain Data
Burr [12] had introduced twelve different forms of cumulative distribution functions for modeling data.
The task of building a mathematical model is incomplete until the unknown parameters i.e. the model
parameters are estimated and validated on actual software failure data sets. In this section we develop
expressions to estimate the parameters of the Burr type III model based on time domain data. Parameter
estimation is given primary importance for software reliability prediction. Parameter estimation can be achieved
by applying a technique of MLE which is the most important and widely used estimation technique. A set of
failure data is usually collected in one of two common ways, time domain data and interval domain data. Here
the failure data is collected through time domain data.
The mean value function of Burr type III model as given in equation (2.1) is
   bc
tatm

 1 t>0 a, b, c > 0
To assess the software reliability, „a‟, „b‟ and „c‟ are to be known or else they can be estimated from
software failure data. For estimating „a‟, „b‟ and „c‟ for the Burr type III model expressions are derived as
mentioned below. Assuming that the data are given for the occurrence times of the failures or the times of
successive failures, i.e., the realization of random variables Tj for j = 1, 2,..n. Given that the data provide n
successive times of observed failures Tj for 0 t1≤t2≤...tn, we can convert these data into the time between failures
xi where xi = ti-ti-1 for i = 1, 2,…, n. Given the recorded data on the time of failures, the log likelihood function
(LLF) takes on the following form:
  )()(log
1
n
n
i
i tmtLLF  
 --------- (4.1)
 










n
i
bc
n
bc
i
c
i t
a
tt
abc
LogL
1
11
1)1(
log -------- (4.2)
 
      






n
i
c
iibc
n
tbtccba
t
a
LogL
1
1log1log1logloglog
1
----- (4.3)
Accordingly parameters „a‟, „b‟ and „c‟ would be solutions of the equations
0


a
LogL
  bc
ntna 
 1 --------- (4.4)
0


b
LogL

   


 n
i
ni tnt
n
b
1
11
1log1log
----------- (4.5)
The parameter „c‟ is estimated by iterative Newton-Raphson Method using
 
 i
i
ii
cg
cg
cc
'
1  where g(c) and
gꞌ(c) are expressed as follows.
0


c
LogL
    










 
c
i
n
i
ic
n
n
t
t
c
n
t
tn
cg
1
2
1log
1
log
1
------ (4.6)
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 52 | Page
02
2



c
LogL
    
 
 
  



n
i
c
i
i
c
i
c
n
c
nn
t
tt
c
n
t
ttn
cg
1
2
2
22
2
1
log2
1
log
' ------------ (4.7)
The value of „c‟ in the above equations (4.6) (4.7) can be obtained using Newton-Raphson iterative
method. Solving the above equation yields the point estimate of the parameter „c‟.
V. Data Validity Analysis
The set of software errors analyzed here is borrowed from software development project as published
in Pham [13, 14]. Data set is truncated into different proportions and used for estimating the parameters of the
proposed basic discrete time model. Table 1 shows the time between failures for different software products
presenting as per the size of the data set.
NTDS Data
The data set consists of 26 failures in 250 days. During the production phase 26 software errors are
found and during the test phase five additional errors are found. During the user phase one error is observed and
two more errors are noticed in a subsequent test phase indicating that a network of the module has taken place
after the user error is found. In this paper, a numerical conversion of data (Failure Time (hours)*0.01) is done in
order to facilitate the parameter estimation [15] [16] [17].
Table-1: NTDS Data Set
Failure
Number n
Time between
Failures Sk days
Cumulative Time
Xn = 𝑆 𝑘 days
Failure Time(hours)*0.01
Production (Checkout) Phase
1 9 9 0.09
2 12 21 0.21
3 11 32 0.32
4 4 36 0.36
5 7 43 0.43
6 2 45 0.45
7 5 50 0.5
8 8 58 0.58
9 5 63 0.63
10 7 70 0.7
11 1 71 0.71
12 6 77 0.77
13 1 78 0.78
14 9 87 0.87
15 4 91 0.91
16 1 92 0.92
17 3 95 0.95
18 3 98 0.98
19 6 104 1.04
20 1 105 1.05
21 11 116 1.16
22 33 149 1.49
23 7 156 1.56
24 91 247 2.47
25 2 249 2.49
26 1 250 2.5
Test Phase
27 87 337 3.37
28 47 384 3.84
29 12 396 3.96
30 9 405 4.05
31 135 540 5.4
User Phase
32 258 798 7.98
Test Phase
33 16 814 8.14
34 35 849 8.49
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 53 | Page
Solving equations in Section 3 by Newton-Raphson Method (N-R) method for the NTDS software
failure data, the iterative solutions for MLEs of a, b and c are as below.
34.465706

