International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 131 | Views: 332 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Dissertation Chapters | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 6.9 / 10


     

Bug Triage Using Data Reduction with Priority and Security

Vijay N. Kukre, Shyam Gupta


Abstract: Many Open Source Software Development organizations pay quite 45 % of expense in solving bugs. Bug triaging is significant phase in procedure of bug solving. The purpose of bug triaging is to allocate coming bugs to appropriate developer. The current bug triaging methodologies are initiated on algorithms, which form classifiers from the training data sets of bug report into training, these methods are suffering from huge scale and low quality training set. Here, the training sets reduction with feature selection method Chi Square Statistic (CH) and instance selections method Iterative Case Filter (ICF) for bug triaging are suggested. Feature selection and instance selections methods are used to get better the correctness of CHI, instance selections algorithm Iterative Case Filters (ICF) are premeditated. The training sets reduction by the bug records is calculated. For training sets, 70 % words and 50 % bugs report are separated after training sets lessening. The outcome illustrates that novel and minor training data sets deliver improved correctness than unique one. The next advantage is, it provides priority according to severity of bug so that bug can be solved on the priority basis and security using AES algorithm so that no another developer can access it.


Keywords: Bug data reduction, feature selection, instance selection, bug triage


Edition: Volume 6 Issue 6, June 2017


Pages: 1939 - 1944



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vijay N. Kukre, Shyam Gupta, "Bug Triage Using Data Reduction with Priority and Security", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1939-1944, URL: https://www.ijsr.net/getabstract.php?paperid=ART20174486, DOI: https://www.doi.org/10.21275/ART20174486



Downloads: 656 | Views: 2003 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 719 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 698 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 688 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top