SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 461
Survey on Software Data Reduction Techniques accomplishing Bug
Triage
Renu Jaiswal1, Prof. Mahendra Sahare2, Dr. Umesh lilhore3
1M.Tech. Scholar Department of computer science and engineering NIIST Bhopal
2Prof. Department of computer science and engineering NIIST Bhopal
3Dr. Department of computer science and engineering NIIST Bhopal
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the tremendous increase in software
development, Bug triage has become a essential and helpful
step in the stage of bug handling. Bug triage is a strategy to
manage the unfixed bug which will get relegated to a right
designer for additionally settling a bug. In this paper a
detailed discussion was done for the identification of bugs
into their respective class. For the identification SVM, ANN,
Decision tree, etc are explained. Here features relatedtobug
are described such asterms, pattern, etc.Variousapproaches
of classification was also list in the paper as well.
Key Words: Bug Reports, Data Reduction, Bug Triage,
Software Maintenance.
1.INTRODUCTION
A huge amount is required in handling thesoftwarebugsina
software company. Bug triage presents a process of
evaluating defect reportsto determinetheirimpactofaction.
In the context of software testing, it is used to define the
severity and priority for new defects and mostly suitable for
large project where large number of major defects comes
into picture.
Software repositories maintains the output of development
process of any software like bug reports, source code, mails
etc. A bug repositories will have an open bug report for
which, a developer and a user publishordeal withtheissues,
present in the software, fix the issue with some
enhancement and mark the current bug report. Challenge of
bug
Triage is to manage the extensive scale bug information and
low quality information. Manual bug triage isn't easy
because of time utilization and less accuracy outcomes. A
programmed bug triage is an option and better approach
which deals with the cost and precision gets expanded.
Programming examination is mind boggling for huge scale
information and complex information exhibit in the
storehouses. To diminish the time cost in manual
undertaking, content order systems are connected for
programmed bug triage.
Here, information decrease for bug triage is manage with to
such an extent that the quality upgrades the bug triage work
while cost is diminished. Assessment is done on the size of
the informational index and precision of bug triage process.
Qualities from chronicled bug informational indexes are
removed and helps in building a prescientmodel foranother
bug informational index. Bug reports from two expansive
open source ventures, Eclipse and Mozilla are gathered and
examined for the execution of information diminishment.
This thought comes about the information decrease to
proficiently limit the information scale and overhaul the
precision of bug triage.
Here, objective is, to diminish the bug measurement and
word measurement which will thusly lessen the size of the
information alongside increment in the nature of the
information. To encourage the bug triage process,thought is
to raise the informational collection to set up a
preprocessing model, to be connected before the real bug
triage process which tends to improve the aftereffects of
information diminishment. Assist it can be utilized as an
overview the choices of creating the great quality bug
informational collection and handlecertainarea determined
programming work.
2. Literature Survey
In the paper [2] the author recommended that the web
content accidents and misshapen progressively produced
website pages are normal blunders, and they genuinely
affect the convenience of Web applications. It gives a
dynamic test age procedure for the area of dynamic Web
applications. The system uses both joined concrete and
emblematic execution and express state demonstrate
checking. The procedurecreatestestsconsequently,runs the
tests catching intelligent limitations on inputs,andlimitsthe
conditions on the contributions to coming up short tests so
the subsequent bug reports are little and valuable in finding
and settling the basic deficiencies.
In the paper [4] the author suggested that the quick
multiplication of the World Wide Web has expanded the
significance and commonness of content as a medium for
scattering of data. In this paper, it presents the idea of
separation diagram portrayals of content information. Such
portrayals save data about the relative requesting and
separation between the words in the diagrams, and give a
considerably wealthier portrayal asfarassentencestructure
of the hidden information.Thisapproachempowerslearning
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 462
revelation from content which isn't conceivable with the
utilization of an unadulterated vector-space portrayal,since
it loses considerably less data about the requesting of the
fundamental words.
In the paper [5] the author recommended that hunting an
association's report archives down specialists gives a
inexpensive answer for the undertaking of master finding.
Author show two general procedures to master seeking
given a report accumulation. The first of these specifically
models a specialist's information in light of the records that
they are related with, while the second finds archives on
subject, and after that finds the related master.Shapingsolid
associations is critical to the executionofmasterdiscovering
frameworks.
In the paper [6] the author recommended that the
unsupervised methods like grouping might be utilized for
blame expectation in programmingmodules, where fault are
not accessible. In this paper a Quad Tree-based K-Means
calculation has been connected for foreseeing shortcomings
in program modules.
In the paper [7] the author suggested that the essential
closest neighbor classifier experiences the unpredictable
stockpiling of all displayed preparing cases. With an
extensive database of cases characterization reaction time
can be moderate. At the point when boisterous occurrences
are available, grouping exactness can endure. By erasing
occasions, the two issues can be reduced. Taking this into
issue calculation is produced that adversaries the best
existing calculation.
In the paper [9] the author recommended that with the
appearance of high dimensionality,sufficientIDofapplicable
highlights of the information has turned out to be
troublesome in certifiable situations. With such a
tremendous assemblage of calculations accessible, picking
the sufficient element choice technique isn't a simple to-
comprehend question and it is important to check their
adequacy on various circumstances. In this paper, a few
engineered datasets are utilized for this reason, going for
surveyingthe executionofhighlightdeterminationstrategies
within the sight of a bow number or unimportant highlights,
commotion in the information, repetition and
communication between properties, and in addition a little
proportion between number of tests and number of
highlights.
In the paper [12] the authors suggest that in information
mining applications, information occasions are normally
portrayed by an immense number of highlights. The greater
part of these highlights are unimportant or repetitive, which
adversely influences the proficiencyandadequacyofvarious
learning calculations. The choice of significant highlightsisa
urgent errand which can be utilized to permit a superior
comprehension of information or enhance the execution of
other learning undertakings. The paper initially
characterizes a successful model for unsupervised
component choice which measures the remaking blunder of
the information network in light of the chose subset of
highlights. The paper at that point shows a novel calculation
for voraciously limiting the recreation mistakeinviewofthe
highlights chose up until this point.
3. Features of Text Mining
Content mining strategiesdependsonhowmessage
report are dissected. In these strategies for content mining
content archive dissected on the premise of term,
expression, idea and example. In light of the data recovery
there are four strategies, 1) Term Based Method (TBM). 2)
Phrase Based Method (PBM). 3) Concept Based Method
(CBM). 4) Pattern Taxonomy Method (PTM).
A. Term Based Method: Term in archive is utilized to decide
substance of content. In Term Based Method each term in
archive is related with esteem known as weight, which
measure significance of term i.e. terms commitment in
archive. Word having semantic importanceisknown asterm
and accumulation of such terms contributes significance to
report. Term based strategies experience theill effectsofthe
issues of polysemy and synonymy. Polysemy implies a word
has numerous implications and synonymyisdifferentwords
having a similar importance. The semantic importance of
many found terms is dubious for noting what clients need.
Data recovery gave many term-basedstrategieslikedirected
and conventional term weighting techniques to fathom this
test.
B. Expression Based Method: Phrases are not so much
equivocal but rather more discriminative thansingularterm
so in state construct strategy reportisdissected withrespect
to express premise. In procedure of investigation of record
phrases are profile descriptor of archive. Expressions are
accumulation of semantic terms so conveys more data than
single term. Over numerous years this is speculation that
expression based approach performs superior to anything
term based approach, as expression may convey more
semantic than term. Utilizing information mining
calculations it isunequivocal toacquiredifferent expressions
yet it is hard to utilize these expressions viably to answer
what client need. It is troublesome on the grounds that
expressions have less events in record and expressions
include vast number of loud with excess terms. As
expressions are gathering of terms those can be considered
as succession of terms and consequently to discover
arrangement of terms consecutive example mining
calculation is utilized. Calculationseparatesvisitconsecutive
examples, here example utilized as words or expression
which is extricated from record.
C. Idea Based Method: Most of content mining systems
depend on word or potentially express investigation of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 463
content. It is imperative to discover term that contributes
more semantic significance to record this idea is known as
idea based strategy. Just the significance of term inside
archive is caught in factual examination of term based
strategy. In idea based strategy the term which adds to
sentence semantic is investigated as for its significance at
sentence and record levels. The model tries to examineterm
at sentence and report level by effectively finding critical
coordinating term instead of single term examination.
D. Example Based Model: In design construct showreport
is examined in light of example premise i.e. example of
report is shaped bydissectingis-a connectionbetweenterms
to frame scientific classification. Scientific classification is
tree like structure The example basedapproachcanenhance
the exactness of framework for assessing term weights on
the grounds that found examples are more particular than
entire archives. To create PTM record split into passages. In
design scientific categorization the hubs speak to visit
designs and their covering sets. The edges are "is-a"
connection. Smaller example in scientific categorization are
normally more broad since they could be utilized as a partof
both positive and negative archives. Bigger examples in
scientific categorization are typically more particular since
they might be utilized as a part of positive reports. The
semantic data will be utilized as a part of the example
scientific classification to enhance the execution of utilizing
shut examples in content mining.
4. Background
A. Information Reduction: Data decrease is a procedure of
changing numerical or in order computerized data into a
lessened information keeping up the trustworthiness of the
first information. Mining on a less volume information
should deliver practically a similar outcome yet being more
proficient.
B. Advantage Of Data Reduction: Applying information
diminishment with the plan to decrease the information
scale and enhance the exactness of bug triage. Diminished
information scale will in the end spare the work cost of
designer in settling the bug. Exactness of bug triage is
inspected by expelling boisterous, copy and insignificant
reports from the informational index. Unique informational
index gets supplanted with the diminished informational
index for bug triage.
C. Bug Or Defect Lifecycle In Software Testing: Bugs may
show up at any stage like planning stage, improvement
arrange, testing stage and so on in a framework
advancement lifecycle (SDLC).When the bug is seen, its
status given is "NEW". After the advancement group
approves and acknowledges, it is "Appointed" to the
designer. At the point when the bug is "Settled", it is checked
for the acknowledgment by the testing group. Contingent on
the impacts its status will be either "Confirmed" or
"Revived". Some extra audit should be possible to make the
status of the bug as "Shut". Testing group may revivethebug
if any lethal impact is watched once more. Members in the
process may incorporate bug journalist, bug following
device, bug gathering and bug proprietor.
5. Techniques of Classification
A. Decision tree
Decision tree grouping is the taking in of decision treesfrom
class named preparing tuples [2]. A decision tree is a
flowchart like tree structures, where each inside node
indicates a test on a characteristic, each branch speaks to a
result of the test, and each leaf node holds a class mark.[2].
Points of interest: Amongst other information mining
strategies, decision trees have different focal points [1].
Decision trees are easy to comprehend and decipher. They
require little information and can deal with both numerical
and clear cut information. It is conceivable to approve a
model utilizing factual tests. They are strong in nature, in
this way, they perform well regardless of the possibility that
its suppositions are to some degree disregarded by the
genuine model from which the information were produced.
Decision trees perform well with extensive information in a
brief span. A lot of information can be broke down utilizing
computers in a period sufficiently short to empower
partners to take decisions in view of its investigation.
B. Limitations:
The issue of taking in an ideal decision tree is known to be
NP-finished. Thus, functional decision tree learning
calculations depend on heuristic calculations, for example,
the covetous calculation where locally ideal decisions are
made at every node. Such calculationscan'tensuretorestore
the all around ideal decision tree. Decision tree students
make over-complex trees that don't sum up the information
well. This is brought over fitting. Components, for example,
pruning are important to keep away from this issue.
C. Nearest neighbor classifier
The k-closest neighbor's calculation (k-NN) is a strategy for
grouping objects in view of nearest preparing cases in the
component space. K-NN is a kind of example based learning,
or apathetic learning. It can likewise be utilized for relapse.
The k-closest neighbor calculation is among the most
straightforward of all machine-learning calculations. The
space is parceled into districts by areas and names of the
