Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Relative risk proneness in phases of software development: metric based approach with Cox model

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The software suffers from confounding effect due to defects that occurs during its entire development process. Software failure occurs due to various reasons. One of the reasons can be removal of defects at a much later stage, even though it has been detected in early phases of software development. Defect prediction has emerged as an interesting area for researchers within stipulated time period. Prediction depends mainly on the modeling of these defects and while modeling the simplest parameter used by researchers is the software size. In this paper, we showed deployment of Cox model and investigated the significance on defect prediction during various phases of development. The parameter used here is the defect count in various phases. Next, we proposed and compared two strategies for effective overall risk prediction of the projects using another proposed metric “Relative Risk Proneness Probability”. This metric is used in phases as evaluation criteria for judging the cost effectiveness of the project.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Akiyama F (1971) An example of software system debugging. In: Proceedings of IFIP congress 71, vol 1. IFIP, Amsterdam, pp 353–359 (1971)

  • Basili VR, Perricone BT (1984) Software errors and complexity: an empirical investigation. Commun ACM 27(1):42–52

    Article  Google Scholar 

  • Beal CW (2008) Practical use of defect detection and prediction in the development and maintenance of software. In: Proceedings of the 4th international workshop on predictor models in software engineering. ACM, New York, pp 45–46

  • Boehm B, Basili YR (2001) Software defect reduction: top 10 list computer 34(1):135–137

  • Briand LC, Bunse C, Daly JW (2001) A controlled experiment for evaluating quality guidelines on the maintainability of object-oriented designs. IEEE Trans Softw Eng 27(6):513–530

    Article  Google Scholar 

  • Chayes F (1971) Ratio correlation: a manual for students of petrology and geochemistry. University of Chicago Press, Chicago

    Google Scholar 

  • Ekanayake J, Tappolet J, Gall HC, Bernstein A (2009) Tracking concept drift of software projects using defect prediction quality. In: 6th IEEE international working conference on mining software repositories, pp 51–60

  • El Emam K, Benlarbi S, Goel N, Rai SN (2001) The confounding effect of class size on the validity of object-oriented metrics. IEEE Trans Softw Eng 27(7):630–650

    Article  Google Scholar 

  • El Emam K, Benlarbi S, Goel N, Melo W, Lounis H, Rai SN (2002) The optimal class size for object-oriented software. IEEE Trans Softw Eng 28(5):494–509

    Article  Google Scholar 

  • Fenton NE, Neil M (1999) A critique of software defect prediction models. IEEE Trans Softw Eng 25(5):675–689

    Article  Google Scholar 

  • Fenton NE, Ohlsson N (2000) Quantitative analysis of faults and failures in a complex software system. IEEE Trans Softw Eng 26(8):797–814

    Article  Google Scholar 

  • Gaffney JE (1982) Estimating the number of faults in code. IEEE Trans Softw Eng 10(4):459–465

    Article  Google Scholar 

  • Gopalakrishnan Nair TR, Suma V (2010) A paradigm for metric based inspection process for enhancing defect management. ACM SIGSOFT Softw Eng Not 35(3)

    Article  Google Scholar 

  • Grottke M, Trivedi KS (2007) Fighting bugs: remove, retry, replicate, and rejuvenate. Computer 40(2):107–109

    Article  Google Scholar 

  • Hall T, Beecham S, Bowes D, Gray D, Counsell S (2012) A systematic literature review on fault prediction performance in software engineering. IEEE Trans Softw Eng 38(6):1276–1304

    Article  Google Scholar 

  • Halstead MH (1977) Elements of software science. Elsevier, Amsterdam

    MATH  Google Scholar 

  • Harrell FE (2001) Regression modeling strategies: with applications to linear modes, logistic regression, and survival analysis. Springer, Heidelberg

    Book  Google Scholar 

  • Kan SH (2003) Metrics and models in software quality engineering, 2nd edn. Pearson, London

    MATH  Google Scholar 

  • Koru G, Zhang D, Liu H (2007) Modeling the effect of size on defect proneness for open-source software. In: 29th international conference on software engineering-companion, pp 115–224

  • Koru AG, Zhang D, Liu H (2007) Modeling the effect of size on defect proneness for open- source software. In: 29th International conference on software engineering, pp 20–26

  • Koru G, Emam KE, Zhang D, Liu H, Mathew D (2008) Theory of relative defect proneness. J Empir Softw Eng 13(5):473–498

    Article  Google Scholar 

  • Koru G, Zhang D, Emam KE, Liu H (2009) An investigation into the functional form of the size-defect relationship for software modules. IEEE Trans Softw Eng 35(2):293–304

    Article  Google Scholar 

  • Kumaresh S, Baskaran R (2010) Defect analysis and prevention for software process quality improvement. Int J Comput Appl (0975 – 8887) 8(7)

  • Laird LM, Brennan MC (2006) Software measurement and estimation: a practical approach. Wiley IEEE Computer Society, Hoboken

