Automated Software Defect Prediction Using Machine Learning
|
|
- Russell Reed
- 6 years ago
- Views:
Transcription
1 Automated Software Defect Prediction Using Machine Learning Leandro L. Minku School of Computer Science University of Birmingham
2 Software Defect Prediction Software code is composed of several components.
3 Software Defect Prediction Testing all these components can be very expensive.
4 Software Defect Prediction If we know which components are likely to be defective, we can increase testing cost-effectiveness.
5 Software Defect Prediction Predictive models can be created to identify components likely to be defective by using past software releases and bug fixes as training data for learning machines. New release Learning Machine Components likely to be defective in the new release
6 Vectorising Past Projects Past projects need to be represented in a format suitable for learning machines. Example: vectorising components from past projects based on static code features. Quickly and automatically collected from the source code. Branch count Code + comment LOC Input features Halstead difficulty Cyclomatic complexity Target class... Defective? No No No Yes Yes
7 Naive Bayes: an example of learning machine Bayes theorem: Assuming independence: Naive bayes classifier:
8 How to Use Naive Bayes: an illustrative example Branch count Code + comment LOC Defective? 5 15 No 3 5 No 9 20 No Yes Yes Example: classify (bc = 16, loc = 39) P(C = No) = 3/5 = 0.6 P(bc = 16 No) = Gauss(x = 16, mean = 5.67 stdev = 3.06) = P(loc = 39 No) = Gauss(x = 39, mean = stdev = 10.41) = C = No --> 0.6 * * =
9 How to Use Naive Bayes: an illustrative example Branch count Code + comment LOC Defective? 5 15 No 3 5 No 9 20 No Yes Yes Example: classify (bc = 16, loc = 39) P(C = Yes) = 2/5 = 0.4 P(bc = 16 Yes) = Gauss(x = 16, mean = 15.5, stdev = 0.71) = P(loc = 39 Yes) = Gauss(x = 39, mean = 37.5, stdev = 3.53) = C = Yes --> 0.4 * * =
10 How to Use Naive Bayes: an illustrative example Branch count Code + comment LOC Defective? 5 15 No 3 5 No 9 20 No Yes Yes Example: classify (bc = 16, loc = 39) C = No --> 0.6 * * = C = Yes --> 0.4 * * = Class = Yes
11 WEKA Open source software that contains implementations of several learning machines.
12 Issues to Consider: class imbalance Image from the-impact-of-neurotransmitterimbalance/ The number of examples of faulty modules is usually much smaller than the number of non-faulty modules. Machine learners may tend to classify everything as negative! Possible fix: Undersample examples from non-faulty class. Other more advanced techniches. WANG, S.; MINKU, L. L.; YAO, X.. "Online Class Imbalance Learning and Its Applications in Fault Detection", International Journal of Computational Intelligence and Applications, 12(4): :1-19, 2013.
13 Issues to Consider: data availability Image from computer_fundamentals/computer_data.htm There is no data from a project before its first version is rolled out. How to predict defects for a project in its first version? Possible fix: Use data on other projects. MINKU, L. L.; YAO, X.; "How to Make Best Use of Cross-company Data in Software Effort Estimation?", Proceedings of the 36th International Conference on Software Engineering (ICSE'2014). NAM, J.; PAN, S.J.; KIM, S.."Transfer Defect Learning", Proceedings of the 35th International Conference on Software Engineering (ICSE'2013).
14 Issues to Consider: temporal behaviour Image from cio-priority-providing-data-time-people/ Typically, all available examples from all previous versions of a software are used to build fault prediction models. However, changes may happen from one version to the other: modules that are likely to be faulty in one version may not be faulty in another. Possible fix: Try and identify which previous versions are more useful. HARMAN, M.; ISLAM, S.; JIA, Y.; MINKU, L.; SARRO, F.; SRIVISUT, K.; "Less is More: Temporal fault predictive performance over multiple Hadoop releases", Symposium on Search-Based Software Engineering (SSBSE'2014).
15 Thank you! To appear in Dec 2014.
SNS College of Technology, Coimbatore, India
Support Vector Machine: An efficient classifier for Method Level Bug Prediction using Information Gain 1 M.Vaijayanthi and 2 M. Nithya, 1,2 Assistant Professor, Department of Computer Science and Engineering,
More informationEffect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction
International Journal of Computer Trends and Technology (IJCTT) volume 7 number 3 Jan 2014 Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction A. Shanthini 1,
More informationPerformance Evaluation of Various Classification Algorithms
Performance Evaluation of Various Classification Algorithms Shafali Deora Amritsar College of Engineering & Technology, Punjab Technical University -----------------------------------------------------------***----------------------------------------------------------
More informationPRIORITIZE REGRESSION TEST CASES
PRIORITIZE REGRESSION TEST CASES Avinash Gupta, 2 Dharmender Singh Kushwaha,2 MNNIT Allahabad Email: avinashg.mnnit@gmail.com, 2 dsk@mnnit.ac.in Abstract Test suites can be reduced to a smaller suite that
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Applying Machine Learning for Fault Prediction Using Software
More informationSOFTWARE DEFECT PREDICTION USING PARTICIPATION OF NODES IN SOFTWARE COUPLING
SOFTWARE DEFECT PREDICTION USING PARTICIPATION OF NODES IN SOFTWARE COUPLING 1 MARYAM SHEKOFTEH, 2 KEYVAN MOHEBBI, 3 JAVAD KAMYABI 1 Department Of Computer Engineering, Sarvestan Branch, Islamic Azad University,
More informationModel s Performance Measures
Model s Performance Measures Evaluating the performance of a classifier Section 4.5 of course book. Taking into account misclassification costs Class imbalance problem Section 5.7 of course book. TNM033:
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue5,May-2017 Software Fault Detection using
More informationA HYBRID FEATURE SELECTION MODEL FOR SOFTWARE FAULT PREDICTION
A HYBRID FEATURE SELECTION MODEL FOR SOFTWARE FAULT PREDICTION C. Akalya devi 1, K. E. Kannammal 2 and B. Surendiran 3 1 M.E (CSE), Sri Shakthi Institute of Engineering and Technology, Coimbatore, India
More informationSoftware Metrics. Lines of Code
Software Metrics Naveed Arshad Lines of Code The total number of lines of executable code in the software program or module being measured But lines of code could mean anything e.g. count only executable
More informationManaging Open Bug Repositories through Bug Report Prioritization Using SVMs
Managing Open Bug Repositories through Bug Report Prioritization Using SVMs Jaweria Kanwal Quaid-i-Azam University, Islamabad kjaweria09@yahoo.com Onaiza Maqbool Quaid-i-Azam University, Islamabad onaiza@qau.edu.pk
More informationEffective Estimation of Modules Metrics in Software Defect Prediction
Effective Estimation of Modules Metrics in Software Defect Prediction S.M. Fakhrahmad, A.Sami Abstract The prediction of software defects has recently attracted the attention of software quality researchers.
More informationAUTOMATION AND EVALUATION OF SOFTWARE FAULT PREDICTION
School of Innovation Design and Engineering Västerås, Sweden Thesis for the Degree of Master of Science in Engineering - Software Engineering 15.0 credits AUTOMATION AND EVALUATION OF SOFTWARE FAULT PREDICTION
More informationIEE 520 Data Mining. Project Report. Shilpa Madhavan Shinde
IEE 520 Data Mining Project Report Shilpa Madhavan Shinde Contents I. Dataset Description... 3 II. Data Classification... 3 III. Class Imbalance... 5 IV. Classification after Sampling... 5 V. Final Model...
