SlideShare a Scribd company logo
1 of 8
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 429
IMPLEMENTATION OF REDUCING FEATURES TO IMPROVE CODE
CHANGE BASED BUG PREDICTION BY USING COS-TRIAGE
ALGORITHM
Veena Jadhav1
, Vandana Gaikwad2
, Netra Patil3
1
Student, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India
2
Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India
3
Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India
Abstract
Today, we are getting plenty of bugs in the software because of variations in the software and hardware technologies. Bugs are
nothing but Software faults, existing a severe challenge for system reliability and dependability. To identify the bugs from the
software bug prediction is convenient approach. To visualize the presence of a bug in a source code file, recently, Machine
learning classifiers approach is developed. Because of a huge number of machine learned features current classifier-based bug
prediction have two major problems i) inadequate precision for practical usage ii) measured prediction time. In this paper we
used two techniques first, cos-triage algorithm which have a go to enhance the accuracy and also lower the price of bug
prediction and second, feature selection methods which eliminate less significant features. Reducing features get better the quality
of knowledge extracted and also boost the speed of computation.
Keywords: Efficiency, Bug Prediction, Classification, Feature Selection, Accuracy.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Classifiers such as SVM and navies byes are accomplished
on previous software project information, also it can be
expended to estimate the presence of a bug in an specific
record in software, as complete in previous work[2].
To fix bug cos-triage algorithm is used. Afterward that data
is added in historical data or in log record. Afterward,
classifier is accomplished on data originate in previous log
record. Then, it can be expended to categorize a renewed
variation is either buggy or clean.
Now days, The Eclipse IDE contains a prototype displaying
server which is used to compute bug predictions [4]. It can
aslo offer accurate predictions. Bug prediction system must
offer a lesser number of incorrect variations that are
predicted to be pram but which are very new, if software
developers are to belief [3]. Suppose, if enormous numbers
of improved variations are incorrectly estimated to be pram,
engineers wonโ€™t have belief in the bug prediction.
Previous bug prediction methodology and identical work
offered by scientist which employ the removal of โ€œfeaturesโ€
from the prior of variations created to a software system[2].
These features comprise completely distributed by blank
space in the code and that all were included or rejected in a
variation. Henceforth, to prepare the SVM classifier entirely
variables, comment words, numerical operatives, name of
methods, and development language keywords are used as
features which is existing in this paper.
Cost of large feature set is tremendously high. Because of
multiple interactions and noise classifiers cannot handle
such an enormous feature set. As well as number of features
increases time also increases and expanding to a number of
seconds per categorization for tens of thousands of features,
and minutes for enormous project data accounts.
Henceforth, this will influences the availability of a bug
prediction scheme.
There are several classification approaches could be
working. But in this paper we used cos-triage algorithm and
SVM.
1) This paper contributes three aspects:
2) Study of various feature selection methods to
categorize bugs in software program variations.
3) Use of cos-triage algorithm to increase accuracy and
reduce cost of bug prediction.
The rest of this paper is prepared as follows: In Section 2
primary steps involved in performing change classification
is presented. Also this section discuss about feature selection
techniques in more detail. Section 3 discuss prior work.
Section 4 contains system overview for proposed system.
Finally a conclusion is made in section 5.
2. CHANGE CLASSIFICATION PROCESS
Following steps are concerned in executing Various
categorization on distinct project. Creating a Corpus:
1) Change deltas are mining from the log records of a
project, as kept in its SCM repository.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 430
2) For each file bug fix variations are known by observing
keywords in SCM variation log messages.
3) At the record level without bug and buggy variations are
known by finding reverse in the review log record from bug
resolve.
4) Features contain both buggy and clean and that mined
from all variations. In Complete source code all expressions
are considered as features. Features are nothing but the lines
fitted in each variation, meta-data such as author, time etc.
we can calculate complexity metrics at this stage.
5) In this paper to compute a reduced set of features
combination of wrapper and filter approaches are used. In
this paper four filter based rankers are used. i) Relief-F. ii)
Chi-Squared iii) Gain Ratio iv) Significance. The wrapper
methods are depends on the SVM classifiers.
6) Classification model is accomplished by using reduced
set.
7) Skilled classifier is set to use. Whether a original
variation is more analogous to a buggy variation or a clean
variation is proven by classifier.
2.1 Detection of Buggy and Clean Changes
For bug prediction training data is fixed and used. Mining
variation log records is used to determine bug introducing
variations and to identify bug fixes. First is Examining for
keywords in old revision such as โ€œSetโ€ โ€œBugโ€ or other
keywords possible to develop in a bug repair.second,
Examining for another situations to bug.
2.2 Feature Extraction
With the help of support vector machine algorithm, using
buggy and clean variations a classification model must be
accomplished which is used to consolidate software
variations.
The entire word in the source code programme distributed
with the help of blank space or a semicolon which is used as
a article .Example of that is method name, keyword,
variable name, comment word, function name and operator.
2.3 Feature Selection Techniques
Huge feature groups need extended working out and
estimation periods, also need lot of memory these are the
requirement to execute classification.
Feature selection is common solution to this problem In
which only the subcategory of structures that are generally
suitable for creating grouping outcomes are truly used.
2.4 Feature Selection Process
A repetitive process of choosing increasingly fewer
important group of features is finished by using Filter and
wrapper approaches.
This process starts by splitting the primary feature set in
partial which reduces processing requirements and memory
for the remaining process.
A classification model is accomplished by using the reduced
feature set. Whether a new variation is more associated to a
buggy variation or a clean variation is decided by classifier.
3. RELATED WORK
A model proposed by scientist Khoshgoftaar and Allen to
group modules corresponding to software quality factors
such as upcoming defect intensity using different phases of
multi-regression[5][6][7]. Ostrand et al. discovered two
model i) The top 20% of problematic records in a project
[11] using upcoming defect predictors ii) A linear regression
model
Totally Ordered Program Units could be transformed into a
half ordered suite list, e.g. by giving the topmost N% of
units as offered by Ostrand et al. Hassan and A caching
algorithm to compute the set of fault-prone modules, called
the topmost-10 list offered by halt [9]. The bug cache
algorithm to envisage upcoming faults built on preceding
fault areas offered by Kim et al.
Fault sessions of the Mozilla project through numerous
releases offered by Gyimothy et al. [11]. With the help of
decision trees and neural networks that use object-oriented
metrics as features. Six different feature selection techniques
when using the Naive Bayes and the C4.5 classifier
considered by Hall and Holmes [12] .There are about 100
features in each dataset. Hall and Holmes launched many of
the feature selection methods.
A general defect prediction framework which encompass a
data pre-processor, feature selection methods, and machine
learning algorithms elaborated by Song et al. [14]. They also
consider that slight variations to data illustration can have a
vast influence on the outcomes of article selection and bug
prediction. Numerous feature selection algorithms to
envisage buggy software modules for a hugeheritage
communications software offered by Gao et al.
Numerous feature selection algorithms to envisage buggy
software units for a huge legacy communications software
offered by Gao et al. There are two methods used. First,
filter based techniques and second, subset selection search
algorithm.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 431
4. SYSTEM OVERVIEW
Fig -1: System Overview of bug prediction system
Above diagram fig 1. Shows general overview of the
system. Originally, user login/register into the system. It
also encompasses training data/raw data which retains the
logs or history. Then it checks for bug. If bug present in the
system verify and report bug. Then, cos-triage algorithm is
applied on that bug. Cos-triage algorithm supports us for
fixing bug or defects. Then at the back end that output with
bug is used as input to support vector machine (SVM)
classifier .SVM classifier uses different feature selection
methods which is given above. After that by reducing the
features we gets final output without bug. SVM classifier
operate on skilled data/raw data which is kept in log record.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 432
5. SCREENSHOTS
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 433
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 434
6. GRAPHICAL REPRESENTATION
Fig 2.Graphical representation of bug prediction on projects
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 435
Fig.3: Cos-triage algorithm graph
7. CONCLUSION
This paper has explored algorithm called Cos-triage
algorithm which helps to reduce cost and increase accuracy
of bug fixing or bug prediction. In this paper we used
feature selection method which reduces the quantity of
structures used by a support vector device classifier and
naive byes for bug prediction.
Henceforward, the usage of classifiers with feature selection
will approve fast, correct, more accurate bug predictions, if
software designers have highly developed bug prediction
methods rooted into their software development
environment. Similarly, many algorithm will build in future
which will increase accuracy of bug prediction.
REFERENCES
[1] T.L. Graves, A.F. Karr, J.S. Marron, and H. Siy,
โ€œPredicting Fault Incidence Using Software Change
History,โ€ IEEE Trans. Software Eng., vol. 26, no. 7,
pp. 653-661, July 2000.
[2] S. Kim, E. W. Jr., and Y. Zhang, โ€œClassifying
Software Changes: Clean or Buggy?โ€ IEEE Trans.
Software Eng., vol. 34, no. 2, pp. 181โ€“196,2008.
[3] A.Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S.
Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and
D.R. Engler, โ€œA Few Billion Lines of Code Later:
Using Static Analysis to Find Bugs in the Real
World,โ€ Comm. ACM, vol. 53, no. 2, pp. 66-75,
2010.
[4] J. Madhavan and E. Whitehead Jr., โ€œPredicting
Buggy Changes Inside an Integrated Development
Environment,โ€ Proc. OOPSLA Workshop Eclipse
Technology eXchange, 2007.
[5] T. Khoshgoftaar and E. Allen, โ€œPredicting the Order
of Fault-Prone Modules in Legacy Software,โ€ Proc.
1998 Intโ€™l Symp. on SoftwareReliability Eng., pp.
344โ€“353, 1998.
[6] R. Kumar, S. Rai, and J. Trahan, โ€œNeural-Network
Techniques for Software-Quality Evaluation,โ€
Reliability and Maintainability Symposium,1998.
[7] T. Ostrand, E. Weyuker, and R. Bell, โ€œPredicting the
Location and Number of Faults in Large Software
Systems,โ€ IEEE Trans. SoftwareEng., vol. 31, no. 4,
pp. 340โ€“355, 2005.
[8] A.Hassan and R. Holt, โ€œThe Top Ten List: Dynamic
Fault Prediction,โ€Proc. ICSMโ€™05, Jan 2005.
[9] R. Moser, W. Pedrycz, and G. Succi, โ€œA Comparative
Analysis ofthe Efficiency of Change Metrics and
Static Code Attributes for Defect Prediction,โ€ Proc.
30th Intโ€™l Conf. Software Eng., pp. 181-190,2008..
[10] L.C. Briand, W.L. Melo, and J. Wuยจ st, โ€œAssessing
the Applicability of Fault-Proneness Models Across
Object-Oriented Software Projects,โ€ IEEE Trans.
Software Eng., vol. 28, no. 7, pp. 706-720,July 2002.
[11] M. Hall and G. Holmes, โ€œBenchmarking Attribute
Selection Techniques for Discrete Class Data
Mining,โ€ IEEE Trans. Knowledge and Data Eng., vol.
15, no. 6, pp. 1437-1447, Nov./Dec. 2003.
[12] J. Quinlan, C4.5: Programs for Machine Learning.
Morgan Kaufmann,1993.
[13] Q. Song, Z. Jia, M. Shepperd, S. Ying, and J. Liu, โ€œA
General Software Defect-Proneness Prediction
Framework,โ€ IEEE Trans. Software Eng., vol. 37, no.
3, pp. 356-370, May/June 2011.
[14] K. Gao, T. Khoshgoftaar, H. Wang, and N. Seliya,
โ€œChoosing Software Metrics for Defect Prediction:
An Investigation on Feature Selection Techniques,โ€
Software: Practice and Experience,vol. 41, no. 5, pp.
579-606, 2011.
[15] A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S.
Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and
D.R. Engler, โ€œA FewBillion Lines of Code Later:
Using Static Analysis to Find Bugs in the Real
World,โ€ Comm. ACM, vol. 53, no. 2, pp. 66-75, 2010
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 436
BIOGRAPHIES
Miss Veena jadhav M.tech (Computer)
BVDUCOE,
Pune
Prof.Vandana Gaikwad, Assistant Professor, Computer
department, BVDUCOE, Pune
Prof.Netra Patil, Assistant Professor, Computer department
BVDUCOE, Pune

More Related Content

What's hot

Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
Conference Papers
ย 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
IJECEIAES
ย 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
ย 

What's hot (19)

A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
ย 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
ย 
IJET-V2I6P28
IJET-V2I6P28IJET-V2I6P28
IJET-V2I6P28
ย 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
ย 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
ย 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
ย 
Regression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaRegression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythia
ย 
Multi step automated refactoring for code smell
Multi step automated refactoring for code smellMulti step automated refactoring for code smell
Multi step automated refactoring for code smell
ย 
Multi step automated refactoring for code smell
Multi step automated refactoring for code smellMulti step automated refactoring for code smell
Multi step automated refactoring for code smell
ย 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
ย 
Threshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniquesThreshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniques
ย 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classification
ย 
Testing embedded system through optimal mining technique (OMT) based on multi...
Testing embedded system through optimal mining technique (OMT) based on multi...Testing embedded system through optimal mining technique (OMT) based on multi...
Testing embedded system through optimal mining technique (OMT) based on multi...
ย 
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
ย 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
ย 
76201929
7620192976201929
76201929
ย 
Improving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsImproving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systems
ย 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritization
ย 
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor DriveIRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
ย 

Viewers also liked

resume ivy tech
resume ivy techresume ivy tech
resume ivy tech
Audrey Vanags
ย 
เธ›เธ“เธดเธ”เธฒ เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24
เธ›เธ“เธดเธ”เธฒ  เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24เธ›เธ“เธดเธ”เธฒ  เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24
เธ›เธ“เธดเธ”เธฒ เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24
NamoRomchumpa
ย 
Boletรญn nยฐ 002 nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...
Boletรญn nยฐ 002  nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...Boletรญn nยฐ 002  nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...
Boletรญn nยฐ 002 nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...
alcaldia municipal
ย 
Jade Kelley Resume 2015
Jade Kelley Resume 2015Jade Kelley Resume 2015
Jade Kelley Resume 2015
Jade Kelley
ย 
Media Advisory
Media AdvisoryMedia Advisory
Media Advisory
Dorsha Dawkins
ย 
Kevin Smith CV 17.02.2016
Kevin  Smith CV 17.02.2016Kevin  Smith CV 17.02.2016
Kevin Smith CV 17.02.2016
Kevin Smith
ย 

Viewers also liked (17)

resume ivy tech
resume ivy techresume ivy tech
resume ivy tech
ย 
Ensighten Certified Professional - Mobile
Ensighten Certified Professional - MobileEnsighten Certified Professional - Mobile
Ensighten Certified Professional - Mobile
ย 
Bryan slide
Bryan slideBryan slide
Bryan slide
ย 
Ensighten Certified Professional - Manage Implementation
Ensighten Certified Professional - Manage ImplementationEnsighten Certified Professional - Manage Implementation
Ensighten Certified Professional - Manage Implementation
ย 
เธ›เธ“เธดเธ”เธฒ เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24
เธ›เธ“เธดเธ”เธฒ  เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24เธ›เธ“เธดเธ”เธฒ  เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24
เธ›เธ“เธดเธ”เธฒ เน€เธŸเธทเนˆเธญเธ‡เธŸเธธเน‰เธ‡ เธŠเธฑเน‰เธ™เธก4-8 เน€เธฅเธ‚เธ—เธตเนˆ 24
ย 
Boletรญn nยฐ 002 nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...
Boletรญn nยฐ 002  nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...Boletรญn nยฐ 002  nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...
Boletรญn nยฐ 002 nuestras deportistas rumbo a la copa รฉlite de baloncesto en a...
ย 
HMS Hurworth
HMS HurworthHMS Hurworth
HMS Hurworth
ย 
stromen van levend water
stromen van levend waterstromen van levend water
stromen van levend water
ย 
Test
TestTest
Test
ย 
Jade Kelley Resume 2015
Jade Kelley Resume 2015Jade Kelley Resume 2015
Jade Kelley Resume 2015
ย 
Media Advisory
Media AdvisoryMedia Advisory
Media Advisory
ย 
Balade week 6
Balade week 6Balade week 6
Balade week 6
ย 
Kevin Smith CV 17.02.2016
Kevin  Smith CV 17.02.2016Kevin  Smith CV 17.02.2016
Kevin Smith CV 17.02.2016
ย 
Janeiro 2015
Janeiro 2015Janeiro 2015
Janeiro 2015
ย 
Fnatic
FnaticFnatic
Fnatic
ย 
Kikiki
KikikiKikiki
Kikiki
ย 
1. rehabilitaciรณn vรญas riobamba
1. rehabilitaciรณn vรญas riobamba1. rehabilitaciรณn vรญas riobamba
1. rehabilitaciรณn vรญas riobamba
ย 

Similar to Implementation of reducing features to improve code change based bug prediction by using cos triage algorithm

Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
butest
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
ย 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
Iasir Journals
ย 

Similar to Implementation of reducing features to improve code change based bug prediction by using cos triage algorithm (20)

Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated Process
ย 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
ย 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
ย 
4213ijsea04
4213ijsea044213ijsea04
4213ijsea04
ย 
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSTHE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
ย 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineering
ย 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexity
ย 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: Testability
ย 
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
Christopher N. Bull History-Sensitive Detection of Design Flaws B ...
ย 
Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10
ย 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
ย 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
ย 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
ย 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
ย 
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
Method-Level Code Clone Modification using Refactoring Techniques for Clone M...
ย 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
ย 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
ย 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
ย 
IRJET- Machine Learning Techniques for Code Optimization
IRJET-  	  Machine Learning Techniques for Code OptimizationIRJET-  	  Machine Learning Techniques for Code Optimization
IRJET- Machine Learning Techniques for Code Optimization
ย 

More from eSAT Journals

Material management in construction โ€“ a case study
Material management in construction โ€“ a case studyMaterial management in construction โ€“ a case study
Material management in construction โ€“ a case study
eSAT Journals
ย 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
ย 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
ย 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
ย 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
ย 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
ย 
Material management in construction โ€“ a case study
Material management in construction โ€“ a case studyMaterial management in construction โ€“ a case study
Material management in construction โ€“ a case study
ย 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
ย 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
ย 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
ย 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
ย 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
ย 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
ย 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
ย 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
ย 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
ย 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
ย 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
ย 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
ย 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
ย 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
ย 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
ย 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
ย 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
ย 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
ย 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 

Implementation of reducing features to improve code change based bug prediction by using cos triage algorithm

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 429 IMPLEMENTATION OF REDUCING FEATURES TO IMPROVE CODE CHANGE BASED BUG PREDICTION BY USING COS-TRIAGE ALGORITHM Veena Jadhav1 , Vandana Gaikwad2 , Netra Patil3 1 Student, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India 2 Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India 3 Assistant Professor, Computer Engineering Department, BVDUCOE Pune-43, Maharashtra, India Abstract Today, we are getting plenty of bugs in the software because of variations in the software and hardware technologies. Bugs are nothing but Software faults, existing a severe challenge for system reliability and dependability. To identify the bugs from the software bug prediction is convenient approach. To visualize the presence of a bug in a source code file, recently, Machine learning classifiers approach is developed. Because of a huge number of machine learned features current classifier-based bug prediction have two major problems i) inadequate precision for practical usage ii) measured prediction time. In this paper we used two techniques first, cos-triage algorithm which have a go to enhance the accuracy and also lower the price of bug prediction and second, feature selection methods which eliminate less significant features. Reducing features get better the quality of knowledge extracted and also boost the speed of computation. Keywords: Efficiency, Bug Prediction, Classification, Feature Selection, Accuracy. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Classifiers such as SVM and navies byes are accomplished on previous software project information, also it can be expended to estimate the presence of a bug in an specific record in software, as complete in previous work[2]. To fix bug cos-triage algorithm is used. Afterward that data is added in historical data or in log record. Afterward, classifier is accomplished on data originate in previous log record. Then, it can be expended to categorize a renewed variation is either buggy or clean. Now days, The Eclipse IDE contains a prototype displaying server which is used to compute bug predictions [4]. It can aslo offer accurate predictions. Bug prediction system must offer a lesser number of incorrect variations that are predicted to be pram but which are very new, if software developers are to belief [3]. Suppose, if enormous numbers of improved variations are incorrectly estimated to be pram, engineers wonโ€™t have belief in the bug prediction. Previous bug prediction methodology and identical work offered by scientist which employ the removal of โ€œfeaturesโ€ from the prior of variations created to a software system[2]. These features comprise completely distributed by blank space in the code and that all were included or rejected in a variation. Henceforth, to prepare the SVM classifier entirely variables, comment words, numerical operatives, name of methods, and development language keywords are used as features which is existing in this paper. Cost of large feature set is tremendously high. Because of multiple interactions and noise classifiers cannot handle such an enormous feature set. As well as number of features increases time also increases and expanding to a number of seconds per categorization for tens of thousands of features, and minutes for enormous project data accounts. Henceforth, this will influences the availability of a bug prediction scheme. There are several classification approaches could be working. But in this paper we used cos-triage algorithm and SVM. 1) This paper contributes three aspects: 2) Study of various feature selection methods to categorize bugs in software program variations. 3) Use of cos-triage algorithm to increase accuracy and reduce cost of bug prediction. The rest of this paper is prepared as follows: In Section 2 primary steps involved in performing change classification is presented. Also this section discuss about feature selection techniques in more detail. Section 3 discuss prior work. Section 4 contains system overview for proposed system. Finally a conclusion is made in section 5. 2. CHANGE CLASSIFICATION PROCESS Following steps are concerned in executing Various categorization on distinct project. Creating a Corpus: 1) Change deltas are mining from the log records of a project, as kept in its SCM repository.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 430 2) For each file bug fix variations are known by observing keywords in SCM variation log messages. 3) At the record level without bug and buggy variations are known by finding reverse in the review log record from bug resolve. 4) Features contain both buggy and clean and that mined from all variations. In Complete source code all expressions are considered as features. Features are nothing but the lines fitted in each variation, meta-data such as author, time etc. we can calculate complexity metrics at this stage. 5) In this paper to compute a reduced set of features combination of wrapper and filter approaches are used. In this paper four filter based rankers are used. i) Relief-F. ii) Chi-Squared iii) Gain Ratio iv) Significance. The wrapper methods are depends on the SVM classifiers. 6) Classification model is accomplished by using reduced set. 7) Skilled classifier is set to use. Whether a original variation is more analogous to a buggy variation or a clean variation is proven by classifier. 2.1 Detection of Buggy and Clean Changes For bug prediction training data is fixed and used. Mining variation log records is used to determine bug introducing variations and to identify bug fixes. First is Examining for keywords in old revision such as โ€œSetโ€ โ€œBugโ€ or other keywords possible to develop in a bug repair.second, Examining for another situations to bug. 2.2 Feature Extraction With the help of support vector machine algorithm, using buggy and clean variations a classification model must be accomplished which is used to consolidate software variations. The entire word in the source code programme distributed with the help of blank space or a semicolon which is used as a article .Example of that is method name, keyword, variable name, comment word, function name and operator. 2.3 Feature Selection Techniques Huge feature groups need extended working out and estimation periods, also need lot of memory these are the requirement to execute classification. Feature selection is common solution to this problem In which only the subcategory of structures that are generally suitable for creating grouping outcomes are truly used. 2.4 Feature Selection Process A repetitive process of choosing increasingly fewer important group of features is finished by using Filter and wrapper approaches. This process starts by splitting the primary feature set in partial which reduces processing requirements and memory for the remaining process. A classification model is accomplished by using the reduced feature set. Whether a new variation is more associated to a buggy variation or a clean variation is decided by classifier. 3. RELATED WORK A model proposed by scientist Khoshgoftaar and Allen to group modules corresponding to software quality factors such as upcoming defect intensity using different phases of multi-regression[5][6][7]. Ostrand et al. discovered two model i) The top 20% of problematic records in a project [11] using upcoming defect predictors ii) A linear regression model Totally Ordered Program Units could be transformed into a half ordered suite list, e.g. by giving the topmost N% of units as offered by Ostrand et al. Hassan and A caching algorithm to compute the set of fault-prone modules, called the topmost-10 list offered by halt [9]. The bug cache algorithm to envisage upcoming faults built on preceding fault areas offered by Kim et al. Fault sessions of the Mozilla project through numerous releases offered by Gyimothy et al. [11]. With the help of decision trees and neural networks that use object-oriented metrics as features. Six different feature selection techniques when using the Naive Bayes and the C4.5 classifier considered by Hall and Holmes [12] .There are about 100 features in each dataset. Hall and Holmes launched many of the feature selection methods. A general defect prediction framework which encompass a data pre-processor, feature selection methods, and machine learning algorithms elaborated by Song et al. [14]. They also consider that slight variations to data illustration can have a vast influence on the outcomes of article selection and bug prediction. Numerous feature selection algorithms to envisage buggy software modules for a hugeheritage communications software offered by Gao et al. Numerous feature selection algorithms to envisage buggy software units for a huge legacy communications software offered by Gao et al. There are two methods used. First, filter based techniques and second, subset selection search algorithm.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 431 4. SYSTEM OVERVIEW Fig -1: System Overview of bug prediction system Above diagram fig 1. Shows general overview of the system. Originally, user login/register into the system. It also encompasses training data/raw data which retains the logs or history. Then it checks for bug. If bug present in the system verify and report bug. Then, cos-triage algorithm is applied on that bug. Cos-triage algorithm supports us for fixing bug or defects. Then at the back end that output with bug is used as input to support vector machine (SVM) classifier .SVM classifier uses different feature selection methods which is given above. After that by reducing the features we gets final output without bug. SVM classifier operate on skilled data/raw data which is kept in log record.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 432 5. SCREENSHOTS
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 433
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 434 6. GRAPHICAL REPRESENTATION Fig 2.Graphical representation of bug prediction on projects
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 435 Fig.3: Cos-triage algorithm graph 7. CONCLUSION This paper has explored algorithm called Cos-triage algorithm which helps to reduce cost and increase accuracy of bug fixing or bug prediction. In this paper we used feature selection method which reduces the quantity of structures used by a support vector device classifier and naive byes for bug prediction. Henceforward, the usage of classifiers with feature selection will approve fast, correct, more accurate bug predictions, if software designers have highly developed bug prediction methods rooted into their software development environment. Similarly, many algorithm will build in future which will increase accuracy of bug prediction. REFERENCES [1] T.L. Graves, A.F. Karr, J.S. Marron, and H. Siy, โ€œPredicting Fault Incidence Using Software Change History,โ€ IEEE Trans. Software Eng., vol. 26, no. 7, pp. 653-661, July 2000. [2] S. Kim, E. W. Jr., and Y. Zhang, โ€œClassifying Software Changes: Clean or Buggy?โ€ IEEE Trans. Software Eng., vol. 34, no. 2, pp. 181โ€“196,2008. [3] A.Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and D.R. Engler, โ€œA Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World,โ€ Comm. ACM, vol. 53, no. 2, pp. 66-75, 2010. [4] J. Madhavan and E. Whitehead Jr., โ€œPredicting Buggy Changes Inside an Integrated Development Environment,โ€ Proc. OOPSLA Workshop Eclipse Technology eXchange, 2007. [5] T. Khoshgoftaar and E. Allen, โ€œPredicting the Order of Fault-Prone Modules in Legacy Software,โ€ Proc. 1998 Intโ€™l Symp. on SoftwareReliability Eng., pp. 344โ€“353, 1998. [6] R. Kumar, S. Rai, and J. Trahan, โ€œNeural-Network Techniques for Software-Quality Evaluation,โ€ Reliability and Maintainability Symposium,1998. [7] T. Ostrand, E. Weyuker, and R. Bell, โ€œPredicting the Location and Number of Faults in Large Software Systems,โ€ IEEE Trans. SoftwareEng., vol. 31, no. 4, pp. 340โ€“355, 2005. [8] A.Hassan and R. Holt, โ€œThe Top Ten List: Dynamic Fault Prediction,โ€Proc. ICSMโ€™05, Jan 2005. [9] R. Moser, W. Pedrycz, and G. Succi, โ€œA Comparative Analysis ofthe Efficiency of Change Metrics and Static Code Attributes for Defect Prediction,โ€ Proc. 30th Intโ€™l Conf. Software Eng., pp. 181-190,2008.. [10] L.C. Briand, W.L. Melo, and J. Wuยจ st, โ€œAssessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects,โ€ IEEE Trans. Software Eng., vol. 28, no. 7, pp. 706-720,July 2002. [11] M. Hall and G. Holmes, โ€œBenchmarking Attribute Selection Techniques for Discrete Class Data Mining,โ€ IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1437-1447, Nov./Dec. 2003. [12] J. Quinlan, C4.5: Programs for Machine Learning. Morgan Kaufmann,1993. [13] Q. Song, Z. Jia, M. Shepperd, S. Ying, and J. Liu, โ€œA General Software Defect-Proneness Prediction Framework,โ€ IEEE Trans. Software Eng., vol. 37, no. 3, pp. 356-370, May/June 2011. [14] K. Gao, T. Khoshgoftaar, H. Wang, and N. Seliya, โ€œChoosing Software Metrics for Defect Prediction: An Investigation on Feature Selection Techniques,โ€ Software: Practice and Experience,vol. 41, no. 5, pp. 579-606, 2011. [15] A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C.Henri-Gros, A. Kamsky, S. McPeak, and D.R. Engler, โ€œA FewBillion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World,โ€ Comm. ACM, vol. 53, no. 2, pp. 66-75, 2010
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 436 BIOGRAPHIES Miss Veena jadhav M.tech (Computer) BVDUCOE, Pune Prof.Vandana Gaikwad, Assistant Professor, Computer department, BVDUCOE, Pune Prof.Netra Patil, Assistant Professor, Computer department BVDUCOE, Pune