2012
DOI: 10.5120/7451-0534
|View full text |Cite
|
Sign up to set email alerts
|

Modified Jelinski-Moranda Software Reliability Model with Imperfect Debugging Phenomenon

Abstract: In this paper, we have modified the Jelinski-Moranda (J-M) model of software reliability using imperfect debugging process in fault removal activity. The J-M model was developed assuming the debugging process to be perfect which implies that there is one-to-one correspondence between the number of failures observed and faults removed. But in reality, it is possible that the fault which is supposed to have been removed may cause a new failure. In the proposed modified J-M model, we consider that whenever a fail… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Geol considered that the time between failures are taken to be exponentially distributed. Different enhancements have been proposed to the existing time between failure models .…”
Section: Related Workmentioning
confidence: 99%
“…Geol considered that the time between failures are taken to be exponentially distributed. Different enhancements have been proposed to the existing time between failure models .…”
Section: Related Workmentioning
confidence: 99%
“…Here, INPUTS as normalized time and TARGETS as normalized cumulative faults, the work flow for the proposed SBPNNDWCM design process has a form of pseudocode as given below : S1: INITIALIZE S2: Set initial INPUTS and TARGETS. S3: INPUTS and TARGETS can be considered as either rows or columns of preprocessed data. S4: Load the data sets INPUTS and TARGETS. S5: Create the network object and select randomly divided data sets for validation and testing: Training: The network is adjusted according to its error. S6: Set the hidden layers. S7: Configure the network, and train the network. S8: Repeat S2 to S4 if the network does not perform well after training. S9: Finally, evaluate the network. The best network with highest prediction performance were recorded. S10: Optionally test network on more data: increase iteration then retrain of the network, (b)if increase, then network size should be adjusted, (c)if data set does not work, then follow S3. S14: Save the network; otherwise, follow S1 to S5 S15: STOP. …”
Section: Description Of Proposed Sbpnn For Dwcm Modelmentioning
confidence: 99%
“…Software failure occurs because of hidden bugs in the software instead of immediate fixes for detected errors during development, but new errors may be introduced during debugging. Some reliability models have also been developed to address fault detection; correction ; testing coverage ; and imperfect debugging processes .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation