Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 7 Issue 6, November-December 2023 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Study of Software Defect Prediction using Forward


Pass RNN with Hyperbolic Tangent Function
Swati Rai1, Dr. Kirti Jain2
1
Research Scholar, 2Associate Professor,
1, 2
SSOAC, SAGE University, Bhopal, Madhya Pradesh, India

ABSTRACT How to cite this paper: Swati Rai | Dr.


For the IT sector and software specialists, software failure prediction Kirti Jain "Study of Software Defect
and proneness have long been seen as crucial issues. Conventional Prediction using Forward Pass RNN
methods need prior knowledge of errors or malfunctioning modules with Hyperbolic Tangent Function"
in order to identify software flaws inside an application. By using Published in
International
machine learning approaches, automated software fault recovery Journal of Trend in
models allow the program to substantially forecast and recover from Scientific Research
software problems. This feature helps the program operate more and Development
efficiently and lowers errors, time, and expense. Using machine (ijtsrd), ISSN:
learning methods, a software fault prediction development model was 2456-6470, IJTSRD60159
presented, which might allow the program to continue working on its Volume-7 | Issue-6,
intended mission. Additionally, we assessed the model's performance December 2023, pp.268-273, URL:
using a variety of optimization assessment benchmarks, including www.ijtsrd.com/papers/ijtsrd60159.pdf
accuracy, f1-measure, precision, recall, and specificity.
Convolutional neural networks and its hyperbolic tangent functions Copyright © 2023 by author (s) and
International Journal of Trend in
are the basis of the deep learning prediction model FPRNN-HTF Scientific Research and Development
(Forward Pass RNN with Hyperbolic Tangent Function) technique. Journal. This is an
The assessment procedure demonstrated the high accuracy rate and Open Access article
effective application of CNN algorithms. Moreover, a comparative distributed under the
measure is used to evaluate the suggested prediction model against terms of the Creative Commons
other methodologies. The gathered data demonstrated the superior Attribution License (CC BY 4.0)
performance of the FPRNN-HTF technique. (http://creativecommons.org/licenses/by/4.0)

KEYWORDS: FPRNN-HTF (Forward Pass RNN with Hyperbolic


Tangent Function), precision, recall, specificity, F1-measure, and
accuracy

1. INTRODUCTION
The presence of flaws in software significantly modules. Based on previous data on software
impacts its dependability, quality, and upkeep accumulated flaws, the research forecasts future
expenses. Even with diligent application, it might be software errors. The research also used the Root
difficult to get bug-free software since most defects Mean Square Error (RMSE) method to assess and
are buried. A significant issue in software engineering compare the AR model with the Known Power Model
is also creating a software bug prediction model that (POWM). Three datasets were also included in the
might identify problematic modules early on. research for assessment, and the outcomes looked
Predicting software bugs is a crucial task in software good. The research examined the suitability of several
development. This is so that user happiness and machine learning techniques for defect prediction.
overall program performance may be increased by The key earlier studies on each machine learning
anticipating the problematic modules before software approach and the most recent developments in
is deployed. Additionally, early software problem machine learning-based software bug prediction.
prediction enhances software adaptability to various
2. BACKGROUND
situations and maximizes resource efficiency.
Robotic programming deformity expectation (SDP)
Numerous research have been conducted on the tactics are gradually used, sometimes with the use of
prediction of software bugs with machine learning artificial intelligence (AI) processes, according to
methods. Take the linear Auto-Regression (AR) Görkem Giray et al. [1]. But existing machine learning
technique, for instance, to forecast the defective methods need physically removed highlights, which

@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 268
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
are cumbersome, time-consuming, and only partially further enhancing programming quality and
capture the semantic information disclosed in bug dependability is ality expectation (Akimova et al.,
describing equipment. Professionals have the Deform et al., 2007). The problem in this area is to
invaluable opportunity to extract and benefit from accurately and very precisely identify the corrupted
more complex and multi-layered knowledge as a source code. Developing a prediction model with
result of profound learning (DL) techniques. shortcomings is a challenging problem for which
According to Iqra Batool et al. [2], programming several approaches have been put out throughout
engineers may identify problematic builds-like history.
modules or classes-early in the product advancement 3. PROBLEM IDENTIFICATION
life cycle with the use of programming It is typical development practice to verify and
issue/deformity expectation. Information mining, examine source codes using analytical techniques.
artificial intelligence, and deep learning techniques are This procedure may be carried either automatically or
used to program expectations that are not satisfied. manually with the use of tools for dynamic and static
Heterogeneous deformity expectation (HDP), as code analysis, among other things. Static code
introduced by Haowen Chen et al. [3], refers to the analysis has seen a recent surge in tool development,
imperfection prediction amongst projects with offering really useful, added-value solutions to many
different measurements. The majority of current HDP of the issues that software development companies
methods severely limit their interpretability by encounter. However, these techniques are difficult to
mapping source and target data into a conventional utilize in real-world scenarios due to a large number
measurement space where each element has no real of false positive and false negative outcomes.
significance. Furthermore, HDP often faces the Therefore, another technique or approach-such as
problem of class inequality. Machine Learning (ML) algorithms-must be
discovered for static code analysis.
According to Cagatay Catal et al. [4], phishing attacks
aim to steal personal information by using The problems that have been identified based on
sophisticated techniques, tools, and tactics. Some previous studies are listed below:
examples of these are happy infusion, social  It is not always possible to identify relevant
engineering, online forums, and mobile apps. A software flaws.
number of phishing location techniques were  A software bug's recovery is not entirely
developed in order to prevent and lessen the risks of recognized.
these attacks; deep learning calculations proved to be  Because of its poor precision, the unnamed
one of the most effective. software problem may be detected.

Xieling and others [5], A number of open-source and 4. RESEARCH OBJECTIVES


endeavor-supported information diagrams have The objectives of the proposed work:
emerged in recent years, marking a remarkable  To increase accuracy for flawless software bug
advancement in the application of information retrieval.
portrayal and thinking into a variety of domains,  To increase recall for software faults that are
including computer vision and natural language absolutely applicable throughout the retrieval
processing. The goal of this research is to thoroughly process.
examine the current state and trends of information  To increase the precision of software bug
diagrams, with a focus on the topical examination detection.
structure. 5. METHODOLOGY
Cagatay et al. (2006) Innovative techniques are put The Algorithm of proposed methodology FPRNN-
HTF (Forward Pass RNN with Hyperbolic Tangent
forward for identifying and eliminating the various
Function) is as follows
types of malware, with deep learning computations
playing a crucial role. Even while the development of I = Number of input layers
DL-based portable malware detection techniques has H = Number of hidden layers
received a great deal of attention, it hasn't been
thoroughly examined yet. The objective of this effort O = Number of output layers
is to identify, compile, and review the published S = Number of data set instances
publications related to the use of deep learning
techniques to the detection of portable malware. Step 1: for i = 1 to H
One of the major challenges in programming Step 2: for j = 1 to S
advancement and programming language research for

@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 269
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
calculating the forward for the forward hidden layers
with activation function
ht f = tanh (Whf ht f−1 + Wx f xt + bhf )

end for
Step 3: for j=S to 1
calculating the backward pass for the backward
hidden layer’s activation function
htb = tanh (Whb htb−1 + Wxb xt + bhb )

end for
end for
Figure 2: Complexity Evaluation of Bug
Step 4: for i =1 to O Frequency for FPRNN-HTF (Proposed
calculating the forward pass for the output layer using Prediction Model)
the previous stored activation function

( )
P yt { xi }i ≠t = σ (Wyf ht f + Wyb htb + by )

Wy is the weight matrix connecting the hidden layer


to output layer,
Wh is the weight matrix that connects hidden to
hidden layer,
and Wx is the weight matrix that connects input layer
to hidden layer.
by is the output layer bias vectors, and bh is the hidden
layer bias vectors.
For the final nonlinearity r, and use tanh as an Figure 3: Calculation of confusion matrix,
activation function for classification. According to precision, recall, F1-Score and accuracy among
this form, the RNN will evaluate the output yt different models and FPRNN-HTF (Proposed
according to the information propagated through the Prediction Model)
hidden layer regardless of whether it depends directly Table 1: Estimation of Precision, Recall, F1-
or indirectly on the values { xi }i =1 = { x1 , x2 ,...., xt } .
t
Score and Accuracy among different models and
FPRNN-HTF (Proposed Prediction Model)
end for F1-
Models Precision Recall Accuracy
end for Score
Random
The Architecture of proposed methodology FPRNN- 0.9 0.83 0.9 80.65 %
Forest
HTF (Forward Pass RNN with Hyperbolic Tangent Naïve
Function) is as follows 0.94 0.82 0.88 80.10 %
Bayes
Logistic
0.93 0.8 0.88 79.5 %
Regression
Decision
0.83 0.84 0.83 74.86 %
Tree
Figure 1: Process of proposed work ANN 0.92 0.84 0.9 82.77 %
6. RESULTS AND ANALYSIS FPRNN-
Python 3.11.1 on Anaconda Navigator and a Jupyter HTF 0.95 0.96 0.98 96 %
notebook are used to take the following metrics. The (Proposed)
computation of precision, recall, F1-Score, and
accuracy is determined by using the recommended
FPRNN-HTF method on CS1.csv data from the
PROMISE dataset.

@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 270
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
terms of F1-score, FPRNN-HTF is superior than
Random Forest and ANN by 0.08 points.

Figure 4: Graphical Analysis of Precision among


different models and FPRNN-HTF (Proposed
Prediction Model) Figure 7: Graphical Analysis of Accuracy among
When compared to alternative models in the context different models and FPRNN-HTF (Proposed
of bug prediction, the following graphic shows that Prediction Model)
the recommended model offers higher accuracy. In When compared to current models, the following data
terms of accuracy, FPRNN-HTF beats Naive Bayes shows that the recommended model offers a greater
by a margin of 0.01. accuracy for predicting bugs. The accuracy of
FPRNN-HTF prediction model is 13.23% greater
than that of ANN prediction model.
7. CONCLUSION
We have used the FPRNN-HTF model in this
investigation to get the intended findings. Our
research demonstrates that prior attempts did not pay
enough attention to feature selection and cross
validation. The recommended technique outperforms
other ones in terms of accuracy (98.16%) on large
datasets. The combination of the five developed
Figure 5: Graphical Analysis of Recall among approaches yields the best results since it is
different models and FPRNN-HTF (Proposed computationally demanding (it avoids overfitting and
Prediction Model) gives fast prediction speeds) and versatile in
application (it can be used for both regression and
The graph above illustrates how the proposed model classification problems). Investigating this method
outperforms earlier models in terms of recall for bug further for bug prediction in deep learning models has
prediction. FPRNN-HTF has a 0.12 improvement in been a continuous endeavor.
recall over the Decision Tree and ANN prediction
models. There should be conclusions to these:
1. The accuracy of the proposed model is higher
than that of FPRNN-HTF. The accuracy has
increased by 0.01 compared to Naïve Bayes.
2. The proposed model achieves higher recall than
FPRNN-HTF Regression. FPRNN-HTF has a
0.12 improvement in recall over the Decision
Tree and ANN prediction models.
3. In terms of F1-Score, the suggested model
performs better than the FPRNN-HTF. The
difference between Random Forest and ANN is
0.08.
Figure 6: Graphical Analysis of F1-Score among
different models and FPRNN-HTF (Proposed 4. The proposed model has a greater accuracy in
Prediction Model) comparison to ANN. There is an accuracy
increase of 13.23%.
The graph above illustrates how the proposed model's
F1-score is greater than that of earlier models. In

@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 271
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
Thus, for software bug prediction, FPRNN-HTF [8] Farah Atif, Manuel Rodriguez, Luiz J. P.
(Forward Pass RNN with Hyperbolic Tangent Araújo, Utih Amartiwi, Barakat J. Akinsanya &
Function) is a more accurate method. Manuel Mazzara “A Survey on Data Science
We propose a technique that enhances diagnostic Techniques for Predicting Software Defects”,
precision-a critical component of successful IEEE Conf. of Software Engineering, 2021.
treatment. New datasets should be used to evaluate [9] Saleema Amershi; Andrew Begel; Christian
the accuracy in the future, and further AI approaches Bird; Robert DeLine; Harald Gall; Ece Kamar;
should be used to confirm the correctness of the Nachiappan Nagappan, “Software Engineering
estimate. Owing to the enormous amount of data for Machine Learning: A Case Study”, IEEE
required for train data performance estimate, the Conf. on Machine Learning, 2019.
suggested model has a processing time limit. The
[10] George G. Cabral; Leandro L. Minku; Emad
effectiveness of the system will be estimated in the Shihab; Suhaib Mujahid, “Class Imbalance
future using real-time data and the same algorithms. Evolution and Verification Latency in Just-in-
REFERENCES Time Software Defect Prediction”, IEEE/ACM
[1] Görkem Giray, Kwabena Ebo Bennin, Ömer 41st International Conference on Software
Köksal, Önder Babur, Bedir Tekinerdogan, “On Engineering (ICSE), 2019.
the use of deep learning in software defect [11] Kwabena Ebo Bennin; Jacky Keung; Passakorn
prediction”, The Journal of Systems & Phannachitta; Akito Monden; Solomon
Software, 2023. Mensah, “MAHAKIL: Diversity Based
[2] Iqra Batool, Tamim Ahmed Khan, “Software Oversampling Approach to Alleviate the Class
fault prediction using data mining, machine Imbalance Issue in Software Defect
learning and deep learning techniques: A Prediction”, IEEE Transactions on Software
systematic literature review”, Computers and Engineering, 2018.
Electrical Engineering, May 2022. [12] Yuxiang Gao, Yi Zhu, Yu Zhao, “Dealing with
[3] Haowen Chen, Xiao-Yuan Jing, Yuming Zhou, imbalanced data for interpretable defect
Bing Li, Baowen Xu, “Aligned metric prediction”, IEEE Conf on Data Analysis,
representation based balanced multiset 2017.
ensemble learning for heterogeneous defect
[13] Kwabena Ebo Bennin; Jacky Keung; Akito
prediction”, Information and Software Monden; Yasutaka Kamei; Naoyasu Ubayashi,
Technology, July 2022.
“Investigating the Effects of Balanced Training
[4] Cagatay Catal, Görkem Giray, Bedir and Testing Datasets on Effort-Aware Fault
Tekinerdogan, Sandeep Kumar & Suyash Prediction Models”, IEEE 40th Annual
Shukla, “Applications of deep learning for Computer Software and Applications
phishing detection: a systematic literature Conference (COMPSAC), 2016.
review”, Knowledge and Information Systems,
[14] Faruk Arar, Kürşat Ayan, “Software defect
2022.
prediction using cost-sensitive neural network”,
[5] Xieling Chen, Haoran Xie, Zongxi Li, Gary Applied Soft Computing, Volume 33, August
Cheng, “Topic analysis and development in 2015.
knowledge graph research: A bibliometric [15] Deepika Badampudi, Claes Wohlin, Kai
review on three decades”, Neurocomputing,
Petersen, “Experiences from using snowballing
October, 2021.
and database searches in systematic literature
[6] Cagatay Catal, Görkem Giray, Bedir studies”, 19th International Conference on
Tekinerdogan, “Applications of deep learning Evaluation and Assessment in Software
for mobile malware detection: A systematic Engineering, 2015.
literature review”, 2021. [16] Kyunghyun Cho, Bart van Merrienboer, Caglar
[7] Konstantin S. Kobylkin, Anton V. Konygin Ilya Gulcehre, Dzmitry Bahdanau, Fethi Bougares,
P. Mezentsev and Vladimir E. Misilov, “A Holger Schwenk, Yoshua Bengio, “Learning
Survey on Software Defect Prediction Using Phrase Representations using RNN Encoder-
Deep Learning”, IEEE/ACM 41st International Decoder for Statistical Machine Translation”,
Conference on Software Engineering: Software Computation and Language, 2014.
Engineering in Practice (ICSE-SEIP), 2021.

@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 272
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
[17] N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. [19] Cagatay Catal, Banu Diri, “A systematic review
Kegelmeyer, “SMOTE: Synthetic Minority of software fault prediction studies”, Expert
Over-sampling Technique”, Artificial Systems with Applications, Volume 36, Issue 4,
Intelligence, 2011 May 2009.
[18] Gul Calikli; Ayse Tosun; Ayse Bener; Melih [20] Alessandro Birolini, “Reliability and
Celik, “The effect of granularity level on Availability of Repairable Systems”, Reliability
software defect prediction”, 24th International Engineering, 2004.
Symposium on Computer and Information
Sciences, 2009.

@ IJTSRD | Unique Paper ID – IJTSRD60159 | Volume – 7 | Issue – 6 | Nov-Dec 2023 Page 273

You might also like