Submit Search
Upload
IRJET - A Novel Approach for Software Defect Prediction based on Dimensionality Reduction
âą
0 likes
âą
2 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i3/IRJET-V7I3879.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 9
Download now
Download to read offline
Recommended
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
IJSRD
Â
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
ijctcm
Â
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
IJNSA Journal
Â
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
csandit
Â
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
ijaia
Â
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
Dr. Amarjeet Singh
Â
A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system
IJECEIAES
Â
Automated exam question set generator using utility based agent and learning ...
Automated exam question set generator using utility based agent and learning ...
Journal Papers
Â
Recommended
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
IJSRD
Â
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
An Empirical Comparison and Feature Reduction Performance Analysis of Intrusi...
ijctcm
Â
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
IJNSA Journal
Â
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
csandit
Â
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
ijaia
Â
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
Dr. Amarjeet Singh
Â
A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system
IJECEIAES
Â
Automated exam question set generator using utility based agent and learning ...
Automated exam question set generator using utility based agent and learning ...
Journal Papers
Â
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
Â
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
ijcsa
Â
Test case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testing
Journal Papers
Â
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET Journal
Â
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
ijseajournal
Â
Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy technique
ijceronline
Â
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
ijaia
Â
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
ijaia
Â
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
IJMER
Â
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET Journal
Â
Towards formulating dynamic model for predicting defects in system testing us...
Towards formulating dynamic model for predicting defects in system testing us...
Journal Papers
Â
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET Journal
Â
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
International Research Journal of Modernization in Engineering Technology and Science
Â
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
CSCJournals
Â
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
ijtsrd
Â
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
IOSR Journals
Â
PARKINSONâS DISEASE DETECTION USING MACHINE LEARNING
PARKINSONâS DISEASE DETECTION USING MACHINE LEARNING
IRJET Journal
Â
Genetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
Â
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
Â
Visualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine Learning
IRJET Journal
Â
A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...
IJECEIAES
Â
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...
IRJET Journal
Â
More Related Content
What's hot
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
Â
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
ijcsa
Â
Test case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testing
Journal Papers
Â
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET Journal
Â
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
ijseajournal
Â
Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy technique
ijceronline
Â
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
ijaia
Â
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
ijaia
Â
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
IJMER
Â
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET Journal
Â
Towards formulating dynamic model for predicting defects in system testing us...
Towards formulating dynamic model for predicting defects in system testing us...
Journal Papers
Â
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET Journal
Â
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
International Research Journal of Modernization in Engineering Technology and Science
Â
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
CSCJournals
Â
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
ijtsrd
Â
What's hot
(15)
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
Â
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
Â
Test case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testing
Â
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
Â
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
Â
Function Point Software Cost Estimates using Neuro-Fuzzy technique
Function Point Software Cost Estimates using Neuro-Fuzzy technique
Â
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
Â
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
Â
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Â
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
Â
Towards formulating dynamic model for predicting defects in system testing us...
Towards formulating dynamic model for predicting defects in system testing us...
Â
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
IRJET- Analysis of PV Fed Vector Controlled Induction Motor Drive
Â
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
Â
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Data Preparation and Reduction Technique in Intrusion Detection Systems: ANOV...
Â
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Â
Similar to IRJET - A Novel Approach for Software Defect Prediction based on Dimensionality Reduction
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
IOSR Journals
Â
PARKINSONâS DISEASE DETECTION USING MACHINE LEARNING
PARKINSONâS DISEASE DETECTION USING MACHINE LEARNING
IRJET Journal
Â
Genetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
Â
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
Â
Visualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine Learning
IRJET Journal
Â
A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...
IJECEIAES
Â
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...
