SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 429
IMPLEMENTATION OF REDUCING FEATURES TO IMPROVE CODE
CHANGE BASED BUG PREDICTION BY USING COS-TRIAGE
ALGORITHM
Veena Jadhav1
, Vandana Gaikwad2
, Netra Patil3
1
Student, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India
2
Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India
3
Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India
Abstract
Today, we are getting plenty of bugs in the software because of variations in the software and hardware technologies. Bugs are
nothing but Software faults, existing a severe challenge for system reliability and dependability. To identify the bugs from the
software bug prediction is convenient approach. To visualize the presence of a bug in a source code file, recently, Machine
learning classifiers approach is developed. Because of a huge number of machine learned features current classifier-based bug
prediction have two major problems i) inadequate precision for practical usage ii) measured prediction time. In this paper we
used two techniques first, cos-triage algorithm which have a go to enhance the accuracy and also lower the price of bug
prediction and second, feature selection methods which eliminate less significant features. Reducing features get better the quality
of knowledge extracted and also boost the speed of computation.
Keywords: Efficiency, Bug Prediction, Classification, Feature Selection, Accuracy.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Classifiers such as SVM and navies byes are accomplished
on previous software project information, also it can be
expended to estimate the presence of a bug in an specific
record in software, as complete in previous work[2].
To fix bug cos-triage algorithm is used. Afterward that data
is added in historical data or in log record. Afterward,
classifier is accomplished on data originate in previous log
record. Then, it can be expended to categorize a renewed
variation is either buggy or clean.
Now days, The Eclipse IDE contains a prototype displaying
server which is used to compute bug predictions [4]. It can
aslo offer accurate predictions. Bug prediction system must
offer a lesser number of incorrect variations that are
predicted to be pram but which are very new, if software
developers are to belief [3]. Suppose, if enormous numbers
of improved variations are incorrectly estimated to be pram,
engineers won’t have belief in the bug prediction.
Previous bug prediction methodology and identical work
offered by scientist which employ the removal of “features”
from the prior of variations created to a software system[2].
These features comprise completely distributed by blank
space in the code and that all were included or rejected in a
variation. Henceforth, to prepare the SVM classifier entirely
variables, comment words, numerical operatives, name of
methods, and development language keywords are used as
features which is existing in this paper.
Cost of large feature set is tremendously high. Because of
multiple interactions and noise classifiers cannot handle
such an enormous feature set. As well as number of features
increases time also increases and expanding to a number of
seconds per categorization for tens of thousands of features,
and minutes for enormous project data accounts.
Henceforth, this will influences the availability of a bug
prediction scheme.
There are several classification approaches could be
working. But in this paper we used cos-triage algorithm and
SVM.
1) This paper contributes three aspects:
2) Study of various feature selection methods to
categorize bugs in software program variations.
3) Use of cos-triage algorithm to increase accuracy and
reduce cost of bug prediction.
The rest of this paper is prepared as follows: In Section 2
primary steps involved in performing change classification
is presented. Also this section discuss about feature selection
techniques in more detail. Section 3 discuss prior work.
Section 4 contains system overview for proposed system.
Finally a conclusion is made in section 5.
2. CHANGE CLASSIFICATION PROCESS
Following steps are concerned in executing Various
categorization on distinct project. Creating a Corpus:
1) Change deltas are mining from the log records of a
project, as kept in its SCM repository.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 430
2) For each file bug fix variations are known by observing
keywords in SCM variation log messages.
3) At the record level without bug and buggy variations are
known by finding reverse in the review log record from bug
resolve.
4) Features contain both buggy and clean and that mined
from all variations. In Complete source code all expressions
are considered as features. Features are nothing but the lines
fitted in each variation, meta-data such as author, time etc.
we can calculate complexity metrics at this stage.
5) In this paper to compute a reduced set of features
combination of wrapper and filter approaches are used. In
this paper four filter based rankers are used. i) Relief-F. ii)
Chi-Squared iii) Gain Ratio iv) Significance. The wrapper
methods are depends on the SVM classifiers.
6) Classification model is accomplished by using reduced
set.
7) Skilled classifier is set to use. Whether a original
variation is more analogous to a buggy variation or a clean
variation is proven by classifier.
2.1 Detection of Buggy and Clean Changes
For bug prediction training data is fixed and used. Mining
variation log records is used to determine bug introducing
variations and to identify bug fixes. First is Examining for
keywords in old revision such as “Set” “Bug” or other
keywords possible to develop in a bug repair.second,
Examining for another situations to bug.
2.2 Feature Extraction
With the help of support vector machine algorithm, using
buggy and clean variations a classification model must be
accomplished which is used to consolidate software
variations.
The entire word in the source code programme distributed
with the help of blank space or a semicolon which is used as
a article .Example of that is method name, keyword,
variable name, comment word, function name and operator.
2.3 Feature Selection Techniques
Huge feature groups need extended working out and
estimation periods, also need lot of memory these are the
requirement to execute classification.
Feature selection is common solution to this problem In
which only the subcategory of structures that are generally
suitable for creating grouping outcomes are truly used.
2.4 Feature Selection Process
A repetitive process of choosing increasingly fewer
important group of features is finished by using Filter and
wrapper approaches.
This process starts by splitting the primary feature set in
partial which reduces processing requirements and memory
for the remaining process.
A classification model is accomplished by using the reduced
feature set. Whether a new variation is more associated to a
buggy variation or a clean variation is decided by classifier.
3. RELATED WORK
A model proposed by scientist Khoshgoftaar and Allen to
group modules corresponding to software quality factors
such as upcoming defect intensity using different phases of
multi-regression[5][6][7]. Ostrand et al. discovered two
model i) The top 20% of problematic records in a project
[11] using upcoming defect predictors ii) A linear regression
model
Totally Ordered Program Units could be transformed into a
half ordered suite list, e.g. by giving the topmost N% of
units as offered by Ostrand et al. Hassan and A caching
algorithm to compute the set of fault-prone modules, called
the topmost-10 list offered by halt [9]. The bug cache
algorithm to envisage upcoming faults built on preceding
fault areas offered by Kim et al.
Fault sessions of the Mozilla project through numerous
releases offered by Gyimothy et al. [11]. With the help of
decision trees and neural networks that use object-oriented
metrics as features. Six different feature selection techniques
when using the Naive Bayes and the C4.5 classifier
considered by Hall and Holmes [12] .There are about 100
features in each dataset. Hall and Holmes launched many of
the feature selection methods.
A general defect prediction framework which encompass a
data pre-processor, feature selection methods, and machine
learning algorithms elaborated by Song et al. [14]. They also
consider that slight variations to data illustration can have a
vast influence on the outcomes of article selection and bug
prediction. Numerous feature selection algorithms to
envisage buggy software modules for a hugeheritage
communications software offered by Gao et al.
Numerous feature selection algorithms to envisage buggy
software units for a huge legacy communications software
offered by Gao et al. There are two methods used. First,
filter based techniques and second, subset selection search
algorithm.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 431
4. SYSTEM OVERVIEW
Fig -1: System Overview of bug prediction system
Above diagram fig 1. Shows general overview of the
system. Originally, user login/register into the system. It
also encompasses training data/raw data which retains the
