Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.36-39
ISSN: 2278-2419
36
Improvement of Software Maintenance and
Reliability using Data Mining Techniques
Yethiraj N G
Assistant Professor, Department of Computer Science
Maharani’s Science College for Women, Bangalore, India
.
Abstract-Software is ubiquitous in our daily life. It brings us
great convenience and a big headache about software reliability
as well: Software is never bug-free, and software bugs keep
incurring monetary loss of even catastrophes. In the pursuit of
better reliability, software engineering researchers found that
huge amount of data in various forms can be collected from
software systems, and these data, when properly analyzed, can
help improve software reliability. Unfortunately, the huge
volume of complex data renders the analysis of simple
techniques incompetent; consequently, studies have been
resorting to data mining for more effective analysis. In the past
few years, we have witnessed many studies on mining for
software reliability reported in data mining as well as software
engineering forums. These studies either develop new or apply
existing data mining techniques to tackle reliability problems
from different angles. In order to keep data mining researchers
abreast of the latest development in this growing research area,
we propose this paper on data mining for software reliability.
In this paper, we will present a comprehensive overview of this
area, examine representative studies, and lay out challenges to
data mining researchers.
Key words- Software, Software Reliability, Data Mining,
Frequent Item Set, Extracting Rules.
I. INTRODUCTION
The economies of all developed nations are dependent on
software. More and More systems are software controlled.
Software Engineering is concerned with theories, methods and
tools for professional software development. Software
Engineering is an engineering discipline which is concerned
with all aspects of software production. Software Engineers
should adopt a systematic and organized approach to their
work and use appropriate tools and techniques depending on
the problem to be solved, the development constraints and the
resources available. Software reliability, unlike many other
quality factors, can be measured directed and estimated using
historical and developmental data [1]. Software reliability is
defined in statistical terms as “the probability of failure-free
operation of a computer program in a specified environment
for a specific time”. Measures of reliability- if we consider a
computer-based system, a simple measure of reliability is
mean-time-between-failure (MTBF),where MTBF = MTTF +
MTTR, the acronym MTTF and MTTR are mean-time-to-
failure and mean-time-to-repair respectively [2].Software
reliability specification- Reliability is a complex concept that
should always be considered at the system rather than the
individual component level. Because the components in a
system are interdependent, a failure in one component can be
propagated through the system and affect the operation of other
components. In a computer-based system, we have to consider
three dimensions when specifying the overall system
reliability:
Hardware reliability- What is the probability of a hardware
component failing and how long would it take to repair that
component? (ii) Software reliability- How likely is it that a
software component will produce an incorrect output?
Software failures are different from hardware failures in that
software does not wear out: It can continue operating correctly
after producing an incorrect result. (iii) Operator reliability –
How likely is it that the operator of a system will make an
error? [1].
Following are the basic terminologies that are frequently used
for reliability-Table-1
System
Failure
When the system does not perform as per the
user expectations, then system failure occurs.
System
Error
When the system gives the result in an
unexpected manner then the system error occurs.
System
Fault
It is probability of the system that the failure can
lead to system error.
Human
Error
It is human activity that makes the system fault to
occur.
Mining Software Engineering Data –The main goal is to
transform static record – keeping Software Engineering data to
active data so that the hidden patterns and trends could be
explored.Normally, a Software is “full of bugs”, In Windows
2000, containing35 million lines of code, there were 63,000
known bugs at the time of release, 2 per 1000 lines. Software
failure costs are becoming very high. A study by the National
Institute of Standards and Technology found that software
errors cost the U.S. economy about $59.5 billion annually. So
testing and debugging are laborious and expensive. “50% of
my company employees are testers, and the rest spends 50% of
their time testing!” —Bill Gates, in 1995. In general Software
is complex for e.g., MySQL has 1.2 millions of LOC and its
runtime data is larger and more complex. In fact, finding bugs
is challenging which requires
specifications/properties, which often don’t exist and also
substantial human efforts in analysing data are required [3].
Software Reliability Methods are:
 Static Bug Detection - Without running the code, detect
bugs in code,
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.36-39
ISSN: 2278-2419
37
 Dynamic Bug Detection (aka. Testing) - Run the code with
some test inputs and detect failures/bugs and
 Debugging - Given known test failures (symptoms),
pinpoint the bug locations in the code.
Mining for Soft Reliability is absolutely needed because,
i. Finding bugs is challenging.It requires
specifications/properties, which often don’t exist and
also require substantial human efforts in analyzing
data.
ii. We can mine common patterns as likely
specifications/properties Detect violations of patterns
as likely bugs.
iii. We can mine huge data for patterns or locations to
narrow down the scope of human inspection
II. TECHNIQUES
The Software engineering tasks helped by data mining are – (i)
programming,(ii)defect detection,(iii)testing,(iv)debugging
and(v)maintenance.Data mining techniques
are(i)Classification, (ii) Association, (iii) Patterns Detection,
(iv) Clustering [4].
Software engineering data
Considered are- (i) Code bases, (ii)
change history, (iii) program states,(iv)
structural entities and (v) bug reports [5].
III. ANALYSIS
Data Mining for Software Bug Detection needs frequent
pattern mining then automated Debugging in Software
Programs is carried out from frequent patterns to software bugs
and statistical debugging. Further, automated Debugging in
computer systems is carried out from (i) Automated diagnosis
of system misconfigurations and (ii) performance debugging
[6].
A. Software Bug Detection
Common approach: mining rules/patterns from source
code/revision histories and detecting bugs as rule/pattern
violations.
B. Mining rules from source code
i. Bugs as deviant behaviour [Engler et al., SOSP’01]
ii. Mining programming rules with PR-Miner [Li et al.,
FSE’05]
iii. Mining function precedence protocols [Ramanathan et
al., ICSE’07]
iv. Revealing neglected conditions [Chang et al.,
ISSTA’07]
C. Mining rules from revision histories
i. DynaMine [Livshits& Zimmermann, FSE’05]
D. Mining copy-paste patterns from source code
ii. CP-Miner [Li et al., OSDI’04] to find copy-paste bugs
[7].
Bugs as Deviant Behaviour
Static verification tools need rules to check against program
code.To find errors without knowing the truth
 Contradiction in belief. To find lies: cross-examine
one witness or many witness. Any contradiction is an
error (internal consistency)
 Deviation from common behaviour. To infer correct
behaviour: if 1 person does X, might be right or a
coincidence. If 1000s do X and 1 does Y, probably an
error (statistical analysis)
IV. A BRIEF METHODOLOGY: SOFTWARE BUG
DETECTION
Based on the discussion presented in the previous section, the
following steps for software bug detection are presented.
Step 1:Mining rules from source code [8]
 Bugs as deviant 37ehaviour [Engler et al., SOSP’01]
 Mining techniques: Statistical analysis
 Mining programming rules with PR-Miner [Li et al.,
FSE’05]
 Mining function precedence protocols [Ramanathan et
al., ICSE’07]
 Revealing neglected conditions [Chang et al.,
ISSTA’07]
Step 2:Mining copy-paste patterns from source code
 CP-Miner [Li et al., OSDI’04] to find copy-paste bugs
An Overview of Extracting Rules –
Observation: elements are usually used
together.Idea: finding association among elements that
arefrequently used togetherin source code Implies frequent
item set mining [9].Examples:spin_lock_irqsave and
spin_unlock_irqrestore
appear together within the same function more than 3600
times.
Step 3: Mining Programming Patterns and Generation of Rules
–
Parsing Source Code – Purpose: building an item set database.
Element: function call, variable, data type, etc. are mapped to a
number. The Source code is mapped to an item set database.A
frequent sub-item set corresponds to a programming pattern
and application of frequent item set mining algorithm on the
item set database.
E.g., {39, 68, 36, 92}:27 corresponds to pattern
{Scsi_Host, host_alloc, add_host, scan_host}
 Tradeoff: consider order or not
Step 4: Generating Programming Rules Programming patterns
- programming rules
E.g., Patterns: {a, b, d} : 3,
{a} : 4
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.36-39
ISSN: 2278-2419
38
Source files
Parsing & hashing
Pre-Processing
Itemsets
Mining
Programming patterns
Post-Processing
Generating rules
Programming rules
Fig.1 Flowchart of Extracting Rules
Rules:
{a} => {b,d} with confidence = ¾ =75%
{b} => {a,d} with confidence = 100%
{d} => {a,b} with confidence = 100%
{a,b} => {d} with confidence = 100%
{a,d} => {b} with confidence = 100%
{b,d} => {a} with confidence = 100%
Rule Explosion Problem
 Exponential number of rules
 Solution: closed mining
Example:
{a,b,d}:3, {a}:4
{a,b}:3, {a,d}:3, {b,d}:3 are not closed
 Close rules
{a,b,d}:3 | {a}:4
Detection of Violations
For violations of a programming rule
(i) The rule holds for most cases
 Confidence > threshold
(ii) The rule is violated for a few cases
 Confidence < 100%
Example: Detecting Violations
Step 5:Programming patterns:
{Scsi_Host, host_alloc, add_host, scan_host}: 27
{Scsi_Host, host_alloc, add_host}: 29
Programming rule:
{Scsi_Host, host_alloc, add_host}=>
{scan_host}
with confidence 27/29 = 93%
Missing
Table 2: Some Results of Bug Detection
Software #C files LOC #functions
Linux 3,538 3,037,403 73,607
Postgre SQL 409 381,192 6,964
Apache 160 84,724 1,912
Table-3
Software Inspected (top 60)
Bugs Anomalies False Positives
Linux 16 20 24
Postgre SQL 6 9 45
Apache 1 0 6
V. LIMITATIONS OF PR-MINER
Rules across multiple functions
 Not using inter-procedural analysis
False negatives of violations in control paths
 Not using sophisticated analysis techniques
 Inter-procedural, path-sensitive inference of function
precedence protocols to address the limitations
[Ramanathan et al., ICSE’07] [10].
We shall now discuss Mining Function Precedence Protocols
fp = fopen(…);
fclose(…);
a) Definition:-Precedence protocol:
A call tofcloseis always preceded by a call tofopen
b) Definition:-Successor protocol :
A call tofopenis always succeeded by a call tofclose
c) Violation of Precedence Protocols
fp = fopen(…);
if(fp == NULL)
exit(-1);
fclose(…);
d) Tool Implementation/Evaluation
CHRONICLER – tool implemented in C has the following
features:
Tested on open source C programs
Apache, linux, openssh, gimp,postgresql
Lines of code varies from 66K to 2M
Number of call-sites varies from 10K to 110K
e) Some Results of Precedence-Related Bug Detection
Case Study: Linux
Hardware Bug
 Difficult to detect using traditional testing techniques
 Platform dependent error
 Transparently identified using CHRONICLER
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume: 01 Issue: 02 December 2012 Page No.36-39
ISSN: 2278-2419
39
Performance Bug
 Cache lookup operation was absent
 Not easily specified as a bug for testing
 Deviation delays data write flushes [11].
f) Limitation of Precedence-Related Bug Detection
 Does not take data flow or data dependency into
account
 A new approach to discovering neglected conditions
[Chang et al., ISSTA’07] addresses the issue
 Based on dependence analysis, frequent item set, and
frequent sub graph mining
g) Crucial Observation
Things that are frequently changed together often form a
pattern...also known as co-changeCo-changed items = patterns
h) Finding Patterns
Find “frequent itemsets” (with Apriori)
o.enterAlignment()
o.exitAlignment()
o.redoAlignment()
iter.hasNext()
iter.next()
{enterAlignment (), exitAlignment(),
redoAlignment()}
i) Ranking Patterns
Support count = #occurrences of a pattern
Confidence count= Strength of a pattern, P (A|B)
j) Pattern classification
Post-process
v validations, e violations
Usage error unlikely
patterns patterns patterns
e<v/10 v/10<=e<=2v otherwise
Fig. 2
Results of Mining Patterns
Usage pattern – 15
Error Pattern- 8
Unlikely Pattern – 11
Not Hit – 24
Total – 56 Patterns
Mining into Computer SystemsHuge volume of data from
computer systems
Persistent state interactions, event logs, network logs, CPU
usage …
Mining system data for …
Reliability
Performance
Manageability …
VI. CONCLUSION
Challenges in data mining-Statistical modelling of computer
systemsOnline, scalability, interpretability …Data Mining for
Software Bug DetectionFrequent pattern mining.Automated
Debugging in Software Programs-From frequent patterns to
software bugs.Statistical debugging-Automated Debugging in
Computer Systems.Automated diagnosis of system
misconfigurations.Limitations of Bugs as Deviant Behaviour
Fixed rule templates.Need specific knowledge about the
software.2 elements.PR-Miner [Li et al., FSE’05] (mining
implicit programming rules) developed to address the
limitations.General method (No prior knowledge; No
templates).General rules (Different types: function, variable,
data type, etc.;Multiple elements)Ubiquitous computing
demands reliable software- Mining for software
reliability.Mining program source code/version histories to
find bugs.Mining program runtime data to locate why an
execution fails.Mining system snapshots to diagnose
misconfigurations and performance problems.An active and
rewarding research area.International Workshop on Mining
Software Repositories since 2004.SIGCOMM Workshop on
Mining Network Data since 2005.Systems and Machine
Learning Workshop since 2006.Workshop on Statistical
Learning Techniques for Solving Systems.Problems, co-
located with NIPS
REFERENCES
[1] Ian Sommerville, Software Engineering 8th
edition, Pearson Education
Publications, 2007.
[2] Roger S. Pressman, Software Engineering: A Practitioner’s Approach, 6th
edition McGraw-Hill International edition Publications, 2005.
[3] James S. Peters &WitoldPedrycz, Software Engineering an Engineering
Approach, Wiley Publications, 2000.
[4] Jiawei Han &MichelineKamber, Data Mining: Concepts and Techniques,
2nd
edition,, Elsevier Publications, March 2006.
[5] Chai Liu, Long Fei, Xifang Yan, Jiawei Han and Samuel Midkiff,
Statistical Debugging: A Hypothesis Testing-based approach, IEEETSE
2006.
[6] Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou and Benjamin
Chelf, Bugs as Deviant Behaviour: A General approach to inferring
errors in systems code, SOSP 2001.
[7] Zhenmin Li, Shan Lu, SuvdaMyagmar and Yuanyan Zhou, CP-Miner: A
tool for finding copy-paste and related bugs in operating system code,
OSPI 2004.
[8] Prof. S. Chitra&Dr. M. Rajaram, A Software Reliability Estimation tool
using Artificial Immune Recognition System: Proceedings of the
International Multiconference of Engineers and computer scientists 2008
vol 1, IMECS 2008, pp. 19-21 March 2008, Hong Kong.
[9] Leon Wu, BoyiXie, Gail Kaiser & Rebecca Passonneau, Department of
Computer Science, Columbia University, Newyork NY 10027 USA,
BUGMINER: Software Reliability Analysis via Data Mining of Bug
Reports2007.
[10] Swapna S. Gokhale, Member, IEEE, A Simulation Approach to
structured-based software reliability analysis, IEEE transactions on
Software Engineering, vol 31, No. 8, August 2005.
[11] Simon P. Wilson and Francisco J. Samaniego,Nonparametric Analysis of
the order-statistic model in software reliability, IEEE transactions on
software engineering, vol 33, No. 3, March 2007.