IRJET Journal
Â
Threshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniques
journalBEEI
Â
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
IJSRD
Â
Comparative performance analysis
Comparative performance analysis
csandit
Â
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET Journal
Â
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET Journal
Â
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
theijes
Â
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
IRJET Journal
Â
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
International Journal of Technical Research & Application
Â
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET Journal
Â
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
IRJET Journal
Â
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
Â
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
IJNSA Journal
Â
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
IJNSA Journal
Â
Similar to IRJET - A Novel Approach for Software Defect Prediction based on Dimensionality Reduction
(20)
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
Â
PARKINSONâS DISEASE DETECTION USING MACHINE LEARNING
PARKINSONâS DISEASE DETECTION USING MACHINE LEARNING
Â
Genetic algorithm based approach for
Genetic algorithm based approach for
Â
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Â
Visualizing and Forecasting Stocks Using Machine Learning
Visualizing and Forecasting Stocks Using Machine Learning
Â
A simplified predictive framework for cost evaluation to fault assessment usi...
A simplified predictive framework for cost evaluation to fault assessment usi...
Â
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Â
Threshold benchmarking for feature ranking techniques
Threshold benchmarking for feature ranking techniques
Â
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
Â
Comparative performance analysis
Comparative performance analysis
Â
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning Approach
Â
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
Â
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
Â
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
Â
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
Â
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
Â
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
Â
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
Â
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
Â
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
Â
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Â
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
Â
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Â
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
nuruddin69
Â
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Â
Air Compressor reciprocating single stage
Air Compressor reciprocating single stage
Abc194748
Â
BhubaneswarđčCall Girls Bhubaneswar â€Komal 9777949614 đ Full Trusted CALL GIRL...
BhubaneswarđčCall Girls Bhubaneswar â€Komal 9777949614 đ Full Trusted CALL GIRL...
Call Girls Mumbai
Â
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
Â
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Â
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Â
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
Â
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
Â
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
Magic Marks
Â
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
Â
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Kamal Acharya
Â
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
Â
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
Â
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
Â
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
meghakumariji156
Â
Recently uploaded
(20)
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Â
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Â
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
Â
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Â
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
Â
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Â
Air Compressor reciprocating single stage
Air Compressor reciprocating single stage
Â
BhubaneswarđčCall Girls Bhubaneswar â€Komal 9777949614 đ Full Trusted CALL GIRL...
BhubaneswarđčCall Girls Bhubaneswar â€Komal 9777949614 đ Full Trusted CALL GIRL...
Â
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
Â
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Â
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Â
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
Â
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
Â
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
Â
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Â
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Â
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Â
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
Â
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Â
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Â
IRJET - A Novel Approach for Software Defect Prediction based on Dimensionality Reduction
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4392 A NOVEL APPROACH FOR SOFTWARE DEFECT PREDICTION BASED ON DIMENSIONALITY REDUCTION Bhushan Salve1, Piyush Pokharkar2, Suriya Pillai3, Rahul Kapse4 1,2,3B.E. student, Dept. of Computer Engineering, PHCET, Maharashtra, India 4Assistant Professor, Dept. of Computer Engineering, PHCET, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Software Defect Prediction is an essential aspect to ensure software quality. Deep Learning techniques can also be used for the same. In this paper, we propose to extract a set of expressive features from an initial set of necessary change measures using Artificial Neural Network (ANN), and then train a classifier based on the extracted features using Decision tree and compare it to three other methods wherein features are derived from a set of initial change measures using dimensionality reduction techniques that include Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Kernel PCA. We use five open-source datasets from NASA Promise Data Repository to perform this comparative study. For evaluation, three widely used metrics: Accuracy, F1 scores and Areas under Receiver Operating Characteristic curve are used. The Artificial Neural Network is considered to be outperformed all the other dimensionality reduction techniques. Kernel PCA performed best amongst the dimensionality reduction techniques. Key Words: Deep Learning, Artificial Neural Network, Principal Component Analysis, Linear Discriminant Analysis, Kernel PCA, Decision Tree, Area under ROC curve. 1. INTRODUCTION To build high-quality software, defect prediction has become an essential aspect as a lot of time and effort is put in soft- ware testing, and it is debugging otherwise. Defect detection techniques are suggested to help prioritize software testing and debugging; they may suggest components of software that developers are likely to be faulty. A lot of parameters are considered while predicting whether the software is buggy or not which include the number of lines in the code, its complexity, the number of operators and operands used in the system and other factors. We have considered a set of 22 first features to predict whether the module is buggy. Deep learning is a new area and the most promising one in the machine learning literature, and has been adopted in a lot of research areas and has proven to be very useful, particularly in image processing [10] and speech recognition. Artificial Neural Network is a deep learning algorithm based on the working of biological neural networks. It has several nodes connected via weighted edges. We propose to extract a set of expressive features from an initial set of necessary change measures using Artificial Neural Network (ANN) and then train a classifier based on the extracted features using Decision tree and compare it to three other methods wherein features are extracted from a set of initial change measures using dimensionality reduction techniques that include Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Kernel PCA. Decision Trees fall under supervised learning method for classification and regression that can easily be visualized. It works by applying classification or regression based on a particular function (here Entropy) on a labeled training set. It splits the population or sample based on the most significant splitter by identifying the most vital variable from the dataset. They work on the principle of Greediness. PCA, LDA and Kernel PCA are ways used for dimension- ality reduction. LDA and PCA are linear transformation techniques, the difference being LDA to be supervised and PCA to be unsupervised. PCA is more of a generic dimensionality reduction technique, while LDA tends to be more specific. PCA treats dataset as a whole while LDA tries to discriminate between classes within the data. On the other hand, KPCA is a non-linear form of PCA, i.e. an extension to PCA that uses kernel methods. For evaluation, three widely used metrics: Accuracy, F1 scores and Areas under Receiver Operating Characteristic curve have been used. Classification accuracy alone can at times mislead, and hence the other two metrics have also been considered. F1 scores are the weighted average of Precision and Recall taking into consideration both False Positives and False Negatives. The two are the harmonic standard. ROC curve analysis can be considered as a complete report of sensitivity and specificity. The Artificial Neural Network is considered to outperform all the other dimensionality reduction techniques. Kernel PCA performed best amongst the other dimensionality reduction techniques. RQ1: How effective is a neural network over other dimen- sionality reduction techniques? RQ2: Can accuracy alone be used for the evaluation of a model?
