User preferences based software defect detection algorithms selection using MCDM

被引:71
|
作者
Peng, Yi [1 ]
Wang, Guoxun [1 ]
Wang, Honggang [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Management & Econ, Chengdu 610054, Peoples R China
[2] Univ Massachusetts, Dept Elect & Comp Engn, Dartmouth, MA USA
关键词
Algorithm selection; Classification algorithm; Knowledge-driven data mining; Multi-criteria decision making (MCDM); Software defect detection; HIERARCHY PROCESS; CLASSIFIERS; PREDICTION; FRAMEWORK; MODELS; TOPSIS; DEA; TREES;
D O I
10.1016/j.ins.2010.04.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A variety of classification algorithms for software defect detection have been developed over the years. How to select an appropriate classifier for a given task is an important issue in Data mining and knowledge discovery (DMKD). Many studies have compared different types of classification algorithms and the performances of these algorithms may vary using different performance measures and under different circumstances. Since the algorithm selection task needs to examine several criteria, such as accuracy, computational time, and misclassification rate, it can be modeled as a multiple criteria decision making (MCDM) problem. The goal of this paper is to use a set of MCDM methods to rank classification algorithms, with empirical results based on the software defect detection datasets. Since the preferences of the decision maker (DM) play an important role in algorithm evaluation and selection, this paper involved the DM during the ranking procedure by assigning user weights to the performance measures. Four MCDM methods are examined using 38 classification algorithms and 13 evaluation criteria over 10 public-domain software defect datasets. The results indicate that the boosting of CART and the boosting of C4.5 decision tree are ranked as the most appropriate algorithms for software defect datasets. Though the MCDM methods provide some conflicting results for the selected software defect datasets, they agree on most top-ranked classification algorithms. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:3 / 13
页数:11
相关论文
共 50 条
  • [21] A parallel framework for software defect detection and metric selection on cloud computing
    Md Mohsin Ali
    Shamsul Huda
    Jemal Abawajy
    Sultan Alyahya
    Hmood Al-Dossari
    John Yearwood
    Cluster Computing, 2017, 20 : 2267 - 2281
  • [22] Feature selection using firefly algorithm in software defect prediction
    M. Anbu
    G. S. Anandha Mala
    Cluster Computing, 2019, 22 : 10925 - 10934
  • [23] Feature selection using firefly algorithm in software defect prediction
    Anbu, M.
    Mala, G. S. Anandha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10925 - 10934
  • [24] Automatic User Preferences Selection of Smart Hearing Aid Using BioAid
    Siddiqui, Hafeez Ur Rehman
    Saleem, Adil Ali
    Raza, Muhammad Amjad
    Zafar, Kainat
    Russo, Riccardo
    Dudley, Sandra
    SENSORS, 2022, 22 (20)
  • [25] Detection of Steel Defect Using the Image Processing Algorithms
    Sharifzadeh, M.
    Alirezaee, S.
    Amirfattahi, R.
    Sadri, S.
    INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 125 - +
  • [26] Building an Ensemble for Software Defect Prediction Based on Diversity Selection
    Petric, Jean
    Bowes, David
    Hall, Tracy
    Christianson, Bruce
    Baddoo, Nathan
    ESEM'16: PROCEEDINGS OF THE 10TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2016,
  • [27] Software Defect Prediction based on Manifold Learning in Subspace Selection
    Gao, Yan
    Yang, Chunhui
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING (ICIIP'16), 2016,
  • [28] Geographical Route Selection Based On User Public Transportation and Service Preferences
    Almobaideen, Wesam
    Saadeh, Maha
    Al-Anbaki, Noor
    Zaghloul, Rawan
    Aladwan, Aryaf
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 144 - 149
  • [29] Algorithms for User Detection and Authentication based on Face Analysis
    Chovanec, M.
    Bily, J.
    Chovancova, E.
    Radusovsky, J.
    2013 11TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2013), 2013, : 63 - 66
  • [30] Software defect prediction using wrapper-based dynamic arithmetic optimization for feature selection
    Anand, Kunal
    Jena, Ajay Kumar
    Das, Himansu
    Askar, S. S.
    Abouhawwash, Mohamed
    CONNECTION SCIENCE, 2025, 37 (01)