Recommended for you

Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...

This document discusses the implementation of a secured network-based intrusion detection system using the support vector machine (SVM) algorithm. It begins with an abstract that outlines hardening different intrusion detection implementations and proposals. The paper then discusses using naive Bayes, a classification method for intrusion detection, to analyze transmitted data for malicious content and block transmissions from corrupted hosts. It also discusses using flow correlation information to improve classification accuracy while minimizing effects on network performance.

irjet
A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...

This academic article summarizes a research paper that proposes a new process analysis method using process mining to discover user behaviors and predict the next application a user will access based on audit logs. The method introduces building a weighted directed graph to represent relationships between different processes accessed in user sessions. It then uses this "reference graph" and random walk theory to evaluate future user sessions and determine which processes are most likely to be explored next. The paper outlines collecting log data from multiple systems, managing the data using classification algorithms, and applying the proposed random walk technique to detect user behaviors and predict the next application.

find more information on http://www.iiste.orginternational peer-reviewed academic journals call
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS

This document presents a static malware detection system using data mining techniques. The system extracts raw features from Windows Portable Executable (PE) files including PE header information, DLLs, and API functions. It then selects important features using Information Gain and reduces dimensions using Principal Component Analysis. Three classifiers (SVM, J48, Naive Bayes) are trained on the transformed feature vectors to classify files as malicious or benign. When evaluated on a dataset of over 247,000 files, the system achieved a detection rate of 99.6%.

information securitymalware detectionmalicious codes

More Related Content

What's hot

A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
IOSR Journals
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
 
A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...
Alexander Decker
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
ijaia
 
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
IJNSA Journal
 
J034057065
J034057065J034057065
J034057065
ijceronline
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach  for detecti...Critical analysis of genetic algorithm based IDS and an approach  for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
IOSR Journals
 
Dynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewDynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A Review
CSCJournals
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
 
A Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer NetworksA Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer Networks
Editor IJCATR
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detection
sujeeshkumarj
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioral
ijfcstjournal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
Nishant Mehta
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
 
A035401010
A035401010A035401010
A035401010
inventionjournals
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
csandit
 

What's hot (20)

A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...A self adaptive learning approach for optimum path evaluation of process for ...
A self adaptive learning approach for optimum path evaluation of process for ...
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
 
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
 
J034057065
J034057065J034057065
J034057065
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach  for detecti...Critical analysis of genetic algorithm based IDS and an approach  for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
 
Dynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewDynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A Review
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 
A Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer NetworksA Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer Networks
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detection
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioral
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
A035401010
A035401010A035401010
A035401010
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 

Similar to Improvement of Software Maintenance and Reliability using Data Mining Techniques

A Review on Software Mining: Current Trends and Methodologies
A Review on Software Mining: Current Trends and MethodologiesA Review on Software Mining: Current Trends and Methodologies
A Review on Software Mining: Current Trends and Methodologies
IJERA Editor
 
E018132735
E018132735E018132735
E018132735
IOSR Journals
 
1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx
jackiewalcutt
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materials
smruti sarangi
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
Dr. Amarjeet Singh
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
Techglyphs
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
RaviKalola786
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
MuhammadTalha436
 
Sw engg two mark question
Sw engg two mark questionSw engg two mark question
Sw engg two mark question
Sumathi Gnanasekaran
 
David vernon software_engineering_notes
David vernon software_engineering_notesDavid vernon software_engineering_notes
David vernon software_engineering_notes
mitthudwivedi
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
IRJET Journal
 
Application of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous IntegrationApplication of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous Integration
Dr. Amarjeet Singh
 
Introduction to Software Reverse Engineering
Introduction to Software Reverse EngineeringIntroduction to Software Reverse Engineering
Introduction to Software Reverse Engineering
Teodoro Cipresso
 
Software Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesSoftware Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining Techniques
AM Publications
 
Comparative performance analysis
Comparative performance analysisComparative performance analysis
Comparative performance analysis
csandit
 
H1803044651
H1803044651H1803044651
H1803044651
IOSR Journals
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
IRJET Journal
 
Different Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application TestingDifferent Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application Testing
Rachel Davis
 

Similar to Improvement of Software Maintenance and Reliability using Data Mining Techniques (20)

A Review on Software Mining: Current Trends and Methodologies
A Review on Software Mining: Current Trends and MethodologiesA Review on Software Mining: Current Trends and Methodologies
A Review on Software Mining: Current Trends and Methodologies
 