logs or history. Then it checks for bug. If bug present in the
system verify and report bug. Then, cos-triage algorithm is
applied on that bug. Cos-triage algorithm supports us for
fixing bug or defects. Then at the back end that output with
bug is used as input to support vector machine (SVM)
classifier .SVM classifier uses different feature selection
methods which is given above. After that by reducing the
features we gets final output without bug. SVM classifier
operate on skilled data/raw data which is kept in log record.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 432
5. SCREENSHOTS
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 433
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 434
6. GRAPHICAL REPRESENTATION
Fig 2.Graphical representation of bug prediction on projects
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 435
Fig.3: Cos-triage algorithm graph
7. CONCLUSION
This paper has explored algorithm called Cos-triage
algorithm which helps to reduce cost and increase accuracy
of bug fixing or bug prediction. In this paper we used
feature selection method which reduces the quantity of
structures used by a support vector device classifier and
naive byes for bug prediction.
Henceforward, the usage of classifiers with feature selection
will approve fast, correct, more accurate bug predictions, if
software designers have highly developed bug prediction
methods rooted into their software development
environment. Similarly, many algorithm will build in future
which will increase accuracy of bug prediction.
REFERENCES
[1] T.L. Graves, A.F. Karr, J.S. Marron, and H. Siy,
“Predicting Fault Incidence Using Software Change
History,” IEEE Trans. Software Eng., vol. 26, no. 7,
pp. 653-661, July 2000.
[2] S. Kim, E. W. Jr., and Y. Zhang, “Classifying
Software Changes: Clean or Buggy?” IEEE Trans.
Software Eng., vol. 34, no. 2, pp. 181–196,2008.
[3] A.Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S.
Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and
D.R. Engler, “A Few Billion Lines of Code Later:
Using Static Analysis to Find Bugs in the Real
World,” Comm. ACM, vol. 53, no. 2, pp. 66-75,
2010.
[4] J. Madhavan and E. Whitehead Jr., “Predicting
Buggy Changes Inside an Integrated Development
Environment,” Proc. OOPSLA Workshop Eclipse
Technology eXchange, 2007.
[5] T. Khoshgoftaar and E. Allen, “Predicting the Order
of Fault-Prone Modules in Legacy Software,” Proc.
1998 Int’l Symp. on SoftwareReliability Eng., pp.
344–353, 1998.
[6] R. Kumar, S. Rai, and J. Trahan, “Neural-Network
Techniques for Software-Quality Evaluation,”
Reliability and Maintainability Symposium,1998.
[7] T. Ostrand, E. Weyuker, and R. Bell, “Predicting the
Location and Number of Faults in Large Software
Systems,” IEEE Trans. SoftwareEng., vol. 31, no. 4,
pp. 340–355, 2005.
[8] A.Hassan and R. Holt, “The Top Ten List: Dynamic
Fault Prediction,”Proc. ICSM’05, Jan 2005.
[9] R. Moser, W. Pedrycz, and G. Succi, “A Comparative
Analysis ofthe Efficiency of Change Metrics and
Static Code Attributes for Defect Prediction,” Proc.
30th Int’l Conf. Software Eng., pp. 181-190,2008..
[10] L.C. Briand, W.L. Melo, and J. Wu¨ st, “Assessing
the Applicability of Fault-Proneness Models Across
Object-Oriented Software Projects,” IEEE Trans.
Software Eng., vol. 28, no. 7, pp. 706-720,July 2002.
[11] M. Hall and G. Holmes, “Benchmarking Attribute
Selection Techniques for Discrete Class Data
Mining,” IEEE Trans. Knowledge and Data Eng., vol.
15, no. 6, pp. 1437-1447, Nov./Dec. 2003.
[12] J. Quinlan, C4.5: Programs for Machine Learning.
Morgan Kaufmann,1993.
[13] Q. Song, Z. Jia, M. Shepperd, S. Ying, and J. Liu, “A
General Software Defect-Proneness Prediction
Framework,” IEEE Trans. Software Eng., vol. 37, no.
3, pp. 356-370, May/June 2011.
[14] K. Gao, T. Khoshgoftaar, H. Wang, and N. Seliya,
“Choosing Software Metrics for Defect Prediction:
An Investigation on Feature Selection Techniques,”
Software: Practice and Experience,vol. 41, no. 5, pp.
579-606, 2011.
[15] A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S.
Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and
D.R. Engler, “A FewBillion Lines of Code Later:
Using Static Analysis to Find Bugs in the Real
World,” Comm. ACM, vol. 53, no. 2, pp. 66-75, 2010
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 436
BIOGRAPHIES
Miss Veena jadhav M.tech (Computer)
BVDUCOE,
Pune
Prof.Vandana Gaikwad, Assistant Professor, Computer
department, BVDUCOE, Pune
Prof.Netra Patil, Assistant Professor, Computer department
BVDUCOE, Pune