a
1.763647

b
1.810222

c
Table-2: Parameters Estimated through MLE
Data set (no) Number of samples
Estimated Parameter
A b C
NTDS 26 34.465706 1.763647 1.810222
AT&T 22 26.839829 1.658692 1.000000
SONATA 30 79.831359 6.742810 0.602440
XIE 30 33.310426 2.270095 1.371974
IBM 15 20.624785 1.711630 1.447815
Here, these three values can be accepted as MLEs of „a‟, „b‟ and „c‟. The estimator of the reliability
function from the equation (2.2) at any time x beyond 250 days is given by
 )()(
1 )/( smsxm
kk exsXRS 
 
= 𝑒− [ 𝑚 (50+250) – 𝑚 (250)]
=0.999221
VI. Performance Analysis For Goodness Of Fit
The potentiality of SRGM is judged by its capability to fit the software failure data, where the term
goodness of fit denotes the question of “How good does a mathematical model fit to the data?” Experiments on
a set of actual software failure data have been performed to validate the model under study and to assess its
performance. The considered model fits more to the data set whose Log Likelihood is most negative. The
application of the considered distribution function and its Log Likelihood on different datasets collected from
real world failure data is given below in table 3.
Table-3: Log likelihood on different data sets
Data set (no) Log L (MLE)
Reliability tn+50
(MLE)
NTDS -168.070414 0.999221
AT&T -160.264155 0.995543
SONATA -218.086332 0.917342
XIE -256.630664 0.999247
IBM -109.246261 0.998116
VII. Conclusion
In this paper we propose a Burr type III software reliability growth model. This model is useful
primarily for estimating and monitoring software reliability that is viewed as a measure of software quality.
Equations are developed to obtain the maximum likelihood estimates of the parameters based on time domain
data. The proposed discrete time models have been validated and evaluated on actual software failure data cited
from real software development projects and compared with existing discrete time NHPP based model. The
results are encouraging in terms of goodness of fit and predictive validity due to their applicability and
flexibility. To validate the proposed approach, the parameter estimation is carried out on the data sets collected
[18][19]. The data set Xie has the best fit among all datasets as it is having the highest negative value for the log
likelihood. The reliability of all the data sets are given in Table 3.The reliability of the model over Xie data is
the highest among the data sets which are considered.
References
[1]. Musa J.D, Software Reliability Engineering MCGraw-Hill, 1998.
[2]. Lyu, M.R., (1996). “Handbook of Software Reliability Engineering”, McGraw-Hill, New York.
[3]. Musa, J.D., Iannino, A., Okumoto, k., 1987. “Software Reliability: Measurement Prediction Application” McGraw -Hill, New
York.
[4]. Wood. A (1996), “Predicting Software Reliability”, IEEE Computer, 2253-2264.
Burr Type III Software Reliability Growth Model
DOI: 10.9790/0661-17144954 www.iosrjournals.org 54 | Page
[5]. Pham. H (2005) “A Generalized Logistic Software Reliability Growth Model”, Opsearch, Vol.42, No.4, 332-331.MC Graw Hill,
New York.
[6]. Goel, A.L., Okumoto, K., 1979. Time- dependent error-detection rate model for software reliability and other performance
measures. IEEE Trans. Reliab. R-28, 206-211.
[7]. Satya Prasad, R (2007) “Half logistic Software reliability growth model”, Ph.D Thesis of ANU, India.
[8]. Satya Prasad, R and Geetha Rani, N (2011), “Pareto type II software reliability growth model”, International Journal of Software
Engineering, Volume 2, Issue(4) 81-86
[9]. Quadri, S.M.K and Ahmad, N., (2010). “Software Reliability Growth modelling with new modified Weibull testing-effort and
optimal release policy”, International Journal of Computer Applications, Vol.6, No.12.
[10]. Xie, M., Yang, B. and Gaudoin, O. (2001), “Regression goodness-of-fit Test for Software reliability model validation”, ISSRE and
Chillarege Corp.
[11]. Tadikamalla, Pandu R. “A Look at the Burr and Related Distributions.” International Statistical Review / Revue Internationale de
Statistique 48(3)(Dec., 1980): 337–344.
[12]. Burr (1942), “Cumulative Frequency Functions”, Annals of Mathematical Statistics, 13, pp. 215-232.
[13]. Pham. H., 2003. “Handbook of Reliability Engineering” Springer.
[14]. Pham. H., 2006. “System software reliability” Springer.
[15]. N. R. Barraza., “Parameter Estimation for the Compound Poisson Software Reliability Model”, International Journal of Software
Engineering and Its Applications, http://www.sersc.org/journals/IJSEIA/vol7_no1_2013/11.pdf, vol. 7, no. 1, (2013) January, pp.
137-148.
[16]. Inayat, M. Asim Noor and Z. Inayat, “Parameter Successful Product-based Agile Software Development without Onsite Customer:
An Industrial Case Study”, International Journal of Software Engineering and Its
Applications,http://www.sersc.org/journals/IJSEIA/vol6_no2_2012/1.pdf, vol. 6, no. 2, (2012) April, pp. 1-14.
[17]. Hassan Najadat and Izzat Alsmadi., “Enhance Rule Based Detection for Software Fault Prone Modules”, International Journal of
Software Engineering and Its Applications, Vol. 6, No.1, pp. 75-86, January
(2012)http://www.serc.org/journals/IJSEIA/vol6_no1_2012/6.pdf.
[18]. Xie, M., Goh. T.N., Ranjan.P, (2002) “Some effective control chart procedures for reliability monitoring” -Reliability engineering
and System Safety 77 143 -150 ꞌ2002.
[19]. Ashoka, M., (2010), “Sonata Software Limited” data set, Bangalore.

