Professional Documents
Culture Documents
Chaotic Grey Wolf
Chaotic Grey Wolf
https://doi.org/10.1007/s12652-020-02476-z
ORIGINAL RESEARCH
Abstract
Software reliability growth model (SRGM) with modified testing-effort function (TEF) is a function to evaluate and foresee
the parameters of the data. Reliability of software is portrayed as the distinct possibility that for a predefined time, a soft-
ware package will continue to run on an advance domain without frustration. SRGM utilized a few optimization procedure
algorithms to advance the parameters by bifurcating them into a few stages however to upgrade the technique by using all
of the parameters at the same time, the algorithm utilized is the chaotic grey wolf optimization algorithm (CGWO). CGWO
is an advanced heuristic system for portraying the execution by achieving complex parameter optimization and designing
application issues. Different parametric reliabilities rely upon the attributes or characteristics of the data. The parameters
are predicted using the Pham–Zhang (PZ) model. Tandem computer software dataset DS1 and DS2 are used to compare the
predicted parameter of SRGM obtained by Pham–Zhang (PZ) model using testing effort functions (TEFs) based on the evalu-
ation metrics mean square error (MSE), relative error (RE) and coefficient of determination ( R2). To enhance the reliability
of SRGM, the parameters of SRGM estimated using TEF and enhanced using chaotic maps to improve search performance.
By using the constrained benchmark functions the results of chaotic maps are obtained. Based on the chaotic graph results,
the Chebyshev graph shows a good convergence rate of 78%. Overall, 86% of the results revealed an association between the
choice variable and fitness criteria for CGWO. In the SRGM using CGWO, the expected result is completely mechanized
and does not require any client necessity.
Keywords Software reliability growth model · Testing effort functions · Chaotic grey wolf optimization algorithm · Mean
square error · Relative error · Coefficient of determination
13
Vol.:(0123456789)
P. Dhavakumar, N. P. Gopalan
The software reliability paradigm has two approaches. parameters are optimized simultaneously in the proposed
The first is a software reliability prediction strategy by sche- technique (Jin and Jin 2016).
matically constrained and the second is to predict software This paper proposes, by utilizing the Grey wolf optimiza-
reliability by testing data (Jin and Jin 2016). SRGM analyze tion algorithm globally optimizing and predicting the param-
the performance and reliability of software application and eters efficiently, chaos have been introduced for developing
overlook the internal structure of the application (Singh et al. chaotic grey wolf optimization algorithm. When compared
2015). It is being exhaustively linked to SRGM to quan- with CGWO, the GWO manages to discover the worldwide
tify important Software Reliability Measuring like interims most favourable solution. Instead of the critical parameters
between successive failure, failure intensity, software avail- utilized in GWO, different unidirectional chaotic maps are
ability, maintenance and estimating the mathematical frame- explored. Chaotic maps based on the nature of reliability, it
work (Zeephongsekul et al. 2016). Exponential functions, assesses in the field of optimizing algorithms by scrutiniz-
non-homogenous Poisson process (NHPP) function, etc. ing the search space more efficiently. The results revealed,
in combination with time utilizing the fundamental arsenal that, by comparing with other algorithms and applications,
of scientific functions factually maps the peaked conduct CGWO can conspicuously overcome conventional GWOs
of programming in SRGM and incorporate imperfect fault with an excellent convergence (Kohli and Arora 2018;
removal (Cascone et al. 2008; Cutolo et al. 2012; D’Apice Decoderz 2019).
et al. 2011; Rarità et al. 2010). An efficient technique is to During several research projects the reliability of the
estimate the parameters using the expectation conditional new techniques being used in the health systems, computer
maximization (ECM) algorithm applied to Non-homogene- engineering, software engineering and mechanical engi-
ous NHPP SRGM developed by Zeephongsekul et al. (2016). neering has already been forecasted and predicted. These
In software failure data, time domain and time interval func- paradigms can be used to forecast reliability, to use software
tions were illustrated using derivatives from the theory of and hardware and are referenced by the anonymous authors:
stochastic point processes. They made similar comments on Researchers have predicted accuracy in estimating software
the ECM algorithm of the Gamma and Weibull failure mod- reliability by using testing process factors like testing-effort
els. They clearly demonstrated that three parameters could (TE) and imperfect debugging (ID) by Li et al. (2015). They
be calibrated with this strategy and maximum likelihood improved the dependability stage and the development pro-
(MLE) estimations from failure model could be discovered. cedure of the software items. In the testing phase, they esti-
The foreseeable future failure sort of behaviour can still be mated and predicted the failures of data collected by using
better mapped in a scientific function which can illustrate SRGMs. The results showed that Inflected S-shaped NHPP
past failure with time apparently (Jin and Jin 2016). SRGMs performed better prediction by comparing delayed
The ideal characteristic of software reliability is the Fault S-shaped NHPP SRGM.
reduction factor (FRF) by processing the sum of all removed The implementation of QPSO for streamlining SRGM
faults in extent to the accomplished failures and failure parameters with S-shaped TEF is being examined by Jin
detection rate using numeric metrics (Abd-Elkader et al. and Jin (2016). In their work they have showed minimum
2018; Kim et al. 2015; Lakshmanan and Ramasamy 2015; prediction error and using Inflected S-shaped model (ISSM)
Fera et al. 2018; Packianather et al. 2014). The relation- the selected datasets were accurate than TEF. The results
ship between software metrics and the number of faults are showed that the predicting performance of real failure data
described by learned model (Yang et al. 2015). SRGMs have was comparatively high based on the traditional methods.
proposed various sorts of software reliability growth models Efficient technique to estimate the parameters using the
to predict the relationship between software program failure expectation conditional maximization (ECM) algorithm
and software program testing time. To recognize whether applied to Non-homogeneous poisson process (NHPP)
the software reliability is extending sufficiently in fulfilling SRGM developed by Zeephongsekul et al. (2016). In soft-
the suitable software essential specification, SRGMs uses ware failure data, time domain and time interval functions
software failure time data or the testing results (Kim et al. were illustrated using derivatives from the theory of sto-
2015; Yang et al. 2015; Roy et al. 2017). Fault failure rela- chastic point processes. They made similar comments on the
tionship is determined by FRF (Abd-Elkader et al. 2018). ECM algorithm of the Gamma and Weibull failure models.
When accessing the reliability of the framework, the focus is They clearly demonstrated that three parameters could be
to check whether the parameter increment or diminishes by calibrated with this strategy and maximum likelihood (MLE)
determining the utilization of various parameters (Diwaker estimations from failure model could be discovered.
et al. 2018). In SRGM, there are some limitations in optimiz- SRGM parameter estimation using Harmony Search
ing the parameters in the software framework while part- variant (HS) has been instituted by Choudhary et al. (2017).
ing them into different groups. By using the SRGM with They conducted various experiments with datasets and by
TEF, the solution for the problem is destined and all the comparing with least square estimation (LSE) and cuckoo
13
An efficient parameter optimization of software reliability growth model by using chaotic…
search (CS) approaches, the results showed that the param- parameters (Zhu and Pham 2018). In the chaotic grey wolf
eters were estimated efficiently. A statistical (F-test) analysis optimization algorithm five parameters are used so we use
revealed HS superior to the other two (LSE and CS) strat- the Pham–Zhang model to predict the parameters. Virtually
egies. Roy et al. (2017) proposed the strategy to enhance each SRGM implies a called function to quantify the number
software reliability performance based on asynchronously of errors within a certain time t. The scheme proposed uses
weighted dynamic combination platform based on the arti- five different TEFs for comparing the SRGM parameters and
ficial neural network (ANN). The experiments have shown detecting the best fit model using the metrics mean square
effective evaluation of three real failure data sets. The par- error, relative error and coefficient of determination for opti-
ticle swarm optimization neural network is compared with mizing the parameter in CGWO. We portray sporadically in
conventional PSO neural network and proved that PSO pro- the following paragraph a well-regarded SRGM model that
duced better results for predicting software reliability accu- we use in our recent study.