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4393 Fig -1: Block Diagram 2. RELATED WORKS X. Yang, D. Lo, X. Xia, Y. Zhang and J. Sun [1] used learning algorithms to predict defects at change level. They made use of deep learning algorithm to predict the same. They first created a Deep Belief Network to extract a set of expressive features from the initial set of linear functions. They then used Logistic Regression as a classifier to predict buggy and non-buggy changes. Using F1-scores and cost-effectiveness as performance metrics, they concluded that their model gave better results as compared to a simple Logistic Regression trained model and the approach proposed by Kamei et al. [2]. T. Jiang, L. Tan, and S. Kim [3] felt that different devel- opers have different coding styles, commit frequencies and experience levels, causing different defect patterns and hence built a separate prediction model for each developer. S. Wang, T. Liu, and L. Tan [5] leveraged a Deep Learning algorithm to extract the semantic features of programs from the source code and then applied a Deep Belief network to help the algorithm learn from the extracted features. They used three performance metrics - Precision, Recall and F1-scores to evaluate the algorithm. They concluded that the automatically learned semantic features could significantly improve both within-project and cross-project defect prediction compared to traditional elements. Jian Li, Pinjia He, Jieming Zhu, and Michael R. Lyu [7] used Convolutional Neural Network to generate useful features from the original handcrafted features. They then combined the learned elements with the handcrafted features for accurate defect prediction. They evaluatedthe algorithm based on F-measure and concluded that their approach improved the state-of-the-art method. P.D. Singh and A. Chugh [8] compared 5 Machine Learn- ing algorithms - Particle Swarm Optimization, Našıve Bayes, Decision Tree, Linear Classifier and Artificial Neural Network - on the data sets for Software Defect Prediction. Linear Classifiers outperformed the other algorithms in terms of defect prediction accuracy. Neural Networks, however, had the lowest error rate. G. E. Hinton and R. R. Salakhutdinov [9] used Deep Auto- encoder Network to reduce the dimensionality of data. They described a way to effectively initialize the weights for the neurons so that the Deep Auto-encoder works in a better idea as compared to Principal Component Analysis to produce low dimensionality data. J. Ali, R. Khan, N. Ahmad, I. Maqsood [13] used the Breast Cancer data sets to compare two classification models, namely, Random Forest and Decision Trees. Using the performance measures as F-Measure, Precision, Accuracy and Recall, they concluded that having the same number of attributes, Random Forest classifier gave better results with large data sets. At the same time, Decision Trees outperformed when the number of instances was comparatively lesser. Jindal, R. Malhotra, A. Jain [14] used text mining tech- niques to develop a model to predict the severity level of each defect report based on classification of existing reports using the machine learning system, namely Ra- dial Basis Neural network algorithm. The Area under the Curve (AUC) value, the sensitivity and the correct threshold criterion is known as the cut-off point was used to analyze the Receiver Operating Characteristics (ROC) and predict the results obtained from the model. They concluded that the model gave exceptionally well results in predicting high severity defects than in predicting the faults of the other severity levels. V. A. Kumar, N. Elavarasan [15] used different feature selection and feature extraction techniques to reduce the dimensionality of high dimensional data. Various statisti- cal measures such as information theory, mutual informa- tion, information gain, gain ratio, symmetric uncertainty, correlation and chi-square statistics were used for fea- ture selection. Techniques such as Principal Component Analysis, Principal Feature Analysis, Fisher Criterion and Linear Discriminant Analysis were studied as a part of feature extraction. Mosci, L. Rosasco, A. Verri [16] use Principal Compo- nent Analysis and Kernel Principal Component Analysis to reduce the dimensionality of data and inves- tigate their regularisation properties. They conclude that PCA as a preprocessing step is in itself a regularisation step and does not need any separate regularization. They also provide a method to choose an optimal number of parameters for the reduced dimension data.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4394 Varghese, V. Verghese, Gayathri. P and Dr N. Jaisankar [17] did an elaborate study of various feature selection and feature extraction techniques. These include Singular Value Decomposition, Principal Component Analysis, Independent Component Analysis, Canonical Correlation Analysis, Locally Linear Embedding, Linear Discriminant Analysis and Partial Least Squares Regression. 