More informationPrest: An Intelligent Software Metrics Extraction, Analysis and Defect Prediction Tool
Prest: An Intelligent Software Metrics Extraction, Analysis and Defect Prediction Tool Ekrem Kocagüneli 1, Ayşe Tosun 1, Ayşe Bener 1, Burak Turhan 2, Bora Çağlayan 1 1 Software Research Laboratory (Softlab),
More informationEvolving Human Competitive Research Spectra-Based Note Fault Localisation Techniques
UCL DEPARTMENT OF COMPUTER SCIENCE Research Note RN/12/03 Evolving Human Competitive Research Spectra-Based Note Fault Localisation Techniques RN/17/07 Deep Parameter Optimisation for Face Detection Using
More informationSoftware Defect Prediction System Decision Tree Algorithm With Two Level Data Preprocessing
Software Defect Prediction System Decision Tree Algorithm With Two Level Data Preprocessing Reena P Department of Computer Science and Engineering Sree Chitra Thirunal College of Engineering Thiruvananthapuram,
More informationOverview of SBSE. CS454, Autumn 2017 Shin Yoo
Overview of SBSE CS454, Autumn 2017 Shin Yoo Search-Based Software Engineering Application of all the optimisation techniques we have seen so far, to the various problems in software engineering. Not web
More informationData Mining Classification: Alternative Techniques. Imbalanced Class Problem
Data Mining Classification: Alternative Techniques Imbalanced Class Problem Introduction to Data Mining, 2 nd Edition by Tan, Steinbach, Karpatne, Kumar Class Imbalance Problem Lots of classification problems
More informationSOFTWARE PRODUCT QUALITY SOFTWARE ENGINEERING SOFTWARE QUALITY SOFTWARE QUALITIES - PRODUCT AND PROCESS SOFTWARE QUALITY - QUALITY COMPONENTS
SOFTWARE PRODUCT QUALITY Today: - Software quality - Quality Components - Good software properties SOFTWARE ENGINEERING SOFTWARE QUALITY Today we talk about quality - but what is quality? Suitable Fulfills
More informationMACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS
MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS N. Kannadhasan and B. Uma Maheswari Department of Master of Computer Applications St. Joseph s College of Engineering, Chennai,
More informationAnale. Seria Informatică. Vol. XVI fasc Annals. Computer Science Series. 16 th Tome 1 st Fasc. 2018
Anale. Seria Informatică. Vol. XVI fasc. Annals. Computer Science Series. th Tome st Fasc. PERFORMANCE EVALUATION OF IMPROVED COGNITIVE COMPLEXITY METRIC AND OTHER CODE BASED COMPLEXITY METRICS Esther
More informationFault-tolerant in wireless sensor networks using fuzzy logic
International Research Journal of Applied and Basic Sciences 2014 Available online at www.irjabs.com ISSN 2251-838X / Vol, 8 (9): 1276-1282 Science Explorer Publications Fault-tolerant in wireless sensor
More informationFeature Selection and Revision of Optimisation Problems
CO3091 - Computational Intelligence and Software Engineering Lecture 26 Image from: http://vignette1.wikia.nocookie.net/pirates/images/3/38/fight_on_isla_de_muerta_16.png/revision/latest?cb=20110702154006
More informationPackage ebmc. August 29, 2017
Type Package Package ebmc August 29, 2017 Title Ensemble-Based Methods for Class Imbalance Problem Version 1.0.0 Author Hsiang Hao, Chen Maintainer ``Hsiang Hao, Chen'' Four ensemble-based
More informationSoftware Defect Prediction Using Static Code Metrics Underestimates Defect-Proneness
Software Defect Prediction Using Static Code Metrics Underestimates Defect-Proneness David Gray, David Bowes, Neil Davey, Yi Sun and Bruce Christianson Abstract Many studies have been carried out to predict
More informationERA -An Enhanced Ripper Algorithm to Improve Accuracy in Software Fault Prediction
ERA -An Enhanced Ripper Algorithm to Improve Accuracy in Software Fault Prediction N.Vinothini # 1 (Research Scholar) School Of Computer Science and Engineering, Bharathidasan University, Tiruchirappalli,
More information1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake
Sample ISTQB examination 1 Visible deviation from the specification or expected behavior for end-user is called: a) an error b) a fault c) a failure d) a defect e) a mistake 2 Regression testing should
More informationEvolutionary Decision Trees and Software Metrics for Module Defects Identification
World Academy of Science, Engineering and Technology 38 008 Evolutionary Decision Trees and Software Metrics for Module Defects Identification Monica Chiş Abstract Software metric is a measure of some
