Submit Search
Upload
A Survey on Bug Tracking System for Effective Bug Clearance
âą
0 likes
âą
48 views
IRJET Journal
Follow
https://irjet.net/archives/V3/i2/IRJET-V3I2286.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 9
Download now
Download to read offline
Recommended
IJET-V2I6P28
IJET-V2I6P28
IJET - International Journal of Engineering and Techniques
Â
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET Journal
Â
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
Journal For Research
Â
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
IRJET Journal
Â
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET Journal
Â
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
IRJET Journal
Â
Genetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
Â
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
IJCSIS Research Publications
Â
Recommended
IJET-V2I6P28
IJET-V2I6P28
IJET - International Journal of Engineering and Techniques
Â
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET Journal
Â
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
Journal For Research
Â
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
IRJET Journal
Â
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET Journal
Â
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
IRJET Journal
Â
Genetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
Â
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
IJCSIS Research Publications
Â
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
IJNSA Journal
Â
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
Â
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
CSCJournals
Â
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
ijaia
Â
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET Journal
Â
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
IJNSA Journal
Â
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
IJNSA Journal
Â
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
ijseajournal
Â
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
Â
survey on analysing the crash reports of software applications
survey on analysing the crash reports of software applications
IRJET Journal
Â
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET Journal
Â
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
IRJET Journal
Â
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
ijdmtaiir
Â
Mining Software Defects: Should We Consider Affected Releases?
Mining Software Defects: Should We Consider Affected Releases?
Chakkrit (Kla) Tantithamthavorn
Â
The Impact of Mislabelling on the Performance and Interpretation of Defect Pr...
The Impact of Mislabelling on the Performance and Interpretation of Defect Pr...
Chakkrit (Kla) Tantithamthavorn
Â
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
eSAT Journals
Â
A new approach for formal behavioral
A new approach for formal behavioral
ijfcstjournal
Â
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
ijfcstjournal
Â
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AI
IRJET Journal
Â
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
SBGC
Â
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET Journal
Â
Bug Triage: An Automated Process
Bug Triage: An Automated Process
IRJET Journal
Â
More Related Content
What's hot
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
IJNSA Journal
Â
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
Â
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
CSCJournals
Â
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
ijaia
Â
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET Journal
Â
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
IJNSA Journal
Â
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
IJNSA Journal
Â
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
ijseajournal
Â
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
Â
survey on analysing the crash reports of software applications
survey on analysing the crash reports of software applications
IRJET Journal
Â
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET Journal
Â
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
IRJET Journal
Â
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
ijdmtaiir
Â
Mining Software Defects: Should We Consider Affected Releases?
Mining Software Defects: Should We Consider Affected Releases?
Chakkrit (Kla) Tantithamthavorn
Â
The Impact of Mislabelling on the Performance and Interpretation of Defect Pr...
The Impact of Mislabelling on the Performance and Interpretation of Defect Pr...
Chakkrit (Kla) Tantithamthavorn
Â
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
eSAT Journals
Â
A new approach for formal behavioral
A new approach for formal behavioral
ijfcstjournal
Â
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
ijfcstjournal
Â
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AI
IRJET Journal
Â
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
SBGC
Â
What's hot
(20)
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
Â
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
Â
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Â
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
Â
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
Â
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
Â
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
Â
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
Â
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
Â
survey on analysing the crash reports of software applications
survey on analysing the crash reports of software applications
Â
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine Learning
Â
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
Â
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Â
Mining Software Defects: Should We Consider Affected Releases?
Mining Software Defects: Should We Consider Affected Releases?
Â
The Impact of Mislabelling on the Performance and Interpretation of Defect Pr...
The Impact of Mislabelling on the Performance and Interpretation of Defect Pr...
Â
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Â
A new approach for formal behavioral
A new approach for formal behavioral
Â
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
Â
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AI
Â
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
Â
Similar to A Survey on Bug Tracking System for Effective Bug Clearance
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET Journal
Â
Bug Triage: An Automated Process
Bug Triage: An Automated Process
IRJET Journal
Â
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
IRJET Journal
Â
IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software
IRJET Journal
Â
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
ijseajournal
Â
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
IRJET Journal
Â
Defect effort prediction models in software
Defect effort prediction models in software
IAEME Publication
Â
Association Rule Mining Scheme for Software Failure Analysis
Association Rule Mining Scheme for Software Failure Analysis
Editor IJMTER
Â
IRJET- Plagiarism Checker
IRJET- Plagiarism Checker
IRJET Journal
Â
Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction Techniques
1crore projects
Â
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniques
redpel dot com
Â
Defect effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
iaemedu
Â
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD Metrics
IRJET Journal
Â
Bug Tracking System (BTS)
Bug Tracking System (BTS)
IRJET Journal
Â
Effective Bug Tracking Systems: Theories and Implementation
Effective Bug Tracking Systems: Theories and Implementation
IOSR Journals
Â
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
iosrjce
Â
F017652530
F017652530
IOSR Journals
Â
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniques
Pvrtechnologies Nellore
Â
Towards effective bug triage with software
Towards effective bug triage with software
Nexgen Technology
Â
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
Â
Similar to A Survey on Bug Tracking System for Effective Bug Clearance
(20)
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
Â
Bug Triage: An Automated Process
Bug Triage: An Automated Process
Â
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
Â
IRJET-Automatic Bug Triage with Software
IRJET-Automatic Bug Triage with Software
Â
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
Â
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Â
Defect effort prediction models in software
Defect effort prediction models in software
Â
Association Rule Mining Scheme for Software Failure Analysis
Association Rule Mining Scheme for Software Failure Analysis
Â
IRJET- Plagiarism Checker
IRJET- Plagiarism Checker
Â
Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Effective Bug Triage with Software Data Reduction Techniques
Â
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniques
Â
Defect effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
Â
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD Metrics
Â
Bug Tracking System (BTS)
Bug Tracking System (BTS)
Â
Effective Bug Tracking Systems: Theories and Implementation
Effective Bug Tracking Systems: Theories and Implementation
Â
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
Â
F017652530
F017652530
Â
Towards effective bug triage with software data reduction techniques
Towards effective bug triage with software data reduction techniques
Â
Towards effective bug triage with software
Towards effective bug triage with software
Â
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of âSeismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Â
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Â
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Â
đ9953056974đ!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
đ9953056974đ!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Â
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Â
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Â
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Anamika Sarkar
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Â
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Â
Gurgaon âĄïž9711147426âšCall In girls Gurgaon Sector 51 escort service
Gurgaon âĄïž9711147426âšCall In girls Gurgaon Sector 51 escort service
jennyeacort
Â
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Â
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Â
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Â
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Â
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Â
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Recently uploaded
(20)
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Â
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Â
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Â
đ9953056974đ!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
đ9953056974đ!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Â
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Â
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Â
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Â
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Â
Gurgaon âĄïž9711147426âšCall In girls Gurgaon Sector 51 escort service
Gurgaon âĄïž9711147426âšCall In girls Gurgaon Sector 51 escort service
Â
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Â
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Â
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Â
power system scada applications and uses
power system scada applications and uses
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Â
Internship report on mechanical engineering
Internship report on mechanical engineering
Â
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
â CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Â
A Survey on Bug Tracking System for Effective Bug Clearance
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1622 A SURVEY ON BUG TRACKING SYSTEM FOR EFFECTIVE BUG CLEARANCE M.Suresh1, M.Amarnath2, G.Baranikumar3, M.Jagadheeswaran4 1Assitant professor, Departement of Information Technology, mail4sureshuni@gmail.com. 2, 3, 4 B.TECH, 4th year student, Departement of Information Technology, Manakula Vinayagar Institute of Technology,Pondicherry,India. 2amar.moorthy1994@gmail.com,3baranikum2r@gmail.com,4jagan.mohan239864@gmail.com. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: Bugs are important challenge for a software organization. Software organization spends over 45 percentages of their resources in handling these bugs. Managing these bugs manually are difficult and error prone. So an automatic approach of instance selection and feature selection method is combined to handle the bugs, then the bugs are distributed to bug solving experts. An inevitable step in fixing the bugs is assigning a bug solving expert. The problem is majority of bugs are assigned to experts who has less experience in that domain which can leave the bugs unsolved. So using term selection method a bug solving expert is predicted automatically depending upon the type of bugs. A history of these cleared bugs is maintained using historical data management system. This automatically resolves a bug which is reported and solved in prior. This highly reduces the time and cost involved in the bug clearance. Keywords: Bug data reduction, Instance selection, feature selection, Historical data management system. 1. INTRODUCTION Bug is important challenge for any software organization. Most of the software companies need to deal with large number of software bugs every day. Software bugs are unavoidable and fixing software bugs is an expensive task [2]. In fact Software organization spends most of their resources in handling these bugs. For managing software bugs, bug repository plays an important role. In software development and Maintenance, a bug repository is a significant software repository for storing the bugs submitted by users. Most of the software which is open source projects has an open bug repository which allows developers as well as users to submit issues or defects in the software that suggest possible solutions and remark on existing bug reports. The drawback is that large-scale software projects are so much large that makes the triaging process very difficult. The inefficient data and unclear data add redundancy data to the data repository and create a great challenge to the software experts [1]. In bug repository, each software bug has a bug report. The bug report consists of textual information regarding the bug and updates related to status of bug fixing [2]. A bug repository gives a data stage support about types of tasks on bugs, e.g., fault prediction, bug localization, and reopened bug analysis. Large software projects convey bug repositories (also called bug tracking systems) support information collection and to assist developers to handle bugs [3]. The number of regular occurring bugs for open source large-scale software projects is so much large that makes the triaging process very difficult and challenging[1]. Once a bug report is formed, a human triager assigns this bug to a developer, who will try to fix this bug. This developer is recorded in an item assigned- to.The process of assigning a correct developer for fixing the bug is called bug triage. Bug triage is one of the most time consuming step in handling of bugs in software projects. Manual bug triage by a human triage is time consuming and error-prone since the number of daily bugs is large and lack of knowledge in developers about all bugs. Because of all these things, bug triage results in expensive time loss, high cost and low accuracy [2]. Before verifying and modifying a bug, each bug report must be assigned to a relevant developer who could fix it. In traditional bug repositories, all the bugs are manually triaged by some specialized developers. Aiming to reduce the human labor costs, some supervised text classification approaches have been proposed for automatic bug triage. After that the nature of the bugs is predicted using a predictive algorithm and then predict relevant developers for the incoming bug reports with these classifiers. A bug repository gives a data stage support about types of tasks on bugs, e.g., fault prediction, bug localization, and reopened bug analysis. Large software projects convey bug repositories (also called bug tracking systems) support information collection and to assist developers to handle bugs [3]. The number of regular occurring bugs for open source large-scale software projects is so much large that makes the triaging process very difficult and challenging[1]. Once a bug report is formed, a human triager assigns this bug to a developer, who will try to fix this bug. This developer is recorded in an item assigned- to.The process of assigning a correct developer for fixing the bug is called bug triage. Bug triage is one of the most