3. EXPERIMENTAL DESIGN AND SETUP Open source datasets are readily available online. The Five datasets used for this project were taken from NASA Promise Dataset Repository namely pc1, cm1, jm1, kc1, kc2 each having no missing values and 22 attributes that come from McCabe and Halstead features extractors. Fig -2: Dataset characteristics Table 1: Characteristics of Datasets 4. APPROACHES The dataset, used for Software Defect prediction in the project, is taken from NASA Promise Repository. All the 5 data sets have 22 attributes, though each was having a different number of instances. Decision Tree classifier is used to make the model learn from the test set, and then the model is tested on the training set and the performance measures are calculated. However, having so many attributes and instances can lead the model to overfit. Hence, we first reduced the dimensionality of the data to a set of 6 cumulated features using 4 different techniques and then trained the model using Decision Tree classifier. A detailed comparison was then made based on the performance metrics that include Accuracy, F1- Scores and Area under the Receiver Operating Characteristics (ROC). Following are the algorithms used for Dimensionality Reduction, along with a brief description. 4.1 Artificial Neural Network (ANN) This algorithm is somewhat based on the human brain or the human nervous system and uses a set of hidden layers with a varied number of nodes called neurons. Each neuron takes inputs from either a few or all of the previous layer neurons and processes the input using initialized weights and an activation function. It then sends the output to many neurons of the next layer. Based on the output and the cost function, the weights are updated over several epochs until the parameters best fit the model. To train our model, we use 3 hidden layers with a different number of neurons. Fig -3: ANN Architecture 4.2 Principal Component Analysis (PCA) The PCA is a statistical data analysis method that transforms the initial set of variables into an assorted set of linear combinations, known as the principal components (PC), with specific properties concerning variances. This condenses the dimensionality of the system while maintaining informationon the variable connections [17]. The PCA algorithm is applied such that it extracts 6 new independent features that explain most the variance of the dataset, regardless of the dependent variable. Since the final class of each instance is not considered while turning the data into a low dimensional one, hence it is an Unsupervised Model.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4395 4.3 Linear Discriminant Analysis (LDA) In high dimensional data, it is difficult to find similarities between different data points and hence the model is chal- lenging to analyze. The LDA algorithm maps down the high dimensional data to a low dimensional space which is then fed to the classifier to train the model. LDA aims to maximize the between-class distance and minimize the within-class distance in the dimensionality reduced space [15]. The LDA algorithm is applied such that it extracts 6 new independent features that separate most the classes of the dataset that is the buggy and no buggy instances. Since the extracted features are obtained, taking into consideration the dependent variable, hence it is a Supervised Model. 4.4 Kernel Principal Component Analysis (KPCA) Standard PCA only allows linear dimensionality reduction. However, if the data has more complex structures that are not well defined in a linear subspace, standard PCA is not going to be of great help. Kernel PCA thus extends conventional principal component analysis (PCA) to a high dimensional feature space using the kernel algorithm. An intuitive under- standing of the Gaussian kernel PCA is that it makes use of the distances between different training data points, which is like k-nearest neighbor or clustering methods [19]. Gaussian kernel PCA reveals more complex hidden structures of the data than standard PCA. Gaussian RBF, Polynomial, Hyperbolic Tangent are some accessible Kernel functions. We leveraged the Gaussian RBF kernel function to reduce the dimensionality of our data set. 4.5 Decision TreeAlgorithm The Decision Tree algorithm that is a supervised learning algorithm and works on principles of Entropy and information gain has been used as a classifier. The entropy of a dataset measures the impurity of the dataset, i.e., how disordered the data set is. The most critical aspect of the Decision Tree algorithm is the attribute selection method employed at each node of the tree since some attributes split the data more purely than other attributes. The algorithm works on the principle of Greediness, i.e., it looks for the solution that appears to be best at the moment without looking at the picture at large. The Decision Tree algorithm uses the Information Gain, which calculates the reduction in Entropy or gains in information, to split the data set using a particular attribute. The algorithm is advantageous as it requires less data cleaning and is not influenced by outliers and missing values to a fair extent. PERFORMANCE MEASURES Table 3: Confusion Matrix A. Accuracy This refers to the ratio of correctly predicted instances of the test set to the total number of instances of the test set. Accuracy = (TP + TN) / (TP + FN + FP + TN) B. F1 scores At