A Novel Approach towards Understanding Adoption of Prediction Models in SDLC in IT SME's

Autor: Ashalatha HS, Prashanth Kumar C P, Nishanth Selvam P, Lavanya A, Nagaveni R, Dr Jayalakshmi, Dr Geetha N
Jazyk: angličtina
Rok vydání: 2020
Předmět:
DOI: 10.5281/zenodo.4394342
Popis: Recent studies of software failure projection usually generate datasets, methods and frames that allow software engineers to concentrate on defect-prone code creation operation, thereby enhancing software quality and better resource usage. In this paper we have attempted to understand the relation of various variables which is relevant for IT SMEs, The study is carried out using a well-structured query. Several software defect forecast datasets, methods and system are published differently and complex, therefore a full view of the current state of defect prediction research is lacking.
{"references":["Shan, C., Chen, B., Hu, C., Xue, J., & Li, N. (2014). Software defect prediction model based on LLE and SVM.","Moyo, S., & Mnkandla, E. (2020). A Novel Lightweight Solo Software Development Methodology With Optimum Security Practices. IEEE Access, 8, 33735-33747.","Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Mathov, Y., Bhairav, S., ... & Elovici, Y. (2019). Security testbed for internet-of-things devices. IEEE Transactions on Reliability, 68(1), 23-44.","Zhao, X., Xue, J., Hu, C., Ma, R., & Zhang, S. (2014). Research on software behavior modeling based on extended finite state automata.","Dong, H., Li, C., Li, T., Du, Y., & Xu, G. (2014). Research on the security model of mobile application.","Márquez, G., Astudillo, H., & Taramasco, C. (2020). Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access, 8, 10933-10950.","Eom, T., Hong, J. B., An, S., Park, J. S., & Kim, D. S. (2019). A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. Ieee Access, 7, 137432-137445.","Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P. (2019). Smart contract security: A software lifecycle perspective. IEEE Access, 7, 150184- 150202.","Cornish, P. L., Knowles, S. R., Marchesano, R., Tam, V., Shadowitz, S., Juurlink, D. N., & Etchells, E. E. (2005). Unintended medication discrepancies at the time of hospital admission. Archives of internal medicine, 165(4), 424-429.","Tam, V. C., Knowles, S. R., Cornish, P. L., Fine, N., Marchesano, R., & Etchells, E. E. (2005). Frequency, type and clinical importance of medication history errors at admission to hospital: a systematic review. Cmaj, 173(5), 510-515."]}
Databáze: OpenAIRE