E018132735
E018132735E018132735
E018132735
 
1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx1. Emergence of Software EngineeringIn the software industry, we.docx
1. Emergence of Software EngineeringIn the software industry, we.docx
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materials
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
 
Sw engg two mark question
Sw engg two mark questionSw engg two mark question
Sw engg two mark question
 
David vernon software_engineering_notes
David vernon software_engineering_notesDavid vernon software_engineering_notes
David vernon software_engineering_notes
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 
Application of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous IntegrationApplication of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous Integration
 
Introduction to Software Reverse Engineering
Introduction to Software Reverse EngineeringIntroduction to Software Reverse Engineering
Introduction to Software Reverse Engineering
 
Software Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesSoftware Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining Techniques
 
Comparative performance analysis
Comparative performance analysisComparative performance analysis
Comparative performance analysis
 
H1803044651
H1803044651H1803044651
H1803044651
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
Different Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application TestingDifferent Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application Testing
 

More from ijdmtaiir

A review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic AnalysisA review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic Analysis
ijdmtaiir
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognition
ijdmtaiir
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Mining
ijdmtaiir
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Mining
ijdmtaiir
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profiling
ijdmtaiir
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
ijdmtaiir
 
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
ijdmtaiir
 
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities MarketAn Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
ijdmtaiir
 
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
ijdmtaiir
 
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
ijdmtaiir
 
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
ijdmtaiir
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
ijdmtaiir
 
Certain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic DataminingCertain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic Datamining
ijdmtaiir
 
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
ijdmtaiir
 
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
ijdmtaiir
 
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic RetinopathyAn Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
ijdmtaiir
 
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
ijdmtaiir
 
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
ijdmtaiir
 
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
ijdmtaiir
 
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
ijdmtaiir
 

More from ijdmtaiir (20)

A review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic AnalysisA review on data mining techniques for Digital Mammographic Analysis
A review on data mining techniques for Digital Mammographic Analysis
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognition
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Mining
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Mining
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profiling
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
 
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
Analysis of Influences of memory on Cognitive load Using Neural Network Back ...
 
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities MarketAn Analysis of Data Mining Applications for Fraud Detection in Securities Market
An Analysis of Data Mining Applications for Fraud Detection in Securities Market
 
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
An Ill-identified Classification to Predict Cardiac Disease Using Data Cluste...
 
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
Scaling Down Dimensions and Feature Extraction in Document Repository Classif...
 
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
Music Promotes Gross National Happiness Using Neutrosophic fuzzyCognitive Map...
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
 
Certain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic DataminingCertain Investigation on Dynamic Clustering in Dynamic Datamining
Certain Investigation on Dynamic Clustering in Dynamic Datamining
 
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
Analyzing the Role of a Family in Constructing Gender Roles Using Combined Ov...
 
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
An Interval Based Fuzzy Multiple Expert System to Analyze the Impacts of Clim...
 
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic RetinopathyAn Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
An Approach for the Detection of Vascular Abnormalities in Diabetic Retinopathy
 
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...Improve the Performance of Clustering Using Combination of Multiple Clusterin...
Improve the Performance of Clustering Using Combination of Multiple Clusterin...
 
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
The Study of Symptoms of Tuberculosis Using Induced Fuzzy Coginitive Maps (IF...
 
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
A Study on Finding the Key Motive of Happiness Using Fuzzy Cognitive Maps (FCMs)
 
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
Study of sustainable development using Fuzzy Cognitive Relational Maps (FCM)
 

Recently uploaded

OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
Blesson Easo Varghese
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理
一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理
一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理
hahehot
 
Literature Reivew of Student Center Design
Literature Reivew of Student Center DesignLiterature Reivew of Student Center Design
Literature Reivew of Student Center Design
PriyankaKarn3
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
Rafael Santos
 
PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
itssurajthakur06
 
一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理
一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理
一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理
byyi0h
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
bookhotbebes1
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
aarusi sexy model
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
sipij
 
Introduction to neural network (Module 1).pptx
Introduction to neural network (Module 1).pptxIntroduction to neural network (Module 1).pptx
Introduction to neural network (Module 1).pptx
archanac21
 
Mumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai Available
Mumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai AvailableMumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai Available
Mumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai Available
1258strict
 
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE DonatoCONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
Servizi a rete
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
Escorts service
 
system structure in operating systems.pdf
system structure in operating systems.pdfsystem structure in operating systems.pdf
system structure in operating systems.pdf
zyroxsunny
 

Recently uploaded (20)

OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理
一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理
一比一原版(skku毕业证)韩国成均馆大学毕业证如何办理
 
Literature Reivew of Student Center Design
Literature Reivew of Student Center DesignLiterature Reivew of Student Center Design
Literature Reivew of Student Center Design
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
 
PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
 
一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理
一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理
一比一原版(UQ毕业证书)昆士兰大学毕业证如何办理
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
 
Introduction to neural network (Module 1).pptx
Introduction to neural network (Module 1).pptxIntroduction to neural network (Module 1).pptx
Introduction to neural network (Module 1).pptx
 
Mumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai Available
Mumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai AvailableMumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai Available
Mumbai @Call @Girls 🛴 9930687706 🛴 Aaradhaya Best High Class Mumbai Available
 
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE DonatoCONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Siliguri 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
 
system structure in operating systems.pdf
system structure in operating systems.pdfsystem structure in operating systems.pdf
system structure in operating systems.pdf
 

Improvement of Software Maintenance and Reliability using Data Mining Techniques

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.36-39 ISSN: 2278-2419 36 Improvement of Software Maintenance and Reliability using Data Mining Techniques Yethiraj N G Assistant Professor, Department of Computer Science Maharani’s Science College for Women, Bangalore, India . Abstract-Software is ubiquitous in our daily life. It brings us great convenience and a big headache about software reliability as well: Software is never bug-free, and software bugs keep incurring monetary loss of even catastrophes. In the pursuit of better reliability, software engineering researchers found that huge amount of data in various forms can be collected from software systems, and these data, when properly analyzed, can help improve software reliability. Unfortunately, the huge volume of complex data renders the analysis of simple techniques incompetent; consequently, studies have been resorting to data mining for more effective analysis. In the past few years, we have witnessed many studies on mining for software reliability reported in data mining as well as software engineering forums. These studies either develop new or apply existing data mining techniques to tackle reliability problems from different angles. In order to keep data mining researchers abreast of the latest development in this growing research area, we propose this paper on data mining for software reliability. In this paper, we will present a comprehensive overview of this area, examine representative studies, and lay out challenges to data mining researchers. Key words- Software, Software Reliability, Data Mining, Frequent Item Set, Extracting Rules. I. INTRODUCTION The economies of all developed nations are dependent on software. More and More systems are software controlled. Software Engineering is concerned with theories, methods and tools for professional software development. Software Engineering is an engineering discipline which is concerned with all aspects of software production. Software Engineers should adopt a systematic and organized approach to their work and use appropriate tools and techniques depending on the problem to be solved, the development constraints and the resources available. Software reliability, unlike many other quality factors, can be measured directed and estimated using historical and developmental data [1]. Software reliability is defined in statistical terms as “the probability of failure-free operation of a computer program in a specified environment for a specific time”. Measures of reliability- if we consider a computer-based system, a simple measure of reliability is mean-time-between-failure (MTBF),where MTBF = MTTF + MTTR, the acronym MTTF and MTTR are mean-time-to- failure and mean-time-to-repair respectively [2].Software reliability specification- Reliability is a complex concept that should always be considered at the system rather than the individual component level. Because the components in a system are interdependent, a failure in one component can be propagated through the system and affect the operation of other components. In a computer-based system, we have to consider three dimensions when specifying the overall system reliability: Hardware reliability- What is the probability of a hardware component failing and how long would it take to repair that component? (ii) Software reliability- How likely is it that a software component will produce an incorrect output? Software failures are different from hardware failures in that software does not wear out: It can continue operating correctly after producing an incorrect result. (iii) Operator reliability – How likely is it that the operator of a system will make an error? [1]. Following are the basic terminologies that are frequently used for reliability-Table-1 System Failure When the system does not perform as per the user expectations, then system failure occurs. System Error When the system gives the result in an unexpected manner then the system error occurs. System Fault It is probability of the system that the failure can lead to system error. Human Error It is human activity that makes the system fault to occur. Mining Software Engineering Data –The main goal is to transform static record – keeping Software Engineering data to active data so that the hidden patterns and trends could be explored.Normally, a Software is “full of bugs”, In Windows 2000, containing35 million lines of code, there were 63,000 known bugs at the time of release, 2 per 1000 lines. Software failure costs are becoming very high. A study by the National Institute of Standards and Technology found that software errors cost the U.S. economy about $59.5 billion annually. So testing and debugging are laborious and expensive. “50% of my company employees are testers, and the rest spends 50% of their time testing!” —Bill Gates, in 1995. In general Software is complex for e.g., MySQL has 1.2 millions of LOC and its runtime data is larger and more complex. In fact, finding bugs is challenging which requires specifications/properties, which often don’t exist and also substantial human efforts in analysing data are required [3]. Software Reliability Methods are:  Static Bug Detection - Without running the code, detect bugs in code,