times, accuracy paradox can lead to misinterpretation of the results. Hence we take another performance metrics called F1 score into consideration.F1 value is the Precision and Recall harmonic mean, which is also calculated from the confusion matrix. Precision is the ratio of actual correctly predicted positive (buggy) instances to the total number of predicted positive instances (Precision= TP/TP+FN) the recall is also known as sensitivity. The recall is the ratio of actual correctly predicted positive (buggy) instances to the total number of actual positive instances (Recall= TP/TP+FN) Taking the harmonic mean, we get F1score = 2*Recall*Precision Recall + Precision C. Area Under the Curve (AUC): It evaluated the performance of the projected models by plotting the Receiver Operating Characteristics (ROC) curve and evaluating the area under the curve. ROC curve, which is defined as a plot of sensitivity on the y-coordinate versus its 1-specificity (it is defined as the ratio of predicted non-faulty classes to the number of classes non- faulty) on the x coordinate, is an effective method of evaluating the quality or performance ofpredicted models. 4.6 VALIDATION METHOD We have used to hold out cross-validation method to val- idate the data set. Since all the data sets used had quite a large number of instances, the training set and test set were divided into the ratio 3:1. The instruction set was used to train the classifier and then the model was validated on the test set. Confusion matrix was obtained by applying various dimensional reduction techniques and training the data set by Decision Tree classifier. Accuracy and F1 score thus obtained are the following: We plotted ROC curves and found AUC to check the validity of our model. Following are the ROC curves for the respective confusion matrix.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4396 5. RESULTS Confusion matrix was obtained by applying various Dimensional reduction techniques and training the data set by Decision Tree classifier. Accuracy and F1 score thus obtained are the following: Table 4: Accuracy of each technique Table 5: F1 Scores of each technique We plotted ROC curves and found AUC to check the validity of our model. Following are the ROC curves for the respective confusion matrix. Fig -4: Areas under ROC curves using PCA
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4397 Fig -5: Areas under ROC curves using LDA Fig -6: Areas under ROC curves using kernel PCA
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4398 Fig - 7: Areas under ROC curves using ANN Table 6: AUC values of each technique 6. DISCUSSION AND INTERPRETATION For interpretation purposes, we represent our findings graphically, as follows. Fig -8: Graphical interpretation considering Accuracy Fig -9: Graphical interpretation considering F1 Scores Fig -10: Graphical interpretation considering AUC We conclude that Artificial Neural Network outperformed the other techniques in 4 out of the 5 datasets considered for defect prediction. This thus shows that Deep Learning can prove to be beneficial when the data under consideration has quite a large number of attributes. Kernel PCA comes out to be better amongst the other dimensionality reduction techniques. 7. THREATS TO VALIDITY In this section, we discuss the various threats to the Validity of our comparative study. Construct Validity We estimate the performance of the model using hold out cross-validation method. Training and test sets are constructed randomly so they may over fit the data. Using other performance estimation techniques, they might give different results. Apart from the considered attributes, there might be other factors affecting the presence of defects.
8.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4399 Internal Validity The data set used contains information regarding features determined by McCabe and Halstead feature extractors, which are known to have certain limitations. External Validity We used only 5 open-source data sets taken NASA Promise Repository, and so our results may not generalize to all software. Replication of this comparative study taking into account other datasets may produce more generalized results. Conclusion Validity The datasets being used have a class imbalance problem. So, we used AUC to evaluate the performance of our model, but it can still be partial for non-buggy instances. 