Contenu connexe

Tendances

A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...IOSR Journals
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designConference Papers
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models IJECEIAES
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionDr. Amarjeet Singh
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
Regression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaRegression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaTELKOMNIKA JOURNAL
 
Multi step automated refactoring for code smell
Multi step automated refactoring for code smellMulti step automated refactoring for code smell
Multi step automated refactoring for code smelleSAT Journals
 
Multi step automated refactoring for code smell
Multi step automated refactoring for code smellMulti step automated refactoring for code smell
Multi step automated refactoring for code smelleSAT Publishing House
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...csandit
 
Threshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniquesThreshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniquesjournalBEEI
 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classificationijcsit
 
Testing embedded system through optimal mining technique (OMT) based on multi...
Testing embedded system through optimal mining technique (OMT) based on multi...Testing embedded system through optimal mining technique (OMT) based on multi...
Testing embedded system through optimal mining technique (OMT) based on multi...IJECEIAES
 
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
76201929
7620192976201929
76201929IJRAT
 
Improving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsImproving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsyasmen essam
 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationijseajournal
 
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET Journal
 

Tendances (19)

A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
 
IJET-V2I6P28
IJET-V2I6P28IJET-V2I6P28
IJET-V2I6P28
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
Regression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaRegression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythia
 
Multi step automated refactoring for code smell
Multi step automated refactoring for code smellMulti step automated refactoring for code smell
Multi step automated refactoring for code smell
 
Multi step automated refactoring for code smell
Multi step automated refactoring for code smellMulti step automated refactoring for code smell
Multi step automated refactoring for code smell
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 
Threshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniquesThreshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniques
 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classification
 
Testing embedded system through optimal mining technique (OMT) based on multi...
Testing embedded system through optimal mining technique (OMT) based on multi...Testing embedded system through optimal mining technique (OMT) based on multi...
Testing embedded system through optimal mining technique (OMT) based on multi...
 
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
76201929
7620192976201929
76201929
 
Improving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsImproving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systems
 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritization
 
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
 

En vedette

Ensighten Certified Professional - Mobile
Ensighten Certified Professional - MobileEnsighten Certified Professional - Mobile
Ensighten Certified Professional - MobileDorian D. Regester
 
Ensighten Certified Professional - Manage Implementation
Ensighten Certified Professional - Manage ImplementationEnsighten Certified Professional - Manage Implementation
Ensighten Certified Professional - Manage ImplementationDorian D. Regester
 
ปณิดา เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24
ปณิดา  เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24ปณิดา  เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24
ปณิดา เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24NamoRomchumpa
 
Boletín n° 002 nuestras deportistas rumbo a la copa élite de baloncesto en a...
Boletín n° 002  nuestras deportistas rumbo a la copa élite de baloncesto en a...Boletín n° 002  nuestras deportistas rumbo a la copa élite de baloncesto en a...
Boletín n° 002 nuestras deportistas rumbo a la copa élite de baloncesto en a...alcaldia municipal
 
stromen van levend water
stromen van levend waterstromen van levend water
stromen van levend watergoedbericht
 
Jade Kelley Resume 2015
Jade Kelley Resume 2015Jade Kelley Resume 2015
Jade Kelley Resume 2015Jade Kelley
 
Kevin Smith CV 17.02.2016
Kevin  Smith CV 17.02.2016Kevin  Smith CV 17.02.2016
Kevin Smith CV 17.02.2016Kevin Smith
 

En vedette (17)

resume ivy tech
resume ivy techresume ivy tech
resume ivy tech
 
Ensighten Certified Professional - Mobile
Ensighten Certified Professional - MobileEnsighten Certified Professional - Mobile
Ensighten Certified Professional - Mobile
 
Bryan slide
Bryan slideBryan slide
Bryan slide
 
Ensighten Certified Professional - Manage Implementation
Ensighten Certified Professional - Manage ImplementationEnsighten Certified Professional - Manage Implementation
Ensighten Certified Professional - Manage Implementation
 
ปณิดา เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24
ปณิดา  เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24ปณิดา  เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24
ปณิดา เฟื่องฟุ้ง ชั้นม4-8 เลขที่ 24
 
Boletín n° 002 nuestras deportistas rumbo a la copa élite de baloncesto en a...
Boletín n° 002  nuestras deportistas rumbo a la copa élite de baloncesto en a...Boletín n° 002  nuestras deportistas rumbo a la copa élite de baloncesto en a...
Boletín n° 002 nuestras deportistas rumbo a la copa élite de baloncesto en a...
 
