Академический Документы
Профессиональный Документы
Культура Документы
Goodubaigari Amrulla 1, Murlidher Mourya 2, Abdul Ahad Afroz3 and Syed Kashif Ali 4
1
Assistant Professor Deportment of CSE,
Vardhaman College of Engineering, JNTU Hyderabad, A.P, India
amrushafi12@gmail.com
2
Assistant Professor Deportment of CSE,
Vardhaman College of Engineering, JNTU Hyderabad, A.P, India
murli_cool9@yahoo.com
3
Assistant Professor Deportment of IT,
Green Fort Engineering College, JNTU Hyderabad, A.P, India
abdulahadafroz@gmail.com
4
Assistant Professor Deportment of IT,
Green Fort College of Engineering, JNTU Hyderabad, A.P, India
Kashif556@gmail.com
53
Goodubaigari Amrulla et al., International Journal of Advanced Trends in Computer Science and Engineering, 3(3), May - June 2014, 53-60
To understand why an empirical and objective model of metrics, targeted specifically at source code and backed with
software readability is useful, consider the use of readability empirical evidence for effectiveness, can serve an analogous
metrics in natural languages. The Flesch-Kincaid Grade purpose in the software domain. It is important to note that
Level, the Gunning-Fog Index, the SMOG Index, and the readability is not the same as complexity, for which some
Automated Readability Index are just a few examples of existing metrics have been empirically shown useful. Brooks
readability metrics for ordinary text. These metrics are all claims that complexity is an “essential” property of
based on simple factors, such as average syllables per word software; it arises from system requirements, and cannot be
and average sentence length. Despite this simplicity, they abstracted away. In the Brooks model, readability is
have each been shown to be quite useful in practice. Flesch- “accidental” because it is not determined by the problem
Kincaid, which has been in use for over 50 years, has not statement.
only been integrated into popular text editors including
Microsoft Word, but has also become a United States 1.5 Advantages
governmental standard. Agencies, including the Department
of Defense, require many documents and forms, internal and We have to generate three measures of software
external, to meet have a readability grade of 10 or below). quality together like as code changes, automated
Defense contractors also are often required to use it when defect reports, and defect log messages.
they write technical manuals.
Time consuming is low.
1.1 Objective
It may help developers to write more readable
software by quickly identifying code that scores
To improve the quality of maintainability. poorly.
Enhance the chances to reusability.
A technique for the construction of automatic
To make portability easier and flexible. software readability metric based on local code
Mechanically predict human readability judgments. features.
Determine code features that are predictive of 2. MODULES DESCRIPTION
readability.
A. Authentication
1.2 Existing system
B. Source code
The system provided the unbeliever to calculate the quality C. Code readability
of software by the automation. The tester who’s calculate the
coding of application to be quality so who’s verified the bulk D. Defects log message
of coding which‘s dominated by them. While it can be used A. Authentication
to predict human readability judgments for existing
software, it can be directly interpreted to prescribe changes This module is used to secure our application from the
that will improve readability. unauthorized persons so it wants to ask the user to submit
those details into our database so only valid users can login
1.3 Disadvantages into the application.
The tester should know the language whish’s B. Source Code
developed by.
Time consuming is high so we can’t deliver the Source code is the means most often used
product in time. by programmers to specify the actions to be performed by a
computer. The source code which constitutes a program is
The result of quality should not be accurate. usually held in one or more text files sometimes stored in
1.4 Proposed System databases as stored procedures and may also appear as code
snippets printed in books or other media. A computer
We proposed that this metric correlates strongly with three program's source code is the collection of files needed to
measures of software quality: code changes, automated convert from human-readable form to some kind of
defect reports, and defect log messages. These metrics can computer-executable form. The source code may be
help organizations gain some confidence that their converted into an executable file by a compiler, or
documents meet goals for readability very cheaply, and have executed on the fly from the human readable form with the
become ubiquitous for that reason. We believe that similar aid of an interpreter.
54
Goodubaigari Amrulla et al., International Journal of Advanced Trends in Computer Science and Engineering, 3(3), May - June 2014, 53-60
User first need to login with his ID and password to 3.7 Test Case
see the defect log report.
The purpose of testing is to discover errors. Testing is the
If user not created ID then user can create newly. process of trying to discover every conceivable fault or
weakness in a work product. It provides a way to check the
For old users the ID and password check from the functionality of components, sub assemblies, assemblies
database for authentication where they are stored in and/or a finished product It is the process of exercising
the creation time through the software application. software with the intent of ensuring that the Software system
meets its requirements and user expectations and does not
After login through the software program user can fail in an unacceptable manner.
give the source code as a input. Table 1: Test cases
Test Input Expected Observed Status
It will be go through the software quality process S. No Behavior Behavior P = Passed
and do the readability. F = Failed
Login as The window
Then it will store the defect or error report in to the user with will open
database. correct from which
1 login details .we can send -do- P
Finally from the database information it will fetch and will the file to
generate the defect report. the
destination.
User Software Login as a Error
user with message
Application 2 -do- P
Authenticati wrong login will be
on storage details displayed
Signup a It should
new User. add a new
record in the
3 database -do- P
with new
and unique
secret key
Software program
Choosing a We can
file and upload the
load. file -do-
4 P
For check
readability
Check It checks
source code against
5 -do-
readability Different P
metrics
Source Software Reada Generating For every
defects log readability
code quality bility message check it
generates
-do-
6 defect log
P
and send it
to
destination
For every
Report readability
generation check any
content
which is not
Defect Report 7 up to -do-
Defect P
Generation metrics it
Details generate
Storage error no
related
description
Figure: 1 System Architecture
56
Goodubaigari Amrulla et al., International Journal of Advanced Trends in Computer Science and Engineering, 3(3), May - June 2014, 53-60
User first need to login with his ID and password to Implementation notes helps to improve readability as it
see the defect log report. discusses difficult or subtle algorithms and data structures. It
includes graphs, drawing, charts and other representations
If user not created ID then user can create newly. difficult to reproduce in source code library. It also
comprises photocopies of portions of books or articles
For old users the ID and password check from the relevant to the design or implementation. All these
database for authentication where they are stored in documentation enhance readability of program. The more
the creation time through the software application. readable a module the faster and more accurately a rouser
can obtain information about it. Here readability can be
After login through the software program user can gauged by the average number of right answers to a series of
give the source code as a input. questions about the program in a given length of time.
Comments could indirectly rescue a not so modular program
It will be go through the software quality process and make it as readable as modular program by increasing
and do the readability. its readability.
Then it will store the defect or error report in to the Create the ID to login, if already created.
database.
Do authentication from database.
Finally from the database information it will fetch and will
generate the defect report. If match allow user to login else through error
message user is not valid.
Collecting
Source
Software Code File
programs
Storage
Code Verify
Readabilit Software
y quality
57
Goodubaigari Amrulla et al., International Journal of Advanced Trends in Computer Science and Engineering, 3(3), May - June 2014, 53-60
58
Goodubaigari Amrulla et al., International Journal of Advanced Trends in Computer Science and Engineering, 3(3), May - June 2014, 53-60
5. CONCLUSION
REFERENCES
60