Machine Learning Approaches for Predicting the Severity Level of Software Bug Reports in Closed Source Projects
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
In Software Development Life Cycle, fixing defect bugs is one of the essential activities of the software maintenance phase. Bug severity indicates how major or minor the bug impacts on the execution of the system and how rapidly the developer should fix it. Triaging a vast amount of new bugs submitted to the software bug repositories is a cumbersome and time-consuming process. Manual triage might lead to a mistake in assigning the appropriate severity level for each bug. As a consequence, a delay for fixing severe software bugs will take place. However, the whole process of assigning the severity level for bug reports should be automated. In this paper, we aim to build prediction models that will be utilized to determine the class of the severity (severe or non-severe) of the reported bug. To validate our approach, we have constructed a dataset from historical bug reports stored in JIRA bug tracking system. These bug reports are related to different closed-source projects developed by INTIX Company located in Amman, Jordan. We compare eight popular machine learning algorithms, namely Naive Bayes, Naive Bayes Multinomial, Support Vector Machine, Decision Tree (J48), Random Forest, Logistic Model Trees, Decision Rules (JRip) and K-Nearest Neighbor in terms of accuracy, F-measure and Area Under the Curve (AUC). According to the experimental results, a Decision Tree algorithm called Logistic Model Trees achieved better performance compared to other machine learning algorithms in terms of Accuracy, AUC and F-measure with values of 86.31, 0.90 and 0.91, respectively.
Authors and Affiliations
Aladdin Baarah, Ahmad Aloqaily, Zaher Salah, Mannam Zamzeer, Mohammad Sallam
Personalizing of Content Dissemination in Online Social Networks
Online social networks have seen a rapid growth in recent years. A key aspect of many of such networks is that they are rich in content and social interactions. Users of social networks connect with each other and formin...
A Review of Blockchain based Educational Projects
Blockchain is a decentralized and shared dis-tributed ledger that records the transaction history done by totally different nodes within the whole network. The technology is practically used in the field of education for...
An Efficient Segmentation of Retinal Blood Vessels using Singular Value Decomposition and Morphological Operator
The extensive study on retinal fundus images has become an essential part in medical domain to detect pathologies including diabetic retinopathy, cataract, glaucoma, macular degeneration,etc.which are the major causes of...
An Empirical Analysis Over the Four Different Feature-Based Face and Iris Biometric Recognition Techniques
Recently, multimodal biometric systems have been widely accepted, which has shown increased accuracy and population coverage, while reducing vulnerability to spoofing. The main feature to multimodal biometrics is the ama...
Method for System Requirements Approval
The requirements approval method is necessary to ensure that the system requirements have been identified in right way and the understanding between the contractor and the client exist. During research conducted is ident...