preparation tests. A point in the space is appointed to the
class c on the off chance that it is the most successive class
name among the k closest preparing tests. Generally
Euclidean remove is utilized as the separation metric;
however this will just work with numerical esteems. In
cases, for example, content grouping another metric, for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 464
example, the cover metric (or Hamming separation) can be
utilized.
D. Artificial neural network
Neural Networks are expository methods demonstrated
after the procedures of learning in the psychological
framework and the neurological elements of the cerebrum
and equipped for anticipating new perceptions (on
particular factors) from different perceptions (on the same
or different factors) in the wake of executing a procedure of
socalled gaining from existing information.Neural Networks
is one of the Data Mining methods. The initial step is to plan
a particular system design (that incorporates a particular
number of "layers" each comprising of a specific number of
"neurons"). System is then subjected to the way toward
"preparing." In that stage, neurons apply an iterative
procedure to the quantity of contributions to modify the
weights of the system keeping in mind the endgoal toideally
foresee the specimen information on which the
"preparation" is performed. After the period of gaining from
a current informational index, the new system is prepared
and it would then be able to be utilized to produce forecasts.
The subsequent "system" created during the time spent
"learning" speaks to an example recognized in the
information.
E. D. Support vector machines
Support Vector Machines were first acquainted with solve
the pattern and regression issues by Vapnik andhispartners
[8]. Support vector machines (SVMs) are an arrangement of
related regulated learning techniques utilized for grouping
and relapse [2]. Survey input information as two
arrangements of vectors in a ndimensional space,a SVMwill
build an isolating hyper-plane in that space, one which
expands the edge between the two informational collections
[2]. To figure the edge, two parallel hyper-planes are
developed, one on each side of the isolating hyper-plane,
which are "pushed up against" the two informational
collections [2]. A decent partition is accomplished by the
hyper-plane that has the biggest separation to the
neighboring information purposes of the two classes, since
by and large the bigger the edge the lower the speculation
mistake of the classifier [2]. This hyperplane is found by
utilizing the help vectors and edges.
6. PROBLEM FORMULATION
 In base paper binary classifier was used for bug
triage. As in case of multiclass bugs this approach is
not feasible.
 Training of the classifier is required, so adoption of
new bug need prior or human involvement.
 Execution time for the comparison of words are
quite large as this required each characters.
 Accuracy of classifier need to be
improved.
7. PROPOSED WORK
 Multiclass classifier should be used.
 Unsupervised model for the classificationshouldbe
need.
 Comparison should be doneinnumericforreducing
the execution time.
 Genetic algorithm such as TLBO (Teacher learning
based optimization)
8. CONCLUSIONS
Software development venture generally gets influenced
while managing the bugs. Along these lines, the point is to
lessen the scale and enhancing the natureofbuginformation
for bug triage process. Above perceptions reason that the
information decrease for bug triage in vast bug archives
when examined, this approach gives a decent method on
information preprocessing to come about a diminished and
superb bug information. Since, bug triage is a costly
undertaking of programming upkeep and advancement in
both, time and work cost, our work lessens the size of bug
informational index and enhance the bug information
quality. In this paper, a point by point discourse of the
different highlights and characterization strategies are
Table 1 Comparison of Various techniques advantages and
disadvantages.
Techniques Advantages Disadvantages
NaïveBayesclassifier
improves the bug
triage in handling
bug involving the
developer and also
considers the
unlabeled document.
Naïve Bayes
classifier, SVM
enables the bug
triage in eclipse and
Firefox projects by
assigning bugs.
Card sorting
technique helps the
bug triage processby
showing information
status and notifying
about it.
Domain mapping
matrix helps
recommending the
best developer list
for new bug reports.
Bug assigning task is
done effectively by
assigning a correct
potential developer
saving the resources
used in bug triage.
Efficient way of
assigningbugsandwith
little knowledge in a
company new triage
can be fixed.
Positive interaction
between the developer
and user is observed in
fixing the bugs.
Historical bug report is
ignored to use the
expertise profile for
developer maintenance
.
Sometimes
developer assigned
is not same as the
one who solves and
algorithm
performance does
not result as
estimated.
Process is supported
only by eclipse
,Firefox and gcc
projects.
Applicable only for
Mozilla and eclipse
projects, not for all
projects.
Chroming bug
repository is used.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 465
likewise done. Order methods are utilized to characterize
information into classes with the assistance of the acquired
highlights from the datasets. In future aneffectivealgorithm
is required for the study and classification of bugs which
have effective set of results.
REFERENCES
[1]. Jifeng Xuan, He Jiang, “TowardsEffectiveBugTriagewith
Software Data Reduction Techniques,” IEEE Trans. on
Knowledge and Data Engineering, vol. 27, no. 1, Jan. 2015.
[2] J. Anvik, L. Hiew, and G. C. Murphy, “Who should fix this
bug?” in Proc. 28th Int. Conf. Softw. Eng., May 2006, pp.361–
370.
[3] S. Artzi, A. Kie_zun, J. Dolby, F. Tip, D. Dig, A. Paradkar,
and M. D. Ernst, “Finding bugs in web applications using
dynamic test generation and explicit-state model checking,”
IEEE Softw., vol. 36,no. 4, pp. 474–494, Jul./Aug. 2010.
[4] J. Anvik and G. C. Murphy, “Reducing the effort of bug
report triage: Recommenders for development-oriented
decisions,” ACM Trans. Soft. Eng. Methodol., vol. 20, no. 3,
Bugs 10, Aug. 2011.
[5] C. C. Aggarwal and P. Zhao, “Towards graphical models
for text processing,” Knowl. Inform. Syst., vol. 36, no. 1, pp.
1–21, 2013.
[6] Bugzilla, (2014). [Online]. Avaialble: http://bugzilla.org/
[7] K. Balog, L. Azzopardi, and M. de Rijke, “Formal models
for expert finding in enterprise corpora,” in Proc.29thAnnu.
Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, Aug.
2006, pp. 43–50.
[8] P. S. Bishnu and V. Bhattacherjee, “Software fault
prediction using quad tree-based k-means clustering
algorithm,” IEEE Trans. Knowl. Data Eng., vol. 24, no. 6, pp.
1146–1150, Jun. 2012.
[9] H. Brighton and C. Mellish, “Advances in instance
selection for instance-based learning algorithms,” Data
Mining Knowl. Discovery, vol. 6, no. 2, pp. 153–172, Apr.
2002.
[10] S. Breu, R. Premraj, J. Sillito, and T. Zimmermann,
“Information needs in bug reports: Improving cooperation
between developers and users,” in Proc. ACM Conf. Comput.
Supported Cooperative Work, Feb. 2010, pp. 301–310.
[11] V. Bol_on-Canedo, N. S_anchez-Maro~no,andA.Alonso-
Betanzos, “A Bug of feature selection methods on synthetic
data,” Knowl.Inform. Syst., vol. 34, no. 3, pp. 483–519, 2013.
[12] D. _Cubrani_c and G. C. Murphy, “Automatic bug triage
using text categorization,” in Proc. 16th Int. Conf. Softw.Eng.
Knowl. Eng., Jun. 2004, pp. 92–97.
[13] Eclipse. (2014). [Online]. Available: http://eclipse.org/
[14] A. K. Farahat, A. Ghodsi, M. S. Kamel, “Efficient greedy
feature selection for unsupervised learning,” Knowl.Inform.
Syst., vol. 35, no. 2, pp. 285–310, May 2013.

More Related Content

What's hot

Final Report
Final ReportFinal Report
Final Reportimu409
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated Document
IRJET Journal
 
Towards effective bug triage with software
Towards effective bug triage with softwareTowards effective bug triage with software
Towards effective bug triage with software
Shakas Technologies
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
An efficient tool for reusable software
An efficient tool for reusable softwareAn efficient tool for reusable software
An efficient tool for reusable softwareprjpublications
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
IJDKP
 
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
IOSR Journals
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESTOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
ijaia
 
Ieee transactions on 2018 knowledge and data engineering topics with abstract .
Ieee transactions on 2018 knowledge and data engineering topics with abstract .Ieee transactions on 2018 knowledge and data engineering topics with abstract .
Ieee transactions on 2018 knowledge and data engineering topics with abstract .
tsysglobalsolutions
 
Fault detection of imbalanced data using incremental clustering
Fault detection of imbalanced data using incremental clusteringFault detection of imbalanced data using incremental clustering
Fault detection of imbalanced data using incremental clustering
IRJET Journal
 
Implementation of Prototype Based Credal Classification approach For Enhanced...
Implementation of Prototype Based Credal Classification approach For Enhanced...Implementation of Prototype Based Credal Classification approach For Enhanced...
Implementation of Prototype Based Credal Classification approach For Enhanced...
IRJET Journal
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
IJCERT
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
csandit
 
Data Analytics on Solar Energy Using Hadoop
Data Analytics on Solar Energy Using HadoopData Analytics on Solar Energy Using Hadoop
Data Analytics on Solar Energy Using Hadoop
IJMERJOURNAL
 
A PROCESS OF LINK MINING
A PROCESS OF LINK MININGA PROCESS OF LINK MINING
A PROCESS OF LINK MINING
csandit
 
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
ijsc
 
Developing a framework for
Developing a framework forDeveloping a framework for
Developing a framework for
csandit
 
A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017
Manish K Patel
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
IRJET Journal
 

What's hot (19)

Final Report
Final ReportFinal Report
Final Report
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated Document
 
Towards effective bug triage with software
Towards effective bug triage with softwareTowards effective bug triage with software
Towards effective bug triage with software
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
An efficient tool for reusable software
An efficient tool for reusable softwareAn efficient tool for reusable software
An efficient tool for reusable software
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
Impulsion of Mining Paradigm with Density Based Clustering of Multi Dimension...
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESTOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
 
Ieee transactions on 2018 knowledge and data engineering topics with abstract .
Ieee transactions on 2018 knowledge and data engineering topics with abstract .Ieee transactions on 2018 knowledge and data engineering topics with abstract .
Ieee transactions on 2018 knowledge and data engineering topics with abstract .
 
Fault detection of imbalanced data using incremental clustering
Fault detection of imbalanced data using incremental clusteringFault detection of imbalanced data using incremental clustering
Fault detection of imbalanced data using incremental clustering
 
Implementation of Prototype Based Credal Classification approach For Enhanced...
Implementation of Prototype Based Credal Classification approach For Enhanced...Implementation of Prototype Based Credal Classification approach For Enhanced...
Implementation of Prototype Based Credal Classification approach For Enhanced...
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 
Data Analytics on Solar Energy Using Hadoop
Data Analytics on Solar Energy Using HadoopData Analytics on Solar Energy Using Hadoop
Data Analytics on Solar Energy Using Hadoop
 
A PROCESS OF LINK MINING
A PROCESS OF LINK MININGA PROCESS OF LINK MINING
A PROCESS OF LINK MINING
 
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
AI TESTING: ENSURING A GOOD DATA SPLIT BETWEEN DATA SETS (TRAINING AND TEST) ...
 
Developing a framework for
Developing a framework forDeveloping a framework for
Developing a framework for
 
A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
 

Similar to Survey on Software Data Reduction Techniques Accomplishing Bug Triage

IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET Journal
 
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation TechniquesReview on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
ijtsrd
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
redpel dot com
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET Journal
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
SBGC
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
iosrjce
 
F017652530
F017652530F017652530
F017652530
IOSR Journals
 
Performance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of DocumentsPerformance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of Documents
IRJET Journal
 
IJET-V2I6P28
IJET-V2I6P28IJET-V2I6P28
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET Journal
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming Assignments
IRJET Journal
 
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning ApproachIRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET Journal
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
IRJET Journal
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
eSAT Journals
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
IRJET Journal
 
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET Journal
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
IRJET Journal
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
ijseajournal
 

Similar to Survey on Software Data Reduction Techniques Accomplishing Bug Triage (20)

IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation TechniquesReview on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniques
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
 
F017652530
F017652530F017652530
F017652530
 
Performance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of DocumentsPerformance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of Documents
 
IJET-V2I6P28
IJET-V2I6P28IJET-V2I6P28
IJET-V2I6P28
 
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming Assignments
 
IRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning ApproachIRJET- Software Bug Prediction using Machine Learning Approach
IRJET- Software Bug Prediction using Machine Learning Approach
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
 
Sub1582
Sub1582Sub1582
Sub1582
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