HMS Hurworth
HMS HurworthHMS Hurworth
HMS Hurworth
 
stromen van levend water
stromen van levend waterstromen van levend water
stromen van levend water
 
Test
TestTest
Test
 
Jade Kelley Resume 2015
Jade Kelley Resume 2015Jade Kelley Resume 2015
Jade Kelley Resume 2015
 
Media Advisory
Media AdvisoryMedia Advisory
Media Advisory
 
Balade week 6
Balade week 6Balade week 6
Balade week 6
 
Kevin Smith CV 17.02.2016
Kevin  Smith CV 17.02.2016Kevin  Smith CV 17.02.2016
Kevin Smith CV 17.02.2016
 
Janeiro 2015
Janeiro 2015Janeiro 2015
Janeiro 2015
 
Fnatic
FnaticFnatic
Fnatic
 
Kikiki
KikikiKikiki
Kikiki
 
1. rehabilitación vías riobamba
1. rehabilitación vías riobamba1. rehabilitación vías riobamba
1. rehabilitación vías riobamba
 

Similaire à Implementation of reducing features to improve code change based bug prediction by using cos triage algorithm

Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated ProcessIRJET Journal
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...acijjournal
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSTHE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSIJSEA
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineeringijsrd.com
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexityeSAT Journals
 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: TestabilityPranay Singh
 
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...butest
 
Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10Kuwait10
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET Journal
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET Journal
 
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...acijjournal
 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmeSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
IRJET- Machine Learning Techniques for Code Optimization
IRJET-  	  Machine Learning Techniques for Code OptimizationIRJET-  	  Machine Learning Techniques for Code Optimization
IRJET- Machine Learning Techniques for Code OptimizationIRJET Journal
 

Similaire à Implementation of reducing features to improve code change based bug prediction by using cos triage algorithm (20)

Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated Process
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
4213ijsea04
4213ijsea044213ijsea04
4213ijsea04
 
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSTHE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineering
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexity
 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: Testability
 
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
 
Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
 
IRJET- Machine Learning Techniques for Code Optimization
IRJET-  	  Machine Learning Techniques for Code OptimizationIRJET-  	  Machine Learning Techniques for Code Optimization
IRJET- Machine Learning Techniques for Code Optimization
 

Plus de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Plus de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Dernier

Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 

Dernier (20)

Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 

Implementation of reducing features to improve code change based bug prediction by using cos triage algorithm

