Retraction: [Yan Meng, Yunming Wu, Track and field competition data collection using a vision sensor system and machine learning, IET Software 2023 (https://doi.org/10.1049/sfw2.12086)].
The above article from IET Software, published online on 11 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal's peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
收回:[严萌,吴云明,使用视觉传感器系统和机器学习的田径比赛数据收集,IET软件2023(https://doi.org/10.1049/sfw2.12086)]来自IET Software的上述文章于2023年1月11日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Track and field competition data collection using a vision sensor system and machine learning","authors":"Yan Meng, Yunming Wu","doi":"10.1049/sfw2.12086","DOIUrl":"https://doi.org/10.1049/sfw2.12086","url":null,"abstract":"<p>Retraction: [Yan Meng, Yunming Wu, Track and field competition data collection using a vision sensor system and machine learning, IET Software 2023 (https://doi.org/10.1049/sfw2.12086)].</p><p>The above article from IET Software, published online on 11 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal's peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"639-648"},"PeriodicalIF":1.6,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retraction: [Yanfeng Ma, Investigating the interactive audio-visual course mode for college English using virtual reality and artificial intelligence, IET Software 2023 (https://doi.org/10.1049/sfw2.12088)].
The above article from IET Software, published online on 9 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
收回:[马延峰,利用虚拟现实和人工智能探索大学英语交互式视听课程模式,IET软件2023(https://doi.org/10.1049/sfw2.12088)]来自IET Software的上述文章于2023年1月9日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Investigating the interactive audio-visual course mode for college English using virtual reality and artificial intelligence","authors":"Yanfeng Ma","doi":"10.1049/sfw2.12088","DOIUrl":"https://doi.org/10.1049/sfw2.12088","url":null,"abstract":"<p>Retraction: [Yanfeng Ma, Investigating the interactive audio-visual course mode for college English using virtual reality and artificial intelligence, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12088)].</p><p>The above article from <i>IET Software</i>, published online on 9 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"661-671"},"PeriodicalIF":1.6,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50142835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Yousef Ibrahim Daradkeh, Mohammad Shabaz
Retraction: [Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Yousef Ibrahim Daradkeh, Mohammad Shabaz, Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality, IET Software 2023 (https://doi.org/10.1049/sfw2.12091)].
The above article from IET Software, published online on 6 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
撤回:[Mhammad Shafiq,Fatemah H.Alghamedy,Nasir Jamal,Tahir Kamal,Yousef Ibrahim Daradkeh,Mohammad Shabaz,使用优化的机器学习技术进行软件故障预测以提高软件质量的科学编程,IET software 2023(https://doi.org/10.1049/sfw2.12091)]。IET Software的上述文章于2023年1月6日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术研究所(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality","authors":"Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Yousef Ibrahim Daradkeh, Mohammad Shabaz","doi":"10.1049/sfw2.12091","DOIUrl":"https://doi.org/10.1049/sfw2.12091","url":null,"abstract":"<p>Retraction: [Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Yousef Ibrahim Daradkeh, Mohammad Shabaz, Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12091)].</p><p>The above article from <i>IET Software</i>, published online on 6 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"694-704"},"PeriodicalIF":1.6,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Y. Daradkeh, Mohammad Shabaz
{"title":"Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality","authors":"Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Y. Daradkeh, Mohammad Shabaz","doi":"10.1049/sfw2.12091","DOIUrl":"https://doi.org/10.1049/sfw2.12091","url":null,"abstract":"","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43336830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The state space explosion restricts the error detection of concurrent software. The abstraction can provide a solution to avoid state space explosion, but it is easy to ignore important details, resulting in inaccurate detection results. This paper proposes a methodology of fine-coarse-grained automatic modelling for Java source programs. By the principle that the execution details of property-unchecked, non-interactive, and unrelated statements do not affect the model checking results, we model coarse-grained model fragments for such statements, while fine-grained model fragments for property-checked, interactive, and related statements. Our method reduces the model and state space and ensures the error detection of the source program based on model checking. Moreover, we prove the equivalence of the fine-grained model, the coarse-grained model, and the program. Finally, this paper gives an experiment to verify the effectiveness of the proposed method.