rately and efficiently. Pham–Zhang (PZ) model: It predicts more accurately
PSO and fuzzy logic were the soft computing techniques than any other SRGM model, the reliability model that best
used in researches for estimating and predicting reliability describes the collected failure data. At a desired time t, the
by Diwaker et al. (2018). In the genetics, radiology, physiol- mean value function describes the expected number of soft-
ogy, cardiology and neurology fields, medical researchers ware errors, where the mean value function is m(t). In this
have used numerous soft computing strategies. Factors such model, the introduction rate is an exponential function of
as component interaction, dependence on the components, testing time and the error deduction rate is non-decreasing
complexity, failure rate and reusability have been the real with an inflected S-shaped model:
challenge for CBSR component-based software Reliabil-
1 a
ity prediction, and the inference that CBSE (Component- m(t) = [(z + x)(1 − e−yt )] − (e−𝛽t − e−yt ).
1 + 𝛼e−yt b−𝛽
based software Engineering) is the right technology, with
(1)
less efforts and the ability to accomplish considerably better
parameter prediction. Riaz et al. (2018) has proposed a new Testing effort functions (TEFs): By using TEF function
method of Easy Ensemble Rough-KNN noise filtering to the prediction process is described precisely. Various TEF
handle unbalanced software failure prediction classes. By functions used in this approach are Weibull, exponential
using this strategy they have eliminated a noisy sample and Weibull, logistic, generalized logistic and inflexion S-shaped
resolved the problem. By eliminating irrelevant, repetitive so that the parameters are made reliable and the prediction
functions, they have augmented the quality of software data. of parameters performed accurately using MSE for DS1 and
The remaining portion of the paper is structured as DS2. The Weibull TEF can be expressed as,
defies: The strategy instituted for the parameter estima- Sw (t) = N(1 - exp[ - btm ]). (2)
tion of SRGM, the definition of TEFs, GWO and CGWO is
emphasised in Sect. 2. Section 3 specifies the outcomes of The total amount of consumed testing effort is N, b is
our proposed technique and Sect. 4 ends the strategy pro- the scale and m is the shape parameter, it performs better
posed and summarizes the future scope. when m > 3.
The exponential Weibull TEF can be given as,
13
P. Dhavakumar, N. P. Gopalan
(1 - exp[ - 𝛼t]) Gray wolves isolate prey during hunting as per the
Sis (t) = N (6) established rules during the encircle prey protocol (as
(1 + Aexp[𝛼t])
shown in Fig. 1):
where α represented as the consumption rate and A is a con-
stant parameter.
⇀ |⇀ ⇀ ⇀ |
P = ||R ⋅ Y p (t) − Y(t)|| (7)
| |
2.2 Methodology
⇀ ⇀ ⇀ ⇀
Y(t + 1) = Y p (t) − V ⋅ P. (8)
Grey wolf optimization (GWO) is an optimization heuristic
based on the gray wolves selection criteria, was developed
by Mirjalili et al. (2014). This is a meta-heuristic algorithm, In Eqs. (7) and (8), where t is labelled iteration number.
strengthened by the apparent framework of gray wolves’
⇀
Y P and ⇀Y⇀ are labelled ⇀level of prey and grey wolf respec-
hunting actions and governance activity. In GWO, global tively. V = 2⃗a.⃗r1 − a⃗ , R = 2 r 2 , are depend on the iteration
⇀
search cannot be carried out in every search and then it and random vectors [0, 1], the characteristics of the param-
becomes critical to discover the globally optimal solution eter a are reduced consecutively from 2 to 0, where r 1
⇀ ⇀
in certain instances. The search functionality was accom- and r 2 are random vectors. Hunting the prey procedure is
⇀
plished on a continual basis. The GWO procedure used for performed under the preceding regulation,
searching the prey using optimization technique is hierarchi-
|⇀ ⇀ |
cal procedure, encircle prey, hunting, attacking prey and the
⇀ ⇀
Pi = ||Ri ⋅ Y i (t) − Y(t),|| (9)
search for prey. In the hierarchical procedure, the wolves are | |
grouped into four categories.