    Book  Google Scholar 

  • Lipow M (1982) Number of faults per line of code. IEEE Trans Softw Eng 8(4):437–439

    Article  Google Scholar 

  • McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng 2(6):308–320

    Article  MathSciNet  Google Scholar 

  • McDonald M, Musson R, Smith R (2007) The practical guide to defect prevention. Microsoft Press, Redmond, p 480

    Google Scholar 

  • Nayak SK, Khan RA, Rizwan Beg Md (2012) Requirement defect identification an early stage perspective. IJCSI Int J Comput Sci Iss 9(5)

  • Ostrand TJ, Weyuker EJ, Bell RM (2005) Predicting the location and number of faults in large software systems. IEEE Trans Softw Eng 31(4):340–355

    Article  Google Scholar 

  • Quah TS (2009) Estimating software readiness using predictive model. J Inf Sci 179(4):430–445

    Article  Google Scholar 

  • Raja U, Hale DP, Hale JE (2009) Modeling software evolution defects: A time series approach. J Softw Maint Evol Res Pract 21(1):49–71

    Article  Google Scholar 

  • Selim GMK, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: Proceedings of working conference on reverse engineering, pp 13–21

  • Suma V, Gopalakrishnan Nair TR (2009) Defect management strategies in software development: recent advances in technologies. In: Strangio MA (ed)

  • The R Project of Statistical Computing (2014, May). [Online]. Available: http://www.r-project.org

  • Therneau TM, Grambsch PM (2010) Modelling survival data: extending the Cox model, 1st edn. Springer, New York

    MATH  Google Scholar 

  • Tosun A, Bener A, Turhan B, Menzies T (2010) Practical considerations in deploying statistical methods for defect prediction: a case study within the Turkish telecommunications industry. In: Proceedings of the 5th international conference on predictor models in software engineering, vol 52(11), pp 1242–1257

  • Wang Q, Wu S, Li M (2008) Software defect prediction (in Chinese). J Softw Maint Evol Res Pract 19(7):1565–1580

    Google Scholar 

  • Wedel M, Jensen U, Gohner P (2008) Mining software code repositories and bug databases using survival analysis models. In: 2nd ACM-IEEE international symposium on empirical software engineering and measurement, pp 282–284

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sridhar Patnaik.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix: Derivation of the equation for relative risk proneness probability (RRPP)

Appendix: Derivation of the equation for relative risk proneness probability (RRPP)

In this appendix, we explained the calculation of RRPP of projects chosen by first strategy with respect to another strategy. The first strategy considers first three phases in which the defects recorded are assumed to be d1, d2, d3, d4 and d5. The second strategy considers two phases having detected defects as D1, D2, D3, D4 and D5.

First, let us take a project as reference with total defects P. As we have identified the link function to be logarithmic in nature, we used the Eq. (4) without time parameter t to show the RRPP of individual project as:

$$ e^{{({\text{In}}\,d = {\text{In}}\,P)}} = e^{{\beta {\text{In}}\frac{d}{P}}} $$

For every strategy, we calculated the sum of RRPP of selected individual phases with respect to reference project P. To find the RRPP, we took the ratio of their sums as:

$$ \begin{aligned} RRPP & = \frac{{\sum\nolimits_{i = 1}^{i = n} {e^{{\beta ({\text{In}}\,d_{i} = {\text{In}}\,P)}} } }}{{\sum\nolimits_{i = 1}^{i = n} {e^{{\beta ({\text{In}}\,D_{i} = {\text{In}}\,P)}} } }} \\ & = \frac{{\sum\nolimits_{i = 1}^{i = n} {\frac{{e^{{\beta {\text{In}}\,d_{i} }} }}{{e^{{\beta {\text{In}}\,P}} }}} }}{{\sum\nolimits_{i = 1}^{i = n} {\frac{{e^{{\beta {\text{In}}\,D_{i} }} }}{{e^{{\beta {\text{In}}\,P}} }}} }} \\ & = \frac{{\frac{1}{{e^{{\beta {\text{In}}\,P}} }}\sum\nolimits_{i = 1}^{i = n} {e^{{\beta {\text{In}}\,d_{i} }} } }}{{\frac{1}{{e^{{\beta {\text{In}}\,P}} }}\sum\nolimits_{i = 1}^{i = n} {e^{{\beta {\text{In}}\,D_{i} }} } }} \\ & = \frac{{\sum\nolimits_{i = 1}^{i = n} {e^{{\beta \,{\text{In}}\,d_{i} }} } }}{{\sum\nolimits_{i = 1}^{i = n} {e^{{\beta \,{\text{In}}\,D_{i} }} } }} \\ \end{aligned} $$

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jha, P., Patnaik, K.S. Relative risk proneness in phases of software development: metric based approach with Cox model. Int J Syst Assur Eng Manag 10, 1544–1554 (2019). https://doi.org/10.1007/s13198-019-00904-8

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-019-00904-8

Keywords

Navigation