Empirically Validating Software Metrics for Risk Prediction Based on Intelligent Methods

Zhihong Xu; Xin Zheng; Ping Guo
June 2007
Journal of Digital Information Management;Jun2007, Vol. 5 Issue 3, p99
Academic Journal
The software systems which are related to national science and technology projects are very crucial. This kind of systems always involves high technical factors and has to spend a large amount of money, so the quality and reliability of the software deserve to be further studied. Hence, we propose to apply four intelligent classification techniques most used in data mining fields, including Bayesian belief networks (BBN), nearest neighbor (NN), rough set (RS) and decision tree (DT), to validate the usefulness of software metrics for risk prediction. Results show that comparing with metrics such as Lines of code (LOC) and Cyclomatic complexity (V(G)) which are traditionally used for risk prediction, Halstead program difficulty (D), Number of executable statements (EXEC) and Halstead program volume (V) are the more effective metrics as risk predictors. By analyzing obtained results we also found that BBN was more effective than the other three methods in risk prediction.


Related Articles

  • Adaptive Approach of Fault Prediction in Software Modules by using Discriminative and Generative Model of Machine Learning. Kaur, Varneet; Arora, Amit // International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p17 

    Software quality assurance is the most important activity during the development of software. Defective software modules may increase costs and decrease customer satisfaction. Hence, effective defect prediction models or techniques are very important in order to deliver efficient software. In...

  • The use of data Mining Techniques for Improving Software Reliability. Ali, Nadhem Sultan; Pawar, V. P. // International Journal of Advanced Research in Computer Science;Mar/Apr2013, Vol. 4 Issue 2, p172 

    The primary goal of software development is to deliver high-quality software efficiently and in the least amount of time whenever possible. To achieve the preceding goal, developers often want to reuse existing frameworks or libraries instead of developing similar code artifacts from scratch....

  • CLASSIFICATION OF DEFECTS IN SOFTWARE USING DECISION TREE ALGORITHM. SURENDRA NAIDU, M.; GEETHANJALI, N. // International Journal of Engineering Science & Technology;Jun2013, Vol. 5 Issue 6, p1332 

    Software defects due to coding errors continue to plague the industry with disastrous impact, especially in the enterprise application software category. Identifying how much of these defects are specifically due to coding errors is a challenging problem. Defect prevention is the most vivid but...

  • Decision Tree Approach to Discovering Fraud in Leasing Agreements. Horvat, Ivan; Pejić Bach, Mirjana; Merkač Skok, Marjana // Business Systems Research;Jun2014, Vol. 5 Issue 2, p61 

    Background: Fraud attempts create large losses for financing subjects in modern economies. At the same time, leasing agreements have become more and more popular as a means of financing objects such as machinery and vehicles, but are more vulnerable to fraud attempts. Objectives: The goal of the...

  • A Novel Integrated Framework to Increase Software Quality by Mining Source Code. Shaheen Khatoon; Azhar Mahmood; Guohui Li; Jianfeng Xu // Journal of Software Engineering;2013, Vol. 7 Issue 3, p86 

    Source code contain lot of structural features that embody latent information that if identified can help software engineers to develop quality software in least amount of time. For instance, many programming rules are hidden in set of function calls, variable usage, data accesses in functions,...

  • Classification of Web Log Data to Identify Interested Users Using Naïve Bayesian Classification. Santra, A.K.; Jayasudha, S. // International Journal of Computer Science Issues (IJCSI);Jan2012, Vol. 9 Issue 1, p381 

    Web Usage Mining (WUM) is the process of extracting knowledge from Web user's access data by exploiting Data Mining technologies. It can be used for different purposes such as personalization, system improvement and site modification. Study of interested web users, provides valuable information...

  • Tailoring SQA to fit your own life cycle. Basili, Victor R. // IEEE Software;Mar88, Vol. 5 Issue 2, p87 

    Reports the need for measurement and analysis of software quality. Measurement of relative cost of modifications; Consideration of the effort and size of future developments; Relationship between modification and data bindings.

  • Imputation techniques for multivariate missingness in software measurement data. Khoshgoftaar, Taghi; Hulse, Jason // Software Quality Journal;Dec2008, Vol. 16 Issue 4, p563 

    The problem of missing values in software measurement data used in empirical analysis has led to the proposal of numerous potential solutions. Imputation procedures, for example, have been proposed to ‘fill-in’ the missing values with plausible alternatives. We present a...

  • Open source software adoption evaluation through feature level sentiment analysis using Twitter data. IKRAM, Muhammad Touseef; BUTT, Naveed Anwer; AFZAL, Muhammad Tanvir // Turkish Journal of Electrical Engineering & Computer Sciences;2016, Vol. 24 Issue 5, p4481 

    Adopting open source software from the Internet, developers often encounter the problem of accessing the quality of candidate software. To efficiently adopt the system they need a sort of quality guarantee regarding software resources. To assist the developer in software adoption evaluation we...

  • A defect prediction method for software versioning. Kastro, Yomi; Bener, Ayşe // Software Quality Journal;Dec2008, Vol. 16 Issue 4, p543 

    New methodologies and tools have gradually made the life cycle for software development more human-independent. Much of the research in this field focuses on defect reduction, defect identification and defect prediction. Defect prediction is a relatively new research area that involves using...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics