Software credibility measurement and estimation method based on data mining

A data mining and credibility technology, applied in the fields of software engineering and information security, can solve untrustworthy explicit and implicit problems

Inactive Publication Date: 2011-09-21
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a user makes a decision to trust the software, it means that the user al

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software credibility measurement and estimation method based on data mining
  • Software credibility measurement and estimation method based on data mining
  • Software credibility measurement and estimation method based on data mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The algorithm flow for implementing this method is as follows:

[0103]

[0104]

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software credibility measurement and estimation method based on data mining, and the method comprises the following steps of: (1) on the basis of a concept hierarchy, defining a construction relation of each attribute weight and an adjacent layer attribute set in the same attribute set; (2) based on a software testing environment, providing a credibility computing base operator facing to an attribute feature set by combining with an artificial intelligence theory; (3) based on a software blackbox testing method, combining a data mining theory, obtaining a software credibility static state attribute feature set and a credibility computing base operator by using the blackbox testing, computing the initial credibility of the software layer by layer, obtaining a software dynamic attribute feature set by testing the software when running, and obtaining the credibility of the software in running by using a congruence measurement operator; (4) defining the lowest subjective expectation to the attribute feature set through a user, and computing the credibility of the software when in termination layer by layer; and (5) providing an estimation recommendation to the credibility of the to-be-estimated software.

Description

technical field [0001] The invention relates to the fields of software engineering and information security, in particular to measurement and evaluation of software credibility. The method disclosed in the present invention aims to provide a method of dividing software credibility to form an attribute feature set using the concept hierarchy method, and by setting different weights, construction types and confidence probabilities, according to the congruence measurement operator based on data mining Software credibility assessment method for software credibility. Background technique [0002] Verification and Validation are one of the basic principles and methods used to build software quality in the research field of software engineering disciplines [1] . In the past decade, Internet-based software applications have gradually evolved from the closed and centralized private R&D environment since the last century, and the specific function usage mode for specific user groups...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 袁玉宇韩强刘川意张旸旸杨金翠
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products