Abstract
Background: Data mining is an emerged and promising technology, and it utilized in
the software engineering development process. It does not only enhance the accurateness, it also
improves the reliability of the software. A software development application error is a fault or bug
in a computer program. It produces wrong or unexpected outcomes. In traditional software development,
faults manually triaged through a specialist developer, i.e., a human being triaged.
Methods: Manual fault triage takes long time and produce low accuracy for the huge amount of
faults. To resolve above issues, An Efficient Integration of Instance and Aspect Preferment Algorithm
(EIIAPA) is proposed to decrease the scale of fault report data concurrently and to enhance
the accurateness of data.
Results & Conclusion: The proposed technique helps to validate & verify software application in
effective way. Reduction of data on fault triage aims to construct a high-superiority set of fault data
in the small-scale system through eliminating the fault report. To applying an algorithm, fault
data set and attributes are extracted from every fault data set and train a predictive model based on
the historical dataset. Based on Experimental evaluations, proposed methodology reduces 0.06 ET
(Execution Time), and improves 0.5 P (Precision), 0.75 R (Recall), 0.39 F-M (F-Measure) and
5.07% (accuracy) compared than existing methodologies.
Keywords:
Software development process, data mining, An Efficient Integration of Instance and Aspect Preferment Algorithm
(EIIAPA), compiler, fault triage, execution time, precision, recall, f-measure, accuracy.
Graphical Abstract
[1]
Lee W, Stolfo SJ, Mok KW. A data mining framework for building
intrusion detection models. In Security and Privacy. 1999. Proceedings of the 1999 IEEE Symposium on. 120-32
[2]
Tsai WT. Service-oriented system engineering: a new paradigm.
IEEE International Workshop. 3-6.
[4]
Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security 2009; 28(1): 18-28.
[6]
Helmer GG, Wong JS, Honavar V, Miller L. Intelligent agents for
intrusion detection. Information Technology Conference. 1998; IEEE 1998; pp. 121-4.
[9]
Suneetha KR, Krishnamoorthi R. Identifying user behavior by analyzing web server access log file. IJCSNS International Journal of Computer Science and Network Security 2009; 9(4): 327-32.
[11]
Zhang D, Ramamohanarao K, Ebringer T. Role engineering using graph optimisation. Proceedings of the 12th ACM symposium on Access control models and technologies. 139-44.
[12]
Xie J, Yin S, Ruan X, et al. Improving MapReduce performance through data placement in heterogeneous Hadoop clusters. In Parallel & Distributed Processing, Workshops and PhD Forum (IPDPSW), 2010 IEEE International Symposium on (pp. 1-9). IEEE.
[15]
Gong RH, Zulkernine M, Abolmaesumi P. A software implementation of a genetic algorithm based approach to network intrusion detection. In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on (pp. 246- 253). IEEE.
[16]
Yao Y. Granular computing for data miningData Mining Intrusion Detection, Information Assurance, and Data Networks Security 2006; p 624105
[17]
Sodiya AS, Onashoga SA, Oladunjoye BA. Threat modelling using fuzzy logic paradigm. Informing Science. International Journal of an Emerging Transdiscipline 2007; 4(1): 53-61.