Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Improving Intelligence Metrics using Frequency Domain Convolutions for Improving Bug Prediction

Author(s): Anurag Mishra* and Ashish Sharma

Volume 16, Issue 8, 2023

Published on: 07 July, 2023

Page: [825 - 835] Pages: 11

DOI: 10.2174/2352096516666230516114420

Price: $65

Abstract

Background: The novelty of the work lies in the formulation of these frequency-based generators, which reflects the lowest level of information loss in the intermediate calculations. The core idea behind the approach presented in this work is that a module with complex logic involved may have more probability of bugs. Software defect prediction is the area of research that enables the development and operations team to have the probability of bug proneness of the software. Many researchers have deployed multiple variations of machine learning and deep learning algorithms to achieve better accuracy and more insights into predictions.

Objective: To prevent this fractional data loss from different derived metrics generations, a few optimal transformational engines capable of carrying forward formulations based on lossless computations have been deployed.

Methods: A model Sodprhym has been developed to model refined metrics. Then, using some classical machine learning algorithms, accuracy measures have been observed and compared with the recently published results, which used the same datasets and prediction techniques.

Results: The teams could establish watchdogs thanks to the automated detection, but it also gave them time to reflect on any potentially troublesome modules. For quality assurance teams, it has therefore become a crucial step. Software defect prediction looks forward to evaluating error-prone modules likely to contain bugs.

Conclusion: Prior information can definitely align the teams with deploying more and more quality assurance checks on predicted modules. Software metrics are the most important component for defect prediction if we consider the different underlying aspects that define the defective module. Later we deployed our refined approach in which we targeted the metrics to be considered.

