With the current advancement of technology, real-time software has been extensively utilized in several complex systems. The eternally rising complexity of software formulates it exceptionally hard to maintain the reliability of software and has strained extraordinary awareness in software industries. Nearly all reliability-based software reliability growth models (SRGMs) are formulated using a general consideration that during the testing phase, all detected faults are instantly corrected without introducing any new fault. Therefore, both detection and correction of faults are considered as similar processes. In this paper, inclusive modeling is done for investigating the detection and correction of faults under an imperfect debugging scenario. This formulation is modeled by considering the postulation that new faults are involved throughout the correction of a hard type of fault. Numerous qualitative measures for assessment of reliability are considered and least square estimations of unidentified model parameters are assessed. The validation of the derived proposed models is verified through actual datasets. The measures of accuracy are the mean square error (MSE), root mean square error (RMSE), bias, variance and root mean square prediction error (RMSPE) are calculated employing valid datasets. The goodness of fit criteria is verified based on such qualitative measures.
Wireless sensor networks (WSN) are recently receiving significant attention due to their unlimited potential. In the current years, WSN has been emerged as the technology which combines the best properties of many small and low cost sensors. A wireless sensor network comprises of a large number of nodes that have low-cost, computation, limited sensing, and communication capabilities. Data aggregation is the process of summarizing and combining sensor data so that the amount of data transmitted in the network is reduced. In a large sensor network, in-network data aggregation significantly reduces the amount of communication and energy consumption. In this paper, we are transforming result formed the watermark, which was embedded into the sending data. The receiving node judges the authenticity of the data by verifying this watermark. Once the watermark has been detected, the receiving node embeds its own watermark on data and transmitted to the sink. Otherwise the data would be discarded. So the only authenticated data send to the base station. Our proposed method maintains hop-by-hop authentication and integrity of data. The proposed scheme incorporates multilevel authentication of the original data. At each level constrained aggregation is done. Number of child per aggregator is limited to three nodes to reduce the computational overhead per aggregator.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.