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 429 IMPLEMENTATION OF REDUCING FEATURES TO IMPROVE CODE CHANGE BASED BUG PREDICTION BY USING COS-TRIAGE ALGORITHM Veena Jadhav1 , Vandana Gaikwad2 , Netra Patil3 1 Student, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India 2 Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India 3 Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India Abstract Today, we are getting plenty of bugs in the software because of variations in the software and hardware technologies. Bugs are nothing but Software faults, existing a severe challenge for system reliability and dependability. To identify the bugs from the software bug prediction is convenient approach. To visualize the presence of a bug in a source code file, recently, Machine learning classifiers approach is developed. Because of a huge number of machine learned features current classifier-based bug prediction have two major problems i) inadequate precision for practical usage ii) measured prediction time. In this paper we used two techniques first, cos-triage algorithm which have a go to enhance the accuracy and also lower the price of bug prediction and second, feature selection methods which eliminate less significant features. Reducing features get better the quality of knowledge extracted and also boost the speed of computation. Keywords: Efficiency, Bug Prediction, Classification, Feature Selection, Accuracy. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Classifiers such as SVM and navies byes are accomplished on previous software project information, also it can be expended to estimate the presence of a bug in an specific record in software, as complete in previous work[2]. To fix bug cos-triage algorithm is used. Afterward that data is added in historical data or in log record. Afterward, classifier is accomplished on data originate in previous log record. Then, it can be expended to categorize a renewed variation is either buggy or clean. Now days, The Eclipse IDE contains a prototype displaying server which is used to compute bug predictions [4]. It can aslo offer accurate predictions. Bug prediction system must offer a lesser number of incorrect variations that are predicted to be pram but which are very new, if software developers are to belief [3]. Suppose, if enormous numbers of improved variations are incorrectly estimated to be pram, engineers won’t have belief in the bug prediction. Previous bug prediction methodology and identical work offered by scientist which employ the removal of “features” from the prior of variations created to a software system[2]. These features comprise completely distributed by blank space in the code and that all were included or rejected in a variation. Henceforth, to prepare the SVM classifier entirely variables, comment words, numerical operatives, name of methods, and development language keywords are used as features which is existing in this paper. Cost of large feature set is tremendously high. Because of multiple interactions and noise classifiers cannot handle such an enormous feature set. As well as number of features increases time also increases and expanding to a number of seconds per categorization for tens of thousands of features, and minutes for enormous project data accounts. Henceforth, this will influences the availability of a bug prediction scheme. There are several classification approaches could be working. But in this paper we used cos-triage algorithm and SVM. 1) This paper contributes three aspects: 2) Study of various feature selection methods to categorize bugs in software program variations. 3) Use of cos-triage algorithm to increase accuracy and reduce cost of bug prediction. The rest of this paper is prepared as follows: In Section 2 primary steps involved in performing change classification is presented. Also this section discuss about feature selection techniques in more detail. Section 3 discuss prior work. Section 4 contains system overview for proposed system. Finally a conclusion is made in section 5. 2. CHANGE CLASSIFICATION PROCESS Following steps are concerned in executing Various categorization on distinct project. Creating a Corpus: 1) Change deltas are mining from the log records of a project, as kept in its SCM repository.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 430 2) For each file bug fix variations are known by observing keywords in SCM variation log messages. 3) At the record level without bug and buggy variations are known by finding reverse in the review log record from bug resolve. 4) Features contain both buggy and clean and that mined from all variations. In Complete source code all expressions are considered as features. Features are nothing but the lines fitted in each variation, meta-data such as author, time etc. we can calculate complexity metrics at this stage. 5) In this paper to compute a reduced set of features combination of wrapper and filter approaches are used. In this paper four filter based rankers are used. i) Relief-F. ii) Chi-Squared iii) Gain Ratio iv) Significance. The wrapper methods are depends on the SVM classifiers. 6) Classification model is accomplished by using reduced set. 7) Skilled classifier is set to use. Whether a original variation is more analogous to a buggy variation or a clean variation is proven by classifier. 2.1 Detection of Buggy and Clean Changes For bug prediction training data is fixed and used. Mining variation log records is used to determine bug introducing variations and to identify bug fixes. First is Examining for keywords in old revision such as “Set” “Bug” or other keywords possible to develop in a bug repair.second, Examining for another situations to bug. 2.2 Feature Extraction With the help of support vector machine algorithm, using buggy and clean variations a classification model must be accomplished which is used to consolidate software variations. The entire word in the source code programme distributed with the help of blank space or a semicolon which is used as a article .Example of that is method name, keyword, variable name, comment word, function name and operator. 2.3 Feature Selection Techniques Huge feature groups need extended working out and estimation periods, also need lot of memory these are the requirement to execute classification. Feature selection is common solution to this problem In which only the subcategory of structures that are generally suitable for creating grouping outcomes are truly used. 2.4 Feature Selection Process A repetitive process of choosing increasingly fewer important group of features is finished by using Filter and wrapper approaches. This process starts by splitting the primary feature set in partial which reduces processing requirements and memory for the remaining process. A classification model is accomplished by using the reduced feature set. Whether a new variation is more associated to a buggy variation or a clean variation is decided by classifier. 