Current Signal Transduction Therapy

Author(s): K.S. Maharasan * and V. Saravanan

DOI: 10.2174/1574362413666180712125144

To Minimize Fault Report and Bug Fixing Time using an Efficient Integration of Instance and Aspect Preferment Algorithm

Page: [131 - 137] Pages: 7

  • * (Excluding Mailing and Handling)

Abstract

Background: Data mining is an emerged and promising technology, and it utilized in the software engineering development process. It does not only enhance the accurateness, it also improves the reliability of the software. A software development application error is a fault or bug in a computer program. It produces wrong or unexpected outcomes. In traditional software development, faults manually triaged through a specialist developer, i.e., a human being triaged.

Methods: Manual fault triage takes long time and produce low accuracy for the huge amount of faults. To resolve above issues, An Efficient Integration of Instance and Aspect Preferment Algorithm (EIIAPA) is proposed to decrease the scale of fault report data concurrently and to enhance the accurateness of data.

Results & Conclusion: The proposed technique helps to validate & verify software application in effective way. Reduction of data on fault triage aims to construct a high-superiority set of fault data in the small-scale system through eliminating the fault report. To applying an algorithm, fault data set and attributes are extracted from every fault data set and train a predictive model based on the historical dataset. Based on Experimental evaluations, proposed methodology reduces 0.06 ET (Execution Time), and improves 0.5 P (Precision), 0.75 R (Recall), 0.39 F-M (F-Measure) and 5.07% (accuracy) compared than existing methodologies.

Keywords: Software development process, data mining, An Efficient Integration of Instance and Aspect Preferment Algorithm (EIIAPA), compiler, fault triage, execution time, precision, recall, f-measure, accuracy.

Graphical Abstract

[1]
Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In Security and Privacy. 1999. Proceedings of the 1999 IEEE Symposium on. 120-32
[2]
Tsai WT. Service-oriented system engineering: a new paradigm. IEEE International Workshop. 3-6.
[3]
Livshits B, Zimmermann T. DynaMine: finding common error patterns by mining software revision histories. Softw Eng Notes 2005; 30(5): 296-305. [). ACM.].
[http://dx.doi.org/10.1145/1095430.1081754]
[4]
Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security 2009; 28(1): 18-28.
[5]
Aydın MA, Zaim AH, Ceylan KG. A hybrid intrusion detection system design for computer network security. Comput Electr Eng 2009; 35(3): 517-26.
[http://dx.doi.org/10.1016/j.compeleceng.2008.12.005]
[6]
Helmer GG, Wong JS, Honavar V, Miller L. Intelligent agents for intrusion detection. Information Technology Conference. 1998; IEEE 1998; pp. 121-4.
[7]
Panda M, Patra MR. A comparative study of data mining algorithms for network intrusion detection. In Emerging Trends in Engineering and Technology, 2008. ICETET'08. First International Conference on (pp. 504-507). IEEE.
[http://dx.doi.org/10.1109/ICETET.2008.80]
[8]
Yildiz M, Abawajy J, Ercan T, Bernoth A. A layered security approach for cloud computing infrastructure. In Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International Symposium on (pp. 763-767). IEEE.
[http://dx.doi.org/10.1109/ISPAN.2009.157]
[9]
Suneetha KR, Krishnamoorthi R. Identifying user behavior by analyzing web server access log file. IJCSNS International Journal of Computer Science and Network Security 2009; 9(4): 327-32.
[10]
Podgurski A, Leon D, Francis P, et al. Automated support for classifying software failure reports. In Software Engineering, 2003. Proceedings. 25th International Conference on (pp. 465-475). IEEE.
[http://dx.doi.org/10.1109/ICSE.2003.1201224]
[11]
Zhang D, Ramamohanarao K, Ebringer T. Role engineering using graph optimisation. Proceedings of the 12th ACM symposium on Access control models and technologies. 139-44.
[12]
Xie J, Yin S, Ruan X, et al. Improving MapReduce performance through data placement in heterogeneous Hadoop clusters. In Parallel & Distributed Processing, Workshops and PhD Forum (IPDPSW), 2010 IEEE International Symposium on (pp. 1-9). IEEE.
[13]
Santos I, Brezo F, Ugarte-Pedrero X, Bringas PG. Opcode sequences as a representation of executables for data-mining-based unknown malware detection. Inf Sci 2013; 231: 64-82.
[http://dx.doi.org/10.1016/j.ins.2011.08.020]
[14]
Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC. Distributed anomaly detection in wireless sensor networks. In Communication systems, 2006. ICCS 2006. 10th IEEE Singapore International Conference on (pp. 1-5). IEEE.
[http://dx.doi.org/10.1109/ICCS.2006.301508]
[15]
Gong RH, Zulkernine M, Abolmaesumi P. A software implementation of a genetic algorithm based approach to network intrusion detection. In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on (pp. 246- 253). IEEE.
[16]
Yao Y. Granular computing for data miningData Mining Intrusion Detection, Information Assurance, and Data Networks Security 2006; p 624105
[17]
Sodiya AS, Onashoga SA, Oladunjoye BA. Threat modelling using fuzzy logic paradigm. Informing Science. International Journal of an Emerging Transdiscipline 2007; 4(1): 53-61.
[18]
Kokolakis SA, Demopoulos AJ, Kiountouzis EA. The use of business process modelling in information systems security analysis and design. Inf Manage Comput Secur 2000; 8(3): 107-16.
[http://dx.doi.org/10.1108/09685220010339192]
[19]
Jadhav AS, Sonar RM. Evaluating and selecting software packages: A review. Inf Softw Technol 2009; 51(3): 555-63.
[http://dx.doi.org/10.1016/j.infsof.2008.09.003]
[20]
Újházi B, Ferenc R, Poshyvanyk D, Gyimothy T. New conceptual coupling and cohesion metrics for object-oriented systems Source Code Analysis and Manipulation (SCAM). 33-42.
[http://dx.doi.org/10.1109/SCAM.2010.14]