Graphical Abstract

[1]
M. Sullivan, and R. Chillarege, "Software defects and their impact on system availability-a study of field failures in operating systems", In The Twenty-First International Symposium, Montreal, QC, Canada, 1991, pp. 2-9
[http://dx.doi.org/10.1109/FTCS.1991.146625]
[2]
N.E. Fenton, and M. Neil, "Software metrics: Roadmap", In ICSE ’00: Proceedings of the Conference on The Future of Software Engineering, New York, NY, United States, 2000, pp. 357-370
[http://dx.doi.org/10.1145/336512.336588]
[3]
J. Wilsdon, "The Metric Tide: Independent Review of the Role of Metrics in Research, SAGE Publication",
[4]
M. D’Ambros, M. Lanza, and R. Robbes, "An extensive comparison of bug prediction approaches", In 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), 02-03 May, 2010, Cape Town, South Africa, 2010, pp. 31-41
[http://dx.doi.org/10.1109/MSR.2010.5463279]
[5]
M. D’Ambros, M. Lanza, and R. Robbes, "Evaluating defect prediction approaches: A benchmark and an extensive comparison", Empir. Softw. Eng., vol. 17, no. 4-5, pp. 531-577, 2012.
[http://dx.doi.org/10.1007/s10664-011-9173-9]
[6]
E. Giger, M. D’Ambros, M. Pinzger, and H.C. Gall, "Method-level bug prediction", In Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, New York, NY, United States, 2012, pp. 171-180
[http://dx.doi.org/10.1145/2372251.2372285]
[7]
A.E. Hassan, "Predicting faults using the complexity of code changes", In Proceedings of the 31st International Conference on Software Engineering, ICSE ’09, 16-24 May 2009, Vancouver, BC, Canada, 2009, pp. 78-88
[http://dx.doi.org/10.1109/ICSE.2009.5070510]
[8]
A.E. Hassan, and R.C. Holt, "The top ten list: Dynamic fault prediction", In 21st IEEE International Conference on Software Maintenance (ICSM’05), 16-24 May, 2009, Budapest, Hungary, 2005, pp. 263-272
[http://dx.doi.org/10.1109/ICSM.2005.91]
[9]
H. Hata, O. Mizuno, and T. Kikuno, "Bug prediction based on fine-grained module histories", In Proceedings of the 34th International Conference on Software Engineering (ICSE ’12), 02-09 Jun, 2012, Zurich, Switzerland, 2012, pp. 200-210
[http://dx.doi.org/10.1109/ICSE.2012.6227193]
[10]
T. Jiang, L. Tan, and S. Kim, "Personalized defect prediction", In Automated Software Engineering (ASE), 2013 IEEE/ACM 28th International Conference on., 11-15 Nov, 2013, Silicon Valley, CA, USA, 2013.
[http://dx.doi.org/10.1109/ASE.2013.6693087]
[11]
S. Kim, T. Zimmermann, E.J. Whitehead Jr, and A. Zeller, "Predicting faults from cached history", In Proceedings of the 29th international conference on Software Engineering (ICSE ’07), 20-26 May 2007, Minneapolis, MN, USA, 2007, pp. 489-498
[http://dx.doi.org/10.1109/ICSE.2007.66]
[12]
R. Moser, W. Pedrycz, and G. Succi, "A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction", In Proceedings of the 30th international conference on Software engineering (ICSE ’08), Association for Computing Machinery, 10 May, 2008, New York, NY, USA, 2008, pp. 181-190
[http://dx.doi.org/10.1145/1368088.1368114]
[13]
F. Rahman, and P. Devanbu, "Ownership, experience and defects: a fine-grained study of authorship", In Proceedings of the 33rd International Conference on Software Engineering (ICSE ’11), Association for Computing Machinery, 21 May, 2011, New York, NY, USA, 2011, pp. 491-500
[http://dx.doi.org/10.1145/1985793.1985860]
[14]
F. Rahman, and P. Devanbu, "How, and why, process metrics are better", In Proceedings of the 2013 International Conference on Software Engineering (ICSE ’13), May 18 - 26, 2013, San Francisco CA USA, 2013, pp. 432-441
[15]
S.R. Chidamber, and C.F. Kemerer, A metrics suite for object oriented design, TSE’94., IEEE, 1994.
[16]
C. Shan, B. Chen, C. Hu, J. Xue, and N. Li, "Software defect prediction model based on LLE and SVM", In 2014 Communications Security Conference (CSC 2014), 22-24 May 2014, Beijing, 2014, pp. 1-5
[http://dx.doi.org/10.1049/cp.2014.0749]
[17]
F. Shull, "What we have learned about fighting defects", In Proceedings Eighth IEEE Symposium on Software Metrics, 04-07 June, 2002, Ottawa, ON, Canada, 2002, pp. 249-258
[http://dx.doi.org/10.1109/METRIC.2002.1011343]
[18]
S.I. Ayon, "Neural Network based Software Defect Prediction using Genetic Algorithm and Particle Swarm Optimization", In 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), 03-05 May 2019, Dhaka, Bangladesh, 2019, pp. 1-4
[http://dx.doi.org/10.1109/ICASERT.2019.8934642]
[19]
C. Thirumalai, R.R. Shridharshan, and L.R. Reynold, "An assessment of halstead and COCOMO model for effort estimation", In 2017 Innovations in Power and Advanced Computing Technologies (i- PACT)., 21-22 April, 2017, Vellore: India, 2017, pp. 1-4
[http://dx.doi.org/10.1109/IPACT.2017.8245069]
[20]
A. Bacchelli, M. D’Ambros, and M. Lanza, "Are popular classes more defect prone?", In Proceedings of the 13th International Conference on Fundamental Approaches to Software Engineering, FASE’10, 21-22 Apr, 2017, Berlin, Heidelberg, 2017, pp. 59-73
[http://dx.doi.org/10.1007/978-3-642-12029-9_5]
[21]
C. Bird, N. Nagappan, B. Murphy, H. Gall, and P. Devanbu, "Don’t touch my code!: Examining the effects of ownership on software quality", In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC/FSE ’11, 9 Sept, 2011, New York, NY, USA, 2011, pp. 4-14
[http://dx.doi.org/10.1145/2025113.2025119]
[22]
T. Lee, J. Nam, D. Han, S. Kim, and I.P. Hoh, "Micro interaction metrics for defect prediction", In FSE-19: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, Aug 26 - 30, 2019, New York, NY, United States, 2011.
[23]
T. Menzies, J. Greenwald, and A. Frank, "Data mining static code attributes to learn defect predictors", IEEE Trans. Softw. Eng., vol. 33, no. 1, pp. 2-13, 2007.
[http://dx.doi.org/10.1109/TSE.2007.256941]
[24]
N. Nagappan, and T. Ball, "Use of relative code churn measures to predict system defect density", In Proceedings of the 27th international conference on Software engineering, ICSE ’05, 15-21 May, 2005, St. Louis, MO, USA, 2005, pp. 284-292
[25]
F. Akiyama, "An example of software system debugging", In Proceedings of the International Federation of Information Processing Societies Congress, 1971, pp. 353-359
[26]
T. McCabe, "A complexity measure", IEEE Transactions on Software Engineering, vol. SE-2, no. 4, 1976.
[http://dx.doi.org/10.1109/TSE.1976.233837]
[27]
M.H. Halstead, "Elements of Software Science (Operating and Programming Systems Series)", Elsevier Science Inc.: New York, NY, USA, 1977.
[28]
N. Fenton, and M. Neil, "A critique of software defect prediction models", IEEE Trans. Softw. Eng., vol. 25, no. 5, pp. 675-689, 1999.
[http://dx.doi.org/10.1109/32.815326]
[29]
V.Y. Shen, Yu Tze-jie, S.M. Thebaut, and L.R. Paulsen, "Identifying error-prone software an empirical study", IEEE Trans. Softw. Eng., vol. SE-11, no. 4, pp. 317-324, 1985.
[http://dx.doi.org/10.1109/TSE.1985.232222]
[30]
J.C. Munson, and T.M. Khoshgoftaar, "The detection of fault-prone programs", IEEE Trans. Softw. Eng., vol. 18, no. 5, pp. 423-433, 1992.
[http://dx.doi.org/10.1109/32.135775]
[31]
V.R. Basili, L.C. Briand, and W.L. Melo, "A validation of object-oriented design metrics as quality indicators", IEEE Trans. Softw. Eng., vol. 22, no. 10, pp. 751-761, 1996.
[http://dx.doi.org/10.1109/32.544352]
[32]
S.R. Chidamber, and C.F. Kemerer, "A metrics suite for object oriented design", IEEE Trans. Softw. Eng., vol. 20, no. 6, pp. 476-493, 1994.
[http://dx.doi.org/10.1109/32.295895]
[33]
M. D’Ambros, M. Lanza, and R. Robbes, "An extensive comparison of bug prediction approaches", In Mining Software Repositories (MSR), 02-03 May, 2010, Cape Town, South Africa, 2010, pp. 31-41
[http://dx.doi.org/10.1109/MSR.2010.5463279]
[34]
R. Moser, W. Pedrycz, and G. Succi, "A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction", In Proceedings of the 30th international conference on Software engineering, ICSE ’08, 10 May, 2008, New York, NY, United States, 2008, pp. 181-190
[http://dx.doi.org/10.1145/1368088.1368114]
[35]
F. Rahman, D. Posnett, A. Hindle, E. Barr, and P. Devanbu, "Bugcache for inspections: Hit or miss?", In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC/FSE ’11, 9 Sept, 2011, New York, NY, United States, 2011, pp. 322-331
[36]
A. Mockus, and L.G. Votta, "Identifying reasons for software changes using historic databases", In Proceedings of the International Conference on Software Maintenance, 11-14 Oct, 2000, San Jose, CA, USA, 2000, pp. 120-130
[http://dx.doi.org/10.1109/ICSM.2000.883028]
[37]
T. Fukushima, Y. Kamei, S. McIntosh, K. Yamashita, and N. Ubayashi, "An empirical study of just-in-time defect prediction using cross- project models", In Proceedings of the 11th Working Conference on Mining Software Repositories, MSR 2014, 31 May, 2014, New York, NY, USA, 2014, pp. 172-181
[http://dx.doi.org/10.1145/2597073.2597075]
[38]
Y. Kamei, E. Shihab, B. Adams, A.E. Hassan, A. Mockus, A. Sinha, and N. Ubayashi, "A large-scale empirical study of just-in-time quality assurance", IEEE Trans. Softw. Eng., vol. 39, no. 6, pp. 757-773, 2013.
[http://dx.doi.org/10.1109/TSE.2012.70]
[39]
S. Kim, E.J. Whitehead Jr, and Y. Zhang, "Classifying software changes: Clean or buggy?", IEEE Trans. Softw. Eng., vol. 34, no. 2, pp. 181-196, 2008.
[http://dx.doi.org/10.1109/TSE.2007.70773]
[40]
