SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
DOI:10.5121/ijcsa.2013.3303 25
Assessment of Programming Language Reliability
Utilizing Soft-Computing
1
Obi J.C. and 2
Akwukuma V.V.N.
1,2
Department of Computer Science. University of Benin, P.M.B. 1154. Benin City.
Nigeria.
2
e-mail: vakwukwuma@yahoo.com; +234(0)8033440003;
Corresponding author:
1
e-mail: tripplejo2k2@yahoo.com; +234(0)8093088218
Abstract
Reliability is a critical program evaluation criterion so much so that program writing (expressing one’s
computational ideas) will be of no use if the end result is not consistent. Programmers cognizant pertaining
to a particular programming language selected for solving a particular computational problem will yield
the desired result. This can only be achieved if the program written in a particular programming language
either structured (C, C++) or Objected-Oriented (Java, C#, Ruby) is gauge with the criteria’s for
evaluating program reliability. Adopting a soft-computing based approach will help model solutions to
program reliability utilizing linguistic variables. Simulating a soft-computing system comprising of genetic
algorithm and fuzzy logic for determining program language reliability was the rationale behind this
research paper. The reliability of programming language could be determined in terms of “Reliable”,
“Moderate Reliable” and “Not Reliable” based on the possessed reliability criteria of the examined
programming language.
Keywords
Fuzzy logic, Fuzzy set, Reliability, Soft-computing.
1.0 Introduction
Reliability is an essential program attribute. Reliability is closely linked with the quality of
measurement which is determined by the "consistency" or "repeatability" of program measure
(Jiantao, 1999). Program reliability is the probability of failure-free program operation for a
specified period of time under a specified set of conditions or defined as producing expected
results for all correct input or the ability of a program to perform to specification under all
conditions (Robert, 2006). Program reliability is also an important factor affecting system
reliability. It differs from hardware reliability in that it reflects the design perfection, rather than
manufacturing perfection (Jiantao, 1999).
The stability or consistency of scores over time or across raters determines reliability. Reliability
pertains to scores not people. Thus, it is highly inadequate to associate reliability with persons.
Program (application) unreliability is usually tied in non-compliance with coding best practice.
This non-compliance can be detected by measuring the static quality attributes of an application
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
26
program reliability criteria’s. Assessing the static attributes underlying an application’s (program)
reliability provides an estimate of the level of program risk and the likelihood of potential
application failures and defeats the application will experience when placed in operation (CISA,
2010).
Determining programming language reliability is a pivoted point of this research utilizing a
simulated soft-computing system which integral genetic algorithm and fuzzy logic.
2.0 Review of Related Literature
The reviewed of certain literatures provided fundamental basic for our research work. This
research work includes:
Sleiman et al., (2010) reviewed ten programming language: C++, C#, Java, Groovy, JavaScript,
PHP, Schalar, Scheme, Haskell and AspectJ with the aim of determining which programming
language is more suitable for a particular language domain; Web applications development, OO
based abstraction. At the end, we will give our conclusion that which languages are suitable and
which are not for using in some language domain. The work also provides evidence and analysis
on why some languages are better than other or have advantages over the other on some criterion.
Fajuyigbe et al., (2009) proposed an appropriate language for introducing object oriented
programming in tertiary institutions. The aim of their works was equipping students with this skill
using the most appropriate language. Adopting the enhanced Alexander’s scheme, they identified
and defined a set of criteria critical to the selection of the most appropriate programming
language for introducing students to Object-Oriented concepts and programming. Furthermore,
based on these criteria, they produced a rating showing the appropriateness of selected
programming languages to the teaching and learning of OOP. The rating result showed the
suitability of these languages to the teaching and learning of OOP. The programming languages
selected were the programming languages rated among the IT skills required in a tough job
market: Java, C#, C++, C and Visual BASIC.
Observing carefully this research works provided a basic for exploring the reliability of
programming language utilizing a simulated model.
3.0 Materials
Fuzzy logic is a superset of conventional (Boolean) logic that has been extended to handle the
concept of partial truth - truth values between "completely true" and "completely false" (Kasabov,
1998; Robert, 2000; Christos and Dimitros, 2008). The theory of fuzzy logic provides a
mathematical strength to capture the uncertainties associated with human cognitive processes,
such as thinking and reasoning. A fuzzy set A is called trapezoidal fuzzy number (Figure 1) with
tolerance interval [a, b], left width α and right width β if its membership function has the
following form
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
27
and we use the notation A = (a, b, α, β). It can easily be shown that [A]γ
= [a − (1 − γ) α, b + (1 −
γ) β], V γ ε [0, 1].
The support of A is (a − α, b + β).
Figure 1: Trapezoidal fuzzy number (Leondes, 2010)
Fuzzy systems often learn their rules from experts. When no expert gives the rules, adaptive
fuzzy systems learns by observing how people regulate real systems (Leondes, 2010). The
difference between classical and fuzzy logic is something called “the law of excluded middle”
(Bart and Satoru, 1993 and Ahmad, 2011). In standard set theory, an object does or does not
belong to a set. There is no middle ground. In such bivalent systems, an object cannot belong to
both its set and its compliment set or to neither of them. This principle preserves the structure of
the logic and avoids the contradiction of object that both is and is not a thing at the same time
(Zadeh, 1965). However, fuzzy logic is highly abstract and employs heuristic (experiment)
requiring human experts to discover rules about data relationship (Angel and Rocio, 2011).
Fuzzy classification assumes the boundary between two neighboring classes as a continuous,
overlapping area within which an object has partial membership in each class (Kuang; Ting-Hua
and Ting-Cheng, 2011). It not only reflects the reality of many applications in which categories
have fuzzy boundaries, but also provides a simple representation of the potentially complex
partition of the feature space. (Sun and Jang, 1993 and Ahmad, 2011) propose an adaptive-
network-based fuzzy classifier to solve fuzzy classification problems. Conventional approaches
of pattern classification involve clustering training samples and associating clusters to given
categories. The complexity and limitations of previous mechanisms are largely due to the lacking
of an effective way of defining the boundaries among clusters. This problem becomes more
intractable when the number of features used for classification increases (Robert, 2000; Kasabov,
1998; Rudolf; 2008, Christos and Dimitros, 2008). A fuzzy set has been derived as an extension
of the classical notion of a set. According to classical set theory, an element either belongs or
does not belong to the set. In contrast, fuzzy set theory permits the gradual assessment of the
membership of elements in a set. A membership function can be described as a graph that defines
how each point in the input space is mapped to the membership value between 0 and 1. Fuzzy
Inference Systems are designed based on the concept of Fuzzy Logic. Fuzzy inference can be
defined as the process of formulating the mapping from a given input to an output. A Fuzzy Logic
System or a Fuzzy Inference System maps the crisp inputs into crisp outputs. It contains five
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
27
and we use the notation A = (a, b, α, β). It can easily be shown that [A]γ
= [a − (1 − γ) α, b + (1 −
γ) β], V γ ε [0, 1].
The support of A is (a − α, b + β).
Figure 1: Trapezoidal fuzzy number (Leondes, 2010)
Fuzzy systems often learn their rules from experts. When no expert gives the rules, adaptive
fuzzy systems learns by observing how people regulate real systems (Leondes, 2010). The
difference between classical and fuzzy logic is something called “the law of excluded middle”
(Bart and Satoru, 1993 and Ahmad, 2011). In standard set theory, an object does or does not
belong to a set. There is no middle ground. In such bivalent systems, an object cannot belong to
both its set and its compliment set or to neither of them. This principle preserves the structure of
the logic and avoids the contradiction of object that both is and is not a thing at the same time
(Zadeh, 1965). However, fuzzy logic is highly abstract and employs heuristic (experiment)
requiring human experts to discover rules about data relationship (Angel and Rocio, 2011).
Fuzzy classification assumes the boundary between two neighboring classes as a continuous,
overlapping area within which an object has partial membership in each class (Kuang; Ting-Hua
and Ting-Cheng, 2011). It not only reflects the reality of many applications in which categories
have fuzzy boundaries, but also provides a simple representation of the potentially complex
partition of the feature space. (Sun and Jang, 1993 and Ahmad, 2011) propose an adaptive-
network-based fuzzy classifier to solve fuzzy classification problems. Conventional approaches
of pattern classification involve clustering training samples and associating clusters to given
categories. The complexity and limitations of previous mechanisms are largely due to the lacking
of an effective way of defining the boundaries among clusters. This problem becomes more
intractable when the number of features used for classification increases (Robert, 2000; Kasabov,