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.36-39 ISSN: 2278-2419 37  Dynamic Bug Detection (aka. Testing) - Run the code with some test inputs and detect failures/bugs and  Debugging - Given known test failures (symptoms), pinpoint the bug locations in the code. Mining for Soft Reliability is absolutely needed because, i. Finding bugs is challenging.It requires specifications/properties, which often don’t exist and also require substantial human efforts in analyzing data. ii. We can mine common patterns as likely specifications/properties Detect violations of patterns as likely bugs. iii. We can mine huge data for patterns or locations to narrow down the scope of human inspection II. TECHNIQUES The Software engineering tasks helped by data mining are – (i) programming,(ii)defect detection,(iii)testing,(iv)debugging and(v)maintenance.Data mining techniques are(i)Classification, (ii) Association, (iii) Patterns Detection, (iv) Clustering [4]. Software engineering data Considered are- (i) Code bases, (ii) change history, (iii) program states,(iv) structural entities and (v) bug reports [5]. III. ANALYSIS Data Mining for Software Bug Detection needs frequent pattern mining then automated Debugging in Software Programs is carried out from frequent patterns to software bugs and statistical debugging. Further, automated Debugging in computer systems is carried out from (i) Automated diagnosis of system misconfigurations and (ii) performance debugging [6]. A. Software Bug Detection Common approach: mining rules/patterns from source code/revision histories and detecting bugs as rule/pattern violations. B. Mining rules from source code i. Bugs as deviant behaviour [Engler et al., SOSP’01] ii. Mining programming rules with PR-Miner [Li et al., FSE’05] iii. Mining function precedence protocols [Ramanathan et al., ICSE’07] iv. Revealing neglected conditions [Chang et al., ISSTA’07] C. Mining rules from revision histories i. DynaMine [Livshits& Zimmermann, FSE’05] D. Mining copy-paste patterns from source code ii. CP-Miner [Li et al., OSDI’04] to find copy-paste bugs [7]. Bugs as Deviant Behaviour Static verification tools need rules to check against program code.To find errors without knowing the truth  Contradiction in belief. To find lies: cross-examine one witness or many witness. Any contradiction is an error (internal consistency)  Deviation from common behaviour. To infer correct behaviour: if 1 person does X, might be right or a coincidence. If 1000s do X and 1 does Y, probably an error (statistical analysis) IV. A BRIEF METHODOLOGY: SOFTWARE BUG DETECTION Based on the discussion presented in the previous section, the following steps for software bug detection are presented. Step 1:Mining rules from source code [8]  Bugs as deviant 37ehaviour [Engler et al., SOSP’01]  Mining techniques: Statistical analysis  Mining programming rules with PR-Miner [Li et al., FSE’05]  Mining function precedence protocols [Ramanathan et al., ICSE’07]  Revealing neglected conditions [Chang et al., ISSTA’07] Step 2:Mining copy-paste patterns from source code  CP-Miner [Li et al., OSDI’04] to find copy-paste bugs An Overview of Extracting Rules – Observation: elements are usually used together.Idea: finding association among elements that arefrequently used togetherin source code Implies frequent item set mining [9].Examples:spin_lock_irqsave and spin_unlock_irqrestore appear together within the same function more than 3600 times. Step 3: Mining Programming Patterns and Generation of Rules – Parsing Source Code – Purpose: building an item set database. Element: function call, variable, data type, etc. are mapped to a number. The Source code is mapped to an item set database.A frequent sub-item set corresponds to a programming pattern and application of frequent item set mining algorithm on the item set database. E.g., {39, 68, 36, 92}:27 corresponds to pattern {Scsi_Host, host_alloc, add_host, scan_host}  Tradeoff: consider order or not Step 4: Generating Programming Rules Programming patterns - programming rules E.g., Patterns: {a, b, d} : 3, {a} : 4
  • 3. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.36-39 ISSN: 2278-2419 38 Source files Parsing & hashing Pre-Processing Itemsets Mining Programming patterns Post-Processing Generating rules Programming rules Fig.1 Flowchart of Extracting Rules Rules: {a} => {b,d} with confidence = ¾ =75% {b} => {a,d} with confidence = 100% {d} => {a,b} with confidence = 100% {a,b} => {d} with confidence = 100% {a,d} => {b} with confidence = 100% {b,d} => {a} with confidence = 100% Rule Explosion Problem  Exponential number of rules  Solution: closed mining Example: {a,b,d}:3, {a}:4 {a,b}:3, {a,d}:3, {b,d}:3 are not closed  Close rules {a,b,d}:3 | {a}:4 Detection of Violations For violations of a programming rule (i) The rule holds for most cases  Confidence > threshold (ii) The rule is violated for a few cases  Confidence < 100% Example: Detecting Violations Step 5:Programming patterns: {Scsi_Host, host_alloc, add_host, scan_host}: 27 {Scsi_Host, host_alloc, add_host}: 29 Programming rule: {Scsi_Host, host_alloc, add_host}=> {scan_host} with confidence 27/29 = 93% Missing Table 2: Some Results of Bug Detection Software #C files LOC #functions Linux 3,538 3,037,403 73,607 Postgre SQL 409 381,192 6,964 Apache 160 84,724 1,912 Table-3 Software Inspected (top 60) Bugs Anomalies False Positives Linux 16 20 24 Postgre SQL 