More Related Content

What's hot

mit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intentmit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intentAlan Turransky
 
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...cscpconf
 
Full parameterization process
Full parameterization processFull parameterization process
Full parameterization processOsama Awad
 
mit-watch-what-i-do-chronology
mit-watch-what-i-do-chronologymit-watch-what-i-do-chronology
mit-watch-what-i-do-chronologyAlan Turransky
 
An optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkAn optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkISA Interchange
 
Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling csijjournal
 
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...ijfls
 
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...Dr. Amir Mosavi, PhD., P.Eng.
 
A hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationA hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationijfcstjournal
 
An Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSPAn Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSPSougata Das
 
Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...Premier Publishers
 
FurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_finalFurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_finalMohammad Abdo
 
Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018Ramadan Babers, PhD
 
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...IJCI JOURNAL
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...MuskanRath1
 

What's hot (18)

mit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intentmit-watch-what-i-do-using-voice-input-to-disambiguate-intent
mit-watch-what-i-do-using-voice-input-to-disambiguate-intent
 
Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...
 
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
 
Full parameterization process
Full parameterization processFull parameterization process
Full parameterization process
 
mit-watch-what-i-do-chronology
mit-watch-what-i-do-chronologymit-watch-what-i-do-chronology
mit-watch-what-i-do-chronology
 
Pxc3899333
Pxc3899333Pxc3899333
Pxc3899333
 
An optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkAn optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic Network
 
Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling
 
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...
 
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
 
A hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimationA hybrid fuzzy ann approach for software effort estimation
A hybrid fuzzy ann approach for software effort estimation
 
An Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSPAn Implementational approach to genetic algorithms for TSP
An Implementational approach to genetic algorithms for TSP
 
Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...Bayesian analysis of shape parameter of Lomax distribution using different lo...
Bayesian analysis of shape parameter of Lomax distribution using different lo...
 
FurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_finalFurtherInvestegationOnProbabilisticErrorBounds_final
FurtherInvestegationOnProbabilisticErrorBounds_final
 
Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018Introduction to computer_lec_03_fall_2018
Introduction to computer_lec_03_fall_2018
 
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
POSTERIOR RESOLUTION AND STRUCTURAL MODIFICATION FOR PARAMETER DETERMINATION ...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...
 

