Abstract
Software quality analysis and estimation is essential in developing a software to avoid faults and increase the reliability. Software quality model (SQM) is highly concerned with standard metrics to qualify the software modules to classify bug or no bug. By using these models, it is easy to identify the hurdles called as errors or faults Apriori to the development cycle. More likely the metrics will not follow the standard protocol in terms of size, performance, technology and the complexity involved. It will vary across the projects. Surprisingly there is no model-based architecture driven tool is available to intact the baseline estimates of the project based on the previous knowledge resource. In earlier research works, various quality assurance metrics are used for analysing the SQ. Also, there is no existing approaches can do earlier prediction of the faults/errors or reduced misclassification rates. But, the COCOMO (COnstructive COst MOdel) gives an approximate estimate in terms of the month constant will not be same for simulating the study. Hence By combining more than one model estimates COCOMO and Gaussian Membership Function software estimate relative error will be the best suite. A fuzzy-based analogy is obtained in the present study to select the nearest path from the history available to meet the project cost and time. Small or standard training sets were considered to deploy the estimate, and compare the performance with different estimators. From the experiment, it is concluded that the proposed fuzzy-COCOMO model outperforms than the existing approaches in terms of relative error.
Similar content being viewed by others
References
Alavalapati GG, Reddy R, Ashok KD, Vanga O, Awais A, Ji SS (2018) A privacy preserving three-factor authenticated key agreement protocol for client–server environment. IEEE J Ambient Intell Humaniz Comput 10(2):661–668
Amin R, Islam SH, Biswas GP, Khan MK, Obaidat MS (2015) Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system. J Med Syst 39(11):1–20
Barry WB, Ricardo V (2008) Achievements, and challenges in COCOMO-based software resource estimation. J Med Syst 39(8):1–19
Bellare M, Rogaway P (1994) Entity authentication and key distribution. In: Stinson DR (ed) Advances in cryptology — CRYPTO’93. Lecture Notes in Computer Science, vol 773. Springer, Berlin, Heidelberg, pp 232–249
Briand LC, Eman KE, Maxwell KD (1999) An assessment and comparison of common software cost estimation modeling techniques. Inf Sci 321:224–237
Brown E (2016) Who needs the internet of things?. https://www.linux.com/news/who-needs-internet-things/
Celikyilmaz A, Turksen IB (2008) Enhanced fuzzy system models with improved fuzzy clustering algorithm. J Med Syst 39(11):1–18
Chen BL, Kuo WC, Wuu LC (2015) Robust smart-card-based remote user password authentication scheme. Int J Commun Syst. https://doi.org/10.1002/dac.2368(In press)
Deepa G, Saurabh M (2015) Analyzing the impact of different factors on software cost estimation in today’s scenario. J Softw Eng Appl 6523(8):245–251
Jacky WK, Barbara AK, David RJ (2008) “Analogy-X: providing statistical inference to analogy-based” software cost estimation. J Med Syst 38:9994
Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart card. IEEE Trans Ind Electron 55(6):2551–2556
Li XX, Qiu WD, Zheng D, Chen KF, Li JH (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793–800
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2013.02.034(In press)
Mendes E, Kitchenham BA (2004) Further comparison of cross-company and within-company effort estimation models for web applications. In: 10th international symposium on software metrics, 2004. Proceedings, IEEE, pp 348–357. https://doi.org/10.1109/metric.2004.1357920
Mendes E, Mosley N, Counsell S (2003) A replicated assessment of the use of adaptation rules to improve Web cost estimation. In: 2003 international symposium on empirical software engineering, 2003. ISESE 2003, Proceedings, IEEE, pp 100–109. https://doi.org/10.1109/isese.2003.1237969
Myrtvelt I, Stensrud E (1999) A controlled experiment to assess the benefits of estimating with analogy and regression models. IEEE Trans Softw Eng 25(4):510–525 (0098-5589)
Niu YJ, Wang XY (2011) Analogy-based software effort estimation using fuzzy numbers. J Syst Softw 16(4):1986–1992
Sarra N, Mohamed EE, Leila AS (2018) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. Nonlinear Dyn 74(1–2):447–489
Shepperd M, Schofield C (2015) Estimating software project effort using analogies. Software Engineering, 1995. http://csrc.nist.gov/publications/softwares/soft180-4/soft-180-4.pdf. Accessed Sept 2015
Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Syst 36(4):2325–2337
Xie Q, Hu B, Wu T (2015) Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using servers public key and smart card. Nonlinear Dyn 79(4):2345–2358
Xu X, Zhu P, Wen Q, Jin Z, Zhang H, He L (2013) Proposing a new software cost estimation model based on artificial neural networks. J Med Syst 38(1):1–7
Yeh HL, Chen TH, Shih WK (2014) Ranking and clustering software cost estimation models through a multiple comparisons algorithm. IEEE Trans Softw Eng 36(2):397–402
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Manikavelan, D., Ponnusamy, R. Software quality analysis based on cost and error using fuzzy combined COCOMO model. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-01783-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-020-01783-9