Dhiman et al., 2012 - Google Patents
A Clustered Approach to Analyze the Software Quality Using Software DefectsDhiman et al., 2012
- Document ID
- 6487176370452831194
- Author
- Dhiman P
- Chawla R
- et al.
- Publication year
- Publication venue
- 2012 Second International Conference on Advanced Computing & Communication Technologies
External Links
Snippet
As the software development begins there also exists the probability of occurrence of some defect in the software system. Software defects plays important role to take the decision about when the testing will be stopped. Software defects are one of the major factors that …
- 238000004458 analytical method 0 description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lessmann et al. | Benchmarking classification models for software defect prediction: A proposed framework and novel findings | |
Ceylan et al. | Software defect identification using machine learning techniques | |
Pascarella et al. | Re-evaluating method-level bug prediction | |
Turhan et al. | Empirical evaluation of mixed-project defect prediction models | |
Chang et al. | Integrating in-process software defect prediction with association mining to discover defect pattern | |
Patel | Quality assurance in the age of data analytics: Innovations and challenges | |
Malhotra et al. | Empirical validation of object-oriented metrics for predicting fault proneness at different severity levels using support vector machines | |
Ciflikli et al. | Enhancing product quality of a process | |
Ma et al. | Adequate and precise evaluation of quality models in software engineering studies | |
Atzmueller et al. | Anomaly detection and structural analysis in industrial production environments | |
Dhiman et al. | A Clustered Approach to Analyze the Software Quality Using Software Defects | |
Pang et al. | Early identification of vulnerable software components via ensemble learning | |
CN114139589A (en) | Fault diagnosis method, device, equipment and computer readable storage medium | |
Brunello et al. | Monitors that learn from failures: Pairing STL and genetic programming | |
Shukla et al. | A review on software defect prediction | |
Shirazi et al. | Deep multilayer perceptron neural network for the prediction of Iranian dam project delay risks | |
Yeon et al. | Visual imputation analytics for missing time-series data in bayesian network | |
Ilkhani et al. | Extraction test cases by using data mining; reducing the cost of testing | |
Ayaz et al. | Automation of FMEA for computer servers using log data with grey relational analysis | |
Alhazzaa et al. | A systematic mapping study on software reliability growth models that consider evolution | |
Raad et al. | Ranking of building maintenance contractors using multi-criteria decision making methods and an artificial neural network model | |
Fenton et al. | Bayesian belief network model for the safety assessment of nuclear computer-based systems | |
MacAllister | Investigating the use of Bayesian networks for small dataset problems | |
Azkiya et al. | Identification of Risk Factors in the Software Design Stage Using the C4. 5 Algorithm | |
Paglioni et al. | Creating formative HRA dependency models using the HRA dependency idioms and SACADA data, Part I: Model construction algorithm |