Survey on Software Data Reduction Techniques Accomplishing Bug Triage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 461 Survey on Software Data Reduction Techniques accomplishing Bug Triage Renu Jaiswal1, Prof. Mahendra Sahare2, Dr. Umesh lilhore3 1M.Tech. Scholar Department of computer science and engineering NIIST Bhopal 2Prof. Department of computer science and engineering NIIST Bhopal 3Dr. Department of computer science and engineering NIIST Bhopal ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the tremendous increase in software development, Bug triage has become a essential and helpful step in the stage of bug handling. Bug triage is a strategy to manage the unfixed bug which will get relegated to a right designer for additionally settling a bug. In this paper a detailed discussion was done for the identification of bugs into their respective class. For the identification SVM, ANN, Decision tree, etc are explained. Here features relatedtobug are described such asterms, pattern, etc.Variousapproaches of classification was also list in the paper as well. Key Words: Bug Reports, Data Reduction, Bug Triage, Software Maintenance. 1.INTRODUCTION A huge amount is required in handling thesoftwarebugsina software company. Bug triage presents a process of evaluating defect reportsto determinetheirimpactofaction. In the context of software testing, it is used to define the severity and priority for new defects and mostly suitable for large project where large number of major defects comes into picture. Software repositories maintains the output of development process of any software like bug reports, source code, mails etc. A bug repositories will have an open bug report for which, a developer and a user publishordeal withtheissues, present in the software, fix the issue with some enhancement and mark the current bug report. Challenge of bug Triage is to manage the extensive scale bug information and low quality information. Manual bug triage isn't easy because of time utilization and less accuracy outcomes. A programmed bug triage is an option and better approach which deals with the cost and precision gets expanded. Programming examination is mind boggling for huge scale information and complex information exhibit in the storehouses. To diminish the time cost in manual undertaking, content order systems are connected for programmed bug triage. Here, information decrease for bug triage is manage with to such an extent that the quality upgrades the bug triage work while cost is diminished. Assessment is done on the size of the informational index and precision of bug triage process. Qualities from chronicled bug informational indexes are removed and helps in building a prescientmodel foranother bug informational index. Bug reports from two expansive open source ventures, Eclipse and Mozilla are gathered and examined for the execution of information diminishment. This thought comes about the information decrease to proficiently limit the information scale and overhaul the precision of bug triage. Here, objective is, to diminish the bug measurement and word measurement which will thusly lessen the size of the information alongside increment in the nature of the information. To encourage the bug triage process,thought is to raise the informational collection to set up a preprocessing model, to be connected before the real bug triage process which tends to improve the aftereffects of information diminishment. Assist it can be utilized as an overview the choices of creating the great quality bug informational collection and handlecertainarea determined programming work. 2. Literature Survey In the paper [2] the author recommended that the web content accidents and misshapen progressively produced website pages are normal blunders, and they genuinely affect the convenience of Web applications. It gives a dynamic test age procedure for the area of dynamic Web applications. The system uses both joined concrete and emblematic execution and express state demonstrate checking. The procedurecreatestestsconsequently,runs the tests catching intelligent limitations on inputs,andlimitsthe conditions on the contributions to coming up short tests so the subsequent bug reports are little and valuable in finding and settling the basic deficiencies. In the paper [4] the author suggested that the quick multiplication of the World Wide Web has expanded the significance and commonness of content as a medium for scattering of data. In this paper, it presents the idea of separation diagram portrayals of content information. Such portrayals save data about the relative requesting and separation between the words in the diagrams, and give a considerably wealthier portrayal asfarassentencestructure of the hidden information.Thisapproachempowerslearning
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 462 revelation from content which isn't conceivable with the utilization of an unadulterated vector-space portrayal,since it loses considerably less data about the requesting of the fundamental words. In the paper [5] the author recommended that hunting an association's report archives down specialists gives a inexpensive answer for the undertaking of master finding. Author show two general procedures to master seeking given a report accumulation. The first of these specifically models a specialist's information in light of the records that they are related with, while the second finds archives on subject, and after that finds the related master.Shapingsolid associations is critical to the executionofmasterdiscovering frameworks. In the paper [6] the author recommended that the unsupervised methods like grouping might be utilized for blame expectation in programmingmodules, where fault are not accessible. In this paper a Quad Tree-based K-Means calculation has been connected for foreseeing shortcomings in program modules. In the paper [7] the author suggested that the essential closest neighbor classifier experiences the unpredictable stockpiling of all displayed preparing cases. With an extensive database of cases characterization reaction time can be moderate. At the point when boisterous occurrences are available, grouping exactness can endure. By erasing occasions, the two issues can be reduced. Taking this into issue calculation is produced that adversaries the best existing calculation. In the paper [9] the author recommended that with the appearance of high dimensionality,sufficientIDofapplicable highlights of the information has turned out to be troublesome in certifiable situations. With such a tremendous assemblage of calculations accessible, picking the sufficient element choice technique isn't a simple to- comprehend question and it is important to check their adequacy on various circumstances. In this paper, a few engineered datasets are utilized for this reason, going for surveyingthe executionofhighlightdeterminationstrategies within the sight of a bow number or unimportant highlights, commotion in the information, repetition and communication between properties, and in addition a little proportion between number of tests and number of highlights. In the paper [12] the authors suggest that in information mining applications, information occasions are normally portrayed by an immense number of highlights. The greater part of these highlights are unimportant or repetitive, which adversely influences the proficiencyandadequacyofvarious learning calculations. The choice of significant highlightsisa urgent errand which can be utilized to permit a superior comprehension of information or enhance the execution of other learning undertakings. The paper initially characterizes a successful model for unsupervised component choice which measures the remaking blunder of the information network in light of the chose subset of highlights. The paper at that point shows a novel calculation for voraciously limiting the recreation mistakeinviewofthe highlights chose up until this point. 3. Features of Text Mining Content mining strategiesdependsonhowmessage report are dissected. In these strategies for content mining content archive dissected on the premise of term, expression, idea and example. In light of the data recovery there are four strategies, 1) Term Based Method (TBM). 2) Phrase Based Method (PBM). 3) Concept Based Method (CBM). 4) Pattern Taxonomy Method (PTM). A. Term Based Method: Term in archive is utilized to decide substance of content. In Term Based Method each term in archive is related with esteem known as weight, which measure significance of term i.e. terms commitment in archive. Word having semantic importanceisknown asterm and accumulation of such terms contributes significance to report. Term based strategies experience theill effectsofthe issues of polysemy and synonymy. Polysemy implies a word has numerous implications and synonymyisdifferentwords having a similar importance. The semantic importance of many found terms is dubious for noting what clients need. Data recovery gave many term-basedstrategieslikedirected and conventional term weighting techniques to fathom this test. B. Expression Based Method: Phrases are not so much equivocal but rather more discriminative thansingularterm so in state construct strategy reportisdissected withrespect to express premise. In procedure of investigation of record phrases are profile descriptor of archive. Expressions are accumulation of semantic terms so conveys more data than single term. Over numerous years this is speculation that expression based approach performs superior to anything term based approach, as expression may convey more semantic than term. Utilizing information mining calculations it isunequivocal toacquiredifferent expressions yet it is hard to utilize these expressions viably to answer what client need. It is troublesome on the grounds that expressions have less events in record and expressions include vast number of loud with excess terms. As expressions are gathering of terms those can be considered as succession of terms and consequently to discover arrangement of terms consecutive example mining calculation is utilized. Calculationseparatesvisitconsecutive examples, here example utilized as words or expression which is extricated from record. C. Idea Based Method: Most of content mining systems depend on word or potentially express investigation of
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 463 content. It is imperative to discover term that contributes more semantic significance to record this idea is known as idea based strategy. Just the significance of term inside archive is caught in factual examination of term based strategy. In idea based strategy the term which adds to sentence semantic is investigated as for its significance at sentence and record levels. The model tries to examineterm at sentence and report level by effectively finding critical coordinating term instead of single term examination. D. Example Based Model: In design construct showreport is examined in light of example premise i.e. example of report is shaped bydissectingis-a connectionbetweenterms to frame scientific classification. Scientific classification is tree like structure The example basedapproachcanenhance the exactness of framework for assessing term weights on the grounds that found examples are more particular than entire archives. To create PTM record split into passages. In design scientific categorization the hubs speak to visit designs and their covering sets. The edges are "is-a" connection. Smaller example in scientific categorization are normally more broad since they could be utilized as a partof both positive and negative archives. Bigger examples in scientific categorization are typically more particular since they might be utilized as a part of positive reports. The semantic data will be utilized as a part of the example scientific classification to enhance the execution of utilizing shut examples in content mining. 4. Background A. Information Reduction: Data decrease is a procedure of changing numerical or in order computerized data into a lessened information keeping up the trustworthiness of the first information. Mining on a less volume information should deliver practically a similar outcome yet being more proficient. B. Advantage Of Data Reduction: Applying information diminishment with the plan to decrease the information scale and enhance the exactness of bug triage. Diminished information scale will in the end spare the work cost of designer in settling the bug. Exactness of bug triage is inspected by expelling boisterous, copy and insignificant reports from the informational index. Unique informational index gets supplanted with the diminished informational index for bug triage. C. Bug Or Defect Lifecycle In Software Testing: Bugs may show up at any stage like planning stage, improvement arrange, testing stage and so on in a framework advancement lifecycle (SDLC).When the bug is seen, its status given is "NEW". After the advancement group approves and acknowledges, it is "Appointed" to the designer. At the point when the bug is "Settled", it is checked for the acknowledgment by the testing group. Contingent on the impacts its status will be either "Confirmed" or "Revived". Some extra audit should be possible to make the status of the bug as "Shut". Testing group may revivethebug if any lethal impact is watched once more. Members in the process may incorporate bug journalist, bug following device, bug gathering and bug proprietor. 5. Techniques of Classification A. Decision tree Decision tree grouping is the taking in of decision treesfrom class named preparing tuples [2]. A decision tree is a flowchart like tree structures, where each inside node indicates a test on a characteristic, each branch speaks to a result of the test, and each leaf node holds a class mark.[2]. Points of interest: Amongst other information mining strategies, decision trees have different focal points [1]. Decision trees are easy to comprehend and decipher. They require little information and can deal with both numerical and clear cut information. It is conceivable to approve a model utilizing factual tests. They are strong in nature, in this way, they perform well regardless of the possibility that its suppositions are to some degree disregarded by the genuine model from which the information were produced. Decision trees perform well with extensive information in a brief span. A lot of information can be broke down utilizing computers in a period sufficiently short to empower partners to take decisions in view of its investigation. B. Limitations: The issue of taking in an ideal decision tree is known to be NP-finished. Thus, functional decision tree learning calculations depend on heuristic calculations, for example, the covetous calculation where locally ideal decisions are made at every node. Such calculationscan'tensuretorestore the all around ideal decision tree. Decision tree students make over-complex trees that don't sum up the information well. This is brought over fitting. Components, for example, pruning are important to keep away from this issue. C. Nearest neighbor classifier The k-closest neighbor's calculation (k-NN) is a strategy for grouping objects in view of nearest preparing cases in the component space. K-NN is a kind of example based learning, or apathetic learning. It can likewise be utilized for relapse. The k-closest neighbor calculation is among the most straightforward of all machine-learning calculations. The space is parceled into districts by areas and names of the preparation tests. A point in the space is appointed to the class c on the off chance that it is the most successive class name among the k closest preparing tests. Generally Euclidean remove is utilized as the separation metric; however this will just work with numerical esteems. In cases, for example, content grouping another metric, for
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 464 example, the cover metric (or Hamming separation) can be utilized. D. Artificial neural network Neural Networks are expository methods demonstrated after the procedures of learning in the psychological framework and the neurological elements of the cerebrum and equipped for anticipating new perceptions (on particular factors) from different perceptions (on the same or different factors) in the wake of executing a procedure of socalled gaining from existing information.Neural Networks is one of the Data Mining methods. The initial step is to plan a particular system design (that incorporates a particular number of "layers" each comprising of a specific number of "neurons"). System is then subjected to the way toward "preparing." In that stage, neurons apply an iterative procedure to the quantity of contributions to modify the weights of the system keeping in mind the endgoal toideally foresee the specimen information on which the "preparation" is performed. After the period of gaining from a current informational index, the new system is prepared and it would then be able to be utilized to produce forecasts. The subsequent "system" created during the time spent "learning" speaks to an example recognized in the information. E. D. Support vector machines Support Vector Machines were first acquainted with solve the pattern and regression issues by Vapnik andhispartners [8]. Support vector machines (SVMs) are an arrangement of related regulated learning techniques utilized for grouping and relapse [2]. Survey input information as two arrangements of vectors in a ndimensional space,a SVMwill build an isolating hyper-plane in that space, one which expands the edge between the two informational collections [2]. To figure the edge, two parallel hyper-planes are developed, one on each side of the isolating hyper-plane, which are "pushed up against" the two informational collections [2]. A decent partition is accomplished by the hyper-plane that has the biggest separation to the neighboring information purposes of the two classes, since by and large the bigger the edge the lower the speculation mistake of the classifier [2]. This hyperplane is found by utilizing the help vectors and edges. 6. PROBLEM FORMULATION  In base paper binary classifier was used for bug triage. As in case of multiclass bugs this approach is not feasible.  Training of the classifier is required, so adoption of new bug need prior or human involvement.  Execution time for the comparison of words are quite large as this required each characters.  Accuracy of classifier need to be improved. 7. PROPOSED WORK  Multiclass classifier should be used.  Unsupervised model for the classificationshouldbe need.  Comparison should be doneinnumericforreducing the execution time.  Genetic algorithm such as TLBO (Teacher learning based optimization) 8. CONCLUSIONS Software development venture generally gets influenced while managing the bugs. Along these lines, the point is to lessen the scale and enhancing the natureofbuginformation for bug triage process. Above perceptions reason that the information decrease for bug triage in vast bug archives when examined, this approach gives a decent method on information preprocessing to come about a diminished and superb bug information. Since, bug triage is a costly undertaking of programming upkeep and advancement in both, time and work cost, our work lessens the size of bug informational index and enhance the bug information quality. In this paper, a point by point discourse of the different highlights and characterization strategies are Table 1 Comparison of Various techniques advantages and disadvantages. Techniques Advantages Disadvantages NaïveBayesclassifier improves the bug triage in handling bug involving the developer and also considers the unlabeled document. Naïve Bayes classifier, SVM enables the bug triage in eclipse and Firefox projects by assigning bugs. Card sorting technique helps the bug triage processby showing information status and notifying about it. Domain mapping matrix helps recommending the best developer list for new bug reports. Bug assigning task is done effectively by assigning a correct potential developer saving the resources used in bug triage. Efficient way of assigningbugsandwith little knowledge in a company new triage can be fixed. Positive interaction between the developer and user is observed in fixing the bugs. Historical bug report is ignored to use the expertise profile for developer maintenance . Sometimes developer assigned is not same as the one who solves and algorithm performance does not result as estimated. Process is supported only by eclipse ,Firefox and gcc projects. Applicable only for Mozilla and eclipse projects, not for all projects. Chroming bug repository is used.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 465 likewise done. Order methods are utilized to characterize information into classes with the assistance of the acquired highlights from the datasets. In future aneffectivealgorithm is required for the study and classification of bugs which have effective set of results. REFERENCES [1]. Jifeng Xuan, He Jiang, “TowardsEffectiveBugTriagewith Software Data Reduction Techniques,” IEEE Trans. on Knowledge and Data Engineering, vol. 27, no. 1, Jan. 2015. [2] J. Anvik, L. Hiew, and G. C. Murphy, “Who should fix this bug?” in Proc. 28th Int. Conf. Softw. Eng., May 2006, pp.361– 370. [3] S. Artzi, A. Kie_zun, J. Dolby, F. Tip, D. Dig, A. Paradkar, and M. D. Ernst, “Finding bugs in web applications using dynamic test generation and explicit-state model checking,” IEEE Softw., vol. 36,no. 4, pp. 474–494, Jul./Aug. 2010. [4] J. Anvik and G. C. Murphy, “Reducing the effort of bug report triage: Recommenders for development-oriented decisions,” ACM Trans. Soft. Eng. Methodol., vol. 20, no. 3, Bugs 10, Aug. 2011. [5] C. C. Aggarwal and P. Zhao, “Towards graphical models for text processing,” Knowl. Inform. Syst., vol. 36, no. 1, pp. 1–21, 2013. [6] Bugzilla, (2014). [Online]. Avaialble: http://bugzilla.org/ [7] K. Balog, L. Azzopardi, and M. de Rijke, “Formal models for expert finding in enterprise corpora,” in Proc.29thAnnu. Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, Aug. 2006, pp. 43–50. [8] P. S. Bishnu and V. Bhattacherjee, “Software fault prediction using quad tree-based k-means clustering algorithm,” IEEE Trans. Knowl. Data Eng., vol. 24, no. 6, pp. 1146–1150, Jun. 2012. [9] H. Brighton and C. Mellish, “Advances in instance selection for instance-based learning algorithms,” Data Mining Knowl. Discovery, vol. 6, no. 2, pp. 153–172, Apr. 2002. [10] S. Breu, R. Premraj, J. Sillito, and T. Zimmermann, “Information needs in bug reports: Improving cooperation between developers and users,” in Proc. ACM Conf. Comput. Supported Cooperative Work, Feb. 2010, pp. 301–310. [11] V. Bol_on-Canedo, N. S_anchez-Maro~no,andA.Alonso- Betanzos, “A Bug of feature selection methods on synthetic data,” Knowl.Inform. Syst., vol. 34, no. 3, pp. 483–519, 2013. [12] D. _Cubrani_c and G. C. Murphy, “Automatic bug triage using text categorization,” in Proc. 16th Int. Conf. Softw.Eng. Knowl. Eng., Jun. 2004, pp. 92–97. [13] Eclipse. (2014). [Online]. Available: http://eclipse.org/ [14] A. K. Farahat, A. Ghodsi, M. S. Kamel, “Efficient greedy feature selection for unsupervised learning,” Knowl.Inform. Syst., vol. 35, no. 2, pp. 285–310, May 2013.