Viewers also liked

Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...
Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...
Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...IOSR Journals
 
Balking and Reneging in the Queuing System
Balking and Reneging in the Queuing SystemBalking and Reneging in the Queuing System
Balking and Reneging in the Queuing SystemIOSR Journals
 
Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...
Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...
Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...IOSR Journals
 
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...IOSR Journals
 
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...IOSR Journals
 
Effective Waste Management and Environmental Control
Effective Waste Management and Environmental ControlEffective Waste Management and Environmental Control
Effective Waste Management and Environmental ControlIOSR Journals
 
Auxin induced germination and plantlet regeneration via Rhizome section cultu...
Auxin induced germination and plantlet regeneration via Rhizome section cultu...Auxin induced germination and plantlet regeneration via Rhizome section cultu...
Auxin induced germination and plantlet regeneration via Rhizome section cultu...IOSR Journals
 
Electromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopoleElectromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopoleIOSR Journals
 
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in FerroelectricsEffect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in FerroelectricsIOSR Journals
 
Meditation for stress reduction in Indian Army- An Experimental Study
Meditation for stress reduction in Indian Army- An Experimental StudyMeditation for stress reduction in Indian Army- An Experimental Study
Meditation for stress reduction in Indian Army- An Experimental StudyIOSR Journals
 
Parasites Associated with wild-caught houseflies in Awka metropololis
Parasites Associated with wild-caught houseflies in Awka metropololisParasites Associated with wild-caught houseflies in Awka metropololis
Parasites Associated with wild-caught houseflies in Awka metropololisIOSR Journals
 
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.IOSR Journals
 
Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...IOSR Journals
 
Public Expenditure on Education; A Measure for Promoting Economic Development
Public Expenditure on Education; A Measure for Promoting Economic DevelopmentPublic Expenditure on Education; A Measure for Promoting Economic Development
Public Expenditure on Education; A Measure for Promoting Economic DevelopmentIOSR Journals
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsIOSR Journals
 
Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...IOSR Journals
 
Effect of Annealing and Time of Crystallization on Structural and Optical Pro...
Effect of Annealing and Time of Crystallization on Structural and Optical Pro...Effect of Annealing and Time of Crystallization on Structural and Optical Pro...
Effect of Annealing and Time of Crystallization on Structural and Optical Pro...IOSR Journals
 

Viewers also liked (20)

M017369095
M017369095M017369095
M017369095
 
N18030594102
N18030594102N18030594102
N18030594102
 
Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...
Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...
Mechanism of the Reaction of Plasma Albumin with Formaldehyde in Ethanol - Wa...
 
Balking and Reneging in the Queuing System
Balking and Reneging in the Queuing SystemBalking and Reneging in the Queuing System
Balking and Reneging in the Queuing System
 
Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...
Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...
Corchorusolitoriuswaste(mulukiya) as a potential sorbent for the removal of c...
 
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...
 
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...
 
Effective Waste Management and Environmental Control
Effective Waste Management and Environmental ControlEffective Waste Management and Environmental Control
Effective Waste Management and Environmental Control
 
Auxin induced germination and plantlet regeneration via Rhizome section cultu...
Auxin induced germination and plantlet regeneration via Rhizome section cultu...Auxin induced germination and plantlet regeneration via Rhizome section cultu...
Auxin induced germination and plantlet regeneration via Rhizome section cultu...
 
Electromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopoleElectromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopole
 
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in FerroelectricsEffect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
 
Meditation for stress reduction in Indian Army- An Experimental Study
Meditation for stress reduction in Indian Army- An Experimental StudyMeditation for stress reduction in Indian Army- An Experimental Study
Meditation for stress reduction in Indian Army- An Experimental Study
 
Parasites Associated with wild-caught houseflies in Awka metropololis
Parasites Associated with wild-caught houseflies in Awka metropololisParasites Associated with wild-caught houseflies in Awka metropololis
Parasites Associated with wild-caught houseflies in Awka metropololis
 
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
 
Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...
 
Public Expenditure on Education; A Measure for Promoting Economic Development
Public Expenditure on Education; A Measure for Promoting Economic DevelopmentPublic Expenditure on Education; A Measure for Promoting Economic Development
Public Expenditure on Education; A Measure for Promoting Economic Development
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable Labelings
 
Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...
 
Effect of Annealing and Time of Crystallization on Structural and Optical Pro...
Effect of Annealing and Time of Crystallization on Structural and Optical Pro...Effect of Annealing and Time of Crystallization on Structural and Optical Pro...
Effect of Annealing and Time of Crystallization on Structural and Optical Pro...
 