More informationPredicting Source Code Quality with Static Analysis and Machine Learning. Vera Barstad, Morten Goodwin, Terje Gjøsæter
Predicting Source Code Quality with Static Analysis and Machine Learning Vera Barstad, Morten Goodwin, Terje Gjøsæter Faculty of Engineering and Science, University of Agder Serviceboks 509, NO-4898 Grimstad,
More informationAdaptive Supersampling Using Machine Learning Techniques
Adaptive Supersampling Using Machine Learning Techniques Kevin Winner winnerk1@umbc.edu Abstract Previous work in adaptive supersampling methods have utilized algorithmic approaches to analyze properties
More informationCS145: INTRODUCTION TO DATA MINING
CS145: INTRODUCTION TO DATA MINING 08: Classification Evaluation and Practical Issues Instructor: Yizhou Sun yzsun@cs.ucla.edu October 24, 2017 Learnt Prediction and Classification Methods Vector Data
More informationSoftware Testing. Lecturer: Sebastian Coope Ashton Building, Room G.18
Lecturer: Sebastian Coope Ashton Building, Room G.18 E-mail: coopes@liverpool.ac.uk COMP 201 web-page: http://www.csc.liv.ac.uk/~coopes/comp201 Software Testing 1 Defect Testing Defect testing involves
More informationAerospace Software Engineering
16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated
More informationNETWORK FAULT DETECTION - A CASE FOR DATA MINING
NETWORK FAULT DETECTION - A CASE FOR DATA MINING Poonam Chaudhary & Vikram Singh Department of Computer Science Ch. Devi Lal University, Sirsa ABSTRACT: Parts of the general network fault management problem,
More informationUsing the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics
Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics David Gray, David Bowes, Neil Davey, Yi Sun and Bruce Christianson Science and Technology
More informationFurther Thoughts on Precision
Further Thoughts on Precision David Gray, David Bowes, Neil Davey, Yi Sun and Bruce Christianson Abstract Background: There has been much discussion amongst automated software defect prediction researchers
More informationCLASSIFYING SOFTWARE FAULTS THROUGH BOOLEAN CLASSIFICATION MODEL BASED ON DISCRETIZED DEFECT DATASETS
CLASSIFYING SOFTWARE FAULTS THROUGH BOOLEAN CLASSIFICATION MODEL BASED ON DISCRETIZED DEFECT DATASETS Pooja Kapoor 1, Deepak Arora 1 and Ashwani Kumar 2 1 Department of Computer Science and Engineering,
More informationThe class imbalance problem
The class imbalance problem In the Caravan data, there is only 6% of positive samples among 5822 and we found KNN, Logistic model, and LDA cannot beat the naive classifier that labels every case negative,
More informationRequirements satisfied : Result Vector : Final : Matrix M. Test cases. Reqmts
Introduction Control flow/data flow widely studied No definitive answer to effectiveness Not widely accepted Quantitative measure of adequacy criteria Effectiveness Whether cost of testing methods is justified
More informationSTUDYING OF CLASSIFYING CHINESE SMS MESSAGES
STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2
More informationFiltering Bug Reports for Fix-Time Analysis
Filtering Bug Reports for Fix-Time Analysis Ahmed Lamkanfi, Serge Demeyer LORE - Lab On Reengineering University of Antwerp, Belgium Abstract Several studies have experimented with data mining algorithms
More informationMeasurement. Joseph Spring. Based on Software Metrics by Fenton and Pfleeger
Measurement Joseph Spring Based on Software Metrics by Fenton and Pfleeger Discussion Measurement Direct and Indirect Measurement Measurements met so far Measurement Scales and Types of Scale Measurement
More informationFault Identification from Web Log Files by Pattern Discovery
ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Fault Identification from Web Log Files
More informationSoftware Quality Assurance. David Janzen
Software Quality Assurance David Janzen What is quality? Crosby: Conformance to requirements Issues: who establishes requirements? implicit requirements Juran: Fitness for intended use Issues: Who defines
More informationOPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM
OPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM XIAO-DONG ZENG, SAM CHAO, FAI WONG Faculty of Science and Technology, University of Macau, Macau, China E-MAIL: ma96506@umac.mo, lidiasc@umac.mo,
More informationFeature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process
Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process KITTISAK KERDPRASOP and NITTAYA KERDPRASOP Data Engineering Research Unit, School of Computer Engineering, Suranaree
More informationMeasuring Complexity
Measuring Complexity outline why should we measure the complexity of a software system? what might we want to measure? complexity of the source code within a code module between code modules complexity
More informationSOFTWARE DEFECT PREDICTION USING IMPROVED SUPPORT VECTOR MACHINE CLASSIFIER
International Journal of Mechanical Engineering and Technology (IJMET) Volume 7, Issue 5, September October 2016, pp.417 421, Article ID: IJMET_07_05_041 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=7&itype=5
More informationLocating Faults Through Automated Predicate Switching
Locating Faults Through Automated Predicate Switching Authored by Xiangyu Zhang, Neelam Gupta, Rajiv Gupta The University of Arizona ICSE 2006 Presented by Jing Pu Authors 1 Neelam Gupta The University
More informationCluster Based detection of Attack IDS using Data Mining
Cluster Based detection of Attack IDS using Data Mining 1 Manisha Kansra, 2 Pankaj Dev Chadha 1 Research scholar, 2 Assistant Professor, 1 Department of Computer Science Engineering 1 Geeta Institute of
More informationArtificial Neural Networks (Feedforward Nets)
Artificial Neural Networks (Feedforward Nets) y w 03-1 w 13 y 1 w 23 y 2 w 01 w 21 w 22 w 02-1 w 11 w 12-1 x 1 x 2 6.034 - Spring 1 Single Perceptron Unit y w 0 w 1 w n w 2 w 3 x 0 =1 x 1 x 2 x 3... x
More informationCombination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset
International Journal of Computer Applications (0975 8887) Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset Mehdi Naseriparsa Islamic Azad University Tehran
More informationTheoretical Foundations of SBSE. Xin Yao CERCIA, School of Computer Science University of Birmingham
Theoretical Foundations of SBSE Xin Yao CERCIA, School of Computer Science University of Birmingham Some Theoretical Foundations of SBSE Xin Yao and Many Others CERCIA, School of Computer Science University
More informationAN EMPIRICAL EVALUATION OF IMPACT OF REFACTORING ON INTERNAL AND EXTERNAL MEASURES OF CODE QUALITY
AN EMPIRICAL EVALUATION OF IMPACT OF REFACTORING ON INTERNAL AND EXTERNAL MEASURES OF CODE QUALITY S.H. Kannangara 1 and W.M.J.I. Wijayanake 2 1 School of Computing, National School of Business Management,
More informationFAULT TOLERANCE. Fault Tolerant Systems. Faults Faults (cont d)
Distributed Systems Fö 9/10-1 Distributed Systems Fö 9/10-2 FAULT TOLERANCE 1. Fault Tolerant Systems 2. Faults and Fault Models. Redundancy 4. Time Redundancy and Backward Recovery. Hardware Redundancy
More informationPredicting Fault-Prone Software Modules with Rank Sum Classification
2013 22nd Australian Conference on Software Engineering Predicting Fault-Prone Software Modules with Rank Sum Classification Jaspar Cahill, James M. Hogan and Richard Thomas School of EECS, Faculty of
More informationImproving Naïve Bayes Classifier for Software Architecture Reconstruction
Improving Naïve Bayes Classifier for Software Architecture Reconstruction Zahra Sadri Moshkenani Faculty of Computer Engineering Najafabad Branch, Islamic Azad University Isfahan, Iran zahra_sadri_m@sco.iaun.ac.ir
More informationImpact of Dependency Graph in Software Testing
Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,
More informationUse of Source Code Similarity Metrics in Software Defect Prediction
1 Use of Source Code Similarity Metrics in Software Defect Prediction Ahmet Okutan arxiv:1808.10033v1 [cs.se] 29 Aug 2018 Abstract In recent years, defect prediction has received a great deal of attention
More informationPotential-fault Cache-based Regression Test Selection
Potential-fault Cache-based Regression Test Selection Samia Hafez Computer and Systems Faculty of Engineering Alexandria University Alexandria, Egypt, 21544. s.hafez@alexu.edu.eg Mustafa ElNainay Computer
More informationTutorial Case studies
1 Topic Wrapper for feature subset selection Continuation. This tutorial is the continuation of the preceding one about the wrapper feature selection in the supervised learning context (http://data-mining-tutorials.blogspot.com/2010/03/wrapper-forfeature-selection.html).
