Software Quality Assurance Models and Application to Defect Prediction Techniques
Keywords:
Defect prediction techniques, Quality Assurance, Quality Models, Quality Standards, Quality ApplicationsAbstract
The needs for hardware and software applications have emerged because of recent technological breakthroughs. Along with this advancement in technology, the need for software across a wide range of applications has dramatically increased. Any software sector, creating high-quality software and preserving its renown for users the most crucial undertaking for the expansion of the software industry. This must be accomplished, for software industries, software engineering is crucial. However, applying such standards to instill trust in the minds of consumers is not always straightforward. In general, the software development team perceives quality assurance in software development as an additional lengthy and extremely documentation-intensive operation that is of little value to the client. Consequently, this paper will demonstrate that the quality of the notion can be addressed from various perspectives depending on the individual's take and interest might be challenging to determine. In addition, we discussed some standards, models and applications of quality and assurance in software engineering by utilizing soft computing-based machine learning approaches that help to forecast, optimize, and efficiently learn the features, we intend to develop an effective method for predicting software defects.
Downloads
References
S. S. Yau, et al., "An integrated expert system framework for software quality assurance," in Computer Software and Applications Conference, 1990. COMPSAC 90. Proceedings., Fourteenth Annual International, 1990, pp. 161-166.
P. Runeson and P. Isacsson, "Software quality assurance-concepts and misconceptions," in Euromicro Conference, 1998. Proceedings. 24th, 1998, pp. 853-859 vol.2. DOI: 10.1109/EURMIC.1998.708112
L. Schrettner, et al., "Software Quality Model and Framework with Applications in Industrial Context," in Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on, 2012, pp. 453-456. DOI: 10.1109/CSMR.2012.57
C. G. Manak, "Software Quality Assurance Management," in Military Communications Conference - Communications-Computers: Teamed for the 90's, 1986. MILCOM 1986. IEEE, 1986, pp. 21.2.1-21.2.2.
F. B. Brown, et al., "MCNP version 5," Trans. Am. Nucl. Soc, vol. 87, p. 4, 2002.
O. Balci, "Validation, verification, and testing techniques throughout the life cycle of a simulation study," in Simulation Conference Proceedings, 1994. Winter, 1994, pp. 215-220.
D. Samadhiya, et al., "Quality models: Role and value in software engineering," in Software Technology and Engineering (ICSTE), 2010 2nd International Conference on, 2010, pp. V1-320-V1-324.
R. Saini, et al., "Analytical study of maintainability models for quality evaluation," Indian Journal of Computer Science and Engineering, vol. 2, pp. 449-454, 2011.
L. P. Dreyfus, et al., "The impact of just-in-time implementation and ISO 9000 certification on total quality management," Engineering Management, IEEE Transactions on, vol. 51, pp. 125-141, 2004.
Rajbahadur, G.K., Wang, S., Kamei, Y., Hassan, A.E. 2017, May. The impact of using regression models to build defect classifiers. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) 135–145. IEEE..
He, P., Li, B., Liu, X., Chen, J., Ma, Y. 2015. An empirical study on software defect prediction with a simplified metric set. Information and Software Technology, 59, 170–190.
Kim, S., Zhang, H., Wu, R., Gong, L. 2011, May. Dealing with noise in defect prediction. In 2011 33rd International Conference on Software Engineering (ICSE). 481–490. IEEE.
L. Davila-Nicanor and P. Mejia-Alvarez, "Reliability improvement of Web-based software applications," in Quality Software, 2004. QSIC 2004. Proceedings. Fourth International Conference on, 2004, pp. 180-188.
N. Chen, An analysis of a NIDS for hardware/software implementation: University of New Brunswick (Canada). 2006.
J. J. Li and H. Yee, "Code-coverage guided prioritized test generation," in Computer Software and Applications Conference, 2004. COMPSAC 2004. Proceedings of the 28th Annual International, 2004, pp. 178-181 vol.2.
W. Emmerich, "Unit Testing Tools."
D. Barbosa, et al., "ToXgene: a template-based data generator for XML," in Proceedings of the 2002 ACM SIGMOD international conference on Management of data, 2002, pp. 616-616.
Li, Z., Jing, X.Y., Zhu, X., Zhang, H., Xu, B., Ying, S. 2017. On the multiple sources and privacy preservation issues for heterogeneous defect prediction. IEEE Transactions on Software Engineering.
Zimmermann, T., Nagappan, N., Gall, H., Giger, E., Murphy, B. 2009, August. Cross-project defect prediction: a large-scale experiment on data vs. domain vs. process. In Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, 91–100. ACM.
Rahman, F., Posnett, D., Devanbu, P. 2012, November. Recalling the imprecision of cross-project defect prediction. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, 61. ACM.
Radjenović, D., Heričko, M., Torkar, R., Živkovič, A. 2013. Software fault prediction metrics: A systematic literature review. Information and software technology, 55, 1397–1418.
Elish, K.O. and Elish, M.O. (2008) Predicting Defect-Prone Software Modules Using Support Vector Machines. Journal of Systems and Software, 81, 649-660.
Kim, S., Zhang, H., Wu, R. and Gong, L. (2011) Dealing with Noise in Defect Prediction. 2011 33rd International Conference on Software Engineering, 21-28 May 2011, Waikiki, 481-490.
Lee, T., Nam, J., Han, D., Kim, S. and In, H. (2011) Micro Interaction Metrics for Defect Prediction. Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, 5-9 September 2011, Szeged, 311-321.
Nahi, A., Flaih, L., & Jasim, K. (2022). . In Communication Engineering and Computer Science. Retrieved from https://conferences.cihanuniversity.edu.iq/index.php/COCOS/22/paper/view/754
Al-Rabeeah, A., & Hashim, M. (2019). Social Network Privacy Models. Cihan University-Erbil Scientific Journal, 3(2), 92-101. https://doi.org/10.24086/cuesj.v3n2y2019.pp92-101
A. A. N. Al-Rabeeah and F. Saeed, "Data privacy model for social media platforms," 2017 6th ICT International Student Project Conference (ICT-ISPC), 2017, pp. 1-5, doi: 10.1109/ICT-ISPC.2017.8075361.
Al-Majdi, K., Salman, A., Abbas, N., Hashim, M., Taha, M., Nahi, A., Saleh, S. (2022). MLCM: An efficient image encryption technique for IoT application based on multi-layer chaotic maps. International Journal of Nonlinear Analysis and Applications, 13(2), 1591-1615. doi: 10.22075/ijnaa.2022.6571
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.