G1803024452
G1803024452G1803024452
G1803024452
 

Similar to I017144954

SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithmsijseajournal
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelWaqas Tariq
 
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATADETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATAIJCSEA Journal
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsEditor IJCATR
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachIJCSEA Journal
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach IJCSEA Journal
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEIOSR Journals
 
Comparing between maximum
Comparing between maximumComparing between maximum
Comparing between maximumijseajournal
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTIRJET Journal
 
76201929
7620192976201929
76201929IJRAT
 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSIAEME Publication
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)ieijjournal1
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET Journal
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsCharlton Inao
 
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...iosrjce
 

Similar to I017144954 (20)

SRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic AlgorithmsSRGM with Imperfect Debugging by Genetic Algorithms
SRGM with Imperfect Debugging by Genetic Algorithms
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power Model
 
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATADETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
 
50120130405032
5012013040503250120130405032
50120130405032
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Duplicate Code Detection using Control Statements
Duplicate Code Detection using Control StatementsDuplicate Code Detection using Control Statements
Duplicate Code Detection using Control Statements
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLE
 
Comparing between maximum
Comparing between maximumComparing between maximum
Comparing between maximum
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLT
 
76201929
7620192976201929
76201929
 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICS
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
 
Reliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systemsReliability engineering chapter-2 reliability of systems
Reliability engineering chapter-2 reliability of systems
 