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1623 time consuming step in handling of bugs in software projects. Manual bug triage by a human triage is time consuming and error-prone since the number of daily bugs is large and lack of knowledge in developers about all bugs. Because of all these things, bug triage results in expensive time loss, high cost and low accuracy [2]. Before verifying and modifying a bug, each bug report must be assigned to a relevant developer who could fix it. In traditional bug repositories, all the bugs are manually triaged by some specialized developers. Aiming to reduce the human labor costs, some supervised text classification approaches have been proposed for automatic bug triage. After that the nature of the bugs is predicted using a predictive algorithm and then predict relevant developers for the incoming bug reports with these classifiers. 2. TECHNIQUES USED 2.1 Top-K pruning algorithm Top-K ranking query in uncertain databases aims to find a top K tuples according to a ranking function. The interplay between score and uncertainty makes top-K ranking in uncertain databases an intriguing issue, leading to rich query semantics. Recently, a unified ranking framework based on parameterized ranking functions (PRFs) is formulated, which generalizes many previously proposed ranking semantics. Under the PRFs based ranking framework, efficient pruning approach for Top-K ranking on dataset with tuple uncertainty has been studied. However, this cannot be applied to top-K ranking on dataset with value uncertainty (described through attribute-level uncertain data model), which are often natural and useful in analyzing uncertain data in many applications. 2.2 Instance selection and feature selection Instance selection and feature selection algorithm deals with clustering the similar bug data sets. . Feature and Instance Selection belong to the practice of data preparation (or pre-processing), which is a preliminary process that transforms raw data into a format that is convenient to the data mining (or machine learning) algorithm. Usually, data is stored in a table-like format: the columns of these tables are the attributes or features - they describe the data - and the rows, or lines, are the records or instances - they are the examples of the concept stored in the data. Feature and Instance selection processes allow applications, such as classification or clusterization, to focus only on the important (or relevant) attributes and records to the specific concept that is in study. By removing noise, irrelevant and redundant features and instances, and reducing the overall dimensionality of a dataset, feature and instance selection have been demonstrated to improve the performance of most machine learning algorithms, speed up the output of models and allow algorithms to deal with datasets whose sizes are gigantic. Feature selection algorithms perform very differently in identifying and removing irrelevant, redundant and randomly class-correlated features. Most of the works on instance selection have been based on Nearest Neighbor classification which finds a subset such that every member of the original dataset is closer to a member of the subset of the same class than to a member of the subset of a different class. 2.3 Apolloâs algorithms Apollo generates test inputs for a web application, monitors the application for crashes, and validates that the output conforms to user. Apollo algorithm, a new sensor information processing tool for uncovering likely facts in noisy participatory sensing data. Apollo belongs to a category of tools called fact-finders. It is the first fact-finder designed and implemented specifically for participatory sensing. When data tuples are clustered and ranked by Apollo, the quality of reported observations increases considerably. Apollo algorithm illustrates a fact-finding tool designed to uncover most likely truth in noisy participatory sensing data. Filtering the amount of data for correctness is an important challenge, commonly known in machine learning and knowledge discovery literature as fact-finding. Apollo is the first fact-finder designed specifically for participatory sensing data. The algorithm has the following reconfigurable parts: The parser: It uses a configuration file (that describes the format of the input data stream) to convert input data into a standard JSON format. Conceptually, the data stream is composed of source, observation tuples, where source identifies the data source (e.g., the Twitter user ID), and the observation content may be structured, as in the case of phones sharing sensor values, or unstructured, as in the case of people sharing text. The configuration file describes the observation format. The distance metrics: A library of different distance metrics is provided for clustering of observations. For unstructured text, these metrics reflect text similarity. For structured data, metrics compute differences in data vectors. Data can be multidimensional. For example, when cell-phones report sensor values at given locations, both measurements and locations can be elements of the data vector. 2.4 NaĂŻve bayes classifier The approach iteratively labels numerous unlabeled bug reports and trains a new classifier with labels of all the bug reports. A weighted recommendation list is