T. Zimmermann, N. Nagappan, H. Gall, E. Giger, and B. Murphy, "Cross-project defect prediction: a large scale experiment on data vs. domain vs. process", In Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, ESEC/FSE ’09, 24 August 2009, New York, NY, USA, 2009, pp. 91-100
[http://dx.doi.org/10.1145/1595696.1595713]
[41]
Y. Ma, G. Luo, X. Zeng, and A. Chen, "Transfer learning for cross-company software defect prediction", Inf. Softw. Technol., vol. 54, no. 3, pp. 248-256, 2012.
[http://dx.doi.org/10.1016/j.infsof.2011.09.007]
[42]
J. Nam, S.J. Pan, and S. Kim, "Transfer defect learning", In Proceedings of the 2013 International Conference on Software Engineering, ICSE ’13, 18 May, 2013, Piscataway, NJ, USA, 2013, pp. 382-391
[43]
B. Turhan, T. Menzies, A.B. Bener, and J. Di Stefano, "On the relative value of cross-company and within-company data for defect prediction", Empir. Softw. Eng., vol. 14, no. 5, pp. 540-578, 2009.
[http://dx.doi.org/10.1007/s10664-008-9103-7]
[44]
S. Watanabe, H. Kaiya, and K. Kaijiri, "Adapting a fault prediction model to allow inter languagereuse", In Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, PROMISE ’08, 12 May, 2008, New York, NY, USA, 2008, pp. 19-24
[http://dx.doi.org/10.1145/1370788.1370794]
[45]
Z. He, F. Shu, Y. Yang, M. Li, and Q. Wang, "An investigation on the feasibility of cross-project defect prediction", Autom. Softw. Eng., vol. 19, no. 2, pp. 167-199, 2012.
[http://dx.doi.org/10.1007/s10515-011-0090-3]
[46]
C.L. Prabha, and N. Shivakumar, "Software Defect Prediction Using Machine Learning Techniques", In 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 15-17 Jun, 2020, Tirunelveli, India, 2020, pp. 728-733
[http://dx.doi.org/10.1109/ICOEI48184.2020.9142909]
[47]
Z.B. Guven Aydin, and R. Samli, "Performance Evaluation of Some Machine Learning Algorithms in NASA Defect Prediction Data Sets", In 2020 5th International Conference on Computer Science and Engineering (UBMK), 09-11 Sept, 2020, Diyarbakir, Turkey, 2020, pp. 1-3
[http://dx.doi.org/10.1109/UBMK50275.2020.9219531]
[48]
Y. Zhou, C. Shan, S. Sun, S. Wei, and S. Zhang, "Software defect prediction model based on KPCA-SVM", In IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (Smart- World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)., 19-23 Aug, 2019, Leicester, UK, 2019, pp. 1326-1332
[http://dx.doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00244]
[49]
R. Mo, S. Wei, Q. Feng, and Z. Li, "An exploratory study of bug prediction at the method level", Information and Software Technology, vol. 144, p. 106794, 2022.
[http://dx.doi.org/10.1016/j.infsof.2021.106794]
[50]
Y. Qu, J. Chi, and H. Yin, "Leveraging developer information for efficient effort-aware bug prediction", Information and Software Technology, vol. 137, p. 106605, 2021.
[http://dx.doi.org/10.1016/j.infsof.2021.106605]
[51]
W. Zheng, J.Y. Cheng, X. Wu, R. Sun, X. Wang, and X. Sun, "Domain knowledge-based security bug reports prediction", Knowledge-Based Systems, vol. 241, p. 108293, 2022.
[http://dx.doi.org/10.1016/j.knosys.2022.108293]
[52]
A. Kukkar, U.K. Lilhore, J. Frnda, J.K. Sandhu, R.P. Das, N. Goyal, A. Kumar, K. Muduli, and F. Rezac, "ProRE: An ACO- based programmer recommendation model to precisely manage software bugs", J. King Saud Uni., vol. 35, no. 1, pp. 483-498, 2023.
[http://dx.doi.org/10.1016/j.jksuci.2022.12.017]
[53]
N.K. Nagwani, "An artificial intelligence framework on software bug triaging, technological evolution, and future challenges: A review", Int. J. Inf. Manage. Data Insights, vol. 3, no. 1, p. 100153, 2023.
[http://dx.doi.org/10.1016/j.jjimei.2022.100153]
[54]
C. Zhou, B. Li, X. Sun, and S. Yu, "Leveraging multi-level embeddings for knowledge-aware bug report reformulation", J. Syst. Softw., vol. 198, p. 111617, 2023.
[http://dx.doi.org/10.1016/j.jss.2023.111617]
[55]
H. Sun, M. Chen, J. Weng, Z. Liu, and G. Geng, "Anomaly detection for in-vehicle network using CNN-LSTM with attention mechanism", IEEE Trans. Vehicular Technol., vol. 70, no. 10, pp. 10880-10893, 2021.
[http://dx.doi.org/10.1109/TVT.2021.3106940]
[56]
J. Mai, Y. Wu, Z. Liu, J. Guo, Z. Ying, X. Chen, and S. Cui, "Anomaly detection method for vehicular network based on collaborative deep support vector data description", Phys. Commun., vol. 56, p. 101940, 2023.
[http://dx.doi.org/10.1016/j.phycom.2022.101940]
[57]
Z. Liu, J. Ma, J. Weng, F. Huang, Y. Wu, L. Wei, and Y. Li, "LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications", Information Fusion, vol. 73, pp. 144-156, 2021.
[http://dx.doi.org/10.1016/j.inffus.2021.03.003]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy