Inheritance Hierarchy Based Reuse & Reusability Metrics in OOSD
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Reuse and reusability are two major aspects in object oriented software which can be measured from inheritance hierarchy. Reusability is the prerequisite of reuse but both may or may not be measured using same metric. This paper characterizes metrics of reuse and reusability in Object Oriented Software Development (OOSD). Reuse metrics compute the extent to which classes have been reused and reusability metrics computes the extent to which classes can be reused. In this paper five new metrics namely- Breadth of Inheritance Tree (BIT), Method Reuse Per Inheritance Relation (MRPIR), Attribute Reuse Per Inheritance Relation (ARPIR), Generality of Class (GC) and Reuse Probability (RP) have been proposed. These metrics help to evaluate reuse and reusability of object oriented software. Four extensively validated existing object oriented metrics, namely- Depth of Inheritance Tree (DIT), Number of Children (NOC), Method Inheritance Factor (MIF) and Attribute Inheritance Factor (AIF) have been selected and investigated for comparison with proposed metrics. All metrics can be computed from inheritance hierarchies and classified according to their characteristics. Further, metrics are evaluated against a case study. These metrics are helpful in comparing alternative inheritance hierarchies at design time to select best alternative, so that the development time and cost can be reduced.
Authors and Affiliations
Nasib S. Gill , Sunil Sikka
E-LEARNING TECHNOLOGY FOR RURAL CHILD DEVELOPMENT
Abstract—21 st century is the century of Hi-Tech. Recently Hi-Tech is comprises with IT, ICT, BT and Nano-Technology. Today ICT (Information Communication Technology) is a unique technology which is used universally in a...
Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)
This paper discusses the effective coding of Rijndael algorithm, Advanced Encryption Standard (AES) in Hardware Description Language, Verilog. In this work we analyze the structure and design of new AES, following three...
Identification and Removal of Impulsive noise using Hypergraph Model
Image noise is unwanted information of an image. Noise can occur during image capture, transmission, or processing and it may depend or may not depend on image content.. In order to remove the noise from the noisy image,...
A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among...
A Survey On Various Defense Mechanisms Against Application Layer Distributed Denial Of Service Attack
The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, r...