1998; Rudolf; 2008, Christos and Dimitros, 2008). A fuzzy set has been derived as an extension
of the classical notion of a set. According to classical set theory, an element either belongs or
does not belong to the set. In contrast, fuzzy set theory permits the gradual assessment of the
membership of elements in a set. A membership function can be described as a graph that defines
how each point in the input space is mapped to the membership value between 0 and 1. Fuzzy
Inference Systems are designed based on the concept of Fuzzy Logic. Fuzzy inference can be
defined as the process of formulating the mapping from a given input to an output. A Fuzzy Logic
System or a Fuzzy Inference System maps the crisp inputs into crisp outputs. It contains five
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
27
and we use the notation A = (a, b, α, β). It can easily be shown that [A]γ
= [a − (1 − γ) α, b + (1 −
γ) β], V γ ε [0, 1].
The support of A is (a − α, b + β).
Figure 1: Trapezoidal fuzzy number (Leondes, 2010)
Fuzzy systems often learn their rules from experts. When no expert gives the rules, adaptive
fuzzy systems learns by observing how people regulate real systems (Leondes, 2010). The
difference between classical and fuzzy logic is something called “the law of excluded middle”
(Bart and Satoru, 1993 and Ahmad, 2011). In standard set theory, an object does or does not
belong to a set. There is no middle ground. In such bivalent systems, an object cannot belong to
both its set and its compliment set or to neither of them. This principle preserves the structure of
the logic and avoids the contradiction of object that both is and is not a thing at the same time
(Zadeh, 1965). However, fuzzy logic is highly abstract and employs heuristic (experiment)
requiring human experts to discover rules about data relationship (Angel and Rocio, 2011).
Fuzzy classification assumes the boundary between two neighboring classes as a continuous,
overlapping area within which an object has partial membership in each class (Kuang; Ting-Hua
and Ting-Cheng, 2011). It not only reflects the reality of many applications in which categories
have fuzzy boundaries, but also provides a simple representation of the potentially complex
partition of the feature space. (Sun and Jang, 1993 and Ahmad, 2011) propose an adaptive-
network-based fuzzy classifier to solve fuzzy classification problems. Conventional approaches
of pattern classification involve clustering training samples and associating clusters to given
categories. The complexity and limitations of previous mechanisms are largely due to the lacking
of an effective way of defining the boundaries among clusters. This problem becomes more
intractable when the number of features used for classification increases (Robert, 2000; Kasabov,
1998; Rudolf; 2008, Christos and Dimitros, 2008). A fuzzy set has been derived as an extension
of the classical notion of a set. According to classical set theory, an element either belongs or
does not belong to the set. In contrast, fuzzy set theory permits the gradual assessment of the
membership of elements in a set. A membership function can be described as a graph that defines
how each point in the input space is mapped to the membership value between 0 and 1. Fuzzy
Inference Systems are designed based on the concept of Fuzzy Logic. Fuzzy inference can be
defined as the process of formulating the mapping from a given input to an output. A Fuzzy Logic
System or a Fuzzy Inference System maps the crisp inputs into crisp outputs. It contains five
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
28
components: Rule-base, Data-base, Fuzzifier (transformation of crisp values into fuzzy set),
Inference and Defuzzifier (transformation of fuzzy set into crisp value).
Professor John Holland in 1975 proposed an attractive class of computational models, called
Genetic Algorithms (GA) that mimic the biological evolution process for solving problems in a
wide domain. Genetic algorithm is made-up of five main components namely (Amit, 1999 and
Zhang and Nguyen 1993).
a. Fitness Function: also called evaluation function, is the genetic algorithm component
that rate a potential by calculating how good they are relative to the current problem
domain.
b. Selection: is a way for the genetic algorithm to move toward promising regions in the
search space. The individual with the highest fitness are selected and they will have a
higher probability of survival to the next generation
c. Mutation: is a genetic operator that changes one or more gene values in a chromosome.
The mutation process helps to overcome trapping at local maxima. The offspring’s
produced by the genetic manipulation process are the next population to be evaluated.
d. Crossover: Exchanging Chromosomes portions of genetic materials.
e. Reproduction: Birth of a new generation
Proposed Pseudo-code for Genetic Algorithm (Obi and Imianvan, 2013)
Input:
Size of population (k)
Rate of mutation (v)
Rate of crossover (c)
Number of iteration (n)
Number of crossover (nc)
Number of mutation (nm)
// Initialization
1. Randomly generate K possible solution;
2. Save solution in population Kok;
// Loop till terminal point
3. For m = 1 to n do;
// Crossover
4. Number of crossover nc = (k –nm)/2;
5. For u = 1 to n do;
6. Select two solutions randomly EA and FG for K;
7. generate GV and HN by two-point cross to EA and FG;
8. Save GV and HN to K2;
9. end for;
//Mutation
10. for u = 1 to n do;
11. Selection a solution Yh from K2;
12. Mutate each bit of Yh under nm and generate a new solution Yhi
13. If Yhi is impossibe
14. renovate Yhi with possible solution by modifying Yhi
15. end if
16. renovate Yh with Yhi in K2
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
29
17. end for
// renovate
18. renovate K = K2;
19. // return the best solution
20. Return the best solution Y in K
3.1 Factors for Assessing Computational Programming language Reliability
Several parameters have been utilized in determining programming language reliability but the
under listed seven are the most appropriate (Robert, 2006).
a. Type Checking is simply testing for type errors in a given program, either by the
compiler or during program execution. Type checking is an important factor in language
reliability. Because run-time type checking is expensive, compile -time checking is more
desirable. Furthermore, the earlier errors in program are detected, the less expensive it is
to make the required repairs (Robert, 2006). It is also the process of ensuring that
operands of an operator are of compatible types. A compatible type is one that either is
legal for the operator or is allowed under languages rules to be implicitly converted by
compile-generated codes (or the interpreter) to legal types. This automatic conversion is
called coercion. Programming language reliability is close tied to type checking.
b. Exception Handling is the ability of a program to interrupt run-time error, as well as
unusual condition detected by the program takes corrective measure before proceeding
with program execution. . As long as exception handling exists in a programming
language utilized for solving particular computational problem reliability is assured.
c. Restricting Aliasing: Aliasing is the process whereby multiple variables are assigned the
same memory location or address. Aliasing is a threat to program reliability because it
allows the value assigned to variables to be changed by been assigned to another variable.
For example if both variables sum and total are aliases, any change to the value of total,
changes the value of sum and vice versa. Two pointers are aliased when they point to the
same memory location (Robert, 2006). Restricting aliasing will result in reliable
programming language and reliable developed program.
d. Restricting Program-orthogonality: Program orthogonality simple means the freedom
residing in the hand of the programmer which allows the programmer to combine
language constructs in other to achieve desirable results. While it fosters program
writability, it is a dangerous end for program reliability. Therefore preventing or
restricting programming language orthogonlity will foster program reliability.
e. Program Uniformity: Program uniformity is tied to the consistency in the forms of
language constructs. Uniformity has to do with format. Program uniformity will go a long
way in determining program reliability.
f. Program Abstraction is the ability to define and use complicated structures or
operations in a manner which permits many of its details to be ignored. Abstraction is a
key concept in contemporary programming language design. The range of program
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
30
abstraction allowed by a programming language and the naturalness of its language
expression enhances writ ability and reliability. Reliability is enhanced if the abstraction
is moderately allowed.
g. Program Expressivity simply defines consistency of language features with natural way
of thinking for solving a computational problem. Without program expressivity,
reliability cannot be achieved.
4.0 Methodology Applied
In other to achieve our underlining objectives, the under listed criteria were applied in designing
the proposed soft-computing model.
Fig.2: Soft-computing Model for the Assessment of programming Language Reliability
The model pictorially illustrated in fig.2, comprises of certain features, which includes
a. Knowledgebase: A varid form of database that hold special information. The criteria
(parameters or fuzzyset) for determinimg programming language reliability is held in the
knowdebase.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
31
b. The structured and unstructures statistic simply refer to database information (usually
well arranged) and dispered information residing in the knowledge-base respectively.
c. The Genetic Optimizer handles membership optimization following the procedure
specified within the architecture.
d. Fuzzy Logic: the impreciseness (vagueness) associated with the parameters for assessing
programming language reliability where handled utilizing fuzzy-if-then rules.
e. Decision support: predicate output result based on emotional filter and cognitive filter.
The cognitive filter of the decision support engine takes as input the output report of
knowledge base and applies objective rules to rank the programming languages criteria’s.
The emotional filter takes as input the output report of the cognitive filter and applies the
subjective rules in the domain of studies in order to rank the programming language
criteria’s.
f. The stationery system: produces the output based on the paramters received.
5.0 Result and Discussions
The fuzzy partition for each input feature consists of the parameters for assessing programming
language reliability. However, it can occur that if the fuzzy partition for assessing programming
language reliability is not set up correctly, or if the number of linguistic terms for the input
features is not large enough, then some patterns will be misclassified. The rules that can be
generated from the initial fuzzy partitions of the classification for assessing programming
language reliability are thus:
a. Not Reliable (Class: C1)
b. Moderately Reliable (Class: C2)
c. Reliable (Class: C3)
If the assessed Programming Language (LP) possesses less than or equal to two (LP ≤ 2) of the
parameters for assessing program reliability THEN (C1), If the assessed Programming Language
(LP) possesses three (LP = 3) of the parameters for assessing program reliability THEN (C2) and
if the assessed Programming Language (LP) possesses four (LP ≥ 4) or more parameters for
assessing program reliability (THEN (C3).
The Fuzzy IF-THEN Rules (Ri) for assessing program reliability:
R1: IF programming Language possesses Type checking ability THEN it is in class C1.
R2: IF programming Language possesses Type checking ability and Exception
handling THEN it is in class C1.
R3: IF programming Language possesses Type checking ability, Exception handling and
Restricting Aliasing THEN it is in class C2.
R4: IF programming Language possesses Type checking ability, Exception handling,
Restricting Aliasing and Program uniformity THEN it is in class C3.
R5: IF programming Language possesses Type checking ability, Exception handling,
Restricting Aliasing, program uniformity and program Abstraction THEN it is in class C3.
R6: IF programming Language possesses Type checking ability, Exception handling,
Restricting Aliasing, Program uniformity, Program abstraction and Program expressivity
THEN it is in class C3
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
32
R7: IF programming Language possesses Type checking ability, Exception handling,
Restricting Aliasing, Program uniformity, Program abstraction, Program expressivity
and Restricting program orthogonality THEN it is in class C3.
A typical data set that contains the seven parameters is presented in Table 1. This shows the
degree of intensity (membership) for assessing programming language reliability.
Table 1: Data Set showing the Degree of membership for Programming Language reliability
Utilizing the algorithm proposed by obi and Imianvan (2013), the optimization of our
membership was achieved..
Genetic Algorithm Inference:
R1: IF R01 THEN C1 = 0.50
R2: IF R01 AND R02 THEN C2 = 0.18
R3: IF R01, R02 AND R03 THEN C2 = 0.38
R4: IF R01, R02, R03 AND R04 THEN C3 = 0.44
R5: IF R01, R02, R03, R04 AND R05 THEN C3 = 0.37
R6: IF R01, R02, R03, R04, R05 AND R06 THEN C3 = 0.46
R7: IF R01, R02, R03, R04, R05, R06 AND RO7 THEN C3 = 0.46
We then convert these resolved values into whole numbers and imply them to be the fitness
function (f) of the initial generation (Parents) as shown in Table 2.
R1: 50, R2: 18, R3: 38 R4: 44 R5: 37 R6: 46
R7: 46
Parameters or Fuzzy sets
For Programming Language
Reliability
Codes Membership Function for Programming
Language Reliability
Cluster 1
(C1)
Cluster 2
(C2)
Cluster 3
(C3)
Type Checking R01 0.50 0.15 0.35
Exception Handling R02 0.20 0.20 0.60
Restricting Aliasing R03 0.10 0.80 0.10
Program Uniformity R04 0.20 0.10 0.70
Program Abstraction R05 0.30 0.60 0.10
Program Expressivity R06 0.05 0.05 0.90
Restricting Program
Othogonality
R07 0.00 0.50 0.50
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
33
Table 2: 1st
and 2nd
Generation Table
S/N Selection Chromosomes (Binary; 0 or 1) Fitness
functionParent (1st
Gen) Crossover Parent (2nd
Gen)
1 50 110010 1 & 6 110101 53
2 46 101110 2 & 4 101100 44
3 46 101110 Mutation 101100 44
4 44 101100 2 & 4 101110 46
5 38 100110 5 & 7 100010 34
6 37 100101 1 & 6 100010 34
7 18 010010 5 & 7 010110 22
To create our 2nd
and 3rd
generation from the parents (1st
generation) we chose the third bit from
the left to be our crossover point. In the 4th
generation each bold bit signifies the cross-over bits, a
single bold bit signifies mutation of that bit and an italicized chromosomes signifies elitism. See
Tables 3 and 4.
Table 3:2nd
and 3rd
Generation Table
Table 4:3rd
and 4th
Generation Table
The best fourth generation (stopping criterion) is that with the best fitness function, 54. This
implies that the clusters of the various parameters has been searched and optimized to 0.54,
serving as the boundary in determining high and low degree of intensity of the served
membership function. Therefore any parameter(s) with membership function (MF > 0.50) implies
S/N Selection Chromosomes (Binary; 0 or 1) Fitness
functionParent (2nd
Gen) Crossover Parent (3rd
Gen)
1 53 110101 1 & 3 110100 52
2 46 101110 2 & 6 101010 42
3 44 101100 1 & 3 101101 45
4 44 101100 4 & 5 101010 42
5 34 100010 4 & 5 100100 36
6 34 100010 2 & 6 100110 38
7 22 010110 Mutation 010100 20
S/N Selection Chromosomes (Binary; 0 or 1) Fitness
functionParent (3rd
Gen) Crossover Parent (4th
Gen)
1 52 110100 Mutation 110110 54
2 45 101101 2 & 3 101110 46
3 42 101010 2 & 3 101001 41
4 42 101010 6 & 4 101000 40
5 38 100110 5 & 7 100100 40
6 36 100100 6 & 4 100110 38
7 20 010100 5 & 7 010110 22
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
34
high degree of membership and any parameters(s) with membership function (MF < 0.50) implies
low degree of membership.
Based on the optimized membership function, the result in table 5 is obtained.
Table 5: Data Set showing the Degree of membership for Programming Language reliability
6.0 Conclusion
The ability in determining if certain programming language constructs fosters programming
reliability is essential for the survival, utilization and continuous propagation of such
programming language. The needs to design a system that would assist application programmers’
in general ascertain programming language reliability parameters cannot be over emphasized. The
practicality of genetic algorithm and fuzzy logic (Genetic-fuzzy system) has been demonstrated
by our proposed model. This model which uses a set of fuzzified data set incorporated into
genetic algorithm system is more precise than the traditional system for recognizing reliable
program language. The system designed is an interactive system that explores programming
language limitation and gains. A system of this nature should be introduced in the IT Sector to
ease the job of IT professionals, programmers and application developer in recognizing and
filtering obsolete programming language.
Reference
[1] Ahmad H. (2011), “Fuzzy approach to Likert Spectrum in Classified levels in surveying researches”
retrieved http://www.tjmcs.com.
[2] Angel C. and Rocio R. ( 2011), “Documentation management with Ant colony Optimization
Metaheuristic: A Fuzzy Text Clustering Approach Using Pheromone trails” retrieved from soft
computing in Industrial applications, Advances in intelligent and soft Computing, vol. 96, 2011, 261-
70, DOI: 10.1007/978-3-642-20505-1_23.
[3] Bart K. and Satoru I. (1993), “Fuzzy Logic”, retrieved from http//:Fortunecity
.com/emachines/e11/86/fuzzylog.html.
Parameters or Fuzzy sets
For Programming Language
Reliability
Codes Membership Function for Programming
Language Reliability
Cluster 1
(C1)
Cluster 2
(C2)
Cluster 3
(C3)
Type Checking R01 0.50 0.15 0.35
Exception Handling R02 0.20 0.20 0.60
Restricting Aliasing R03 0.10 0.80 0.10
Program Uniformity R04 0.20 0.10 0.70
Program Abstraction R05 0.30 0.60 0.10
Program Expressivity R06 0.05 0.05 0.90
Restricting Program Othogonality R07 0.00 0.50 0.50
Result Not
Reliable
Moderately
Reliable
Reliable
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
35
[4] Christos S. And Dimitros S. (2008) “Neural Network”, retrieved from
http://www.docstoc.com/docs/15050/neural-networks.
[5] CISA: Certified Information System Auditor (2011), “Cisa review manual 2010”, Chapter 5, 305.
[6] Fajuyigbe O., Onibere E., Ekuobase G. (2011), “Appropriate language for introducing object oriented
programming in tertiary institutions” retrieved online from
www.ajol.info/index.php/ijonas/article/view/49925
[7] Jiantao P. (1999), “Software Reliability”, retrieved online from http://ece.cmu.edu/koopman/Des_a
99/sw-reliability/
[8] Kasabov N. K. (1998), “Foundations of neural networks, fuzzy systems, and knowledge engineering”,
A Bradford Book, The MIT Press Cambridge, Massachusetts London, England, ISBN 0-262-11212-.
[9] Kuang Y. H., Ting-H. C. and Ting-Cheng Chang (2011), “Determination of the threshold value β of
variable precision rough set by fuzzy algorithms” retrieved from
http://www.sciencedirect.com/science/article/pii/S0888613X11000831.
[10] Lamb J.D. (2006), “Insertion Heuristics for Central Cycle Problems” retrieved from
aura.abdn.ac.uk/bitstream/2164/96/1/ISSN%200143-06-07.pdf
[11] Leondes C (2010), “The Technology of Fuzzy Logic Algorithm retrieved from
Suite101.com/examples-of-expert-System-application-in-artificial Intelligence.
[12] Robert Full´er,(2000) Introduction to Neuro-Fuzzy Systems, Advances in Soft Computing Series,
Springer-Verlag, Berlin/Heildelberg, 289 pages. (ISBN3-7908-1256-0)(MR1760972.
[13] Robert W. S. (2006), “Concept of Programming Language” 7ed, University of Colorado at Colorado
spring, USA.
[14] Rudolf K. (2008), Neuro-fuzzy systems, retrieved from http://ask.com
[15] Sleiman R., Jiang Li., Mingzhi L., Yuanwei L. (2010), “Comparative Studies of 10 Programming
Languages within 10 Diverse Criteria” retrieved from” http://arxiv.org/abs/1009.0305
[16] Sun C.T. and Jang J.S. (1993) “A neuro-fuzzy classifier and its applications”, in: Proc. IEEE Int.
Conference on Neural Networks, San Francisco, pp.94–98.
[17] Zadeh L.A. (1965), “Fuzzy sets. Information and Control”, Vol.8, pp.338-353.

Mais conteúdo relacionado

Mais procurados

Review: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense DisambiguationReview: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense DisambiguationIOSR Journals
 
A Survey on Sentiment Categorization of Movie Reviews
A Survey on Sentiment Categorization of Movie ReviewsA Survey on Sentiment Categorization of Movie Reviews
A Survey on Sentiment Categorization of Movie ReviewsEditor IJMTER
 
Trajectory Data Fuzzy Modeling : Ambulances Management Use Case
Trajectory Data Fuzzy Modeling : Ambulances Management Use CaseTrajectory Data Fuzzy Modeling : Ambulances Management Use Case
Trajectory Data Fuzzy Modeling : Ambulances Management Use Caseijdms
 
NLP_Project_Paper_up276_vec241
NLP_Project_Paper_up276_vec241NLP_Project_Paper_up276_vec241
NLP_Project_Paper_up276_vec241Urjit Patel
 
Modeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationModeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationTELKOMNIKA JOURNAL
 
Nlp research presentation
Nlp research presentationNlp research presentation
Nlp research presentationSurya Sg
 
Programmer information needs after memory failure
Programmer information needs after memory failureProgrammer information needs after memory failure
Programmer information needs after memory failureBhagyashree Deokar
 
Feature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsFeature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsIJECEIAES
 
SENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCH
SENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCHSENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCH
SENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCHijwscjournal
 
Importance of the neutral category in fuzzy clustering of sentiments
Importance of the neutral category in fuzzy clustering of sentimentsImportance of the neutral category in fuzzy clustering of sentiments
Importance of the neutral category in fuzzy clustering of sentimentsijfls
 
IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...
IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...
IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...IRJET Journal
 
Analysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion MiningAnalysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion Miningmlaij
 
Neural Network in Knowledge Bases
Neural Network in Knowledge BasesNeural Network in Knowledge Bases
Neural Network in Knowledge BasesKushal Arora
 
Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...Bhagyashree Deokar
 
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET Journal
 
A fuzzy logic based on sentiment
A fuzzy logic based on sentimentA fuzzy logic based on sentiment
A fuzzy logic based on sentimentIJDKP
 

Mais procurados (20)

Review: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense DisambiguationReview: Semi-Supervised Learning Methods for Word Sense Disambiguation
Review: Semi-Supervised Learning Methods for Word Sense Disambiguation
 
A Survey on Sentiment Categorization of Movie Reviews
A Survey on Sentiment Categorization of Movie ReviewsA Survey on Sentiment Categorization of Movie Reviews
A Survey on Sentiment Categorization of Movie Reviews
 
Trajectory Data Fuzzy Modeling : Ambulances Management Use Case
Trajectory Data Fuzzy Modeling : Ambulances Management Use CaseTrajectory Data Fuzzy Modeling : Ambulances Management Use Case
Trajectory Data Fuzzy Modeling : Ambulances Management Use Case
 
NLP_Project_Paper_up276_vec241
NLP_Project_Paper_up276_vec241NLP_Project_Paper_up276_vec241
NLP_Project_Paper_up276_vec241
 
Modeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationModeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector Quantization
 
Nlp research presentation
Nlp research presentationNlp research presentation
Nlp research presentation
 
Programmer information needs after memory failure
Programmer information needs after memory failureProgrammer information needs after memory failure
Programmer information needs after memory failure
 
Feature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsFeature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documents
 
SENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCH
SENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCHSENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCH
SENSE DISAMBIGUATION TECHNIQUE FOR PROVIDING MORE ACCURATE RESULTS IN WEB SEARCH
 
Importance of the neutral category in fuzzy clustering of sentiments
Importance of the neutral category in fuzzy clustering of sentimentsImportance of the neutral category in fuzzy clustering of sentiments
Importance of the neutral category in fuzzy clustering of sentiments
 
IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...
IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...
IRJET-Classifying Mined Online Discussion Data for Reflective Thinking based ...
 
Supervised Approach to Extract Sentiments from Unstructured Text
Supervised Approach to Extract Sentiments from Unstructured TextSupervised Approach to Extract Sentiments from Unstructured Text
Supervised Approach to Extract Sentiments from Unstructured Text
 
Nn kb
Nn kbNn kb
Nn kb
 
Analysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion MiningAnalysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion Mining
 
Neural Network in Knowledge Bases
Neural Network in Knowledge BasesNeural Network in Knowledge Bases
Neural Network in Knowledge Bases
 
Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...
 
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect Information
 
40120140501013
4012014050101340120140501013
40120140501013
 
My experiment
My experimentMy experiment
My experiment
 
A fuzzy logic based on sentiment
A fuzzy logic based on sentimentA fuzzy logic based on sentiment
A fuzzy logic based on sentiment
 

Destaque

A N A UTOMATION S YSTEM F OR T RACKING C OMMUNITY C ERTIFICATE
A N  A UTOMATION  S YSTEM  F OR  T RACKING  C OMMUNITY  C ERTIFICATEA N  A UTOMATION  S YSTEM  F OR  T RACKING  C OMMUNITY  C ERTIFICATE
A N A UTOMATION S YSTEM F OR T RACKING C OMMUNITY C ERTIFICATEijcsa
 
Motion detection applied to
Motion detection applied toMotion detection applied to
Motion detection applied toijcsa
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
Image Inpainting System Model Based on Evaluation
Image Inpainting System Model Based on  EvaluationImage Inpainting System Model Based on  Evaluation
Image Inpainting System Model Based on Evaluationijcsa
 
A novelty approach on forgery digital image
A novelty approach on forgery digital imageA novelty approach on forgery digital image
A novelty approach on forgery digital imageijcsa
 
An experimental evaluation of performance
An experimental evaluation of performanceAn experimental evaluation of performance
An experimental evaluation of performanceijcsa
 
EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...
EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...
EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...ijcsa
 
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGA SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGijcsa
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsijcsa
 
TEST CASE PRIORITIZATION USING FUZZY LOGIC BASED ON REQUIREMENT PRIORITIZING
TEST CASE PRIORITIZATION USING FUZZY LOGIC  BASED ON REQUIREMENT PRIORITIZINGTEST CASE PRIORITIZATION USING FUZZY LOGIC  BASED ON REQUIREMENT PRIORITIZING
TEST CASE PRIORITIZATION USING FUZZY LOGIC BASED ON REQUIREMENT PRIORITIZINGijcsa
 
A new approach to the solution of economic dispatch using particle Swarm opt...
A new approach to the solution of economic dispatch using particle Swarm  opt...A new approach to the solution of economic dispatch using particle Swarm  opt...
A new approach to the solution of economic dispatch using particle Swarm opt...ijcsa
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Classification of retinal vessels into
Classification of retinal vessels intoClassification of retinal vessels into
Classification of retinal vessels intoijcsa
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphijcsa
 
