CFP last date
20 January 2025
Reseach Article

Use of Genetic Algorithm in Quality Measurement

by D. M. Thakore, Torana N. Kamble
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 8
Year of Publication: 2012
Authors: D. M. Thakore, Torana N. Kamble
10.5120/9712-4177

D. M. Thakore, Torana N. Kamble . Use of Genetic Algorithm in Quality Measurement. International Journal of Computer Applications. 60, 8 ( December 2012), 24-28. DOI=10.5120/9712-4177

@article{ 10.5120/9712-4177,
author = { D. M. Thakore, Torana N. Kamble },
title = { Use of Genetic Algorithm in Quality Measurement },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 8 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number8/9712-4177/ },
doi = { 10.5120/9712-4177 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:06:01.030662+05:30
%A D. M. Thakore
%A Torana N. Kamble
%T Use of Genetic Algorithm in Quality Measurement
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 8
%P 24-28
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Assigning access specifier is not an easy task as it decides over all security of any software Though there are many metrics tools available in a market to measure the security at early stage. But in this case assignment of access specifier is totally based on the human judgment and understanding . Objective of Secure Coupling Measurement Tool (SCMT) is to generate all possible solutions by applying Genetic Algorithm (GA). It is different than any other security Measurement Tool because it filters input design before applying metrics by GA. SCMT uses coupling , feature of OO design to determine the security at design level. It Takes input as a UML class diagram with basic constraints and generates alternate solutions i. e. combinations. Tool also provides metrics at code level to compute the security at code level. Result of both the metrics give proof of secure design with the help of spider chart and line graph. These graphs suggests scope to change the design.

References
  1. J. Bansiya and C. G. Davis, "A hierarchical model for object-oriented design quality assessment," IEEE Transactions on Software Engineering, vol. 28, pp. 4–17, 2002 . .
  2. P K. Manadhata, K. M. C. Tan, R. A. Maxion, and J. M. Wing, "An approach to measuring a system's attack surface," Tech. Rep. CMU-CS- 07-146, Carnegie Mellon University, Pittsburgh, PA, August 2007.
  3. B. Alshammari, C. J. Fidge, and D. Corney, "Security metrics for object-oriented class designs," in Proceedings of the Ninth International Conference on Quality Software (QSIC 2009), (Jeju, Korea), pp. 11–20, IEEE, 2009
  4. I. Chowdhury, B. Chan, and M. Zulkernine, "Security metrics for sourcecode structures," in Proceedings of the Fourth International Workshop onSoftware Engineering for Secure Systems, (Leipzig, Germany), ACM, 2008. .
  5. Smriti Jain, "A Review of Security Metrics in Software Development Process" et al / (IJCSIT) International Journal of Computer Science and Information Technologies, 2011.
  6. IstehadChowdhury, Mohammad Zulkernine "Can Complexity, Coupling, and Cohesion Metrics be Used as Early Indicators of Vulnerabilities?" ACM 2010.
  7. S. Chidamber and C. Kemerer, "A metrics suite for object oriented design," IEEE Transactions on Software Engineering, vol. 20, pp. 476–493, 1994. ,
  8. M. Fowler, Refactoring: Improving The Design of Existing Code. Reading, MA: Addison-Wesley, 1999
  9. Payal Khurana&Puneet Jai Kaur DYNAMIC METRICS AT DESIGN LEVEL ,International Journal of Information Technology and Knowledge Management July-December 2009, Volume 2, No. 2, pp. 449-454
  10. AmjanShaik,C. R. K. Reddy, BalaManda, Prakashini. C, Deepthi. K, "An Empirical Validation of Object Oriented Design Metrics in Object Oriented Systems" Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) ,(ISSN: 2141-7016).
  11. John Lloyd1 and Jan Jürjens2,'Security Analysis of a Biometric Authentication System 'Using UMLsec and JML*, A. Schürr and B. Selic (Eds. ): MODELS 2009, LNCS 5795, pp. 77–91, 2009. ,© Springer-Verlag Berlin Heidelberg 2009
  12. M. Y. Liu and I. Traore, "Empirical relation between coupling and attackability in software systems: a case study on DOS," in Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security Ottawa. Ontario, Canada: ACM, 2006, pp. 57–64
  13. Rüdiger Lincke, Jonas Lundberg and Welf Löwe,"Comparing Software Metric Tools", 2008 ACM 978-1-59593-904-3/08/07.
  14. Lionel C. Briand Jie Feng Yvan Labiche," Using Genetic Algorithms and Coupling Measures to Devise Optimal Integration Test Orders" SEKE '02, July 15-19, 2002, Ischia, Italy. ACM 1-58113-556-4/02/0700.
Index Terms

Computer Science
Information Sciences

Keywords

Coupling Quality Security Metrics