More informationSoftware Metrics Reduction for Fault-Proneness Prediction of Software Modules
Software Metrics Reduction for Fault-Proneness Prediction of Software Modules Yunfeng Luo, Kerong Ben, and Lei Mi Department of Computer Engineering Navy University of Engineering Wuhan, China hehelyf@gmail.com,
More informationEmpirical Study on Impact of Developer Collaboration on Source Code
Empirical Study on Impact of Developer Collaboration on Source Code Akshay Chopra University of Waterloo Waterloo, Ontario a22chopr@uwaterloo.ca Parul Verma University of Waterloo Waterloo, Ontario p7verma@uwaterloo.ca
More informationA PSO-based Generic Classifier Design and Weka Implementation Study
International Forum on Mechanical, Control and Automation (IFMCA 16) A PSO-based Generic Classifier Design and Weka Implementation Study Hui HU1, a Xiaodong MAO1, b Qin XI1, c 1 School of Economics and
More informationStudy on Classifiers using Genetic Algorithm and Class based Rules Generation
2012 International Conference on Software and Computer Applications (ICSCA 2012) IPCSIT vol. 41 (2012) (2012) IACSIT Press, Singapore Study on Classifiers using Genetic Algorithm and Class based Rules
More informationarxiv: v1 [cond-mat.dis-nn] 30 Dec 2018
A General Deep Learning Framework for Structure and Dynamics Reconstruction from Time Series Data arxiv:1812.11482v1 [cond-mat.dis-nn] 30 Dec 2018 Zhang Zhang, Jing Liu, Shuo Wang, Ruyue Xin, Jiang Zhang
More informationA Feature Selection Method to Handle Imbalanced Data in Text Classification
A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University
More informationComPARE: A Generic Quality Assessment Environment for Component-Based Software Systems
ComPARE: A Generic Quality Assessment Environment for Component-Based Software Systems Xia Cai, Michael R. Lyu, Kam-Fai Wong, Mabel Wong Dept. of Computer Science and Engineering Center of Innovation and
More informationFPGA Based Distributed Network Intrusion Detection in Smart Grids Using Naives Bayes Classifier
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 747-752 International Research Publications House http://www. irphouse.com FPGA Based Distributed
More informationA METRIC BASED EVALUATION OF TEST CASE PRIORITATION TECHNIQUES- HILL CLIMBING, REACTIVE GRASP AND TABUSEARCH
A METRIC BASED EVALUATION OF TEST CASE PRIORITATION TECHNIQUES- HILL CLIMBING, REACTIVE GRASP AND TABUSEARCH 1 M.Manjunath, 2 N.Backiavathi 1 PG Scholar, Department of Information Technology,Jayam College
More informationA New Pool Control Method for Boolean Compressed Sensing Based Adaptive Group Testing
Proceedings of APSIPA Annual Summit and Conference 27 2-5 December 27, Malaysia A New Pool Control Method for Boolean Compressed Sensing Based Adaptive roup Testing Yujia Lu and Kazunori Hayashi raduate
More informationA Case Study on the Similarity Between Source Code and Bug Reports Vocabularies
A Case Study on the Similarity Between Source Code and Bug Reports Vocabularies Diego Cavalcanti 1, Dalton Guerrero 1, Jorge Figueiredo 1 1 Software Practices Laboratory (SPLab) Federal University of Campina
More informationFrom network-level measurements to expected Quality of Experience. the Skype use case
From network-level measurements to expected Quality of Experience the Skype use case 2015 IEEE 2015 International IEEE International Workshop Workshop on Measurements on Measurements & Networking & Networking
More informationDetecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data
Detecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data Lingfeng Zhang and Philip K. Chan Florida Institute of Technology, Melbourne, FL 32901 lingfeng2013@my.fit.edu, pkc@cs.fit.edu
More informationSoftware Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2
IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2
More informationDeep Learning & Accelerating the NLP Journey in the Unstructured World
Deep Learning & Accelerating the NLP Journey in the Unstructured World Jenny Chong, Global Head of ecommunications Surveillance Shahzad Chohan, Global Head of Machine Intelligence and Accelerated Computing
More informationThe Extreme Value Theorem (IVT)
3.1 3.6 old school 1 Extrema If f(c) f(x) (y values) for all x on an interval, then is the (value) of f(x) (the function) on that interval. If f(c) f(x) (y-values) for all x on an interval, then is the
More informationTemporal Decision Trees for Diagnosis
Dipartimento di Informatica Model-Based Diagnosis Model = description of a system to be diagnosed objective description. usually component oriented. may describe only correct behaviour or both correct
More informationMining Frequent Bug-Fix Code Changes
Mining Frequent Bug-Fix Code Changes Haidar Osman, Mircea Lungu, Oscar Nierstrasz Software Composition Group University of Bern Bern, Switzerland {osman, lungu, oscar@iam.unibe.ch Abstract Detecting bugs