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

I017144954

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. IV (Jan – Feb. 2015), PP 49-54 www.iosrjournals.org DOI: 10.9790/0661-17144954 www.iosrjournals.org 49 | Page Burr Type III Software Reliability Growth Model Ch.Smitha Chowdary1 , Dr.R.Satya Prasad2 , K.Sobhana3 1 Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh. INDIA-521001 2 Associate Professor, Dept. of Computer Science & Engineering Acharya Nagarjuna University, Nagarjuna Nagar- INDIA-522510 3 Research Scholar, Dept. of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh. INDIA-521001 Abstract : Software Reliability Growth Model (SRGM) is used to assess software reliability quantitatively for tracking and measuring the growth of reliability. The potentiality of SRGM is judged by its capability to fit the software failure data. In this paper we propose Burr type III software reliability growth model based on Non Homogeneous Poisson Process (NHPP) with time domain data. The Maximum Likelihood (ML) estimation method is used for finding unknown parameters in the model on ungrouped data. How good does a mathematical model fit to the data is also being calculated. To assess the performance of the considered SRGM, we have carried out the parameter estimation on real software failure data sets. We also present an analysis of goodness of fit and reliability for given failure data sets. Keywords: Burr type III, Goodness of fit, NHPP, ML estimation, Software Reliability, Time domain data. I. Introduction Software reliability is the probability of failure-free operation of software in a specified environment during specified duration [1][2][3]. Over the decades, different statistical models have been discussed for assessing the software reliability where Wood (1996), Pham (2005), Goel & Okumoto (1979), Satya Prasad (2007) and Satya Prasad & Geetha Rani (2011) are some examples [4][5][6][7][8]. The models applicable for the assessment of software reliability are called Software Reliability Growth Models (SRGMs). SRGM is a mathematical model of how software reliability improves as faults are detected and repaired [9]. One of the important classes of SRGM that has been studied widely is Non Homogeneous Poisson Process (NHPP), which forms one of the main classes of the existing SRGMs due to its mathematical traceability and wide applicability. The NHPP based software reliability growth models have been proved quite successful in practical software reliability engineering [3]. Software reliability can be estimated after the determination of the mean value function. To determine this mean value function, model parameters can be estimated by using Maximum Likelihood Estimation (MLE). These Parameter values can be obtained by using Newton-Raphson Method. The success of mathematical modeling approach to reliability evaluation heavily depends upon quality of failure data collected and its goodness of fit. If the selected model does not fit relatively well into the collected software testing data, we may expect a low prediction ability of this model and the decision makings based on the analysis of this model may be far from what is considered to be optimal decision [10]. This paper presents Burr type III model to analyze the reliability of a software system using time domain data. The layout of the paper is as follows: Section 2 gives the details of formulation and interpretation of the model for the underlying NHPP. Section 3 describes the background of Burr type III model. Section 4 discusses parameter estimation of Burr type III model based on time domain data. Section 5 describes the techniques used for software failure data analysis for live data. Section 6 gives the performance analysis of the presented model and Section 7 contains the conclusion. II. NHPP Model Software reliability models can be classified according to probabilistic assumptions based on the type of failure process. First one is, when a Markov process represents the failure process, the resultant model is Markovian Model. Second one is fault counting model that describes the failure phenomenon by stochastic process like Homogeneous Poisson Process (HPP), Non Homogeneous Poisson Process (NHPP) and Compound Poisson Process (CPP) etc. Most of the failure count models are based upon NHPP and are described in the following lines. A software system is subject to failures at random times which are caused by errors present in the system. Suppose {N(t), t >0} is a counting process, then the cumulative number of failures are represented by time „t‟. As there were no failures at t=0 we have
  • 2. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 50 | Page N(0) = 0 The assumption is, that the number of software failures during non overlapping time intervals will not affect each other. In other way, for any finite collection of times t1<t2<…. <tn the „n‟ random variables N(t1), {N(t2)-N(t1)}, ….. {N(tn) - N(tn-1)} are independent. This implies that the counting process {N(t), t>0} has independent increments. Suppose m(t) represents the expected number of software failures by time „t‟, then the expected number of errors remaining in the system at any time is finite, hence m(t) is a bounded, non decreasing function of „t‟ with the following boundary conditions.          ta t tm , 0,0 )( Here the above mentioned „a‟ is meant for expected number of software errors to be eventually detected. Let N(t) be known to have a Poisson probability mass function with parameters m(t) i.e.       )( ! tm n e n tm ntNP   , n=0, 1, 2,…∞ Then the stochastic behavior of software failure phenomenon can be described through the N(t) process. In this paper we consider m(t) as given by    bc tatm   1 ---------------- (2.1) Where [m(t)/a] is the cumulative distribution function of Burr type III distribution for the present choice.       )( ! tm n e n tm ntNP      ! . lim n ae ntNP na n    This is also a Poisson model with mean „a‟. Let the number of errors remaining in the system at time‟t‟ be N(t).   b aa tma      c- t1-= )( E[N(t)]-)]E[N(=]E[N(t) N(t)-)N(=N(t) Suppose Sk be the time between (k-1)th and kth failure of the software product and Xk be the time up to the kth failure, then to find out the probability time between (k-1)th and kth failures the software reliability function is given below.  )()( 1 )/( smsxm kk exsXRS    --------- (2.2) This expression is referred as Software Reliability. III. Background Theory This section presents the theory that underlines Burr Type III based NHPP model. The Burr type XII uses a wide range of skewness and kurtosis, which may be used to fit any given set of unimodal data [11]. The „reciprocal Burr‟ (Burr Type III) covers a wide region that includes the region covered by Burr Type XII. Burr has suggested a number of forms of cumulative distribution functions (cdf) that would be useful for fitting data [12]. The Burr Type XII distribution F(x) is given as F(x) =1-(1+xc )-b , x>0, c>0, b>0. ------ (3.1) Here both‟ c‟ and‟ b‟ are shape parameters. Let X be the random variable with cdf given by equation (3.1) and consider the transformation t=1/X. F(t)=(1+t-c )-b --------- (3.2) Which is one of the many forms of distribution functions (Burr Type III) given by Burr.
  • 3. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 51 | Page IV. Parameters Of Burr Type III Based Time Domain Data Burr [12] had introduced twelve different forms of cumulative distribution functions for modeling data. The task of building a mathematical model is incomplete until the unknown parameters i.e. the model parameters are estimated and validated on actual software failure data sets. In this section we develop expressions to estimate the parameters of the Burr type III model based on time domain data. Parameter estimation is given primary importance for software reliability prediction. Parameter estimation can be achieved by applying a technique of MLE which is the most important and widely used estimation technique. A set of failure data is usually collected in one of two common ways, time domain data and interval domain data. Here the failure data is collected through time domain data. The mean value function of Burr type III model as given in equation (2.1) is    bc tatm   1 t>0 a, b, c > 0 To assess the software reliability, „a‟, „b‟ and „c‟ are to be known or else they can be estimated from software failure data. For estimating „a‟, „b‟ and „c‟ for the Burr type III model expressions are derived as mentioned below. Assuming that the data are given for the occurrence times of the failures or the times of successive failures, i.e., the realization of random variables Tj for j = 1, 2,..n. Given that the data provide n successive times of observed failures Tj for 0 t1≤t2≤...tn, we can convert these data into the time between failures xi where xi = ti-ti-1 for i = 1, 2,…, n. Given the recorded data on the time of failures, the log likelihood function (LLF) takes on the following form:   )()(log 1 n n i i tmtLLF    --------- (4.1)             n i bc n bc i c i t a tt abc LogL 1 11 1)1( log -------- (4.2)                n i c iibc n tbtccba t a LogL 1 1log1log1logloglog 1 ----- (4.3) Accordingly parameters „a‟, „b‟ and „c‟ would be solutions of the equations 0   a LogL   bc ntna   1 --------- (4.4) 0   b LogL         n i ni tnt n b 1 11 1log1log ----------- (4.5) The parameter „c‟ is estimated by iterative Newton-Raphson Method using    i i ii cg cg cc ' 1  where g(c) and gꞌ(c) are expressed as follows. 0   c LogL                  c i n i ic n n t t c n t tn cg 1 2 1log 1 log 1 ------ (4.6)
  • 4. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 52 | Page 02 2    c LogL                n i c i i c i c n c nn t tt c n t ttn cg 1 2 2 22 2 1 log2 1 log ' ------------ (4.7) The value of „c‟ in the above equations (4.6) (4.7) can be obtained using Newton-Raphson iterative method. Solving the above equation yields the point estimate of the parameter „c‟. V. Data Validity Analysis The set of software errors analyzed here is borrowed from software development project as published in Pham [13, 14]. Data set is truncated into different proportions and used for estimating the parameters of the proposed basic discrete time model. Table 1 shows the time between failures for different software products presenting as per the size of the data set. NTDS Data The data set consists of 26 failures in 250 days. During the production phase 26 software errors are found and during the test phase five additional errors are found. During the user phase one error is observed and two more errors are noticed in a subsequent test phase indicating that a network of the module has taken place after the user error is found. In this paper, a numerical conversion of data (Failure Time (hours)*0.01) is done in order to facilitate the parameter estimation [15] [16] [17]. Table-1: NTDS Data Set Failure Number n Time between Failures Sk days Cumulative Time Xn = 𝑆 𝑘 days Failure Time(hours)*0.01 Production (Checkout) Phase 1 9 9 0.09 2 12 21 0.21 3 11 32 0.32 4 4 36 0.36 5 7 43 0.43 6 2 45 0.45 7 5 50 0.5 8 8 58 0.58 9 5 63 0.63 10 7 70 0.7 11 1 71 0.71 12 6 77 0.77 13 1 78 0.78 14 9 87 0.87 15 4 91 0.91 16 1 92 0.92 17 3 95 0.95 18 3 98 0.98 19 6 104 1.04 20 1 105 1.05 21 11 116 1.16 22 33 149 1.49 23 7 156 1.56 24 91 247 2.47 25 2 249 2.49 26 1 250 2.5 Test Phase 27 87 337 3.37 28 47 384 3.84 29 12 396 3.96 30 9 405 4.05 31 135 540 5.4 User Phase 32 258 798 7.98 Test Phase 33 16 814 8.14 34 35 849 8.49
