Text Classification Techniques to Conduct Automatic Bug Triage
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 6
Abstract
We address the issue of information lessening for bug triage, i.e., how to diminish the scale and enhance the nature of bug information. We solidify illustration decision with highlight assurance to in the meantime decrease data scale on the bug estimation and the word estimation. To choose the demand of applying event assurance and highlight decision, we isolate characteristics from recorded bug educational lists and build a judicious model for another bug enlightening gathering. We exactly look at the execution of data reduction on totally 600,000 bug reports of two enormous open source wanders, specifically Eclipse and Mozilla. The results show that our data decline can feasibly lessen the data scale and upgrade the precision of bug triage. Our work gives an approach to manage using frameworks on data taking care of to edge diminished and superb bug data in programming change and support.
Authors and Affiliations
Sunkara Poojitha| Dept. of CSE, Usha Rama College Of Engineering And Technology,Telaprolu, Andhra Pradesh-521109, M. Sambasiva Rao| Dept. of CSE, Usha Rama College Of Engineering And Technology,Telaprolu, Andhra Pradesh-521109
An Unprecedented Approach of Detecting and Reporting System of Earthquakes Using Tweet Analysis
Social media has got an exponential growth in recent years. One of the most representative examples is Twitter, which allows users to publish short tweets (messages within a 140-character limit) about “what’s hap...
Fault Detection of Ball Bearing Using Finite Element Analysis
During the last decade’s vibration based damage detection methods have attracted the most attention due to their simplicity for implementation. This research mainly deals with detection of faults through vibration...
Token Based Fair Queuing Algorithms for Wireless Networks
Token Based Fair Queuing (TBFQ) algorithm has been proposed for single carrier Time Division Multiple Access (TDMA) systems, to suit WINNER Orthogonal Frequency Division Multiple Access (OFDMA) air-interface. This al...
To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of recei...
Scalable Data Sharing In Cloud using Public Key Cryptosystem
Data sharing is an important functionality in cloud storage. We show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems that produce constant-s...