Downloads: 131 | Views: 332 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Dissertation Chapters | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 6.9 / 10
Bug Triage Using Data Reduction with Priority and Security
Vijay N. Kukre, Shyam Gupta
Abstract: Many Open Source Software Development organizations pay quite 45 % of expense in solving bugs. Bug triaging is significant phase in procedure of bug solving. The purpose of bug triaging is to allocate coming bugs to appropriate developer. The current bug triaging methodologies are initiated on algorithms, which form classifiers from the training data sets of bug report into training, these methods are suffering from huge scale and low quality training set. Here, the training sets reduction with feature selection method Chi Square Statistic (CH) and instance selections method Iterative Case Filter (ICF) for bug triaging are suggested. Feature selection and instance selections methods are used to get better the correctness of CHI, instance selections algorithm Iterative Case Filters (ICF) are premeditated. The training sets reduction by the bug records is calculated. For training sets, 70 % words and 50 % bugs report are separated after training sets lessening. The outcome illustrates that novel and minor training data sets deliver improved correctness than unique one. The next advantage is, it provides priority according to severity of bug so that bug can be solved on the priority basis and security using AES algorithm so that no another developer can access it.
Keywords: Bug data reduction, feature selection, instance selection, bug triage
Edition: Volume 6 Issue 6, June 2017
Pages: 1939 - 1944
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2003 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera