Skip to main content
Log in

Software quality analysis based on cost and error using fuzzy combined COCOMO model

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Software quality analysis and estimation is essential in developing a software to avoid faults and increase the reliability. Software quality model (SQM) is highly concerned with standard metrics to qualify the software modules to classify bug or no bug. By using these models, it is easy to identify the hurdles called as errors or faults Apriori to the development cycle. More likely the metrics will not follow the standard protocol in terms of size, performance, technology and the complexity involved. It will vary across the projects. Surprisingly there is no model-based architecture driven tool is available to intact the baseline estimates of the project based on the previous knowledge resource. In earlier research works, various quality assurance metrics are used for analysing the SQ. Also, there is no existing approaches can do earlier prediction of the faults/errors or reduced misclassification rates. But, the COCOMO (COnstructive COst MOdel) gives an approximate estimate in terms of the month constant will not be same for simulating the study. Hence By combining more than one model estimates COCOMO and Gaussian Membership Function software estimate relative error will be the best suite. A fuzzy-based analogy is obtained in the present study to select the nearest path from the history available to meet the project cost and time. Small or standard training sets were considered to deploy the estimate, and compare the performance with different estimators. From the experiment, it is concluded that the proposed fuzzy-COCOMO model outperforms than the existing approaches in terms of relative error.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Alavalapati GG, Reddy R, Ashok KD, Vanga O, Awais A, Ji SS (2018) A privacy preserving three-factor authenticated key agreement protocol for client–server environment. IEEE J Ambient Intell Humaniz Comput 10(2):661–668

    Google Scholar 

  • Amin R, Islam SH, Biswas GP, Khan MK, Obaidat MS (2015) Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system. J Med Syst 39(11):1–20

    Google Scholar 

  • Barry WB, Ricardo V (2008) Achievements, and challenges in COCOMO-based software resource estimation. J Med Syst 39(8):1–19

    Google Scholar 

  • Bellare M, Rogaway P (1994) Entity authentication and key distribution. In: Stinson DR (ed) Advances in cryptology — CRYPTO’93. Lecture Notes in Computer Science, vol 773. Springer, Berlin, Heidelberg, pp 232–249

    Google Scholar 

  • Briand LC, Eman KE, Maxwell KD (1999) An assessment and comparison of common software cost estimation modeling techniques. Inf Sci 321:224–237

    Google Scholar 

  • Brown E (2016) Who needs the internet of things?. https://www.linux.com/news/who-needs-internet-things/

  • Celikyilmaz A, Turksen IB (2008) Enhanced fuzzy system models with improved fuzzy clustering algorithm. J Med Syst 39(11):1–18

    Google Scholar 

  • Chen BL, Kuo WC, Wuu LC (2015) Robust smart-card-based remote user password authentication scheme. Int J Commun Syst. https://doi.org/10.1002/dac.2368(In press)

    Article  Google Scholar 

  • Deepa G, Saurabh M (2015) Analyzing the impact of different factors on software cost estimation in today’s scenario. J Softw Eng Appl 6523(8):245–251

    Google Scholar 

  • Jacky WK, Barbara AK, David RJ (2008) “Analogy-X: providing statistical inference to analogy-based” software cost estimation. J Med Syst 38:9994

    Google Scholar 

  • Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart card. IEEE Trans Ind Electron 55(6):2551–2556

    Article  Google Scholar 

  • Li XX, Qiu WD, Zheng D, Chen KF, Li JH (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793–800

    Article  Google Scholar 

  • Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2013.02.034(In press)

    Article  Google Scholar 

  • Mendes E, Kitchenham BA (2004) Further comparison of cross-company and within-company effort estimation models for web applications. In: 10th international symposium on software metrics, 2004. Proceedings, IEEE, pp 348–357. https://doi.org/10.1109/metric.2004.1357920

  • Mendes E, Mosley N, Counsell S (2003) A replicated assessment of the use of adaptation rules to improve Web cost estimation. In: 2003 international symposium on empirical software engineering, 2003. ISESE 2003, Proceedings, IEEE, pp 100–109. https://doi.org/10.1109/isese.2003.1237969

  • Myrtvelt I, Stensrud E (1999) A controlled experiment to assess the benefits of estimating with analogy and regression models. IEEE Trans Softw Eng 25(4):510–525 (0098-5589)

    Article  Google Scholar 

  • Niu YJ, Wang XY (2011) Analogy-based software effort estimation using fuzzy numbers. J Syst Softw 16(4):1986–1992

    MATH  Google Scholar 

  • Sarra N, Mohamed EE, Leila AS (2018) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. Nonlinear Dyn 74(1–2):447–489

    Google Scholar 

  • Shepperd M, Schofield C (2015) Estimating software project effort using analogies. Software Engineering, 1995. http://csrc.nist.gov/publications/softwares/soft180-4/soft-180-4.pdf. Accessed Sept 2015

  • Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Syst 36(4):2325–2337

    Article  Google Scholar 

  • Xie Q, Hu B, Wu T (2015) Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using servers public key and smart card. Nonlinear Dyn 79(4):2345–2358

    Article  MathSciNet  Google Scholar 

  • Xu X, Zhu P, Wen Q, Jin Z, Zhang H, He L (2013) Proposing a new software cost estimation model based on artificial neural networks. J Med Syst 38(1):1–7

    Google Scholar 

  • Yeh HL, Chen TH, Shih WK (2014) Ranking and clustering software cost estimation models through a multiple comparisons algorithm. IEEE Trans Softw Eng 36(2):397–402

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Manikavelan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manikavelan, D., Ponnusamy, R. Software quality analysis based on cost and error using fuzzy combined COCOMO model. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-01783-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-020-01783-9

Keywords

Navigation