Performance Analysis of Machine Learning Techniques on Software Defect Prediction using NASA Datasets
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
Defect prediction at early stages of software development life cycle is a crucial activity of quality assurance process and has been broadly studied in the last two decades. The early prediction of defective modules in developing software can help the development team to utilize the available resources efficiently and effectively to deliver high quality software product in limited time. Until now, many researchers have developed defect prediction models by using machine learning and statistical techniques. Machine learning approach is an effective way to identify the defective modules, which works by extracting the hidden patterns among software attributes. In this study, several machine learning classification techniques are used to predict the software defects in twelve widely used NASA datasets. The classification techniques include: Naïve Bayes (NB), Multi-Layer Perceptron (MLP). Radial Basis Function (RBF), Support Vector Machine (SVM), K Nearest Neighbor (KNN), kStar (K*), One Rule (OneR), PART, Decision Tree (DT), and Random Forest (RF). Performance of used classification techniques is evaluated by using various measures such as: Precision, Recall, F-Measure, Accuracy, MCC, and ROC Area. The detailed results in this research can be used as a baseline for other researches so that any claim regarding the improvement in prediction through any new technique, model or framework can be compared and verified.
Authors and Affiliations
Ahmed Iqbal, Shabib Aftab, Umair Ali, Zahid Nawaz, Laraib Sana, Munir Ahmad, Arif Husen
Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of p...
Intrusion Detection System in Wireless Sensor Networks: A Review
The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Netwo...
Improving TCP Throughput Using Modified Packet Reordering Technique (MPRT) Over Manets
At the beginning of development of network technology TCP transport agent were designed assuming that communication is using wired network, but recently there is huge demand and use of wireless networks for communication...
A Hybrid Method to Improve Forecasting Accuracy Utilizing Genetic Algorithm –An Application to the Data of Operating equipment and supplies
In industries, how to improve forecasting accuracy such as sales, shipping is an important issue. There are many researches made on this. In this paper, a hybrid method is introduced and plural methods are compared. Focu...
Segmentation on the Dental Periapical X-Ray Images for Osteoporosis Screening
Segmentation on the trabecular of dental periapical X-Ray images is very important for osteoporosis screening. Existing methods do not perform well in segmenting the trabecular of dental periapical in X-Ray images due to...