A coustic pseudo spectrum based fault Localization in motorcycles
A coustic pseudo spectrum based fault Localization in motorcyclesA coustic pseudo spectrum based fault Localization in motorcycles
A coustic pseudo spectrum based fault Localization in motorcyclesijcsa
 
EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...
EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...
EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...ijcsa
 
Automated traffic sign board
Automated traffic sign boardAutomated traffic sign board
Automated traffic sign boardijcsa
 
Persian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approachPersian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approachijcsa
 
Nocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksNocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksijcsa
 

Destaque (20)

A N A UTOMATION S YSTEM F OR T RACKING C OMMUNITY C ERTIFICATE
A N  A UTOMATION  S YSTEM  F OR  T RACKING  C OMMUNITY  C ERTIFICATEA N  A UTOMATION  S YSTEM  F OR  T RACKING  C OMMUNITY  C ERTIFICATE
A N A UTOMATION S YSTEM F OR T RACKING C OMMUNITY C ERTIFICATE
 
Motion detection applied to
Motion detection applied toMotion detection applied to
Motion detection applied to
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Image Inpainting System Model Based on Evaluation
Image Inpainting System Model Based on  EvaluationImage Inpainting System Model Based on  Evaluation
Image Inpainting System Model Based on Evaluation
 
A novelty approach on forgery digital image
A novelty approach on forgery digital imageA novelty approach on forgery digital image
A novelty approach on forgery digital image
 
An experimental evaluation of performance
An experimental evaluation of performanceAn experimental evaluation of performance
An experimental evaluation of performance
 
EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...
EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...
EVALUATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN PREDICTION OF THE CAR ...
 
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERINGA SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
A SURVEY ON OPTIMIZATION APPROACHES TO TEXT DOCUMENT CLUSTERING
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systems
 
TEST CASE PRIORITIZATION USING FUZZY LOGIC BASED ON REQUIREMENT PRIORITIZING
TEST CASE PRIORITIZATION USING FUZZY LOGIC  BASED ON REQUIREMENT PRIORITIZINGTEST CASE PRIORITIZATION USING FUZZY LOGIC  BASED ON REQUIREMENT PRIORITIZING
TEST CASE PRIORITIZATION USING FUZZY LOGIC BASED ON REQUIREMENT PRIORITIZING
 
A new approach to the solution of economic dispatch using particle Swarm opt...
A new approach to the solution of economic dispatch using particle Swarm  opt...A new approach to the solution of economic dispatch using particle Swarm  opt...
A new approach to the solution of economic dispatch using particle Swarm opt...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Classification of retinal vessels into
Classification of retinal vessels intoClassification of retinal vessels into
Classification of retinal vessels into
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graph
 
A coustic pseudo spectrum based fault Localization in motorcycles
A coustic pseudo spectrum based fault Localization in motorcyclesA coustic pseudo spectrum based fault Localization in motorcycles
A coustic pseudo spectrum based fault Localization in motorcycles
 
EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...
EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...
EVALUATION THE EFFICIENCY OF ARTIFICIAL BEE COLONY AND THE FIREFLY ALGORITHM ...
 
Automated traffic sign board
Automated traffic sign boardAutomated traffic sign board
Automated traffic sign board
 
Persian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approachPersian arabic document segmentation based on hybrid approach
Persian arabic document segmentation based on hybrid approach
 
Residence 305
Residence 305Residence 305
Residence 305
 
Nocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksNocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless links
 

Semelhante a Assessment of Programming Language Reliability Utilizing Soft-Computing

FUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATION
FUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATIONFUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATION
FUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATIONijdms
 
Tracing Requirements as a Problem of Machine Learning
Tracing Requirements as a Problem of Machine Learning Tracing Requirements as a Problem of Machine Learning
Tracing Requirements as a Problem of Machine Learning ijseajournal
 
SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING
SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING
SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING cscpconf
 
Estimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approachEstimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approachcsandit
 
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHcscpconf
 
Supreme court dialogue classification using machine learning models
Supreme court dialogue classification using machine learning models Supreme court dialogue classification using machine learning models
Supreme court dialogue classification using machine learning models IJECEIAES
 
PROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGN
PROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGNPROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGN
PROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGNijpla
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Survey: Biological Inspired Computing in the Network Security
Survey: Biological Inspired Computing in the Network SecuritySurvey: Biological Inspired Computing in the Network Security
Survey: Biological Inspired Computing in the Network SecurityEswar Publications
 
ONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVAL
ONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVALONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVAL
ONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVALijaia
 
Ijarcet vol-2-issue-4-1363-1367
Ijarcet vol-2-issue-4-1363-1367Ijarcet vol-2-issue-4-1363-1367
Ijarcet vol-2-issue-4-1363-1367Editor IJARCET
 
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...
A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...ijcsit
 
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONijscai
 
A Naive Method For Ontology Construction
A Naive Method For Ontology Construction A Naive Method For Ontology Construction
A Naive Method For Ontology Construction IJSCAI Journal
 
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONijscai
 

Semelhante a Assessment of Programming Language Reliability Utilizing Soft-Computing (20)

FUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATION
FUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATIONFUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATION
FUZZY STATISTICAL DATABASE AND ITS PHYSICAL ORGANIZATION
 
Tracing Requirements as a Problem of Machine Learning
Tracing Requirements as a Problem of Machine Learning Tracing Requirements as a Problem of Machine Learning
Tracing Requirements as a Problem of Machine Learning
 
graziani_bias.pdf
graziani_bias.pdfgraziani_bias.pdf
graziani_bias.pdf
 
SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING
SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING
SEMANTIC INTEGRATION FOR AUTOMATIC ONTOLOGY MAPPING
 
Estimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approachEstimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approach
 
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
 
Supreme court dialogue classification using machine learning models
Supreme court dialogue classification using machine learning models Supreme court dialogue classification using machine learning models
Supreme court dialogue classification using machine learning models
 
PROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGN
PROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGNPROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGN
PROPERTIES OF RELATIONSHIPS AMONG OBJECTS IN OBJECT-ORIENTED SOFTWARE DESIGN
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Survey: Biological Inspired Computing in the Network Security
Survey: Biological Inspired Computing in the Network SecuritySurvey: Biological Inspired Computing in the Network Security
Survey: Biological Inspired Computing in the Network Security
 
ONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVAL
ONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVALONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVAL
ONTOLOGICAL TREE GENERATION FOR ENHANCED INFORMATION RETRIEVAL
 
Ijarcet vol-2-issue-4-1363-1367
Ijarcet vol-2-issue-4-1363-1367Ijarcet vol-2-issue-4-1363-1367
Ijarcet vol-2-issue-4-1363-1367
 
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...
A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...A N  E XTENSION OF  P ROTÉGÉ FOR AN AUTOMA TIC  F UZZY - O NTOLOGY BUILDING U...
A N E XTENSION OF P ROTÉGÉ FOR AN AUTOMA TIC F UZZY - O NTOLOGY BUILDING U...
 
61_Empirical
61_Empirical61_Empirical
61_Empirical
 
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
 
A Naive Method For Ontology Construction
A Naive Method For Ontology Construction A Naive Method For Ontology Construction
A Naive Method For Ontology Construction
 
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTIONA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Assessment of Programming Language Reliability Utilizing Soft-Computing

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 DOI:10.5121/ijcsa.2013.3303 25 Assessment of Programming Language Reliability Utilizing Soft-Computing 1 Obi J.C. and 2 Akwukuma V.V.N. 1,2 Department of Computer Science. University of Benin, P.M.B. 1154. Benin City. Nigeria. 2 e-mail: vakwukwuma@yahoo.com; +234(0)8033440003; Corresponding author: 1 e-mail: tripplejo2k2@yahoo.com; +234(0)8093088218 Abstract Reliability is a critical program evaluation criterion so much so that program writing (expressing one’s computational ideas) will be of no use if the end result is not consistent. Programmers cognizant pertaining to a particular programming language selected for solving a particular computational problem will yield the desired result. This can only be achieved if the program written in a particular programming language either structured (C, C++) or Objected-Oriented (Java, C#, Ruby) is gauge with the criteria’s for evaluating program reliability. Adopting a soft-computing based approach will help model solutions to program reliability utilizing linguistic variables. Simulating a soft-computing system comprising of genetic algorithm and fuzzy logic for determining program language reliability was the rationale behind this research paper. The reliability of programming language could be determined in terms of “Reliable”, “Moderate Reliable” and “Not Reliable” based on the possessed reliability criteria of the examined programming language. Keywords Fuzzy logic, Fuzzy set, Reliability, Soft-computing. 1.0 Introduction Reliability is an essential program attribute. Reliability is closely linked with the quality of measurement which is determined by the "consistency" or "repeatability" of program measure (Jiantao, 1999). Program reliability is the probability of failure-free program operation for a specified period of time under a specified set of conditions or defined as producing expected results for all correct input or the ability of a program to perform to specification under all conditions (Robert, 2006). Program reliability is also an important factor affecting system reliability. It differs from hardware reliability in that it reflects the design perfection, rather than manufacturing perfection (Jiantao, 1999). The stability or consistency of scores over time or across raters determines reliability. Reliability pertains to scores not people. Thus, it is highly inadequate to associate reliability with persons. Program (application) unreliability is usually tied in non-compliance with coding best practice. This non-compliance can be detected by measuring the static quality attributes of an application
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 26 program reliability criteria’s. Assessing the static attributes underlying an application’s (program) reliability provides an estimate of the level of program risk and the likelihood of potential application failures and defeats the application will experience when placed in operation (CISA, 2010). Determining programming language reliability is a pivoted point of this research utilizing a simulated soft-computing system which integral genetic algorithm and fuzzy logic. 2.0 Review of Related Literature The reviewed of certain literatures provided fundamental basic for our research work. This research work includes: Sleiman et al., (2010) reviewed ten programming language: C++, C#, Java, Groovy, JavaScript, PHP, Schalar, Scheme, Haskell and AspectJ with the aim of determining which programming language is more suitable for a particular language domain; Web applications development, OO based abstraction. At the end, we will give our conclusion that which languages are suitable and which are not for using in some language domain. The work also provides evidence and analysis on why some languages are better than other or have advantages over the other on some criterion. Fajuyigbe et al., (2009) proposed an appropriate language for introducing object oriented programming in tertiary institutions. The aim of their works was equipping students with this skill using the most appropriate language. Adopting the enhanced Alexander’s scheme, they identified and defined a set of criteria critical to the selection of the most appropriate programming language for introducing students to Object-Oriented concepts and programming. Furthermore, based on these criteria, they produced a rating showing the appropriateness of selected programming languages to the teaching and learning of OOP. The rating result showed the suitability of these languages to the teaching and learning of OOP. The programming languages selected were the programming languages rated among the IT skills required in a tough job market: Java, C#, C++, C and Visual BASIC. Observing carefully this research works provided a basic for exploring the reliability of programming language utilizing a simulated model. 3.0 Materials Fuzzy logic is a superset of conventional (Boolean) logic that has been extended to handle the concept of partial truth - truth values between "completely true" and "completely false" (Kasabov, 1998; Robert, 2000; Christos and Dimitros, 2008). The theory of fuzzy logic provides a mathematical strength to capture the uncertainties associated with human cognitive processes, such as thinking and reasoning. A fuzzy set A is called trapezoidal fuzzy number (Figure 1) with tolerance interval [a, b], left width α and right width β if its membership function has the following form
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 27 and we use the notation A = (a, b, α, β). It can easily be shown that [A]γ = [a − (1 − γ) α, b + (1 − γ) β], V γ ε [0, 1]. The support of A is (a − α, b + β). Figure 1: Trapezoidal fuzzy number (Leondes, 2010) Fuzzy systems often learn their rules from experts. When no expert gives the rules, adaptive fuzzy systems learns by observing how people regulate real systems (Leondes, 2010). The difference between classical and fuzzy logic is something called “the law of excluded middle” (Bart and Satoru, 1993 and Ahmad, 2011). In standard set theory, an object does or does not belong to a set. There is no middle ground. In such bivalent systems, an object cannot belong to both its set and its compliment set or to neither of them. This principle preserves the structure of the logic and avoids the contradiction of object that both is and is not a thing at the same time (Zadeh, 1965). However, fuzzy logic is highly abstract and employs heuristic (experiment) requiring human experts to discover rules about data relationship (Angel and Rocio, 2011). Fuzzy classification assumes the boundary between two neighboring classes as a continuous, overlapping area within which an object has partial membership in each class (Kuang; Ting-Hua and Ting-Cheng, 2011). It not only reflects the reality of many applications in which categories have fuzzy boundaries, but also provides a simple representation of the potentially complex partition of the feature space. (Sun and Jang, 1993 and Ahmad, 2011) propose an adaptive- network-based fuzzy classifier to solve fuzzy classification problems. Conventional approaches of pattern classification involve clustering training samples and associating clusters to given categories. The complexity and limitations of previous mechanisms are largely due to the lacking of an effective way of defining the boundaries among clusters. This problem becomes more intractable when the number of features used for classification increases (Robert, 2000; Kasabov, 1998; Rudolf; 2008, Christos and Dimitros, 2008). A fuzzy set has been derived as an extension of the classical notion of a set. According to classical set theory, an element either belongs or does not belong to the set. In contrast, fuzzy set theory permits the gradual assessment of the membership of elements in a set. A membership function can be described as a graph that defines how each point in the input space is mapped to the membership value between 0 and 1. Fuzzy Inference Systems are designed based on the concept of Fuzzy Logic. Fuzzy inference can be defined as the process of formulating the mapping from a given input to an output. A Fuzzy Logic System or a Fuzzy Inference System maps the crisp inputs into crisp outputs. It contains five International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 27 and we use the notation A = (a, b, α, β). It can easily be shown that [A]γ = [a − (1 − γ) α, b + (1 − γ) β], V γ ε [0, 1]. The support of A is (a − α, b + β). Figure 1: Trapezoidal fuzzy number (Leondes, 2010) Fuzzy systems often learn their rules from experts. When no expert gives the rules, adaptive fuzzy systems learns by observing how people regulate real systems (Leondes, 2010). The difference between classical and fuzzy logic is something called “the law of excluded middle” (Bart and Satoru, 1993 and Ahmad, 2011). In standard set theory, an object does or does not belong to a set. There is no middle ground. In such bivalent systems, an object cannot belong to both its set and its compliment set or to neither of them. This principle preserves the structure of the logic and avoids the contradiction of object that both is and is not a thing at the same time (Zadeh, 1965). However, fuzzy logic is highly abstract and employs heuristic (experiment) requiring human experts to discover rules about data relationship (Angel and Rocio, 2011). Fuzzy classification assumes the boundary between two neighboring classes as a continuous, overlapping area within which an object has partial membership in each class (Kuang; Ting-Hua and Ting-Cheng, 2011). It not only reflects the reality of many applications in which categories have fuzzy boundaries, but also provides a simple representation of the potentially complex partition of the feature space. (Sun and Jang, 1993 and Ahmad, 2011) propose an adaptive- network-based fuzzy classifier to solve fuzzy classification problems. Conventional approaches of pattern classification involve clustering training samples and associating clusters to given categories. The complexity and limitations of previous mechanisms are largely due to the lacking of an effective way of defining the boundaries among clusters. This problem becomes more intractable when the number of features used for classification increases (Robert, 2000; Kasabov, 1998; Rudolf; 2008, Christos and Dimitros, 2008). A fuzzy set has been derived as an extension of the classical notion of a set. According to classical set theory, an element either belongs or does not belong to the set. In contrast, fuzzy set theory permits the gradual assessment of the membership of elements in a set. A membership function can be described as a graph that defines how each point in the input space is mapped to the membership value between 0 and 1. Fuzzy Inference Systems are designed based on the concept of Fuzzy Logic. Fuzzy inference can be defined as the process of formulating the mapping from a given input to an output. A Fuzzy Logic System or a Fuzzy Inference System maps the crisp inputs into crisp outputs. It contains five International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 27 and we use the notation A = (a, b, α, β). It can easily be shown that [A]γ = [a − (1 − γ) α, b + (1 − γ) β], V γ ε [0, 1]. The support of A is (a − α, b + β). Figure 1: Trapezoidal fuzzy number (Leondes, 2010) Fuzzy systems often learn their rules from experts. When no expert gives the rules, adaptive fuzzy systems learns by observing how people regulate real systems (Leondes, 2010). The difference between classical and fuzzy logic is something called “the law of excluded middle” (Bart and Satoru, 1993 and Ahmad, 2011). In standard set theory, an object does or does not belong to a set. There is no middle ground. In such bivalent systems, an object cannot belong to both its set and its compliment set or to neither of them. This principle preserves the structure of the logic and avoids the contradiction of object that both is and is not a thing at the same time (Zadeh, 1965). However, fuzzy logic is highly abstract and employs heuristic (experiment) requiring human experts to discover rules about data relationship (Angel and Rocio, 2011). Fuzzy classification assumes the boundary between two neighboring classes as a continuous, overlapping area within which an object has partial membership in each class (Kuang; Ting-Hua and Ting-Cheng, 2011). It not only reflects the reality of many applications in which categories have fuzzy boundaries, but also provides a simple representation of the potentially complex partition of the feature space. (Sun and Jang, 1993 and Ahmad, 2011) propose an adaptive- network-based fuzzy classifier to solve fuzzy classification problems. Conventional approaches of pattern classification involve clustering training samples and associating clusters to given categories. The complexity and limitations of previous mechanisms are largely due to the lacking of an effective way of defining the boundaries among clusters. This problem becomes more intractable when the number of features used for classification increases (Robert, 2000; Kasabov, 1998; Rudolf; 2008, Christos and Dimitros, 2008). A fuzzy set has been derived as an extension of the classical notion of a set. According to classical set theory, an element either belongs or does not belong to the set. In contrast, fuzzy set theory permits the gradual assessment of the membership of elements in a set. A membership function can be described as a graph that defines how each point in the input space is mapped to the membership value between 0 and 1. Fuzzy Inference Systems are designed based on the concept of Fuzzy Logic. Fuzzy inference can be defined as the process of formulating the mapping from a given input to an output. A Fuzzy Logic System or a Fuzzy Inference System maps the crisp inputs into crisp outputs. It contains five
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 28 components: Rule-base, Data-base, Fuzzifier (transformation of crisp values into fuzzy set), Inference and Defuzzifier (transformation of fuzzy set into crisp value). Professor John Holland in 1975 proposed an attractive class of computational models, called Genetic Algorithms (GA) that mimic the biological evolution process for solving problems in a wide domain. Genetic algorithm is made-up of five main components namely (Amit, 1999 and Zhang and Nguyen 1993). a. Fitness Function: also called evaluation function, is the genetic algorithm component that rate a potential by calculating how good they are relative to the current problem domain. b. Selection: is a way for the genetic algorithm to move toward promising regions in the search space. The individual with the highest fitness are selected and they will have a higher probability of survival to the next generation c. Mutation: is a genetic operator that changes one or more gene values in a chromosome. The mutation process helps to overcome trapping at local maxima. The offspring’s produced by the genetic manipulation process are the next population to be evaluated. d. Crossover: Exchanging Chromosomes portions of genetic materials. e. Reproduction: Birth of a new generation Proposed Pseudo-code for Genetic Algorithm (Obi and Imianvan, 2013) Input: Size of population (k) Rate of mutation (v) Rate of crossover (c) Number of iteration (n) Number of crossover (nc) Number of mutation (nm) // Initialization 1. Randomly generate K possible solution; 2. Save solution in population Kok; // Loop till terminal point 3. For m = 1 to n do; // Crossover 4. Number of crossover nc = (k –nm)/2; 5. For u = 1 to n do; 6. Select two solutions randomly EA and FG for K; 7. generate GV and HN by two-point cross to EA and FG; 8. Save GV and HN to K2; 9. end for; //Mutation 10. for u = 1 to n do; 11. Selection a solution Yh from K2; 12. Mutate each bit of Yh under nm and generate a new solution Yhi 13. If Yhi is impossibe 14. renovate Yhi with possible solution by modifying Yhi 15. end if 16. renovate Yh with Yhi in K2
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 29 17. end for // renovate 18. renovate K = K2; 19. // return the best solution 20. Return the best solution Y in K 3.1 Factors for Assessing Computational Programming language Reliability Several parameters have been utilized in determining programming language reliability but the under listed seven are the most appropriate (Robert, 2006). a. Type Checking is simply testing for type errors in a given program, either by the compiler or during program execution. Type checking is an important factor in language reliability. Because run-time type checking is expensive, compile -time checking is more desirable. Furthermore, the earlier errors in program are detected, the less expensive it is to make the required repairs (Robert, 2006). It is also the process of ensuring that operands of an operator are of compatible types. A compatible type is one that either is legal for the operator or is allowed under languages rules to be implicitly converted by compile-generated codes (or the interpreter) to legal types. This automatic conversion is called coercion. Programming language reliability is close tied to type checking. b. Exception Handling is the ability of a program to interrupt run-time error, as well as unusual condition detected by the program takes corrective measure before proceeding with program execution. . As long as exception handling exists in a programming language utilized for solving particular computational problem reliability is assured. c. Restricting Aliasing: Aliasing is the process whereby multiple variables are assigned the same memory location or address. Aliasing is a threat to program reliability because it allows the value assigned to variables to be changed by been assigned to another variable. For example if both variables sum and total are aliases, any change to the value of total, changes the value of sum and vice versa. Two pointers are aliased when they point to the same memory location (Robert, 2006). Restricting aliasing will result in reliable programming language and reliable developed program. d. Restricting Program-orthogonality: Program orthogonality simple means the freedom residing in the hand of the programmer which allows the programmer to combine language constructs in other to achieve desirable results. While it fosters program writability, it is a dangerous end for program reliability. Therefore preventing or restricting programming language orthogonlity will foster program reliability. e. Program Uniformity: Program uniformity is tied to the consistency in the forms of language constructs. Uniformity has to do with format. Program uniformity will go a long way in determining program reliability. f. Program Abstraction is the ability to define and use complicated structures or operations in a manner which permits many of its details to be ignored. Abstraction is a key concept in contemporary programming language design. The range of program
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 30 abstraction allowed by a programming language and the naturalness of its language expression enhances writ ability and reliability. Reliability is enhanced if the abstraction is moderately allowed. g. Program Expressivity simply defines consistency of language features with natural way of thinking for solving a computational problem. Without program expressivity, reliability cannot be achieved. 4.0 Methodology Applied In other to achieve our underlining objectives, the under listed criteria were applied in designing the proposed soft-computing model. Fig.2: Soft-computing Model for the Assessment of programming Language Reliability The model pictorially illustrated in fig.2, comprises of certain features, which includes a. Knowledgebase: A varid form of database that hold special information. The criteria (parameters or fuzzyset) for determinimg programming language reliability is held in the knowdebase.
