Text Mining Approaches for Dependent Bug Report Assembly and Severity Prediction

被引:1
|
作者
Luaphol, Bancha [1 ]
Polpinij, Jantima [2 ]
Kaenampornpan, Manasawee [2 ]
机构
[1] Kalasin Univ, Dept Digital Technol, Fac Adm Sci, Song Plueai, Thailand
[2] Mahasarakham Univ, Dept Comp Sci, Kham Riang, Thailand
关键词
Bug report; dependent bug report assembly; bug severity prediction; threshold -based similarity analysis; cosine; similarity; BM25; term weighting; classification algorithm; SOFTWARE; MODEL;
D O I
10.34028/iajit/19/6/9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In general, most existing bug report studies focus only on solving a single specific issue. Considering of multiple issues at one is required for a more complete and comprehensive process of bug fixing. We took up this challenge and proposed a method to analyze two issues of bug reports based on text mining techniques. Firstly, dependent bug reports are assembled into an individual cluster and then the bug reports in each cluster are analyzed for their severity. The method of dependent bug report assembly is experimented with threshold-based similarity analysis. Cosine similarity and BM25 are compared with term frequency (tf) weighting to obtain the most appropriate method. Meanwhile, four classification algorithms namely Random Forest (RF), Support Vector Machines (SVM) with the RBF kernel function, Multinomial Naive Bayes (MNB), and k-Nearest Neighbor (k-NN) are utilized to model the bug severity predictor with four term weighting schemes, i.e., tf, term frequency-inverse document frequency (tf-idf), term frequency-inverse class frequency (tf-icf), and term frequency-inverse gravity moment (tf-igm). After the experimentation process, BM25 was found to be the most appropriate for dependent bug report assemblage, while for severity prediction using tf-icf weighting on the RF method yielded the best performance value.
引用
收藏
页码:915 / 924
页数:10
相关论文
共 50 条
  • [1] Automated Configuration Bug Report Prediction Using Text Mining
    Xie, Xin
    Lo, David
    Qiu, Weiwei
    Wang, Xingen
    Zhou, Bo
    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 107 - 116
  • [2] Combining text mining and data mining for bug report classification
    Zhou, Yu
    Tong, Yanxiang
    Gu, Ruihang
    Gall, Harald
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2016, 28 (03) : 150 - 176
  • [3] Combining Text Mining and Data Mining for Bug Report Classification
    Zhou, Yu
    Tong, Yanxiang
    Gu, Ruihang
    Gall, Harald
    2014 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2014, : 311 - 320
  • [4] Predicting Severity of Bug Report by Mining Bug Repository with Concept Profile
    Zhang, Tao
    Yang, Geunseok
    Lee, Byungjeong
    Chan, Alvin T. S.
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 1553 - 1558
  • [5] Is This Bug Severe? A Text-Cum-Graph Based Model for Bug Severity Prediction
    Hazra, Rima
    Dwivedi, Arpit
    Mukherjee, Animesh
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2022, PT VI, 2023, 13718 : 236 - 252
  • [6] Text mining approaches for stock market prediction
    Nikfarjam, Azadeh
    Emadzadeh, Ehsan
    Muthaiyah, Saravanan
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 256 - 260
  • [7] Text Filtering and Ranking for Security Bug Report Prediction
    Peters, Fayola
    Tun, Thein Than
    Yu, Yijun
    Nuseibeh, Bashar
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (06) : 615 - 631
  • [8] Crowdsourced bug report severity prediction based on text and image understanding via heterogeneous graph convolutional networks
    Wu, Yifan
    Lin, Chendong
    Liu, An
    Zhao, Lei
    Zhang, Xiaofang
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2024, 36 (11)
  • [9] Intelligent Prediction of Vulnerability Severity level Based on Text Mining and XGBoost
    Wang, Peichao
    Zhou, Yun
    Sun, Baodan
    Zhang, Weiming
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI 2019), 2019, : 72 - 77
  • [10] Text mining based an automatic model for software vulnerability severity prediction
    Malhotra, Ruchika
    Vidushi
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (08) : 3706 - 3724