Professional Documents
Culture Documents
Study of Software Defect Prediction Using Forward Pass RNN With Hyperbolic Tangent Function
Study of Software Defect Prediction Using Forward Pass RNN With Hyperbolic Tangent Function
Volume 7 Issue 6, November-December 2023 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
1. INTRODUCTION
The presence of flaws in software significantly modules. Based on previous data on software
impacts its dependability, quality, and upkeep accumulated flaws, the research forecasts future
expenses. Even with diligent application, it might be software errors. The research also used the Root
difficult to get bug-free software since most defects Mean Square Error (RMSE) method to assess and
are buried. A significant issue in software engineering compare the AR model with the Known Power Model
is also creating a software bug prediction model that (POWM). Three datasets were also included in the
might identify problematic modules early on. research for assessment, and the outcomes looked
Predicting software bugs is a crucial task in software good. The research examined the suitability of several
development. This is so that user happiness and machine learning techniques for defect prediction.
overall program performance may be increased by The key earlier studies on each machine learning
anticipating the problematic modules before software approach and the most recent developments in
is deployed. Additionally, early software problem machine learning-based software bug prediction.
prediction enhances software adaptability to various
2. BACKGROUND
situations and maximizes resource efficiency.
Robotic programming deformity expectation (SDP)
Numerous research have been conducted on the tactics are gradually used, sometimes with the use of
prediction of software bugs with machine learning artificial intelligence (AI) processes, according to
methods. Take the linear Auto-Regression (AR) Görkem Giray et al. [1]. But existing machine learning
technique, for instance, to forecast the defective methods need physically removed highlights, which
@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 268
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
are cumbersome, time-consuming, and only partially further enhancing programming quality and
capture the semantic information disclosed in bug dependability is ality expectation (Akimova et al.,
describing equipment. Professionals have the Deform et al., 2007). The problem in this area is to
invaluable opportunity to extract and benefit from accurately and very precisely identify the corrupted
more complex and multi-layered knowledge as a source code. Developing a prediction model with
result of profound learning (DL) techniques. shortcomings is a challenging problem for which
According to Iqra Batool et al. [2], programming several approaches have been put out throughout
engineers may identify problematic builds-like history.
modules or classes-early in the product advancement 3. PROBLEM IDENTIFICATION
life cycle with the use of programming It is typical development practice to verify and
issue/deformity expectation. Information mining, examine source codes using analytical techniques.
artificial intelligence, and deep learning techniques are This procedure may be carried either automatically or
used to program expectations that are not satisfied. manually with the use of tools for dynamic and static
Heterogeneous deformity expectation (HDP), as code analysis, among other things. Static code
introduced by Haowen Chen et al. [3], refers to the analysis has seen a recent surge in tool development,
imperfection prediction amongst projects with offering really useful, added-value solutions to many
different measurements. The majority of current HDP of the issues that software development companies
methods severely limit their interpretability by encounter. However, these techniques are difficult to
mapping source and target data into a conventional utilize in real-world scenarios due to a large number
measurement space where each element has no real of false positive and false negative outcomes.
significance. Furthermore, HDP often faces the Therefore, another technique or approach-such as
problem of class inequality. Machine Learning (ML) algorithms-must be
discovered for static code analysis.
According to Cagatay Catal et al. [4], phishing attacks
aim to steal personal information by using The problems that have been identified based on
sophisticated techniques, tools, and tactics. Some previous studies are listed below:
examples of these are happy infusion, social It is not always possible to identify relevant
engineering, online forums, and mobile apps. A software flaws.
number of phishing location techniques were A software bug's recovery is not entirely
developed in order to prevent and lessen the risks of recognized.
these attacks; deep learning calculations proved to be Because of its poor precision, the unnamed
one of the most effective. software problem may be detected.
@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 269
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
calculating the forward for the forward hidden layers
with activation function
ht f = tanh (Whf ht f−1 + Wx f xt + bhf )
end for
Step 3: for j=S to 1
calculating the backward pass for the backward
hidden layer’s activation function
htb = tanh (Whb htb−1 + Wxb xt + bhb )
end for
end for
Figure 2: Complexity Evaluation of Bug
Step 4: for i =1 to O Frequency for FPRNN-HTF (Proposed
calculating the forward pass for the output layer using Prediction Model)
the previous stored activation function
( )
P yt { xi }i ≠t = σ (Wyf ht f + Wyb htb + by )
@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 270
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
terms of F1-score, FPRNN-HTF is superior than
Random Forest and ANN by 0.08 points.
@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 271
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
Thus, for software bug prediction, FPRNN-HTF [8] Farah Atif, Manuel Rodriguez, Luiz J. P.
(Forward Pass RNN with Hyperbolic Tangent Araújo, Utih Amartiwi, Barakat J. Akinsanya &
Function) is a more accurate method. Manuel Mazzara “A Survey on Data Science
We propose a technique that enhances diagnostic Techniques for Predicting Software Defects”,
precision-a critical component of successful IEEE Conf. of Software Engineering, 2021.
treatment. New datasets should be used to evaluate [9] Saleema Amershi; Andrew Begel; Christian
the accuracy in the future, and further AI approaches Bird; Robert DeLine; Harald Gall; Ece Kamar;
should be used to confirm the correctness of the Nachiappan Nagappan, “Software Engineering
estimate. Owing to the enormous amount of data for Machine Learning: A Case Study”, IEEE
required for train data performance estimate, the Conf. on Machine Learning, 2019.
suggested model has a processing time limit. The
[10] George G. Cabral; Leandro L. Minku; Emad
effectiveness of the system will be estimated in the Shihab; Suhaib Mujahid, “Class Imbalance
future using real-time data and the same algorithms. Evolution and Verification Latency in Just-in-
REFERENCES Time Software Defect Prediction”, IEEE/ACM
[1] Görkem Giray, Kwabena Ebo Bennin, Ömer 41st International Conference on Software
Köksal, Önder Babur, Bedir Tekinerdogan, “On Engineering (ICSE), 2019.
the use of deep learning in software defect [11] Kwabena Ebo Bennin; Jacky Keung; Passakorn
prediction”, The Journal of Systems & Phannachitta; Akito Monden; Solomon
Software, 2023. Mensah, “MAHAKIL: Diversity Based
[2] Iqra Batool, Tamim Ahmed Khan, “Software Oversampling Approach to Alleviate the Class
fault prediction using data mining, machine Imbalance Issue in Software Defect
learning and deep learning techniques: A Prediction”, IEEE Transactions on Software
systematic literature review”, Computers and Engineering, 2018.
Electrical Engineering, May 2022. [12] Yuxiang Gao, Yi Zhu, Yu Zhao, “Dealing with
[3] Haowen Chen, Xiao-Yuan Jing, Yuming Zhou, imbalanced data for interpretable defect
Bing Li, Baowen Xu, “Aligned metric prediction”, IEEE Conf on Data Analysis,
representation based balanced multiset 2017.
ensemble learning for heterogeneous defect
[13] Kwabena Ebo Bennin; Jacky Keung; Akito
prediction”, Information and Software Monden; Yasutaka Kamei; Naoyasu Ubayashi,
Technology, July 2022.
“Investigating the Effects of Balanced Training
[4] Cagatay Catal, Görkem Giray, Bedir and Testing Datasets on Effort-Aware Fault
Tekinerdogan, Sandeep Kumar & Suyash Prediction Models”, IEEE 40th Annual
Shukla, “Applications of deep learning for Computer Software and Applications
phishing detection: a systematic literature Conference (COMPSAC), 2016.
review”, Knowledge and Information Systems,
[14] Faruk Arar, Kürşat Ayan, “Software defect
2022.
prediction using cost-sensitive neural network”,
[5] Xieling Chen, Haoran Xie, Zongxi Li, Gary Applied Soft Computing, Volume 33, August
Cheng, “Topic analysis and development in 2015.
knowledge graph research: A bibliometric [15] Deepika Badampudi, Claes Wohlin, Kai
review on three decades”, Neurocomputing,
Petersen, “Experiences from using snowballing
October, 2021.
and database searches in systematic literature
[6] Cagatay Catal, Görkem Giray, Bedir studies”, 19th International Conference on
Tekinerdogan, “Applications of deep learning Evaluation and Assessment in Software
for mobile malware detection: A systematic Engineering, 2015.
literature review”, 2021. [16] Kyunghyun Cho, Bart van Merrienboer, Caglar
[7] Konstantin S. Kobylkin, Anton V. Konygin Ilya Gulcehre, Dzmitry Bahdanau, Fethi Bougares,
P. Mezentsev and Vladimir E. Misilov, “A Holger Schwenk, Yoshua Bengio, “Learning
Survey on Software Defect Prediction Using Phrase Representations using RNN Encoder-
Deep Learning”, IEEE/ACM 41st International Decoder for Statistical Machine Translation”,
Conference on Software Engineering: Software Computation and Language, 2014.
Engineering in Practice (ICSE-SEIP), 2021.
@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 272
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
[17] N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. [19] Cagatay Catal, Banu Diri, “A systematic review
Kegelmeyer, “SMOTE: Synthetic Minority of software fault prediction studies”, Expert
Over-sampling Technique”, Artificial Systems with Applications, Volume 36, Issue 4,
Intelligence, 2011 May 2009.
[18] Gul Calikli; Ayse Tosun; Ayse Bener; Melih [20] Alessandro Birolini, “Reliability and
Celik, “The effect of granularity level on Availability of Repairable Systems”, Reliability
software defect prediction”, 24th International Engineering, 2004.
Symposium on Computer and Information
Sciences, 2009.
@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 273