{"title":"Concurrent software fine-coarse-grained automatic modelling by Coloured Petri Nets for model checking","authors":"Wenjie Zhong, Jian-tao Zhou, Tao Sun","doi":"10.1049/sfw2.12084","DOIUrl":"https://doi.org/10.1049/sfw2.12084","url":null,"abstract":"<p>The state space explosion restricts the error detection of concurrent software. The abstraction can provide a solution to avoid state space explosion, but it is easy to ignore important details, resulting in inaccurate detection results. This paper proposes a methodology of fine-coarse-grained automatic modelling for Java source programs. By the principle that the execution details of property-unchecked, non-interactive, and unrelated statements do not affect the model checking results, we model coarse-grained model fragments for such statements, while fine-grained model fragments for property-checked, interactive, and related statements. Our method reduces the model and state space and ensures the error detection of the source program based on model checking. Moreover, we prove the equivalence of the fine-grained model, the coarse-grained model, and the program. Finally, this paper gives an experiment to verify the effectiveness of the proposed method.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 1","pages":"55-75"},"PeriodicalIF":1.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hasan Kahtan, Mansoor Abdulhak, Ahmad Salah Al-Ahmad, Yehia Ibrahim Alzoubi
Component-based software development (CBSD) is an emerging technology that integrates existing software components to swiftly develop and deploy big and complex software systems with little engineering effort, money, and time. CBSD, on the other hand, has difficulties with security trust, particularly dependability. When a system provides the desired outcomes while causing no harm to the environment, it is said to be dependable. Dependability encompasses several attributes, including availability, confidentiality, integrity, reliability, safety, and maintainability. Developing dependable component software is achieved by embedding dependability attributes in CBSD. Thus, the CBSD model must address the dependability attributes. Hence, the objectives of this work are: (1) to propose a model for developing a dependable system using component-based software development approach (hereafter the model is referred to as MDDS-CBSD), which aims to mitigate software component vulnerabilities, and (2) to assess the proposed model. The best-practice method was used to frame the CBSD architecture phases and processes, as well as embed the six dependability attributes. The MDDS-CBSD architecture was evaluated using expert opinion. The MDDS-CBSD was also used to develop an information and communications technology (ICT) portal using an empirical study method. Vulnerability Assessment Tools were used to assess the developed ICT portal's dependability. The MDDS-CBSD may be used to create web application systems and to protect them from attacks. Model developers may use CBSD to describe and assess dependability attributes at any point during the model development process. The reliability of this model can also let companies utilise CBSD with confidence.
{"title":"A model for developing dependable systems using a component-based software development approach (MDDS-CBSD)","authors":"Hasan Kahtan, Mansoor Abdulhak, Ahmad Salah Al-Ahmad, Yehia Ibrahim Alzoubi","doi":"10.1049/sfw2.12085","DOIUrl":"https://doi.org/10.1049/sfw2.12085","url":null,"abstract":"<p>Component-based software development (CBSD) is an emerging technology that integrates existing software components to swiftly develop and deploy big and complex software systems with little engineering effort, money, and time. CBSD, on the other hand, has difficulties with security trust, particularly dependability. When a system provides the desired outcomes while causing no harm to the environment, it is said to be dependable. Dependability encompasses several attributes, including availability, confidentiality, integrity, reliability, safety, and maintainability. Developing dependable component software is achieved by embedding dependability attributes in CBSD. Thus, the CBSD model must address the dependability attributes. Hence, the objectives of this work are: (1) to propose a model for developing a dependable system using component-based software development approach (hereafter the model is referred to as MDDS-CBSD), which aims to mitigate software component vulnerabilities, and (2) to assess the proposed model. The best-practice method was used to frame the CBSD architecture phases and processes, as well as embed the six dependability attributes. The MDDS-CBSD architecture was evaluated using expert opinion. The MDDS-CBSD was also used to develop an information and communications technology (ICT) portal using an empirical study method. Vulnerability Assessment Tools were used to assess the developed ICT portal's dependability. The MDDS-CBSD may be used to create web application systems and to protect them from attacks. Model developers may use CBSD to describe and assess dependability attributes at any point during the model development process. The reliability of this model can also let companies utilise CBSD with confidence.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 1","pages":"76-92"},"PeriodicalIF":1.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanjie Wang, Yueshen Xu, Xinkui Zhao, Zhiping Jiang, Rui Li
Malware detection is an important task for the ecosystem of mobile applications (APPs), especially for the Android ecosystem, and is vital to guarantee the user experience of Android APPs. There have been some exiting methods trying to solve the problem of malware detection, but the methods suffer from several defects, such as high time complexity and mediocre accuracy, which seriously decrease the practicability of existing methods. To solve these problems, in this study, we propose a novel Android malware detection framework, where we contribute an efficient Application Programming Interface (API) call sequences extraction algorithm and an investigation of different types of classifiers. In API call sequences extraction, we propose an algorithm for transforming the function call graph from a multigraph into a directed simple graph, which successfully avoids the unnecessary repetitive path searching. We also propose a pruning search, which further reduces the number of paths to be searched. Our algorithm greatly reduces the time complexity. We generate the transition matrix as classification features and investigate three types of machine learning classifiers to complete the malware detection task. The experiments are performed on real-world Android Packages (APKs), and the results demonstrate that our method significantly reduces the running time and produces high detection accuracy.
{"title":"Android malware detection via efficient application programming interface call sequences extraction and machine learning classifiers","authors":"Tanjie Wang, Yueshen Xu, Xinkui Zhao, Zhiping Jiang, Rui Li","doi":"10.1049/sfw2.12083","DOIUrl":"https://doi.org/10.1049/sfw2.12083","url":null,"abstract":"<p>Malware detection is an important task for the ecosystem of mobile applications (APPs), especially for the Android ecosystem, and is vital to guarantee the user experience of Android APPs. There have been some exiting methods trying to solve the problem of malware detection, but the methods suffer from several defects, such as high time complexity and mediocre accuracy, which seriously decrease the practicability of existing methods. To solve these problems, in this study, we propose a novel Android malware detection framework, where we contribute an efficient Application Programming Interface (API) call sequences extraction algorithm and an investigation of different types of classifiers. In API call sequences extraction, we propose an algorithm for transforming the function call graph from a multigraph into a directed simple graph, which successfully avoids the unnecessary repetitive path searching. We also propose a pruning search, which further reduces the number of paths to be searched. Our algorithm greatly reduces the time complexity. We generate the transition matrix as classification features and investigate three types of machine learning classifiers to complete the malware detection task. The experiments are performed on real-world Android Packages (APKs), and the results demonstrate that our method significantly reduces the running time and produces high detection accuracy.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"348-361"},"PeriodicalIF":1.6,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50144704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Requirements management (RM) plays an important role in requirements engineering. The development of machine learning (ML) is in full swing, and many ML software management techniques had been used to improve the performance of RM methods. However, as no research study is known that exists systematically to summarise the ML methods used in RM. To fill this gap, this paper adopts the systematic mapping study to survey the state-of-the-art ML methods for RM primary studies and were finally selected in this mapping, which was published on 36 conferences and journals. The 24 factors affecting the ML method of RM are determined, of which 9, 11 and 4 are the three parts of RM, namely requirements baseline maintenance, requirements traceability and requirements change management separately. The 18 objectives of the ML method for RM are summarised, of which 6, 7 and 5 are the three parts of RM. The eight ML methods used in RM and their time sequence are summarised. The 18 evaluation indexes for RM in the ML method are determined, and the performance of these methods on these parameters is analysed. The research direction of this paper is of great significance to the research of researchers in demand management.
{"title":"A systematic mapping study on machine learning methodologies for requirements management","authors":"Chi Xu, Yuanbang Li, Bangchao Wang, Shi Dong","doi":"10.1049/sfw2.12082","DOIUrl":"https://doi.org/10.1049/sfw2.12082","url":null,"abstract":"<p>Requirements management (RM) plays an important role in requirements engineering. The development of machine learning (ML) is in full swing, and many ML software management techniques had been used to improve the performance of RM methods. However, as no research study is known that exists systematically to summarise the ML methods used in RM. To fill this gap, this paper adopts the systematic mapping study to survey the state-of-the-art ML methods for RM primary studies and were finally selected in this mapping, which was published on 36 conferences and journals. The 24 factors affecting the ML method of RM are determined, of which 9, 11 and 4 are the three parts of RM, namely requirements baseline maintenance, requirements traceability and requirements change management separately. The 18 objectives of the ML method for RM are summarised, of which 6, 7 and 5 are the three parts of RM. The eight ML methods used in RM and their time sequence are summarised. The 18 evaluation indexes for RM in the ML method are determined, and the performance of these methods on these parameters is analysed. The research direction of this paper is of great significance to the research of researchers in demand management.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"405-423"},"PeriodicalIF":1.6,"publicationDate":"2022-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50142330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the literature, infinite-failure software reliability models (SRMs), such as Musa-Okumoto SRM (1984), have been demonstrated to be effective in quantitatively characterizing software testing processes and assessing software reliability. This paper primarily focuses on the infinite-failure (type-II) non-homogeneous Poisson process (NHPP)-based SRMs and evaluates the performances of these SRMs comprehensively by comparing with the existing finite-failure (type-I) NHPP-based SRMs. In more specific terms, to describe the software fault-detection time distribution, we postulate 11 representative probability distribution functions that can be categorized into the generalized exponential distribution family and the extreme-value distribution family. Then, we compare the goodness-of-fit and predictive performances with the associated 11 type-I and type-II NHPP-based SRMs. In numerical experiments, we analyze software fault-count data, collected from 16 actual development projects, which are commonly known in the software industry as fault-count time-domain data and fault-count time-interval data (group data). The maximum likelihood method is utilized to estimate the model parameters in both NHPP-based SRMs. In a comparison of the type-I with the type-II, it is shown that the type-II NHPP-based SRMs could exhibit better predictive performance than the existing type-I NHPP-based SRMs, especially in the early stage of software testing.
{"title":"Are Infinite-Failure NHPP-Based Software Reliability Models Useful?","authors":"Siqiao Li, T. Dohi, H. Okamura","doi":"10.3390/software2010001","DOIUrl":"https://doi.org/10.3390/software2010001","url":null,"abstract":"In the literature, infinite-failure software reliability models (SRMs), such as Musa-Okumoto SRM (1984), have been demonstrated to be effective in quantitatively characterizing software testing processes and assessing software reliability. This paper primarily focuses on the infinite-failure (type-II) non-homogeneous Poisson process (NHPP)-based SRMs and evaluates the performances of these SRMs comprehensively by comparing with the existing finite-failure (type-I) NHPP-based SRMs. In more specific terms, to describe the software fault-detection time distribution, we postulate 11 representative probability distribution functions that can be categorized into the generalized exponential distribution family and the extreme-value distribution family. Then, we compare the goodness-of-fit and predictive performances with the associated 11 type-I and type-II NHPP-based SRMs. In numerical experiments, we analyze software fault-count data, collected from 16 actual development projects, which are commonly known in the software industry as fault-count time-domain data and fault-count time-interval data (group data). The maximum likelihood method is utilized to estimate the model parameters in both NHPP-based SRMs. In a comparison of the type-I with the type-II, it is shown that the type-II NHPP-based SRMs could exhibit better predictive performance than the existing type-I NHPP-based SRMs, especially in the early stage of software testing.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88562197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retraction: [Prabhdeep Singh, Rajbir Kaur, A software-based framework for the development of smart healthcare systems using fog computing, IET Software 2022 (https://doi.org/10.1049/sfw2.12081)].
The above article from IET Software, published online on 23 December 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
撤回:[Prabhdeep Singh,Rajbir Kaur,使用雾计算开发智能医疗系统的基于软件的框架,IET软件2022(https://doi.org/10.1049/sfw2.12081)]上述来自IET Software的文章于2022年12月23日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: A software-based framework for the development of smart healthcare systems using fog computing","authors":"Prabhdeep Singh, Rajbir Kaur","doi":"10.1049/sfw2.12081","DOIUrl":"https://doi.org/10.1049/sfw2.12081","url":null,"abstract":"<p>Retraction: [Prabhdeep Singh, Rajbir Kaur, A software-based framework for the development of smart healthcare systems using fog computing, <i>IET Software</i> 2022 (https://doi.org/10.1049/sfw2.12081)].</p><p>The above article from <i>IET Software</i>, published online on 23 December 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"632-638"},"PeriodicalIF":1.6,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50141553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}