3. RELATED WORK A model proposed by scientist Khoshgoftaar and Allen to group modules corresponding to software quality factors such as upcoming defect intensity using different phases of multi-regression[5][6][7]. Ostrand et al. discovered two model i) The top 20% of problematic records in a project [11] using upcoming defect predictors ii) A linear regression model Totally Ordered Program Units could be transformed into a half ordered suite list, e.g. by giving the topmost N% of units as offered by Ostrand et al. Hassan and A caching algorithm to compute the set of fault-prone modules, called the topmost-10 list offered by halt [9]. The bug cache algorithm to envisage upcoming faults built on preceding fault areas offered by Kim et al. Fault sessions of the Mozilla project through numerous releases offered by Gyimothy et al. [11]. With the help of decision trees and neural networks that use object-oriented metrics as features. Six different feature selection techniques when using the Naive Bayes and the C4.5 classifier considered by Hall and Holmes [12] .There are about 100 features in each dataset. Hall and Holmes launched many of the feature selection methods. A general defect prediction framework which encompass a data pre-processor, feature selection methods, and machine learning algorithms elaborated by Song et al. [14]. They also consider that slight variations to data illustration can have a vast influence on the outcomes of article selection and bug prediction. Numerous feature selection algorithms to envisage buggy software modules for a hugeheritage communications software offered by Gao et al. Numerous feature selection algorithms to envisage buggy software units for a huge legacy communications software offered by Gao et al. There are two methods used. First, filter based techniques and second, subset selection search algorithm.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 431 4. SYSTEM OVERVIEW Fig -1: System Overview of bug prediction system Above diagram fig 1. Shows general overview of the system. Originally, user login/register into the system. It also encompasses training data/raw data which retains the logs or history. Then it checks for bug. If bug present in the system verify and report bug. Then, cos-triage algorithm is applied on that bug. Cos-triage algorithm supports us for fixing bug or defects. Then at the back end that output with bug is used as input to support vector machine (SVM) classifier .SVM classifier uses different feature selection methods which is given above. After that by reducing the features we gets final output without bug. SVM classifier operate on skilled data/raw data which is kept in log record.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 432 5. SCREENSHOTS
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 433
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 434 6. GRAPHICAL REPRESENTATION Fig 2.Graphical representation of bug prediction on projects
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 435 Fig.3: Cos-triage algorithm graph 7. CONCLUSION This paper has explored algorithm called Cos-triage algorithm which helps to reduce cost and increase accuracy of bug fixing or bug prediction. In this paper we used feature selection method which reduces the quantity of structures used by a support vector device classifier and naive byes for bug prediction. Henceforward, the usage of classifiers with feature selection will approve fast, correct, more accurate bug predictions, if software designers have highly developed bug prediction methods rooted into their software development environment. Similarly, many algorithm will build in future which will increase accuracy of bug prediction. REFERENCES [1] T.L. Graves, A.F. Karr, J.S. Marron, and H. Siy, “Predicting Fault Incidence Using Software Change History,” IEEE Trans. Software Eng., vol. 26, no. 7, pp. 653-661, July 2000. [2] S. Kim, E. W. Jr., and Y. Zhang, “Classifying Software Changes: Clean or Buggy?” IEEE Trans. Software Eng., vol. 34, no. 2, pp. 181–196,2008. [3] A.Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and D.R. Engler, “A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World,” Comm. ACM, vol. 53, no. 2, pp. 66-75, 2010. [4] J. Madhavan and E. Whitehead Jr., “Predicting Buggy Changes Inside an Integrated Development Environment,” Proc. OOPSLA Workshop Eclipse Technology eXchange, 2007. [5] T. Khoshgoftaar and E. Allen, “Predicting the Order of Fault-Prone Modules in Legacy Software,” Proc. 1998 Int’l Symp. on SoftwareReliability Eng., pp. 344–353, 1998. [6] R. Kumar, S. Rai, and J. Trahan, “Neural-Network Techniques for Software-Quality Evaluation,” Reliability and Maintainability Symposium,1998. [7] T. Ostrand, E. Weyuker, and R. Bell, “Predicting the Location and Number of Faults in Large Software Systems,” IEEE Trans. SoftwareEng., vol. 31, no. 4, pp. 340–355, 2005. [8] A.Hassan and R. Holt, “The Top Ten List: Dynamic Fault Prediction,”Proc. ICSM’05, Jan 2005. [9] R. Moser, W. Pedrycz, and G. Succi, “A Comparative Analysis ofthe Efficiency of Change Metrics and Static Code Attributes for Defect Prediction,” Proc. 30th Int’l Conf. Software Eng., pp. 181-190,2008.. [10] L.C. Briand, W.L. Melo, and J. Wu¨ st, “Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects,” IEEE Trans. Software Eng., vol. 28, no. 7, pp. 706-720,July 2002. [11] M. Hall and G. Holmes, “Benchmarking Attribute Selection Techniques for Discrete Class Data Mining,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1437-1447, Nov./Dec. 2003. [12] J. Quinlan, C4.5: Programs for Machine Learning. Morgan Kaufmann,1993. [13] Q. Song, Z. Jia, M. Shepperd, S. Ying, and J. Liu, “A General Software Defect-Proneness Prediction Framework,” IEEE Trans. Software Eng., vol. 37, no. 3, pp. 356-370, May/June 2011. [14] K. Gao, T. Khoshgoftaar, H. Wang, and N. Seliya, “Choosing Software Metrics for Defect Prediction: An Investigation on Feature Selection Techniques,” Software: Practice and Experience,vol. 41, no. 5, pp. 579-606, 2011. [15] A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and D.R. Engler, “A FewBillion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World,” Comm. ACM, vol. 53, no. 2, pp. 66-75, 2010
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 436 BIOGRAPHIES Miss Veena jadhav M.tech (Computer) BVDUCOE, Pune Prof.Vandana Gaikwad, Assistant Professor, Computer department, BVDUCOE, Pune Prof.Netra Patil, Assistant Professor, Computer department BVDUCOE, Pune