GKS Algorithmic Technique for Early Defect Prediction (GKS: A Genetic Feature K-means Clustering with Support Vector Machines)
DOI:
https://doi.org/10.61841/mwcxs539Keywords:
Machine Learning (ML), GKS (A Genetic Feature K-means Clustering with Support Vector Machines), Feature Engineering, MAE (Mean Absolute Error), AUC (Area Under the Curve), ROC (Receiver Operating Characteristic curve)Abstract
Post production defects are one of the reasons behind the rework and also the failure of software. To reduce the defects, we have to find features in earlier post production. Many experts will be developing intelligent decision support systems related to software to get better ability in detection of defect. The defect identification and discovery using machine learning techniques provide the reasonable result with accuracy. In order to stimulate the accuracy level, we combine supervised and unsupervised learning techniques. This helps to design an intelligent decision support system for early defect prediction. In our paper, clustering and classification algorithms are combined with genetic feature set to form GKS (A Genetic feature K-means clustering with Support Vector Machines) technique. This proposed algorithmic technique works in three parts, first a predictive analysis is carried out on Bugzilla eclipse Dataset and features are collected by using genetic algorithm and followed by the second part in which clustering set is formed by unsupervised clustering technique known as K-Means clustering and finally the performance parameters like precision, recall, f1 – score and accuracy level are found using supervised classification technique known as SVM (Support Vector Machine).The results are mapped into the roc – auc curve. At last, the clustered labels are mapped with the defect taxonomy list to categorize the defect features in appropriate defect occurring phase. In this paper, the feature classification is improved by using K-Means centroid algorithm with the help of SVM technique. This paper also provides a model to implement the GKS algorithmic technique. The focus of our model is used to classify the feature according to post production defect list so as to have better defect taxonomy.
Downloads
References
[1] Application of Genetic Algorithms in Machine learning, Harsh Bhasin, Surbhi Bhatia, (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 2 (5) , 2011, 2412-2415.
[2] Software Defect Prediction Models for Quality Improvement: A Literature Study, Mrinal Singh Rawat1,
Sanjay Kumar Dubey, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 2,
September 2012
[3] Software Fault Prediction Exploration Using Machine Learning Techniques, P. Patchaiammal, R.
Thirumalaiselvi, International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878,
Volume-7 Issue-6S3 April, 2019
[4] Contemporary Trends in Defect Prevention: A Survey Report, Muhammad Faizan, Muhammad Naeem
Ahmed Khan, Sami Ulhaq, I.J. Modern Education and Computer Science, 2012, 3, 14-20
[5] Analytical Survey on Bug Tracking System, Dr. Sanjay Kumar Dubey, Shivani, International Journal of
Computer and Communication System Engineering (IJCCSE) Vol. 1 No.02 August 2014
[6] Ada95 Object-Oriented and Real-Time Support for Development of Software Fault Tolerance Reusable
Components, Eltefaat H. Shokri Kam S. Tso.
[7] High-Coverage Fault Tolerance in Real-Time Systems Based on Point-to-Point Communication, K. H.
(Kane) Kim, Chittur Subbaraman, Eltefaat Shokri
[8] ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems, Kam
S. Tso, Eltefaat H. Shokri, Roger J. Dziegiel, Jr.
[9] Engineering Oriented Dependability Evaluation: MEADEP and Its Applications, Dong Tang, Myron
Hecht, Jeffrey Agron, Jeffrey Miller, Herbert Hecht, 1997 Pacific Rim International Symposium on FaultTolerant Systems, Taipei, Taiwan, Dec. 15-16, 1997, pp. 85-90
[10] Protection against Software Failures: Low Failure Rate and Fault Tolerance, Herbert Hecht
[11] A Software Flaw Taxonomy: Aiming Tools at Security, Sam Weber Paul A. Karger Amit Paradkar,
Software Engineering for Secure Systems – Building Trustworthy Applications, (SESS’05) St. Louis,
Missouri, USA.
[12] A Survey on Software Testing Techniques using Genetic Algorithm, Chayanika Sharma, Sangeeta
Sabharwal, RituSibal, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1,
January 2013.
[13] Finding Defective Modules from Highly Unbalanced Datasets, J C Riquelme, R Ruiz, D Rodrıguez, J
Moreno, Actas de los Talleres de las Jornadas de Ingeniería del Software y Bases de Datos, Vol. 2, No. 1,
2008
[14] Re-using Generators of Complex Test Data, Simon Poulding, Robert Feldt, Software Engineering Research
Lab (SERL Sweden), Blekinge Institute of Technology, Sweden.
[15] A Taxonomy for Requirements Engineering and Software Test Alignment, M. Unterkalmsteiner, R. Feldt,
T. Gorschek, ACM Transactions on Software Engineering and Methodology, Vol. V, No. N, Article A
[16] A survey on software fault detection based on different prediction approaches, GolnoushAbaei, Ali
Selamat, Vietnam J Comput Sci (2014) 1:79–95.
[17] Analogy Based Defect Prediction Model, Elham Paikari.
[18] Defects4J: A Database of Existing Faults to Enable Controlled Testing Studies for Java Programs, René
Just, Darioush Jalali, Michael D. Ernst ISSTA ’14, July 21–25, 2014, San Jose, CA, USA
[19] Automatic Extraction of Bug Localization Benchmarks from History, Valentin Dallmeier, Thomas
Zimmermann.
[20] https://en.wikipedia.org/wiki/Precision_and_recall
[21] https://bugs.eclipse.org/bugs/buglist.cgi?quicksearch=functional
[22] https://www.bugzilla.org.
Downloads
Published
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.