SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 568
Bug Triage: An Automated Process
Fareen Sayed1, Hetvi Shah2, Namrata Kharat3 , Prajakta Ohal4, Gopal Deshmukh5
1,2,3,4 UG Student, M.E.S. College of Engineering, Pune, Maharashtra,India
5Dept. Of Computer Engineering, M.E.S College of Engineering,Pune,Maharahtra,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Bug triage means to transfer a new bug to
expertise developer. The manual bug triage allocationprocess
is opulent in time and poor in accuracy. There is a need to
automatize the bug triage process. In order to automate the
bug triage process, text classification techniques are applied
using stopword removal andstemming. Intheproposedpaper,
NB-Classifiers is used to predict the appropriate developers to
whom the particular bug can be allocated. The datareduction
techniques like instance selection and keyword selection are
used to obtain bug report and words related to bugs. The
proposed system will predict only those developers who are
expertise in solving the particular bug. The status of bug will
be tracked by the proposed system and if the bugissolvedthen
the bug status will be updated as solved in the database. The
solves bug will not be allocated to any developer in the future
but if a particular developer fails to solve the bug then the bug
will be allocated to another set of appropriate developers. The
proposed system is built with intention to suggest or
recommend the bug and not to manually assign it to any
developer randomly. The proposed system will provide an
efficient window to handle real timecrisisthatcomeupduring
project development lifecycle.
Key Words: Data Reduction, Bug triage, Bug Report,
Instance Selection, Keyword Selection, Text
Classification.
1. INTRODUCTION
An error or faults that occur in a system and causes
unexpected results is nothing but a software bug. Software
organizations spend a large amount of expense to handle
software bugs. Bug fixing is an important part in every
softwarecompanies.Current softwareframeworksconsistof
repositories that contain immense databases for storing the
results of software frameworks. The old frameworks aren’t
entirely suitable for immense and complicated data in
repositories. Data mining has developed encouraging ways
to deal with software data. By using data mining methods,
digging repositories can discover charismatic data and can
solve realistic problems.
A bug repository contains bug reports and actasa crucial
part in handling bugs. Bug reports or record consists of
textual details of a bug. Large projects set out bug tracking
systems to collect information and to aid developers to
manage bugs. Challenges arise as there are large amount of
bugs disclosed each day. A process of managing bugs is bug
triage. In traditional organizations, new bugs are assigned
manually to an expert developer. Due to manual assessment
of bug, this process has low accuracy and also takes an
inadequate amount of time. Also, sometimes the new bug is
assigned to a developer who doesn’t have much knowledge
about that bug. Since the human/manual bug triage system
had many disadvantages, existing work has proposed
automatic bug triage approach.
In this approach, a bug report undergoes text classification
techniques. In this paper, we are going to use two text
classification techniques namely, stopword removal and
stemming. Stopword removal will help to remove
unnecessary words (e.g. ‘a’, ’the’, ’this’, and’, etc.) from the
bug report.
Stemming is useful to reduce words into its root form (e.g.
words like ‘engineering’, ‘engineered’ sharea commonbase-
‘engineer’). After text classification, data reductionisused to
address quality of data. In this paper, we will combine
keyword selection algorithm and instance selection
algorithm to obtain word dimension and bug dimension.
This new bug report will be then given to NB- Classifier for
prediction of developers. NB- Classifier will predict the top
five developers based on their history and profile (skills).
The remainder of paper comprises of following sections.
Section II shows literature survey. Section III contains
proposed system followed by algorithms in Section IV.
Section V includes system results and Section VI concludes.
2. RELATED WORK
[1] Jiefng Xuan et al. marks the issue of noisy and low
quality of data. They employ data reduction strategies by
combining instance selection and feature selection. They
made use of predictive model to decide the order ofinstance
selection and feature selection. They used text classification
techniques and solved the bugs. Inthispaper,theyhaveused
Naïve Bayes algorithm to predict developers. Their work
provided an approach to leveraging techniques on data
processing to form reduced and high-quality bug data in
software development and maintenance.
[2] In this paper they investigated whether we can
accurately predict the severity of a reported bug by
analysing its textual description using text mining
algorithms. Based on three cases drawn from the open-
source community (Mozilla, Eclipse and GNOME), they
concluded that given a training set of sufficient size
(approximately 500 reports per severity), it is possible to
predict the severity with a reasonable accuracy (both
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 569
precision and recall varybetween0.65-0.75withMozilla and
Eclipse; 0.70-0.85 in the case of GNOME).
[3] In this paper, they performed an empirical studyofbug-
fixing time for three CA Technologies projects. They
proposed a Markov-basedmethodforpredictingthenumber
of bugs that will be fixed in future. For a given number of
defects, they proposed a method for estimating the total
amount of time required to fix them based on the empirical
distribution of bug-fixing time derived from historical data.
They evaluated these methods using real maintenance data
from three CA Technologies projects. The results show that
the proposed methods are effective.
[4] in this paper, they dealt with data reductionproblems.
They combined feature selection with instance selection for
data diminution to construct the reduced data set and
improve the quality of bug data. The resultsshowedthatthis
data diminution technique will provide good quality of data
and decrease scale.
[5] In this paper, they have presented a comparative
analysis of different available information retrieval and
machine learning methods in order to automate the
assignment of bug reports to developers in an optimal
fashion. The target was to find a combination of methods,
which is most suitable to finally develop a high performance
bug triage system. They used these five data sets and apply
multiple machine learning algorithms. All of these seven ML
algorithms belong to the class of supervised machine
learning methods, and are used for single-label multi-class
classification. The experimental results indicated that
classification based on LSI and support vector machine has
the best accuracy, precision, and recall values.
[6] proposed the concept for text representation and
processing. They made used of distance graph to represent
the documents in terms of distance between the distinct
words. This provided a much richer representation in terms
of sentence structure of the underlying data.
[7] they proposed four broad areas for improvements. To
demonstrate the potential of this idea they conducted an
initial study in which they simulated an interactive bug
tracking system. This helped them to speeduptheprocessof
resolving bugs.
[8] they introduced a novel dataset mined from the
Firefox bug repository(Bugzilla)whichcontainsinformation
about the temporal alignment of developer interactions.
They presented a Firefox Temporal Defect Dataset (FTDD)
and the rationale for selecting the key activities which it
captures. Also they have described the FTDD schema and
data sources. They presented an exploratory analysis on the
dataset that we mined.
[9] The aim of this paper was to attain a data setreduction
in bug triage by including the representative values along
with the statistical values of the bug data set. They
considered the dataset from the open source projectEclipse.
They focused on reducing the data scale and thereby
improving the accuracy. They achieved theiraimby building
a representative model for prediction of reductionorders by
including the summary, metadata. Their proposed work
attains an accuracy result of 96.5% that is better when
compared with existing work.
[10] this paper presents a model for the developer
prioritization in bug repositories by extending a socio-
technical approach. They analysed three problems of the
developer prioritization, namely the characteristics in
products, the evolution, andthetoleranceof noises.Basedon
the analysis, they investigated the ways to leverage the
developer prioritizationtoimprovethreetypical tasksinbug
repositories. The results were studied on over 900000 bug
reports in Eclipse and Mozilla.
3. PROPOSED SYSTEM
In traditional software establishment, new bugs are human
triaged by a skilled developer. This approach has
disadvantages, as there are large number of bugs and a
shortage of expertise to fix all bugs. Also, it has poor
accuracy and is time consuming. To desist from high cost of
manual triage, an automatic way for bug triage process is
proposed.
Fig. 1, illustrates the basic framework of bug triage based
on text classification. A bug data set contains bug reports
with respective developers. On this bug data set, the bug
data reduction is applied as a phase in data preparation of
bug triage. The proposed architecture combines existing
techniques of instance selection and keyword (feature)
selection to remove certain bug reports and words. A
problem for reducing the bug data is to discover the orderof
instance selection and keyword selection, which is denoted
as the prediction of reduction orders.
Fig. 1 Framework of Bug Triage Based On Text
Classification.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 570
In bug triage, a bug data set is converted into text matrix
with two dimensions, namely the bug dimension and the
word dimension. The combination of instance selection and
keyword selection is used to generate a reduced bug data
set. The original data set is replaced with the reduced data
set for bug triage. For given data set in a certain application,
instance selection is to obtain a subset of suitable instances
while keyword selection aims to obtain a subset of suitable
words in bug data set. Given an instance selection algorithm
IS and keyword selection algorithm KS, we use KS!IS to
denote the bug data reduction, which first applies KS and
then IS; on the other hand, IS!KS denotes first applying IS
and then KS.
Fig. 2 System Architecture
4. ALGORITHMS
Proposed work consists of various algorithms that helps in
predicting developers. The algorithms used are as follow:
4.1 Text-Classification
In order to automate the process of bug triage, text
classification techniques are used. Text classification allots
one or more classes to document based on their content. In
our work, we are using stopword removal followed by
stemming.
Input
Bug Report:-
Bug ID : Unique Id
Summary : Description
Creation Time :
YYYY/MM/DD
Status : New
Table No.1 Input data for text classification
a) Stop word Removal
Words which don’t import peculiar knowledge in bug
report are known as stop words. For eg.,the, an, who,
how,where,etc.
Steps for stop word removal algorithm:
i. Prepare stop word list using Word Net dictionary.
ii. Get statement from user.
iii. Convert statement into words.
iv. for each word in statement check if word is present
in Stop WordsList.
v. if yes, then continue the loop
vi. else add word to preprocessedStatement
vii.end for
viii. preprocessedStatement is the final statement
b) Stemming
The preprocessedStatement is given to stemming for
further process. Each term arriving is reduced into its root
form through stemming process.
For example, 'danced','dancing' all share a equivalent root
base :'dance'.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 571
4.2 Data Reduction Techniques
After applying text classification via stopword removal and
stemming the bug report undergoes data reduction for
further process. Data reduction includes keyword
selection(KS) and instance selection(IS) algorithm to obtain
word dimension and bug dimension respectively. Data
reduction techniques helps to improve scale and quality of
bug report. Our work combines KS and IS.
a) Keyword Selection Algorithm
In keyword selection algorithm, we use CHI-square to
determine whether thereisa significantassociation between
two variables. Similarly, the proposed system uses CHI-
square test to determine the similarities between two
developers. The developer profiles which matches the bug
more appropriately is kept and theotherprofileisdiscarded.
Thus, CHI-square test is used to reduce the number of
developers that could be assigned to a particular bug. It
includes four steps in determining the association and they
are as follow:
1. State of Hypothesis: Suppose that variable A has
keywords with r levels and variable B has developer’s
with c levels then,
Null hupothesis(Ho): States that keywords and developers
are independent.
Alternative hypothesis(Ha): States that keywords and
developers are not independent.
2. Formulate Analysis Plan: It describes howto usesample
data to accept or reject the null hypothesis. The plan
should specify significance level i.e any value between0
and 1.
3. Analyze Sample Data:
Using sample data, we find degree of freedom, expected
frequencies, test statics and P-value associated with test
statistics. The illustration through formulas is as follow:
(a) Expected Frequency (Er,c) = (nr*nc)/n
where,
Er,c= expected frequency count for level r of variable A and
level c for variable B.
nr= total number of sample observed at level r of variable A.
nc= total number of sample observed at level c of variable B.
n= total sample size.
(b) Test statistics: Chi-square random variable X2 defined
by the following equation:
X2 = [(Or,c-Er,c)2/ Er,c]
where,
Or,c = Observed frequency count at level r of variable A and
level c of variable B.
Er,c = Expected frequency count at level r of variable A and
level c of variable B.
4. Interpret Results
This involves comparing P-value to significance level and
rejecting the null hypothesis when the P-value is less than
significance level.
b. Instance Selection Algorithm
Our work uses cosine similarity to find how similar the text
are purely in terms of word countsignoringthewordsorder.
It compares two sets of bug reports. Set A contains new bug
report and Set B contains existing bug report of the
developer. Then using the formula:
Cos Ɵ =
We check the similarity between two sets of report.If the
similarity is greater than the thresholdvalue,thenthereport
is stated as duplicate and is given as a reference of
previously solved report. Else it is passed to NB Classifier.
4.3 NB- Classifier
NB classifier algorithm is used to predict developers. Table
No.2 shows learning data set which is given input to NB
Classifier.
Dev 1
Dev 2
.
.
.
Dev n
[Keyword Count]
[Keyword Count]
[Keyword Count]
Table No.2 Input for NB Classifier
Along with this data the input also contains keyword count
of new bug report. By using these counts we calculate prior,
likelihood and posterior probability respectively. Based on
maximum posterior probability the prediction order of
developer is decide.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 572
5. SYSTEM RESULTS
1] Screenshot showing the login screen
2] Screenshot showing the functionality of bug data set
creation.
3] Screenshot showing the information of all bugs added
by tester.
4] Screenshot showing the information of all the bugs in
the system.
5] Screenshot showing the list of predicted developers for
a particular Bug Id.
6. CONCLUSION
Bug fixing is an elegant part of software organization. One of
the major challenges in process of bug triage is to assign a
skilled developer to fix a new bug. In this paper, we
presented the complete abstraction of an automatic bug
triage approach.
We proposed a framework that removes the issue of data
reduction to a huge extent. By combining KS and IS
techniques, better quality of data can be obtained. In this
paper, we used NB-Classifier which will help in suggesting a
list of expert developers for fixing the bug.
In future work, we will evaluate the results of bug triage on
open source project namely Bugzilla.Bugzilla isa testing tool
developed and used by Mozilla. Also, we will explore and
experiment on more advance methods to improve the
existing functioning of our bug triage approach.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 573
Reference
[1] Fareen Sayed, Hetvi Shah, Namrata Kharat,Prajakta
Ohal,Gopal Deshmukh, “Automatic Bug Triage With
Data Reduction”, International Journal Of
Engineering And Techniques, vol 2 Issue 6,2016.
[2] JifengXuan, He Jiang. Yan Hu, ZhileiRen, WeiqinZou,
ZhongxuanLuo,and XindongWu,”TowardsEffective
Bug Triage with Software Data Reduction
Techniques” IEEE Transaction on Knowledge and
Data Engineering, vol. 27, no. 1,January 2015.
[3] Lamkanfi, S. Demeyer, E. Giger, and B. Goethals,
“Predicting the severity of a reported bug,” in Proc.
7th IEEE Working Conf. Mining Softw.
Repositories,May 2010.
[4] H. Zhang, L. Gong, and S. Versteeg, “Predicting bug-
fixing time: An empirical study of commercial
software projects,” in Proc. 35th Int. Conf. Softw.
Eng.,May 2013.
[5] Prof. A. Gadekar, N. Waghmare, P. Taralkar, R.
Dapke, “Detecting and ReportingbugsbyusingData
Reduced technique”, August 2015.
[6] S. N. Ashan, J. Ferzund and F. Wotawa, “Automatic
Software Bug Triage System (BTS) Based on Latent
Semantic Indexing and Support Vector
Machine”,2009.
[7] W. Zou, Y. Hu, J. Xuan, and H. Jiang, “Towards
training set reduction for bug triage,” in Proc. IEEE
35th Annual CS and Application Conference,
Washington, DC, USA: IEEEComputerSociety,2011.
[8] Thomas Zimmermann,Rahul premraj, Jonathan
Sillito,Silvia Brell, “Improving Bug Tracking
Systems”, ICSE’09,May 2016.
[9] Mayy Habayeb, Andriy Miranskyy, Syed Shariyar
Murtaza, Leotis Buchanan, Ayse Bener,”TheFirefox
Temporal DefectDataset”,12thWorkingConference
on Mining Software Repositories, IEEE ,2015.
[10] V Govindasamy, V Akila, “Data Reduction
For Bug Triage Using Effective Prediction Of
Reduction Order Techniques”, International
Conference on Computation of Power, Energy
Information and Communication (ICCPEIC),2016.
[11] Jifeng Xuan ,He Jiang, Zhilei Ren ,Weiqin
Zou,” Developer Prioritization in Bug
Repositories”,ICSE,2012.
[12] E. Murphy-Hill, T. Zimmermann, C. Bird,
and N. Nagappan, “The design of bug fixes,” in Proc.
Int. Conf. Softw. Eng., 2013, pp. 332–341.
[13] Stefan R¨abiger, Ataman Giris¸ken, and
Cemal Yilmaz,” How to Provide Developers only
with Relevant Information?”, 27th International
Workshop on Empirical Software Engineering in
Practice, IEEE, 2016
[14] C. C. Aggarwal and P. Zhao, “Towards
graphical models for text processing”,Knowl.
Inform. Syst., vol. 36, no. 1, pp.1-21, July 2012.s
[15] X. Zhu and X. Wu, “Cost-constrained data
acquisition for intelligent data preparation,” IEEE
Trans. Knowl. Data Eng., vol. 17, no. 11, pp. 1542–
1556, Nov. 2005.
[16] J. Anvik,”Automatic bugreportassignment
,” in Proc 28th International Conference onSoftware
Engineering. ACM, 2006.

More Related Content

What's hot

A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...IJCI JOURNAL
 
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug TriageSurvey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug TriageIRJET Journal
 
Benchmarking machine learning techniques
Benchmarking machine learning techniquesBenchmarking machine learning techniques
Benchmarking machine learning techniquesijseajournal
 
Bug or Not? Bug Report Classification using N-Gram Idf
Bug or Not? Bug Report Classification using N-Gram IdfBug or Not? Bug Report Classification using N-Gram Idf
Bug or Not? Bug Report Classification using N-Gram IdfHideaki Hata
 
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning ApproachIRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning ApproachIRJET Journal
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET Journal
 
Generation of Search Based Test Data on Acceptability Testing Principle
Generation of Search Based Test Data on Acceptability Testing PrincipleGeneration of Search Based Test Data on Acceptability Testing Principle
Generation of Search Based Test Data on Acceptability Testing Principleiosrjce
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
Application of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A ReviewApplication of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A ReviewIRJESJOURNAL
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSijseajournal
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Reviewinventionjournals
 
Predicting More from Less: Synergies of Learning
Predicting More from Less: Synergies of LearningPredicting More from Less: Synergies of Learning
Predicting More from Less: Synergies of LearningCS, NcState
 
IRJET- Instant Exam Paper Generator
IRJET- Instant Exam Paper GeneratorIRJET- Instant Exam Paper Generator
IRJET- Instant Exam Paper GeneratorIRJET Journal
 
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...CSCJournals
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...ijseajournal
 
Abstract.doc
Abstract.docAbstract.doc
Abstract.docbutest
 

What's hot (18)

A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
 
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug TriageSurvey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
 
Benchmarking machine learning techniques
Benchmarking machine learning techniquesBenchmarking machine learning techniques
Benchmarking machine learning techniques
 
Bug or Not? Bug Report Classification using N-Gram Idf
Bug or Not? Bug Report Classification using N-Gram IdfBug or Not? Bug Report Classification using N-Gram Idf
Bug or Not? Bug Report Classification using N-Gram Idf
 
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning ApproachIRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning Approach
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
Generation of Search Based Test Data on Acceptability Testing Principle
Generation of Search Based Test Data on Acceptability Testing PrincipleGeneration of Search Based Test Data on Acceptability Testing Principle
Generation of Search Based Test Data on Acceptability Testing Principle
 
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATIONONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
ONE HIDDEN LAYER ANFIS MODEL FOR OOS DEVELOPMENT EFFORT ESTIMATION
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
Application of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A ReviewApplication of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A Review
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Review
 
Predicting More from Less: Synergies of Learning
Predicting More from Less: Synergies of LearningPredicting More from Less: Synergies of Learning
Predicting More from Less: Synergies of Learning
 
IRJET- Instant Exam Paper Generator
IRJET- Instant Exam Paper GeneratorIRJET- Instant Exam Paper Generator
IRJET- Instant Exam Paper Generator
 
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...
A DATA EXTRACTION ALGORITHM FROM OPEN SOURCE SOFTWARE PROJECT REPOSITORIES FO...
 
Abstract.doc
Abstract.docAbstract.doc
Abstract.doc
 

Similar to Bug Triage: An Automated Process

Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...eSAT Journals
 
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUESAUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUESJournal For Research
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESTOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESijaia
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksEditor IJCATR
 
A Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug ClearanceA Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug ClearanceIRJET Journal
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...iosrjce
 
Deepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningDeepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningIRJET Journal
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodIRJET Journal
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using associationiaemedu
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using associationiaemedu
 
Art of software defect association & correction using association rule mining
Art of software defect association & correction using association rule miningArt of software defect association & correction using association rule mining
Art of software defect association & correction using association rule miningIAEME Publication
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using associationiaemedu
 
Development of software defect prediction system using artificial neural network
Development of software defect prediction system using artificial neural networkDevelopment of software defect prediction system using artificial neural network
Development of software defect prediction system using artificial neural networkIJAAS Team
 
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation TechniquesReview on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniquesijtsrd
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...IOSR Journals
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsIRJET Journal
 

Similar to Bug Triage: An Automated Process (20)

IJET-V2I6P28
IJET-V2I6P28IJET-V2I6P28
IJET-V2I6P28
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...
 
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUESAUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESTOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
 
A Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug ClearanceA Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug Clearance
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
 
F017652530
F017652530F017652530
F017652530
 
Deepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningDeepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine Learning
 
J034057065
J034057065J034057065
J034057065
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using association
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using association
 
Art of software defect association & correction using association rule mining
Art of software defect association & correction using association rule miningArt of software defect association & correction using association rule mining
Art of software defect association & correction using association rule mining
 
Art of software defect association & correction using association
Art of software defect association & correction using associationArt of software defect association & correction using association
Art of software defect association & correction using association
 
Development of software defect prediction system using artificial neural network
Development of software defect prediction system using artificial neural networkDevelopment of software defect prediction system using artificial neural network
Development of software defect prediction system using artificial neural network
 
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation TechniquesReview on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming Assignments
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

Bug Triage: An Automated Process

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 568 Bug Triage: An Automated Process Fareen Sayed1, Hetvi Shah2, Namrata Kharat3 , Prajakta Ohal4, Gopal Deshmukh5 1,2,3,4 UG Student, M.E.S. College of Engineering, Pune, Maharashtra,India 5Dept. Of Computer Engineering, M.E.S College of Engineering,Pune,Maharahtra,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Bug triage means to transfer a new bug to expertise developer. The manual bug triage allocationprocess is opulent in time and poor in accuracy. There is a need to automatize the bug triage process. In order to automate the bug triage process, text classification techniques are applied using stopword removal andstemming. Intheproposedpaper, NB-Classifiers is used to predict the appropriate developers to whom the particular bug can be allocated. The datareduction techniques like instance selection and keyword selection are used to obtain bug report and words related to bugs. The proposed system will predict only those developers who are expertise in solving the particular bug. The status of bug will be tracked by the proposed system and if the bugissolvedthen the bug status will be updated as solved in the database. The solves bug will not be allocated to any developer in the future but if a particular developer fails to solve the bug then the bug will be allocated to another set of appropriate developers. The proposed system is built with intention to suggest or recommend the bug and not to manually assign it to any developer randomly. The proposed system will provide an efficient window to handle real timecrisisthatcomeupduring project development lifecycle. Key Words: Data Reduction, Bug triage, Bug Report, Instance Selection, Keyword Selection, Text Classification. 1. INTRODUCTION An error or faults that occur in a system and causes unexpected results is nothing but a software bug. Software organizations spend a large amount of expense to handle software bugs. Bug fixing is an important part in every softwarecompanies.Current softwareframeworksconsistof repositories that contain immense databases for storing the results of software frameworks. The old frameworks aren’t entirely suitable for immense and complicated data in repositories. Data mining has developed encouraging ways to deal with software data. By using data mining methods, digging repositories can discover charismatic data and can solve realistic problems. A bug repository contains bug reports and actasa crucial part in handling bugs. Bug reports or record consists of textual details of a bug. Large projects set out bug tracking systems to collect information and to aid developers to manage bugs. Challenges arise as there are large amount of bugs disclosed each day. A process of managing bugs is bug triage. In traditional organizations, new bugs are assigned manually to an expert developer. Due to manual assessment of bug, this process has low accuracy and also takes an inadequate amount of time. Also, sometimes the new bug is assigned to a developer who doesn’t have much knowledge about that bug. Since the human/manual bug triage system had many disadvantages, existing work has proposed automatic bug triage approach. In this approach, a bug report undergoes text classification techniques. In this paper, we are going to use two text classification techniques namely, stopword removal and stemming. Stopword removal will help to remove unnecessary words (e.g. ‘a’, ’the’, ’this’, and’, etc.) from the bug report. Stemming is useful to reduce words into its root form (e.g. words like ‘engineering’, ‘engineered’ sharea commonbase- ‘engineer’). After text classification, data reductionisused to address quality of data. In this paper, we will combine keyword selection algorithm and instance selection algorithm to obtain word dimension and bug dimension. This new bug report will be then given to NB- Classifier for prediction of developers. NB- Classifier will predict the top five developers based on their history and profile (skills). The remainder of paper comprises of following sections. Section II shows literature survey. Section III contains proposed system followed by algorithms in Section IV. Section V includes system results and Section VI concludes. 2. RELATED WORK [1] Jiefng Xuan et al. marks the issue of noisy and low quality of data. They employ data reduction strategies by combining instance selection and feature selection. They made use of predictive model to decide the order ofinstance selection and feature selection. They used text classification techniques and solved the bugs. Inthispaper,theyhaveused Naïve Bayes algorithm to predict developers. Their work provided an approach to leveraging techniques on data processing to form reduced and high-quality bug data in software development and maintenance. [2] In this paper they investigated whether we can accurately predict the severity of a reported bug by analysing its textual description using text mining algorithms. Based on three cases drawn from the open- source community (Mozilla, Eclipse and GNOME), they concluded that given a training set of sufficient size (approximately 500 reports per severity), it is possible to predict the severity with a reasonable accuracy (both
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 569 precision and recall varybetween0.65-0.75withMozilla and Eclipse; 0.70-0.85 in the case of GNOME). [3] In this paper, they performed an empirical studyofbug- fixing time for three CA Technologies projects. They proposed a Markov-basedmethodforpredictingthenumber of bugs that will be fixed in future. For a given number of defects, they proposed a method for estimating the total amount of time required to fix them based on the empirical distribution of bug-fixing time derived from historical data. They evaluated these methods using real maintenance data from three CA Technologies projects. The results show that the proposed methods are effective. [4] in this paper, they dealt with data reductionproblems. They combined feature selection with instance selection for data diminution to construct the reduced data set and improve the quality of bug data. The resultsshowedthatthis data diminution technique will provide good quality of data and decrease scale. [5] In this paper, they have presented a comparative analysis of different available information retrieval and machine learning methods in order to automate the assignment of bug reports to developers in an optimal fashion. The target was to find a combination of methods, which is most suitable to finally develop a high performance bug triage system. They used these five data sets and apply multiple machine learning algorithms. All of these seven ML algorithms belong to the class of supervised machine learning methods, and are used for single-label multi-class classification. The experimental results indicated that classification based on LSI and support vector machine has the best accuracy, precision, and recall values. [6] proposed the concept for text representation and processing. They made used of distance graph to represent the documents in terms of distance between the distinct words. This provided a much richer representation in terms of sentence structure of the underlying data. [7] they proposed four broad areas for improvements. To demonstrate the potential of this idea they conducted an initial study in which they simulated an interactive bug tracking system. This helped them to speeduptheprocessof resolving bugs. [8] they introduced a novel dataset mined from the Firefox bug repository(Bugzilla)whichcontainsinformation about the temporal alignment of developer interactions. They presented a Firefox Temporal Defect Dataset (FTDD) and the rationale for selecting the key activities which it captures. Also they have described the FTDD schema and data sources. They presented an exploratory analysis on the dataset that we mined. [9] The aim of this paper was to attain a data setreduction in bug triage by including the representative values along with the statistical values of the bug data set. They considered the dataset from the open source projectEclipse. They focused on reducing the data scale and thereby improving the accuracy. They achieved theiraimby building a representative model for prediction of reductionorders by including the summary, metadata. Their proposed work attains an accuracy result of 96.5% that is better when compared with existing work. [10] this paper presents a model for the developer prioritization in bug repositories by extending a socio- technical approach. They analysed three problems of the developer prioritization, namely the characteristics in products, the evolution, andthetoleranceof noises.Basedon the analysis, they investigated the ways to leverage the developer prioritizationtoimprovethreetypical tasksinbug repositories. The results were studied on over 900000 bug reports in Eclipse and Mozilla. 3. PROPOSED SYSTEM In traditional software establishment, new bugs are human triaged by a skilled developer. This approach has disadvantages, as there are large number of bugs and a shortage of expertise to fix all bugs. Also, it has poor accuracy and is time consuming. To desist from high cost of manual triage, an automatic way for bug triage process is proposed. Fig. 1, illustrates the basic framework of bug triage based on text classification. A bug data set contains bug reports with respective developers. On this bug data set, the bug data reduction is applied as a phase in data preparation of bug triage. The proposed architecture combines existing techniques of instance selection and keyword (feature) selection to remove certain bug reports and words. A problem for reducing the bug data is to discover the orderof instance selection and keyword selection, which is denoted as the prediction of reduction orders. Fig. 1 Framework of Bug Triage Based On Text Classification.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 570 In bug triage, a bug data set is converted into text matrix with two dimensions, namely the bug dimension and the word dimension. The combination of instance selection and keyword selection is used to generate a reduced bug data set. The original data set is replaced with the reduced data set for bug triage. For given data set in a certain application, instance selection is to obtain a subset of suitable instances while keyword selection aims to obtain a subset of suitable words in bug data set. Given an instance selection algorithm IS and keyword selection algorithm KS, we use KS!IS to denote the bug data reduction, which first applies KS and then IS; on the other hand, IS!KS denotes first applying IS and then KS. Fig. 2 System Architecture 4. ALGORITHMS Proposed work consists of various algorithms that helps in predicting developers. The algorithms used are as follow: 4.1 Text-Classification In order to automate the process of bug triage, text classification techniques are used. Text classification allots one or more classes to document based on their content. In our work, we are using stopword removal followed by stemming. Input Bug Report:- Bug ID : Unique Id Summary : Description Creation Time : YYYY/MM/DD Status : New Table No.1 Input data for text classification a) Stop word Removal Words which don’t import peculiar knowledge in bug report are known as stop words. For eg.,the, an, who, how,where,etc. Steps for stop word removal algorithm: i. Prepare stop word list using Word Net dictionary. ii. Get statement from user. iii. Convert statement into words. iv. for each word in statement check if word is present in Stop WordsList. v. if yes, then continue the loop vi. else add word to preprocessedStatement vii.end for viii. preprocessedStatement is the final statement b) Stemming The preprocessedStatement is given to stemming for further process. Each term arriving is reduced into its root form through stemming process. For example, 'danced','dancing' all share a equivalent root base :'dance'.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 571 4.2 Data Reduction Techniques After applying text classification via stopword removal and stemming the bug report undergoes data reduction for further process. Data reduction includes keyword selection(KS) and instance selection(IS) algorithm to obtain word dimension and bug dimension respectively. Data reduction techniques helps to improve scale and quality of bug report. Our work combines KS and IS. a) Keyword Selection Algorithm In keyword selection algorithm, we use CHI-square to determine whether thereisa significantassociation between two variables. Similarly, the proposed system uses CHI- square test to determine the similarities between two developers. The developer profiles which matches the bug more appropriately is kept and theotherprofileisdiscarded. Thus, CHI-square test is used to reduce the number of developers that could be assigned to a particular bug. It includes four steps in determining the association and they are as follow: 1. State of Hypothesis: Suppose that variable A has keywords with r levels and variable B has developer’s with c levels then, Null hupothesis(Ho): States that keywords and developers are independent. Alternative hypothesis(Ha): States that keywords and developers are not independent. 2. Formulate Analysis Plan: It describes howto usesample data to accept or reject the null hypothesis. The plan should specify significance level i.e any value between0 and 1. 3. Analyze Sample Data: Using sample data, we find degree of freedom, expected frequencies, test statics and P-value associated with test statistics. The illustration through formulas is as follow: (a) Expected Frequency (Er,c) = (nr*nc)/n where, Er,c= expected frequency count for level r of variable A and level c for variable B. nr= total number of sample observed at level r of variable A. nc= total number of sample observed at level c of variable B. n= total sample size. (b) Test statistics: Chi-square random variable X2 defined by the following equation: X2 = [(Or,c-Er,c)2/ Er,c] where, Or,c = Observed frequency count at level r of variable A and level c of variable B. Er,c = Expected frequency count at level r of variable A and level c of variable B. 4. Interpret Results This involves comparing P-value to significance level and rejecting the null hypothesis when the P-value is less than significance level. b. Instance Selection Algorithm Our work uses cosine similarity to find how similar the text are purely in terms of word countsignoringthewordsorder. It compares two sets of bug reports. Set A contains new bug report and Set B contains existing bug report of the developer. Then using the formula: Cos Ɵ = We check the similarity between two sets of report.If the similarity is greater than the thresholdvalue,thenthereport is stated as duplicate and is given as a reference of previously solved report. Else it is passed to NB Classifier. 4.3 NB- Classifier NB classifier algorithm is used to predict developers. Table No.2 shows learning data set which is given input to NB Classifier. Dev 1 Dev 2 . . . Dev n [Keyword Count] [Keyword Count] [Keyword Count] Table No.2 Input for NB Classifier Along with this data the input also contains keyword count of new bug report. By using these counts we calculate prior, likelihood and posterior probability respectively. Based on maximum posterior probability the prediction order of developer is decide.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 572 5. SYSTEM RESULTS 1] Screenshot showing the login screen 2] Screenshot showing the functionality of bug data set creation. 3] Screenshot showing the information of all bugs added by tester. 4] Screenshot showing the information of all the bugs in the system. 5] Screenshot showing the list of predicted developers for a particular Bug Id. 6. CONCLUSION Bug fixing is an elegant part of software organization. One of the major challenges in process of bug triage is to assign a skilled developer to fix a new bug. In this paper, we presented the complete abstraction of an automatic bug triage approach. We proposed a framework that removes the issue of data reduction to a huge extent. By combining KS and IS techniques, better quality of data can be obtained. In this paper, we used NB-Classifier which will help in suggesting a list of expert developers for fixing the bug. In future work, we will evaluate the results of bug triage on open source project namely Bugzilla.Bugzilla isa testing tool developed and used by Mozilla. Also, we will explore and experiment on more advance methods to improve the existing functioning of our bug triage approach.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 573 Reference [1] Fareen Sayed, Hetvi Shah, Namrata Kharat,Prajakta Ohal,Gopal Deshmukh, “Automatic Bug Triage With Data Reduction”, International Journal Of Engineering And Techniques, vol 2 Issue 6,2016. [2] JifengXuan, He Jiang. Yan Hu, ZhileiRen, WeiqinZou, ZhongxuanLuo,and XindongWu,”TowardsEffective Bug Triage with Software Data Reduction Techniques” IEEE Transaction on Knowledge and Data Engineering, vol. 27, no. 1,January 2015. [3] Lamkanfi, S. Demeyer, E. Giger, and B. Goethals, “Predicting the severity of a reported bug,” in Proc. 7th IEEE Working Conf. Mining Softw. Repositories,May 2010. [4] H. Zhang, L. Gong, and S. Versteeg, “Predicting bug- fixing time: An empirical study of commercial software projects,” in Proc. 35th Int. Conf. Softw. Eng.,May 2013. [5] Prof. A. Gadekar, N. Waghmare, P. Taralkar, R. Dapke, “Detecting and ReportingbugsbyusingData Reduced technique”, August 2015. [6] S. N. Ashan, J. Ferzund and F. Wotawa, “Automatic Software Bug Triage System (BTS) Based on Latent Semantic Indexing and Support Vector Machine”,2009. [7] W. Zou, Y. Hu, J. Xuan, and H. Jiang, “Towards training set reduction for bug triage,” in Proc. IEEE 35th Annual CS and Application Conference, Washington, DC, USA: IEEEComputerSociety,2011. [8] Thomas Zimmermann,Rahul premraj, Jonathan Sillito,Silvia Brell, “Improving Bug Tracking Systems”, ICSE’09,May 2016. [9] Mayy Habayeb, Andriy Miranskyy, Syed Shariyar Murtaza, Leotis Buchanan, Ayse Bener,”TheFirefox Temporal DefectDataset”,12thWorkingConference on Mining Software Repositories, IEEE ,2015. [10] V Govindasamy, V Akila, “Data Reduction For Bug Triage Using Effective Prediction Of Reduction Order Techniques”, International Conference on Computation of Power, Energy Information and Communication (ICCPEIC),2016. [11] Jifeng Xuan ,He Jiang, Zhilei Ren ,Weiqin Zou,” Developer Prioritization in Bug Repositories”,ICSE,2012. [12] E. Murphy-Hill, T. Zimmermann, C. Bird, and N. Nagappan, “The design of bug fixes,” in Proc. Int. Conf. Softw. Eng., 2013, pp. 332–341. [13] Stefan R¨abiger, Ataman Giris¸ken, and Cemal Yilmaz,” How to Provide Developers only with Relevant Information?”, 27th International Workshop on Empirical Software Engineering in Practice, IEEE, 2016 [14] C. C. Aggarwal and P. Zhao, “Towards graphical models for text processing”,Knowl. Inform. Syst., vol. 36, no. 1, pp.1-21, July 2012.s [15] X. Zhu and X. Wu, “Cost-constrained data acquisition for intelligent data preparation,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 11, pp. 1542– 1556, Nov. 2005. [16] J. Anvik,”Automatic bugreportassignment ,” in Proc 28th International Conference onSoftware Engineering. ACM, 2006.