  • 5. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 53 | Page Solving equations in Section 3 by Newton-Raphson Method (N-R) method for the NTDS software failure data, the iterative solutions for MLEs of a, b and c are as below. 34.465706  a 1.763647  b 1.810222  c Table-2: Parameters Estimated through MLE Data set (no) Number of samples Estimated Parameter A b C NTDS 26 34.465706 1.763647 1.810222 AT&T 22 26.839829 1.658692 1.000000 SONATA 30 79.831359 6.742810 0.602440 XIE 30 33.310426 2.270095 1.371974 IBM 15 20.624785 1.711630 1.447815 Here, these three values can be accepted as MLEs of „a‟, „b‟ and „c‟. The estimator of the reliability function from the equation (2.2) at any time x beyond 250 days is given by  )()( 1 )/( smsxm kk exsXRS    = 𝑒− [ 𝑚 (50+250) – 𝑚 (250)] =0.999221 VI. Performance Analysis For Goodness Of Fit The potentiality of SRGM is judged by its capability to fit the software failure data, where the term goodness of fit denotes the question of “How good does a mathematical model fit to the data?” Experiments on a set of actual software failure data have been performed to validate the model under study and to assess its performance. The considered model fits more to the data set whose Log Likelihood is most negative. The application of the considered distribution function and its Log Likelihood on different datasets collected from real world failure data is given below in table 3. Table-3: Log likelihood on different data sets Data set (no) Log L (MLE) Reliability tn+50 (MLE) NTDS -168.070414 0.999221 AT&T -160.264155 0.995543 SONATA -218.086332 0.917342 XIE -256.630664 0.999247 IBM -109.246261 0.998116 VII. Conclusion In this paper we propose a Burr type III software reliability growth model. This model is useful primarily for estimating and monitoring software reliability that is viewed as a measure of software quality. Equations are developed to obtain the maximum likelihood estimates of the parameters based on time domain data. The proposed discrete time models have been validated and evaluated on actual software failure data cited from real software development projects and compared with existing discrete time NHPP based model. The results are encouraging in terms of goodness of fit and predictive validity due to their applicability and flexibility. To validate the proposed approach, the parameter estimation is carried out on the data sets collected [18][19]. The data set Xie has the best fit among all datasets as it is having the highest negative value for the log likelihood. The reliability of all the data sets are given in Table 3.The reliability of the model over Xie data is the highest among the data sets which are considered. References [1]. Musa J.D, Software Reliability Engineering MCGraw-Hill, 1998. [2]. Lyu, M.R., (1996). “Handbook of Software Reliability Engineering”, McGraw-Hill, New York. [3]. Musa, J.D., Iannino, A., Okumoto, k., 1987. “Software Reliability: Measurement Prediction Application” McGraw -Hill, New York. [4]. Wood. A (1996), “Predicting Software Reliability”, IEEE Computer, 2253-2264.
  • 6. Burr Type III Software Reliability Growth Model DOI: 10.9790/0661-17144954 www.iosrjournals.org 54 | Page [5]. Pham. H (2005) “A Generalized Logistic Software Reliability Growth Model”, Opsearch, Vol.42, No.4, 332-331.MC Graw Hill, New York. [6]. Goel, A.L., Okumoto, K., 1979. Time- dependent error-detection rate model for software reliability and other performance measures. IEEE Trans. Reliab. R-28, 206-211. [7]. Satya Prasad, R (2007) “Half logistic Software reliability growth model”, Ph.D Thesis of ANU, India. [8]. Satya Prasad, R and Geetha Rani, N (2011), “Pareto type II software reliability growth model”, International Journal of Software Engineering, Volume 2, Issue(4) 81-86 [9]. Quadri, S.M.K and Ahmad, N., (2010). “Software Reliability Growth modelling with new modified Weibull testing-effort and optimal release policy”, International Journal of Computer Applications, Vol.6, No.12. [10]. Xie, M., Yang, B. and Gaudoin, O. (2001), “Regression goodness-of-fit Test for Software reliability model validation”, ISSRE and Chillarege Corp. [11]. Tadikamalla, Pandu R. “A Look at the Burr and Related Distributions.” International Statistical Review / Revue Internationale de Statistique 48(3)(Dec., 1980): 337–344. [12]. Burr (1942), “Cumulative Frequency Functions”, Annals of Mathematical Statistics, 13, pp. 215-232. [13]. Pham. H., 2003. “Handbook of Reliability Engineering” Springer. [14]. Pham. H., 2006. “System software reliability” Springer. [15]. N. R. Barraza., “Parameter Estimation for the Compound Poisson Software Reliability Model”, International Journal of Software Engineering and Its Applications, http://www.sersc.org/journals/IJSEIA/vol7_no1_2013/11.pdf, vol. 7, no. 1, (2013) January, pp. 137-148. [16]. Inayat, M. Asim Noor and Z. Inayat, “Parameter Successful Product-based Agile Software Development without Onsite Customer: An Industrial Case Study”, International Journal of Software Engineering and Its Applications,http://www.sersc.org/journals/IJSEIA/vol6_no2_2012/1.pdf, vol. 6, no. 2, (2012) April, pp. 1-14. [17]. Hassan Najadat and Izzat Alsmadi., “Enhance Rule Based Detection for Software Fault Prone Modules”, International Journal of Software Engineering and Its Applications, Vol. 6, No.1, pp. 75-86, January (2012)http://www.serc.org/journals/IJSEIA/vol6_no1_2012/6.pdf. [18]. Xie, M., Goh. T.N., Ranjan.P, (2002) “Some effective control chart procedures for reliability monitoring” -Reliability engineering and System Safety 77 143 -150 ꞌ2002. [19]. Ashoka, M., (2010), “Sonata Software Limited” data set, Bangalore.