where i denotes α, β, δ:
α, β and δ are the first three leader wolves for controlling
and guiding the other wolves’ ω in the hunting process. In ⇀ ⇀ ⇀ ⇀
Y(t + 1) = 𝛴i={𝛼,𝛽,𝛿} Y i (t) − V i ⋅ Pi . (10)
encircle prey, grey wolves surround prey during the hunting
process by indicating the position of the prey. After recog- In Eqs. (9) and (10), where Xi denote position of leader
nition of prey position, hunting procedure performed by ω
⇀ ⇀
wolves, Ri and V i are random vector. Assaulting and find-
wolves in the guidance of leader wolves. The position of
⇀
ing prey are denoted based on the value of vector V , R⇀
. As
ω wolves around the prey is updated to the guiding leader instantiated in Fig. 1, analyse convened when A is greater
wolves so that the position of prey is estimated. The attack- than 1 or A is less than − 1, otherwise C is greater than 1.
ing prey procedure performs exploitation process. Search In contrast, the misappropriation is convened when |V| < 1
for prey performs exploration process and jumps out from and |R| < 1 (Yazdanbakhsh et al. 2016).
the optimal solution.
13
An efficient parameter optimization of software reliability growth model by using chaotic…
To improve the searching behaviour of the GWO a new, of lower bound and upper bound, lower bound is denoted as
efficacious approach to augment SRGM metrics is instituted (l) and the upper bound is denoted as (u) as articulated in
in this paper. An enhanced grey wolf optimization algorithm Eq. (13) and Q space is the form of Eq. (14) that the number
with an interoperable chaotic search strategy for systemati- of limitation say g(g > 0) are described in the Q space.
cally strengthening the searching and decrease the chances
of optimized prediction via the CGWO algorithm. Various
l(j) ≤ y(j) ≤ u(j), 1≤j≤n (13)
kinds of chaotic maps (Appendix Table 4) are being uti-
lized to establish a chaotic variable to generate a chaotic rk (y) ≤ 0, for k = 1, … , v,
(14)
algorithm. sk (y) = 0, for k = v + 1, … , g.
When considering the chaotic map, the chaotic search
approach is proposed and defined using: If any solution describes x satisfies the restriction ru or
su in Q space, then ru is articulated to be an active restric-
Cxin+1 = 𝜇 ⋅ Cxin (1 − Cxin ). (11) tion at y (Lakshmanan and Ramasamy 2015) in Eq. (14),
rk (y) and sk (y) are considered as inequality and equal-
In Eq. (11), where Cxin denotes the chaotic variable and n ity restriction respectively. The proposed chaotic grey
denotes the number of iterations. These chaotic maps have wolf optimization algorithmic rule is utilized (as shown
been widely used by researchers, mathematicians and in in Algorithm 1) for solving optimization problems effi-
medical science in the optimization field. It obviously helps ciently. In the algorithm, the first step involves starting of
to efficiently traverse the search. The number [0, 1] is the ini- folk of grey wolves. Then the chaotic map value is started
tial value of chaotic maps. The original value of these kinds
⇀
continuously as x0 . Sequentially, the parameter a⃗ , A ⇀
,C
of maps on the statistical basis of the literature is 0.7. Each are involved in performing exploration and exploitation
chaotic map deviates in type of attitude. The chaotic maps process. Then parameter t denotes the iterations. Fitness
themselves aid to determine the data. The fitness of all user
⇀ ⇀ ⇀
of each search wolf is evaluated based on X 𝛼 , X 𝛽 and X 𝛿 .
defined gray wolves in the target area is examined and clas- The first wolf is denoted by 𝛼 , second wolf denoted by 𝛽
sified yet according to their situation with various standard and third wolf denoted by 𝛿 . Based on the iterative value
benchmarking features. It consist of two functions, they are the grey wolves are classified according to their fitness.
given as objective function and constraining infringement The chaotic number is upgraded with the chaotic map
function, formulate all the minimal problems. The intent of equation. According to Eq. (11), for each search wolf the
the functionality x is to determine the best solution in the position is updated and the parameter value gets updated.
stipulated search space. It can be articulated as: Then replacement of worst fit wolf with best fit wolf is
minQ(y), y = (y1 , y2 , y3 , … yn ) ∈ Pn . performed. The fitness of 𝛼 wolf at the later part of the
(12)
iteration is seen in the CGWO algorithm as the optimal
In Eq. (12), where n estimated number of configurations solution. This approach produces better results and save
of a viable solution Y ∈ Q ∈ S , Q is the possible region in computing time productively (Yazdanbakhsh et al. 2016;
the search space S which defies a P is an n-dimensional rec- Yu et al. 2017).
tangle. Thus the rectangle P has domains size in the form
13
P. Dhavakumar, N. P. Gopalan
∑n
2.3 Evaluation metrics MSE = (qk − q�k )2 (15)
k=1
2.3.1 Mean squared error (MSE) where [in Eq. (15)] qk describes the total number of detected
faults at execution time tk based on the actual data, q′k is the
The model prediction of Mean squared error approach predicted total number of detected discrepancies by time tk
can denote the contrast between genuine perception and and number of perceptions in the software failure dataset.
perception esteem. By not hurting the models predictive Lesser the value of MSE denotes minimum fitness error
capacity, the utilization of data fits the model to a certain and better Software reliability growth model performance
degree and by not expelling the required variable. MSE (Jin and Jin 2016) During the testing phase, SRGM con-
formulated as: sumes huge amount of resource like manpower and CPU
13
An efficient parameter optimization of software reliability growth model by using chaotic…
Table 1 Chaotic maps results Problem GW1 GW2 GW3 GW4 GW5 GW6
with constricted benchmark
functions on CGWO (GW1– Bernoulli map − 14.1857 − 0.52058 − 0.87665 − 32,350.4 52,672.1 − 6329.29
GW6)
Logistic map − 13.4120 − 0.667739 − 0.488866 − 32,236.7 39,974.8 − 6452.64
Chebyshev map − 14.7998 − 0.81434 − 0.9681 − 30,645.2 53,814.1 − 65,463.16
Circle map − 11.1283 − 0.21189 − 0.17956 − 31,212.6 186,242 − 6481.72
Cubic map − 14.4847 − 0.59969 − 0.54943 − 30,162.7 38,497.2 − 6634.46
ICMIC map − 11.1984 − 0.514268 − 0.105644 − 32,579.2 23,729.4 − 6589.12
Piecewise map 12.2842 − 0.620454 − 0.74163 − 31,275.1 56,104.5 − 6451.86
Singer map − 13.2749 − 0.40466 − 0.85799 − 30,202.2 64,423.1 − 6349.35
Sinusoidal map − 14.3466 − 0.33927 − 0.82258 − 30,022.5 43,857.1 − 6382.18
Tent map − 13.2748 − 0.43695 − 0.80427 − 30,494.2 26,421.2 − 6484.28
Sine map − 14.4705 − 0.51969 − 0.28356 − 32,195.2 26,868.2 6015.14
Gaussian map − 15.9102 − 0.567739 − 0.101344 − 33,250.4 55,231.2 − 6229.18