More informationA study of classification algorithms using Rapidminer
Volume 119 No. 12 2018, 15977-15988 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A study of classification algorithms using Rapidminer Dr.J.Arunadevi 1, S.Ramya 2, M.Ramesh Raja
More informationREMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More information2015, IJARCSSE All Rights Reserved Page 31
Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Procedural Cognitive
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 213 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Modelling of
More information3 Virtual attribute subsetting
3 Virtual attribute subsetting Portions of this chapter were previously presented at the 19 th Australian Joint Conference on Artificial Intelligence (Horton et al., 2006). Virtual attribute subsetting
More informationSource Code Reuse Evaluation by Using Real/Potential Copy and Paste
Source Code Reuse Evaluation by Using Real/Potential Copy and Paste Takafumi Ohta, Hiroaki Murakami, Hiroshi Igaki, Yoshiki Higo, and Shinji Kusumoto Graduate School of Information Science and Technology,
More informationEarly Prediction of Software Fault-Prone Module using Artificial Neural Network
International Journal of Performability Engineering Vol. 11, No. 1, January 2015, pp. 43-52. RAMS Consultants Printed in India Early Prediction of Software Fault-Prone Module using Artificial Neural Network
More informationOPTIMIZED TEST GENERATION IN SEARCH BASED STRUCTURAL TEST GENERATION BASED ON HIGHER SERENDIPITOUS COLLATERAL COVERAGE
Volume 115 No. 7 2017, 549-554 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu OPTIMIZED TEST GENERATION IN SEARCH BASED STRUCTURAL TEST GENERATION
More informationLonger is Better: On the Role of Test Sequence Length in Software Testing
Longer is Better: On the Role of Test Sequence Length in Software Testing Andrea Arcuri The School of Computer Science, The University of Birmingham, Edgbaston, Birmingham B15 2TT, UK. Email: a.arcuri@cs.bham.ac.uk
More informationIntroduction to Automated Text Analysis. bit.ly/poir599
Introduction to Automated Text Analysis Pablo Barberá School of International Relations University of Southern California pablobarbera.com Lecture materials: bit.ly/poir599 Today 1. Solutions for last
More informationComparing Software Abstractions Baby Steps. Michael Hansen Lab Lunch Talk 2011
Comparing Software Abstractions Baby Steps Michael Hansen Lab Lunch Talk 2011 Comparing Abstractions Need objective comparison method Libraries (OpenGL vs. Direct3D) Language constructs ( -expressions,
More informationObject Oriented Design Metrics for Predicting Fault Proneness using Naïve Bayes and Random Forest
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Object Oriented Design Metrics for Predicting Fault Proneness using Naïve Bayes and Random Forest Vaishnavi.J 1, Anousouya
More informationA Survey And Comparative Analysis Of Data
A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th
More informationDistress Image Library for Precision and Bias of Fully Automated Pavement Cracking Survey
Distress Image Library for Precision and Bias of Fully Automated Pavement Cracking Survey Kelvin C.P. Wang, Ran Ji, and Cheng Chen kelvin.wang@okstate.edu Oklahoma State University/WayLink School of Civil
More informationMTAT Software Engineering. Written Exam 10 January Start: 9:15 End: 11:45
MTAT.03.094 Software Engineering Written Exam 10 January 2014 Start: 9:15 End: 11:45 Important Notes: The exam is open book and open laptop. Web browsing is allowed, but you are not allowed to use e mail
More informationBug or Not? Bug Report Classification using N-Gram IDF
Bug or Not? Bug Report Classification using N-Gram IDF Pannavat Terdchanakul 1, Hideaki Hata 1, Passakorn Phannachitta 2, and Kenichi Matsumoto 1 1 Graduate School of Information Science, Nara Institute
More informationA Case Study of Black-Box Testing for Embedded Software using Test Automation Tool
Journal of Computer Science 3 (3): 1-1, 7 ISSN 159-33 7 Science Publications A Case Study of Black-Box Testing for Embedded Software using Test Automation Tool 1 Changhyun Baek, Joongsoon Jang, 3 Gihyun
More informationANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS
ANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS MR. S. PASUPATHY 1 AND DR. R. BHAVANI 2 1 Associate Professor, Dept. of CSE, FEAT, Annamalai University, Tamil Nadu, India. 2 Professor,
More informationMonte Carlo Methods; Combinatorial Search
Monte Carlo Methods; Combinatorial Search Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico November 22, 2012 CPD (DEI / IST) Parallel and
More informationKarami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings.
Online Review Spam Detection by New Linguistic Features Amir Karam, University of Maryland Baltimore County Bin Zhou, University of Maryland Baltimore County Karami, A., Zhou, B. (2015). Online Review
More information