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 31 b. The structured and unstructures statistic simply refer to database information (usually well arranged) and dispered information residing in the knowledge-base respectively. c. The Genetic Optimizer handles membership optimization following the procedure specified within the architecture. d. Fuzzy Logic: the impreciseness (vagueness) associated with the parameters for assessing programming language reliability where handled utilizing fuzzy-if-then rules. e. Decision support: predicate output result based on emotional filter and cognitive filter. The cognitive filter of the decision support engine takes as input the output report of knowledge base and applies objective rules to rank the programming languages criteria’s. The emotional filter takes as input the output report of the cognitive filter and applies the subjective rules in the domain of studies in order to rank the programming language criteria’s. f. The stationery system: produces the output based on the paramters received. 5.0 Result and Discussions The fuzzy partition for each input feature consists of the parameters for assessing programming language reliability. However, it can occur that if the fuzzy partition for assessing programming language reliability is not set up correctly, or if the number of linguistic terms for the input features is not large enough, then some patterns will be misclassified. The rules that can be generated from the initial fuzzy partitions of the classification for assessing programming language reliability are thus: a. Not Reliable (Class: C1) b. Moderately Reliable (Class: C2) c. Reliable (Class: C3) If the assessed Programming Language (LP) possesses less than or equal to two (LP ≤ 2) of the parameters for assessing program reliability THEN (C1), If the assessed Programming Language (LP) possesses three (LP = 3) of the parameters for assessing program reliability THEN (C2) and if the assessed Programming Language (LP) possesses four (LP ≥ 4) or more parameters for assessing program reliability (THEN (C3). The Fuzzy IF-THEN Rules (Ri) for assessing program reliability: R1: IF programming Language possesses Type checking ability THEN it is in class C1. R2: IF programming Language possesses Type checking ability and Exception handling THEN it is in class C1. R3: IF programming Language possesses Type checking ability, Exception handling and Restricting Aliasing THEN it is in class C2. R4: IF programming Language possesses Type checking ability, Exception handling, Restricting Aliasing and Program uniformity THEN it is in class C3. R5: IF programming Language possesses Type checking ability, Exception handling, Restricting Aliasing, program uniformity and program Abstraction THEN it is in class C3. R6: IF programming Language possesses Type checking ability, Exception handling, Restricting Aliasing, Program uniformity, Program abstraction and Program expressivity THEN it is in class C3
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 32 R7: IF programming Language possesses Type checking ability, Exception handling, Restricting Aliasing, Program uniformity, Program abstraction, Program expressivity and Restricting program orthogonality THEN it is in class C3. A typical data set that contains the seven parameters is presented in Table 1. This shows the degree of intensity (membership) for assessing programming language reliability. Table 1: Data Set showing the Degree of membership for Programming Language reliability Utilizing the algorithm proposed by obi and Imianvan (2013), the optimization of our membership was achieved.. Genetic Algorithm Inference: R1: IF R01 THEN C1 = 0.50 R2: IF R01 AND R02 THEN C2 = 0.18 R3: IF R01, R02 AND R03 THEN C2 = 0.38 R4: IF R01, R02, R03 AND R04 THEN C3 = 0.44 R5: IF R01, R02, R03, R04 AND R05 THEN C3 = 0.37 R6: IF R01, R02, R03, R04, R05 AND R06 THEN C3 = 0.46 R7: IF R01, R02, R03, R04, R05, R06 AND RO7 THEN C3 = 0.46 We then convert these resolved values into whole numbers and imply them to be the fitness function (f) of the initial generation (Parents) as shown in Table 2. R1: 50, R2: 18, R3: 38 R4: 44 R5: 37 R6: 46 R7: 46 Parameters or Fuzzy sets For Programming Language Reliability Codes Membership Function for Programming Language Reliability Cluster 1 (C1) Cluster 2 (C2) Cluster 3 (C3) Type Checking R01 0.50 0.15 0.35 Exception Handling R02 0.20 0.20 0.60 Restricting Aliasing R03 0.10 0.80 0.10 Program Uniformity R04 0.20 0.10 0.70 Program Abstraction R05 0.30 0.60 0.10 Program Expressivity R06 0.05 0.05 0.90 Restricting Program Othogonality R07 0.00 0.50 0.50
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 33 Table 2: 1st and 2nd Generation Table S/N Selection Chromosomes (Binary; 0 or 1) Fitness functionParent (1st Gen) Crossover Parent (2nd Gen) 1 50 110010 1 & 6 110101 53 2 46 101110 2 & 4 101100 44 3 46 101110 Mutation 101100 44 4 44 101100 2 & 4 101110 46 5 38 100110 5 & 7 100010 34 6 37 100101 1 & 6 100010 34 7 18 010010 5 & 7 010110 22 To create our 2nd and 3rd generation from the parents (1st generation) we chose the third bit from the left to be our crossover point. In the 4th generation each bold bit signifies the cross-over bits, a single bold bit signifies mutation of that bit and an italicized chromosomes signifies elitism. See Tables 3 and 4. Table 3:2nd and 3rd Generation Table Table 4:3rd and 4th Generation Table The best fourth generation (stopping criterion) is that with the best fitness function, 54. This implies that the clusters of the various parameters has been searched and optimized to 0.54, serving as the boundary in determining high and low degree of intensity of the served membership function. Therefore any parameter(s) with membership function (MF > 0.50) implies S/N Selection Chromosomes (Binary; 0 or 1) Fitness functionParent (2nd Gen) Crossover Parent (3rd Gen) 1 53 110101 1 & 3 110100 52 2 46 101110 2 & 6 101010 42 3 44 101100 1 & 3 101101 45 4 44 101100 4 & 5 101010 42 5 34 100010 4 & 5 100100 36 6 34 100010 2 & 6 100110 38 7 22 010110 Mutation 010100 20 S/N Selection Chromosomes (Binary; 0 or 1) Fitness functionParent (3rd Gen) Crossover Parent (4th Gen) 1 52 110100 Mutation 110110 54 2 45 101101 2 & 3 101110 46 3 42 101010 2 & 3 101001 41 4 42 101010 6 & 4 101000 40 5 38 100110 5 & 7 100100 40 6 36 100100 6 & 4 100110 38 7 20 010100 5 & 7 010110 22
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 34 high degree of membership and any parameters(s) with membership function (MF < 0.50) implies low degree of membership. Based on the optimized membership function, the result in table 5 is obtained. Table 5: Data Set showing the Degree of membership for Programming Language reliability 6.0 Conclusion The ability in determining if certain programming language constructs fosters programming reliability is essential for the survival, utilization and continuous propagation of such programming language. The needs to design a system that would assist application programmers’ in general ascertain programming language reliability parameters cannot be over emphasized. The practicality of genetic algorithm and fuzzy logic (Genetic-fuzzy system) has been demonstrated by our proposed model. This model which uses a set of fuzzified data set incorporated into genetic algorithm system is more precise than the traditional system for recognizing reliable program language. The system designed is an interactive system that explores programming language limitation and gains. A system of this nature should be introduced in the IT Sector to ease the job of IT professionals, programmers and application developer in recognizing and filtering obsolete programming language. Reference [1] Ahmad H. (2011), “Fuzzy approach to Likert Spectrum in Classified levels in surveying researches” retrieved http://www.tjmcs.com. [2] Angel C. and Rocio R. ( 2011), “Documentation management with Ant colony Optimization Metaheuristic: A Fuzzy Text Clustering Approach Using Pheromone trails” retrieved from soft computing in Industrial applications, Advances in intelligent and soft Computing, vol. 96, 2011, 261- 70, DOI: 10.1007/978-3-642-20505-1_23. [3] Bart K. and Satoru I. (1993), “Fuzzy Logic”, retrieved from http//:Fortunecity .com/emachines/e11/86/fuzzylog.html. Parameters or Fuzzy sets For Programming Language Reliability Codes Membership Function for Programming Language Reliability Cluster 1 (C1) Cluster 2 (C2) Cluster 3 (C3) Type Checking R01 0.50 0.15 0.35 Exception Handling R02 0.20 0.20 0.60 Restricting Aliasing R03 0.10 0.80 0.10 Program Uniformity R04 0.20 0.10 0.70 Program Abstraction R05 0.30 0.60 0.10 Program Expressivity R06 0.05 0.05 0.90 Restricting Program Othogonality R07 0.00 0.50 0.50 Result Not Reliable Moderately Reliable Reliable
  • 11. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 35 [4] Christos S. And Dimitros S. (2008) “Neural Network”, retrieved from http://www.docstoc.com/docs/15050/neural-networks. [5] CISA: Certified Information System Auditor (2011), “Cisa review manual 2010”, Chapter 5, 305. [6] Fajuyigbe O., Onibere E., Ekuobase G. (2011), “Appropriate language for introducing object oriented programming in tertiary institutions” retrieved online from www.ajol.info/index.php/ijonas/article/view/49925 [7] Jiantao P. (1999), “Software Reliability”, retrieved online from http://ece.cmu.edu/koopman/Des_a 99/sw-reliability/ [8] Kasabov N. K. (1998), “Foundations of neural networks, fuzzy systems, and knowledge engineering”, A Bradford Book, The MIT Press Cambridge, Massachusetts London, England, ISBN 0-262-11212-. [9] Kuang Y. H., Ting-H. C. and Ting-Cheng Chang (2011), “Determination of the threshold value β of variable precision rough set by fuzzy algorithms” retrieved from http://www.sciencedirect.com/science/article/pii/S0888613X11000831. [10] Lamb J.D. (2006), “Insertion Heuristics for Central Cycle Problems” retrieved from aura.abdn.ac.uk/bitstream/2164/96/1/ISSN%200143-06-07.pdf [11] Leondes C (2010), “The Technology of Fuzzy Logic Algorithm retrieved from Suite101.com/examples-of-expert-System-application-in-artificial Intelligence. [12] Robert Full´er,(2000) Introduction to Neuro-Fuzzy Systems, Advances in Soft Computing Series, Springer-Verlag, Berlin/Heildelberg, 289 pages. (ISBN3-7908-1256-0)(MR1760972. [13] Robert W. S. (2006), “Concept of Programming Language” 7ed, University of Colorado at Colorado spring, USA. [14] Rudolf K. (2008), Neuro-fuzzy systems, retrieved from http://ask.com [15] Sleiman R., Jiang Li., Mingzhi L., Yuanwei L. (2010), “Comparative Studies of 10 Programming Languages within 10 Diverse Criteria” retrieved from” http://arxiv.org/abs/1009.0305 [16] Sun C.T. and Jang J.S. (1993) “A neuro-fuzzy classifier and its applications”, in: Proc. IEEE Int. Conference on Neural Networks, San Francisco, pp.94–98. [17] Zadeh L.A. (1965), “Fuzzy sets. Information and Control”, Vol.8, pp.338-353.