13
P. Dhavakumar, N. P. Gopalan
Table 2 Chaotic maps results Problem GW7 GW8 GW9 GW10 GW11 GW12
with constrained benchmark
functions on CGWO (GW7– Bernoulli map 112.2438 − 0.05861 602.1739 6294.23 0.626 − 69.2839
GW12)
Logistic map 529.2649 − 0.076304 612.46 6045.14 0.635 − 68.1368
Chebyshev map 48.2278 − 0.09874 681.43 7046.13 0.672 − 47.3472
Circle map 52.3442 − 0.05812 676.67 027.24 0.650 − 76.3629
Cubic map 35.2463 − 0.07874 648.4 7038.43 0.639 − 143.363
ICMIC map 37.2641 − 0.09375 673.643 7063.12 0.668 − 103.368
Piecewise map 629.3459 − 0.09524 618.135 7054.24 0.652 − 213.368
Singer map 128.4740 − 0.05285 620.321 7046.26 0.625 − 408.478
Sinusoidal map 549.2327 − 0.03662 649.184 7013.17 0.638 − 2298.378
Tent map 828.4649 − 0.09466 663.12 7010.43 0.639 − 2538.36
Sine map 582.1472 − 503.093 612.37 7044.13 0.661 − 73.2839
Gaussian map 185.4121 − 0.06451 652.471 6842.24 0.648 − 576.4821
13
An efficient parameter optimization of software reliability growth model by using chaotic…
13
P. Dhavakumar, N. P. Gopalan
characteristics of the data itself without assumptions, rea- comparatively get better results of parameter estimation of
sonable predicting capacity and all the prediction process SRGM and help in predicting software reliability.
is automated and does not require user participation. The
Presented chaotic maps have been helps to widely used
by the researchers, mathematicians in the optimization Appendix
field. It obviously helps to efficiently traverse the search.
In the future, we will continue to find some approach to See Tables 4, 5, 6, 7, 8.
1 6.83 65 1 985 14
2 8.02 89 2 1981 28
3 11.65 106 3 2934 32
4 14.25 115 4 3742 48
5 17.89 140 5 4948 59
6 20.23 166 6 5416 67
7 21.47 188 7 5924 72
8 23.12 210 8 6691 77
9 26.92 238 9 7114 82
10 28.04 259 10 7519 86
11 30.49 272 11 7948 90
12 34.43 291 12 8059 93
13 38.51 302 13 8321 96
14 40.41 310 14 8543 98
15 42.47 322 15 8981 99
16 44.34 324 16 9327 100
17 47.58 327 17 9543 100
18 51.63 330 18 10,000 100
13
An efficient parameter optimization of software reliability growth model by using chaotic…
References Kohli M, Arora S (2018) Chaotic grey wolf optimization algorithm for
constrained optimization problems. J Comput Des Eng 5(4):458–
472. https://doi.org/10.1016/j.jcde.2017.02.005
Abd-Elkader AG, Saleh SM, Eiteba MM (2018) A passive islanding
Lakshmanan I, Ramasamy S (2015) An artificial neural-network
detection strategy for multi-distributed generations. Int J Electr
approach to software reliability growth modeling. Procedia Com-
Power Energy Syst 99:146–155. https://doi.org/10.1016/j.ijepe
put Sci 57:695–702. https://doi.org/10.1016/j.procs.2015.07.450
s.2018.01.005
Li Q, Li H, Lu M (2015) Incorporating S-shaped testing-effort func-
Cascone A, Manzo R, Piccoli B, Rarità L (2008) Optimization versus
tions into NHPP software reliability model with imperfect debug-
randomness for car traffic regulation. Phys Rev E 78(2):026113.
ging. J Syst Eng Electron 26(1):190–207. https: //doi.org/10.1109/
https://doi.org/10.1103/PhysRevE.78.026113
JSEE.2015.00024
Cheng M, Wu G, Yuan M, Wan H (2016) Semi-supervised soft-
Li Z, Jing X, Zhu X (2018) Progress on approaches to software defect
ware defect prediction using task-driven dictionary learning.
