42
Views
4
CrossRef citations to date
0
Altmetric
Articles

Assessment of optimum refactoring sequence to improve the software quality of object-oriented software

&

References

  • Adhao, R. and Pachghare, V. (2020) ‘Feature selection using principal component analysis and genetic algorithm’, Journal of Discrete Mathematical Sciences and Cryptography. Taylor & Francis, 23(2), pp. 595–602. doi: 10.1080/09720529.2020.1729507.
  • Demeyer, S., Ducasse, S. and Nierstrasz, O. (2000) ‘Finding refactorings via change metrics’, in ACM SIGPLAN Notices, pp. 166–177. doi: 10.1145/354222.353183
  • Dubey, S. K. and Rana, A. (2011) ‘Assessement of Maintainability Metrics for Object-Oriented Software System’, ACM SIGSOFT Software Engineering Notes, 36(5). doi: 10.1145/2020976.2020983.
  • Fowler, M. (2018) Refactoring: improving the design of existing code. Addison-Wesley Professional.
  • Garrido, A. and Johnson, R. (2002) ‘Challenges of refactoring C programs’, in Proceedings of the international workshop on Principles of software evolution, pp. 6–14.
  • Gupta, S. and Chug, A. (2020) ‘Software maintainability prediction using an enhanced random forest algorithm’, Journal of Discrete Mathematical Sciences and Cryptography. Taylor & Francis, 23(2), pp. 441– 449. doi: 10.1080/09720529.2020.1728898.
  • Jahnke, J. and Zündorf, A. (1997) ‘Rewriting poor design patterns by good design patterns’, in Proc. ESEC/FSE, pp. 181–184.
  • Jang, J.-S. R., Sun, C.-T. and Mizutani, E. (1997) ‘Neuro-fuzzy and soft computing-a computational approach to learning and machine intelligence [Book Review]’, IEEE Transactions on automatic control. IEEE, 42(10), pp. 1482–1484. doi: 10.1109/TAC.1997.633847
  • Kataoka, Y. et al. (2002) ‘A quantitative evaluation of maintainability enhancement by refactoring’, in International Conference on Software Maintenance, 2002. Proceedings. , pp. 576–585. doi: 10.1109/ICSM.2002.1167822
  • Olbrich, S. et al. (2009) ‘The evolution and impact of code smells: A case study of two open source systems’, in 2009 3rd international symposium on empirical software engineering and measurement, pp. 390–400. doi: 10.1109/ESEM.2009.5314231
  • Qayum, F. and Heckel, R. (2009) ‘Local search-based refactoring as graph transformation’, in 2009 1st International Symposium on Search Based Software Engineering, pp. 43–46. doi: 10.1109/SSBSE.2009.27
  • Saini, G. L. et al. (2020) ‘A systematic literature review and comparative study of different software quality models’, Journal of Discrete Mathematical Sciences and Cryptography. Taylor & Francis, 23(2), pp. 585–593. doi: 10.1080/09720529.2020.1747188.
  • Sharma, D. and Chandra, P. (2020) ‘Linear regression with factor analysis in fault prediction of software’, Journal of Interdisciplinary Mathematics. Taylor & Francis, 23(1), pp. 11–19. doi: 10.1080/09720502.2020.1721641.
  • Sharma, R. and Saha, A. (2020) ‘Identification of critical test paths using firefly algorithm for object oriented software’, Journal of Interdisciplinary Mathematics. Taylor & Francis, 23(1), pp. 191–203. doi: 10.1080/09720502.2020.1721712.
  • Tahvildari, L. and Kontogiannis, K. (2003) ‘A metric-based approach to enhance design quality through meta-pattern transformations’, in Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings. , pp. 183–192. doi: 10.1109/CSMR.2003.1192426
  • Tarwani, Sandhya and Chug, A. (2016) ‘Prioritization of code restructuring for severely affected classes under release time constraints’, in 2016 1st India International Conference on Information Processing (IICIP), pp. 1–6.
  • Tarwani, Sandhya; and Chug, A. (2016) ‘Sequencing of refactoring techniques by greedy algorithm for maximizing maintainability’, in International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE. doi: 10.1109/ICACCI.2016.7732243.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.