6 9 45 Apache 1 0 6 V. LIMITATIONS OF PR-MINER Rules across multiple functions  Not using inter-procedural analysis False negatives of violations in control paths  Not using sophisticated analysis techniques  Inter-procedural, path-sensitive inference of function precedence protocols to address the limitations [Ramanathan et al., ICSE’07] [10]. We shall now discuss Mining Function Precedence Protocols fp = fopen(…); fclose(…); a) Definition:-Precedence protocol: A call tofcloseis always preceded by a call tofopen b) Definition:-Successor protocol : A call tofopenis always succeeded by a call tofclose c) Violation of Precedence Protocols fp = fopen(…); if(fp == NULL) exit(-1); fclose(…); d) Tool Implementation/Evaluation CHRONICLER – tool implemented in C has the following features: Tested on open source C programs Apache, linux, openssh, gimp,postgresql Lines of code varies from 66K to 2M Number of call-sites varies from 10K to 110K e) Some Results of Precedence-Related Bug Detection Case Study: Linux Hardware Bug  Difficult to detect using traditional testing techniques  Platform dependent error  Transparently identified using CHRONICLER
  • 4. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume: 01 Issue: 02 December 2012 Page No.36-39 ISSN: 2278-2419 39 Performance Bug  Cache lookup operation was absent  Not easily specified as a bug for testing  Deviation delays data write flushes [11]. f) Limitation of Precedence-Related Bug Detection  Does not take data flow or data dependency into account  A new approach to discovering neglected conditions [Chang et al., ISSTA’07] addresses the issue  Based on dependence analysis, frequent item set, and frequent sub graph mining g) Crucial Observation Things that are frequently changed together often form a pattern...also known as co-changeCo-changed items = patterns h) Finding Patterns Find “frequent itemsets” (with Apriori) o.enterAlignment() o.exitAlignment() o.redoAlignment() iter.hasNext() iter.next() {enterAlignment (), exitAlignment(), redoAlignment()} i) Ranking Patterns Support count = #occurrences of a pattern Confidence count= Strength of a pattern, P (A|B) j) Pattern classification Post-process v validations, e violations Usage error unlikely patterns patterns patterns e<v/10 v/10<=e<=2v otherwise Fig. 2 Results of Mining Patterns Usage pattern – 15 Error Pattern- 8 Unlikely Pattern – 11 Not Hit – 24 Total – 56 Patterns Mining into Computer SystemsHuge volume of data from computer systems Persistent state interactions, event logs, network logs, CPU usage … Mining system data for … Reliability Performance Manageability … VI. CONCLUSION Challenges in data mining-Statistical modelling of computer systemsOnline, scalability, interpretability …Data Mining for Software Bug DetectionFrequent pattern mining.Automated Debugging in Software Programs-From frequent patterns to software bugs.Statistical debugging-Automated Debugging in Computer Systems.Automated diagnosis of system misconfigurations.Limitations of Bugs as Deviant Behaviour Fixed rule templates.Need specific knowledge about the software.2 elements.PR-Miner [Li et al., FSE’05] (mining implicit programming rules) developed to address the limitations.General method (No prior knowledge; No templates).General rules (Different types: function, variable, data type, etc.;Multiple elements)Ubiquitous computing demands reliable software- Mining for software reliability.Mining program source code/version histories to find bugs.Mining program runtime data to locate why an execution fails.Mining system snapshots to diagnose misconfigurations and performance problems.An active and rewarding research area.International Workshop on Mining Software Repositories since 2004.SIGCOMM Workshop on Mining Network Data since 2005.Systems and Machine Learning Workshop since 2006.Workshop on Statistical Learning Techniques for Solving Systems.Problems, co- located with NIPS REFERENCES [1] Ian Sommerville, Software Engineering 8th edition, Pearson Education Publications, 2007. [2] Roger S. Pressman, Software Engineering: A Practitioner’s Approach, 6th edition McGraw-Hill International edition Publications, 2005. [3] James S. Peters &WitoldPedrycz, Software Engineering an Engineering Approach, Wiley Publications, 2000. [4] Jiawei Han &MichelineKamber, Data Mining: Concepts and Techniques, 2nd edition,, Elsevier Publications, March 2006. [5] Chai Liu, Long Fei, Xifang Yan, Jiawei Han and Samuel Midkiff, Statistical Debugging: A Hypothesis Testing-based approach, IEEETSE 2006. [6] Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou and Benjamin Chelf, Bugs as Deviant Behaviour: A General approach to inferring errors in systems code, SOSP 2001. [7] Zhenmin Li, Shan Lu, SuvdaMyagmar and Yuanyan Zhou, CP-Miner: A tool for finding copy-paste and related bugs in operating system code, OSPI 2004. [8] Prof. S. Chitra&Dr. M. Rajaram, A Software Reliability Estimation tool using Artificial Immune Recognition System: Proceedings of the International Multiconference of Engineers and computer scientists 2008 vol 1, IMECS 2008, pp. 19-21 March 2008, Hong Kong. [9] Leon Wu, BoyiXie, Gail Kaiser & Rebecca Passonneau, Department of Computer Science, Columbia University, Newyork NY 10027 USA, BUGMINER: Software Reliability Analysis via Data Mining of Bug Reports2007. [10] Swapna S. Gokhale, Member, IEEE, A Simulation Approach to structured-based software reliability analysis, IEEE transactions on Software Engineering, vol 31, No. 8, August 2005. [11] Simon P. Wilson and Francisco J. Samaniego,Nonparametric Analysis of the order-statistic model in software reliability, IEEE transactions on software engineering, vol 33, No. 3, March 2007.