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1624 maintained to boost the performance by imposing the weights of multiple developers in training the classifier. Naive bayes classifiers are a family of simple probabilistic classifiers based on applying bayes theorem with strong (naive) independence assumptions between the features. It is not a single algorithm for training such classifiers, but a family of algorithms based on a common principle: all naive bayes classifiers assume that the value of a particular feature is independent of the value of any other feature, given the class variable. For example, a fruit may be considered to be an apple if it is red, round, and about 10 cm in diameter. A naive bayes classifier considers each of these features to contribute independently to the probability that this fruit is an apple, regardless of any possible correlations between the color, roundness and diameter features. 2.5 Markov chains method A Markov chain is a random process that undergoes transitions from one state to another on a state space. It must possess a property that is usually characterized as "memorylessness": the probability distribution of the next state depends only on the current state and not on the sequence of events that preceded it. This specific kind of "memorylessness" is called the Markov property. Markov chains have many applications as statistical models of real-world processes. It reveals developer networks which can be used to discover team structures and to find suitable experts for a new task. 2.6 Content-based recommendation (cbr) and content based filtering (cbf) It recommends only the types of bugs that each developer has solved before. In a content-based recommender system, keywords or attributes are used to describe items. To provide content-based recommendation we treat the prediction task as a text- categorization problem. Content based filtering combines cbr with a collaborative filtering recommender (cf), it identify potential experts by identifying similar bug reports and analyzing the associated change sets. 2.7 Defect prediction method Defect prediction is a software task in software metrics, which is to predict whether a software artifact (e.g., A source code file, a class, or a module) contains a defect or not First, a data set of software modules is collected; second, each module is labeled (i.e., Whether a module contains defects) and the attributes of this module are extracted as metrics; third, a classifier (e.g., A decision tree) is trained as a predictive model; fourth, the trained classifier is used to predict whether a new module contains defects. 3. LITERATURE REVIEW 3.1 Towards Effective Troubleshooting with Data Truncation Towards Effective Troubleshooting with Data Truncation deals with reducing the data present in the bug repository and improve the quality of data then reduce time and cost of bug triaging, it represent an automatic approach to predict a developer with relevant experience to solve the new coming report.. The bug data sets are obtained and techniques such as instance selection feature selection are applied simultaneously. The top k pruning is applied for improving results of data reduction quality, obtaining domain wise bug solution. Instance selection is for obtaining a subset of relevant instances (i.e., bug reports in bug data) .It is used to Remove noise and redundant instances,Remove non-representative instances. Feature selection which aims to obtain a subset of relevant features (i.e., words in bug data) ,Sorting of words according to feature values .Top-K pruning algorithm for improving results of data reduction quality. 3.2 Technique to Combine Feature Selection with Instance Selection for Effective Bug triage A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage .It addresses the issue of data reduction for bug triage by text classification techniques. Conventional software analysis is not totally suitable for the large-scale and complex data in software repositories. Data mining has developed as a promising means to handle software data. There are two difficulties related to bug data that may influence the effective use of bug repositories in software development tasks, namely the huge scale and the low quality. Therefore unfixed bugs are deleted from the bug repositories. 3.3 Automatic Bug Triage using Semi- Supervised Text Classification Automatic Bug Triage using Semi-Supervised Text Classification propose a semi-supervised text classification approach for bug triage to avoid the deficiency of labeled bug reports in existing supervised approaches. This approach combines naive bayes classifier and expectation maximization to take advantage of both labeled and unlabeled bug reports. This approach trains a classifier with a fraction of
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1625 labeled bug reports. Then the approach iteratively labels numerous unlabeled bug reports and trains a new classifier with labels of all the bug reports. Then it employs a weighted recommendation list to boost the performance by imposing the weights of multiple developers in training the classifier. Before training a supervised classifier for bug triage, a necessary step is to collect numerous labeled bug reports, which are bug reports marked with their relevant developers.The semi- supervised text classification approach to improve the classification accuracy of bug triage. This semi- supervised approach enhances a NB classifier by applying expectation-maximization (EM) based on the combination of unlabeled and labeled bug reports. First, this semi-supervised approach trains a classifier with labeled bug reports. Then, the approach iteratively labels the unlabeled bug reports and trains a new classifier with labels of all the bug reports. To adjust bug triage, we update a semi-supervised approach with a weighted recommendation list (WRL) to augment the effectiveness of unlabeled bug reports. This WRL is employed to probabilistically label an unlabeled bug report with multiple relevant developers instead of a single relevant developer. 3.4 Reducing Features to Improve Bug Prediction Recently, machine learning classifiers have emerged as a way to predict the existence of a bug in a change made to a source code file. The classifier is first trained on software history data, and then used to predict bugs. Two drawbacks of existing classifier-based bug prediction are potentially insufficient accuracy for practical use, and use of a large number of features. These large numbers of features adversely impact scalability and accuracy of the approach. Reducing Features to Improve Bug Prediction aims in classifier to first trained on software history data, and then used to predict bugs. The disadvantage of the traditional method is that, classifier-based bug predictions are potentially insufficient accuracy for practical use, and use of a large number of features. The system uses Naive Bayes and Support Vector Machine (SVM).The system mainly Gain Ratio for feature selection, along with the characterization of bug prediction results achieved when using feature selection. This paper proposes a feature selection technique applicable to classification-based bug prediction. This technique is applied to predict bugs in software changes, and performance of Naıve Bayes and Support Vector Machine classifiers is characterized. . These features include everything separated by whitespace, in the code added or deleted in a change. This leads to a large number of features, in the thousands, and low tens of thousands. For larger project histories which span thousand revisions or more, this can stretch into hundreds of thousands of features. The addition of many non-useful features reduces a classifierâs accuracy. Additionally, the time required to perform classification increases with the number of features, rising to several seconds per classification for tens of thousands of features, and minutes for large project histories. A standardapproach (in the machine learning literature) for handling large feature sets is to perform a feature selection process to identify that subset of features providing the best classification results. This paper introduces a feature selection process that discards features with lowest gain ratio until optimal classification performance is reached for a given performance measure. 3.5 Efficient Bug Triaging Using Text Mining Efficient Bug Triaging Using Text Mining aims for an automatic approach to predict a developer with relevant experience to solve the new coming report. The techniques used are five term selection method. Term selection methods are used to reduce the high dimensionality of term space by selecting the most discriminating terms for the classification task. The methods give a weight for each term in which terms with higher weights are assumed to contribute more for the classification task than terms with lower weights. The goal of bug triaging is to assign potentially experienced developers to new-coming bug reports. To reduce time and cost of bug triaging, we present an automatic approach to predict a developer with relevant experience to solve the new coming report. It investigate the use of five term selection methods on the accuracy of bug assignment. In addition, it re-balance the load between developers based on their experience. It conduct experiments on four real datasets. To reduce the time spent triaging, it present an approach for automatic triaging by recommending one experienced developer for each new bug report. This information can help to manage the progress of these projects. In the last decade, practitioners have analyzed and mined these software repositories to support software development and evolution. One of the important software repositories is the bug tracking system (BTS). Many open source software projects have an open bug repository that allows both developers and users to submit defects or issues in the software, suggest possible enhancements, and comment on existing bug reports. It formulate the bug triaging process as a classification task where instances represent bug reports, features represent the terms of the report, and the class label represents the developer who fixed this report. This approach can help the triage process in two ways: 1) it may allow a triager to process a bug more quickly, and 2) it may allow a triager with less knowledge about systems and developers to perform bug assignments more accurately.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1626 Sl. no Title Year Tools Application Area Pros Cons Analysis 1 Towards Effective Troubleshooting With Data Truncation 2015 Instance selection and feature selection Bug Repository Handling. The problem of handling huge number of data in bug repository is minimized. Instance selection and feature selection is not completely enough to handle the data in bug repository. Additionally, text processing and data processing algorithm must be used to handle the data in bug repository. 2 A Technique to Combine Feature Selection with Instance Selection for Effective Bug Triage 2015 Instance selection and feature selection For an efficient bug triage. It analysis data by considering the word dimension and bug dimension which helps in reducing duplicate and unnecessary bugs. The order of applying instance selection and feature selection is not clearly explained which leads to inefficient system. The order of applying instance selection and feature is selection must be determined by a predictive algorithm. 3 Automatic Bug Triage using Semi- Supervised Text Classification 2010 Naïve bayes classifier Software bug handling. It labels the bug data iteratively. The weighted list maintained, helps to boost the results obtained. It only focuses on classifying the bugs in bug repository. The major problem in bug handling is that huge number of data in bug repository. Techniques such as IS and FS must be used to reduce the data in bug repository. Proper predictive algorithm must be used to classify bugs. 4 Reducing Features to Improve Bug Prediction 2009 Support vector machine Software development committee. Provides a layout for minimizing techniques used in bug data reduction. Minimizing the techniques used leads in less accuracy. Necessary algorithm such as IS and FS must be used. 5 A Survey Paper on Efficient 2015 Instance selection feature Automatic bug triaging. It uses text classification techniques to Too many repositories are used to handle A comparator can be used
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1627 Approach of Data Reduction Techniques for Bug Triaging System selection and historical data sets reduce the data in bug repository. Then uses predictive model to predict a developer based on historical data sets. the bugs in bug repository which can be minimized. to compare the new bug report with historical data sets. 6 A survey on bug-report analysis 2015 Bugzilla Explains various techniques in bug handling Research and explain background details about bug handling which makes bug handling an efficient task. The accuracy obtains by this techniques are not more enough in handling the bugs. Several more techniques such as instance selection and feature selection must be used to handle the bugs. 7 Automatic bug triage using text cateogarization NaĂŻve bayes classifier Large open source projects. Have explained naĂŻve bayes classifier for bug triaging. And investigated bug data sets efficiently for bug handling. There is a chance of assigning the bugs to un- suited developers. Therefore the techniques used are inefficient. Developers should be involved in bug triaging for an efficient bug handling. 8 Bug report network: varieties strategies and impact in Fos development 2004 - Software development community. It focuses on developing a model that provides enhanced software management techniques to handle bugs. It just handles the bugs from single community. Tools must be introduced to handle BRNâs complexity. 9 Coping with an open bug repository. 2004 Bugzilla Development of eclipse and Firefox projects. Explained briefly about various challenges that are faced in handling bugs in bug repository. It does not explained clearly about how overcoming these challenges. After analyzing the scenario proper tools must be suggested for bug handling.
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1628 10 Defect tracking system 2007 CDTS and BTS Development of projects in MNCâs. CDTS helps in keep tracking of defect, flaws, errors that can happen in development of a product. BTS provides a list of developers to solve the reported bugs. CDTS does not provide a view of methodologies to handle the reported bugs. The process is time consuming when CDTS is combined with BTS. Alternate approach must be used in handling these defects in the products. 11. Modeling bug report quality 2007 Bugzilla Used as filter in Mozilla and Firefox project to resolve the bug. It will reduce overall maintenance cost. Leads to better precession and recall results. The drawback is that it will consider only a two projects. The reported should provide complete guide about the bug. 12. Towards the next generation of bug tracking system 2008 Card sort technique Software development project. It will come out with useful recommendation that improve the working of BTS. Though it provides more recommendation it does not provide any tool. The feature that can implemented to good quality of bug report in BTS. The bug report that provides complete information that reporter gets an idea on how to file a bug report. 13. Duplicate bug report considered harmful really?? 2008 Infozilla Software maintenance of large projects. That all duplicate are not always considered to be harmful sometimes it provides additional informationâs. The study was based on the survey results of bug report from eclipse project5. BTS should consist a tool that scans the entire duplicate bug and extracts all the additional information that might be help in
8.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1629 Table -1: Analysis of various bug tracking system fixing the bug. 14. What makes a good bug report 2008 cuezilla Software development projects and product manufacturing. It will mention the crucial role in resolving the bug. Identifies the why developer takes more time. This will consider the response of experienced developers. It involves the self selection principles. To improve the quality of bug report is that it should be made mandatory for all reporters to provide all relevant information required 15. New feature for duplicate bug detection 2014 Weka Large open source projects and android development projects. Undefined the use of automatically grouping the duplicate bug report. Study shows that 36% of bugs are duplicate but in experiments only 1452 were duplicate. The attributes should be further explored so that better duplicate detection system could be developed.
9.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1630 4. Conclusion The amount of data available in the bug repository plays an important role in bug handling.So as to reduce the data in bug repository, the bug reduction techniques must be implemented. The data in bug repository is majorly reduced by neglecting the redundancy data in the bug repository. Then the subset of the data in data repository is obtained. In future we planned to develop a predictive model which predicts a developer based on the type of bugs obtained. Then an historical data management system is maintained which keeps record of bugs which are reported and resolved in prior. A comparator checks with this historical data management system when a new bug is reported, if it is found to be reported again the historical data management system resolves it automatically without assigning to an expert. References [1] B Jifeng Xuan, He Jiang, Yan Hu, Zhilei Ren, Weiqin Zou, Zhongxuan Luo, and Xindong Wu,â Towards Effective Bug Triage with Software Data Reduction Techniquesâ ieee transactions on knowledge and data engineering, vol. 27, no. 1, january 2015. [2] karishmaMusale, Gorakshanath Gagare, âTowards Effective Troubleshooting With Data Truncationâ , âInternational Journal of Advanced Research in Computer and Communication EngineeringVol. 4, Issue 11, November 2015â [3] Ashwini Jadhava, Komal Jadhava, âA Survey on Software Data Reduction Techniques for Effective Bug Triagingâ, âInternational Journal of Computer Science and Information Technologies, Vol. 6 (5) , 2015, 4611-4612â. [4] JifengXuan, He Jiang, âAutomatic Bug Triage using Semi-Supervised Text Classificationâ, âChinese Academy of Sciences, Beijing, 100190 Chinaâ. [5] Suvarnaa Kale, Ajay Kumar Gupta, âA Technique to Combine Feature Selection with Instance Selection for Effective Bug Triageâ, âInternational Journal of Science and Research (IJSR) ISSN (Online): 2319- 7064â. [6] C. Sun, D. Lo, S. C. Khoo, and J. Jiang, âTowards more accurate retrieval of duplicate bug reports,â in Proc. 26th IEEE/ACM Int. Conf. Automated Softw. Eng.,2012 [7] J. Anvik, L. Hiew, and G. C. Murphy, âWho should fix this bug?,â Proc. Intl. Conf. Softwarre Engineering (ICSE 06), ACM, 2006, pp. 361-370. [8] N. Betten burg, R. Prem raj, T. Zimmermann, and S. Kim, âReducing Features to Improve Bug Prediction,â Proc. IEEE Conf. Software Maintenance (ICSM 08), IEEE Computer Society, Sep. 2008, pp. 337-345. [9] J. Anvik , âAutomatic bug reporting assignment, â in Proc 28th International Conference on Software Engineering. ACM, 2006, pp. 937â940. [10] J. Anvik , and G. C. Murphy , âReducing the effort of bug report triage: Recommenders for development-oriented decisions,â ACMTrans. Soft. Eng. Methodol., vol. 20, no. 3, article 10, Aug. 2011. [11] K. Baloga, L. Azzopardi, and M. de Rijke, âFormal models for expert finding in enterprise corpora,â in Proc. 29th Annu. Int. ACMSIGIR Conf. Res. Develop. Inform. Retrieval, Aug. 2006, pp. 43â50. [12] C. Aggarwaal and KP. Zhaao, âTowards graphical models for textprocessing,â Knowl. Inform. Syst., vol. 36, no. 1, pp. 1â21, 2013. [13] J. Anvik and G. C. Murphy , âReducing the efforts of bug report triage: Recommenders for development-oriented decisions,â ACMTrans. Soft. Eng. Methodol., vol. 20, no. 3, article 10, Aug. 2011. [14] S. Artzi, A. Kie_zunn, J. Dollby, F. Tip, D. Dig, A. Paradkar, and M. D.Ernst, âFindingbugs in web applications using dssynamic test generationand explicit-state model checkin,â IEEE Softw., vol. 36,no. 4, pp. 474â494, Jul./Aug. 2010. [15] D. Matter , A. Kuhan , and O. Nierstrasz , âAssigning bug reports using a vocabulary-based expertise model of developers,â in 6th IEEE International Working Conference onMining Software Repositories, 2009, pp. 131â140 [16] D. Cubranic and G. C. Murphy , âAutomatic bugs triaging usings text categorization,â in Proc Sixteenth International Conference on Software Engineering, Citeseer, 2004, pp. 92â97. [17] Jifeng Xuan , Hee Jiang , â Towards Effective Bug Triageâ, âIEEE transactions on journal 2013â,pp.251-269 .
Download now