8. CONCLUSION AND FUTURE SCOPE In this paper, we proposed different dimensionality reduction techniques and compared the results obtained on the basis on prediction accuracy, F1- scores and area under the curve. Artificial Neural Network outperformed all the other techniques in terms of accuracy. The best technique available hence depends on the data set and the performance metrics being considered. The research issues that emerged at the start of the paper have also been answered. RQ1: How effective is a neural network over other dimensionality reduction techniques? We conclude that Artificial Neural Network outperformed the other techniques in 4 out of the 5 datasets considered for defect prediction. This show that Deep Learning can prove to be beneficial when the data under consideration has quite a large number of attributes. Kernel PCA comes out to be better amongst the other dimensionality reduction techniques. RQ2: Can accuracy alone be used for the evaluation of a model? At times, the class imbalance can lead to accuracy paradox. Hence we cannot say that accuracy metrics always gives the correct interpretations. Thus, alongside accuracy, we have also taken into consideration F1-scores and Area under the Receiver Operating Characteristic curve. In future, we plan to improve the neural network model by changing various parameters which include the number of hidden layers, neurons in each layer, optimizers and the cost function. Various other techniques need to be an experiment for reducing the dimensionality of the parameters, and as per the current techniques, changing the number of components taken can also result in individual improvement. We also plan to test other classifiers such as Naive Bayes, K-Nearest Neighbors, Kernel Support Vector Machines and ensemble techniques such as Random Forest and compare the results to those found by using Decision Tree classifier. ACKNOWLEDGEMENTS We are profoundly grateful to Prof. RAHUL KAPSE for his expert guidance and continuous encouragement throughout to see that this project rights its target since its commencement to its completion. We would like to express deepest appreciation to- wards Dr. MADHUMITA CHATTERJEE, Principal, Pillaiâs HOC College of Engineering and Technology, Dr. ASHOK KANTHE, Head of Department of Computer Engineering and Prof. RAHUL KAPSE, Project Coordinator whoâs valuable guidance supported us in completing this project. At last we must express our sincere heartfelt gratitude to all the staff members of Computer Engineering Department who helped us directly or indirectly during this course of work. REFERENCES [1] X. Yang, D. Lo, X. Xia, Y. Zhang, and J. Sun, âDeep learning for just-in-time defect prediction,â in QRSâ15: Proc. of the International Conference on Software Quality, Reliability and Security, 2015. [2] Y. Kamei, E. Shihab, B. Adams, A. E. Hassan, A. Mockus, A. Sinha, and N. Ubayashi, âA large-scale empirical study of just-in-time quality assurance,â TSE, vol. 39, no. 6, pp. 757â773, 2013. [3] T. Jiang, L. Tan, and S. Kim, âPersonalized defect prediction,â in ASE, 2013, pp. 279â28. [4] M. Tan, L. Tan, S. Dara, and C. Mayeux, âOnline defect prediction for imbalanced data,â in ICSEâ15, pages 99â108. [5] S. Wang, T. Liu, and L. Tan, âAutomatically learning semantic features for defect prediction,â in ICSEâ16: Proc. of the International Conference on Software Engineering, 2016. [6] Y. Kamei, S. Matsumoto, A. Monden, K.-i. Matsumoto, B. Adams, and A. E. Hassan, âRevisiting common bug prediction findings using effort- aware models,â in ICSM, 2010, pp. 1â10. [7] Jian Li, Pinjia He, Jieming Zhu, and Michael R. Lyu, âSoftware Defect Prediction via Convolutional Neural Networkâ. [8] P. D. Singh and A. Chugh, âSoftware Defect Prediction Analysis Using Machine Learning Algorithms,â in International Conference on Cloud Computing, Data Science Engineering â Confluence, 2017. [9] G. E. Hinton and R. R. Salakhutdinov, âReducing the dimensionality of data with neural networks,â Science, vol. 313, no. 5786, pp. 504â507, 2006.
9.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4400 [10] G. E. Hinton, âLearning multiple layers of representation,â Trends in cognitive sciences, vol. 11, no. 10, pp. 428â434, 2007. [11] L. Deng, J. Li, J.-T. Huang, K. Yao, D. Yu, F. Seide, M. Seltzer, G. Zweig, X. He, J. Williams et al., âRecent advances in deep learning for speech research at Microsoft,â in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, 2013, pp. 8604â8608. [12] F. Rahman and P. Devanbu, âHow, and why, process metrics are better,â in ICSE, 2013, pp. 432â441. [13] J. Ali, R. Khan, N. Ahmad, I. Maqsood, âRandom Forests and Decision Trees,â in International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3, September 2012. [14] R. Jindal, R. Malhotra, A. Jain, âSoftware Defect Prediction Using Neural Networks,â IEEE Conference 2014. [15] V. A. Kumar, N. Elavarasan, â A Survey on Dimensionality Reduction Technique,â in International Journal of Emerging Trends Technology in Computer Science, Volume 3, Issue 6, November-December 2014. [16] S. Mosci, L. Rosasco, A. Verri, âDimensionality Reduction and Gener- alization,â in the 24th International Conference on Machine Learning, Corvallis, OR, 2007. [17] N. Varghese, V. Verghese, Gayathri. P and Dr N. Jaisankar, âA Survey Of Dimensionality Reduction And Classification Methods,â in International Journal of Computer Science Engineering Survey, Vol.3, No.3, June 2012. [18] Q. Wang, âKernel Principal Component Analysis and its Applications in Face Recognition and Active Shape Models,â Rpi, Troy, NY, USA, 2011. Copyright 2011. [19] J. Hanley, BJ. McNeil, âThe meaning and use of the area under a Receiver Operating Characteristic ROC curveâ, Radiology, 143, 1982, pp. 29-36.
Download now