prediction. IET Softw 12(3):161–175. https://doi.org/10.1049/
Chin J Electron 25(6):1089–1096. https : //doi.org/10.1049/
iet-sen.2017.0148
cje.2016.08.034
Mallikharjuna K, Anuradha K (2015) An efficient method for software
Choudhary A, Baghel A, Sangwan O (2017) Efficient parameter esti-
reliability growth model selection using modified particle swarm
mation of software reliability growth models using harmony
optimization technique. Int Rev Comput Softw 10(12):1169. https
search. IET Softw 11(6):286–291. https : //doi.org/10.1049/
://doi.org/10.15866/irecos.v10i12.8089
iet-sen.2015.0171
Mirjalili S, Mirjalili S, Lewis A (2014) Grey wolf optimizer. Adv Eng
Cutolo A, De Nicola C, Manzo R, Rarità L (2012) Optimal paths on
Softw 69:46–61. https: //doi.org/10.1016/j.adveng soft. 2013.12.007
urban networks using travelling times prevision. Model Simul
Packianather MS, Yuce B, Mastrocinque E, Fruggiero F, Pham DT,
Eng. https://doi.org/10.1155/2012/564168
Lambiase A (2014) Novel Genetic Bees Algorithm applied to
D’Apice C, Manzo R, Rarità L (2011) Splitting of traffic flows to con-
single machine scheduling problem. In: 2014 World Automation
trol congestion in special events. Int J Math Math Sci. https://doi.
Congress (WAC). IEEE, pp 906–911. https://doi.org/10.1109/
org/10.1155/2011/563171
wac.2014.6936194
Decoderz (2019) Behavior of grey wolf optimization (GWO) algorithm
Rarità L, D’Apice C, Piccoli B, Helbing D (2010) Sensitivity analy-
using meta-heuristics method. Transpire Online. https: //transp ireo
sis of permeability parameters for flows on Barcelona networks.
nline.blog/2019/08/09/behavior-of-grey-wolf-optimization-gwo-
J Differ Equ 249(12):3110–3131. https: //doi.org/10.1016/j.
algorithm-using-meta-heuristics-method/. Accessed Sept 2010
jde.2010.09.006
Diwaker C, Tomar P, Poonia R, Singh V (2018) Prediction of software
Riaz S, Arshad A, Jiao L (2018) Rough noise-filtered easy ensemble
reliability using bio inspired soft computing techniques. J Med
for software fault prediction. IEEE Access 6:46886–46899. https
Syst. https://doi.org/10.1007/s10916-018-0952-3
://doi.org/10.1049/iet-sen.2014.0108
Fera M, Fruggiero F, Lambiase A, Macchiaroli R, Todisco V (2018) A
Roy P, Mahapatra G, Dey K (2017) An efficient particle swarm opti-
modified genetic algorithm for time and cost optimization of an
mization-based neural network approach for software reliability
additive manufacturing single-machine scheduling. Int J Ind Eng
assessment. Int J Reliab Qual Saf Eng 24(04):1750019. https://
Comput 9(4):423–438. https://doi.org/10.5267/j.ijiec.2018.1.001
doi.org/10.1109/ACCESS.2018.2865383
Jin C, Jin S (2016) Parameter optimization of software reliabil-
Singh L, Tripathi A, Vinod G (2015) Approach for parameter esti-
ity growth model with S-shaped testing-effort function using
mation in Markov model of software reliability for early predic-
improved swarm intelligent optimization. Appl Soft Comput
tion: a case study. IET Softw 9(3):65–75. https://doi.org/10.1109/
40:283–291. https://doi.org/10.1016/j.asoc.2015.11.041
TNSM.2018.2848105
Kim T, Lee K, Baik J (2015) An effective approach to estimating the
Vizarreta P, Trivedi K, Helvik B, Heegaard P, Blenk A, Kellerer W,
parameters of software reliability growth models using a real-
Mas Machuca C (2018) Assessing the maturity of SDN controllers
valued genetic algorithm. J Syst Softw 102:134–144. https://doi.
with software reliability growth models. IEEE Trans Netw Serv
org/10.1016/j.jss.2015.01.001
13
P. Dhavakumar, N. P. Gopalan
13