International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 54 - Issue 11 |
Published: September 2012 |
Authors: Bharavi Mishra, K. K. Shukla |
![]() |
Bharavi Mishra, K. K. Shukla . Mining Attributes Patterns of Defective Modules for Object Oriented Software. International Journal of Computer Applications. 54, 11 (September 2012), 14-18. DOI=10.5120/8610-2462
@article{ 10.5120/8610-2462, author = { Bharavi Mishra,K. K. Shukla }, title = { Mining Attributes Patterns of Defective Modules for Object Oriented Software }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 54 }, number = { 11 }, pages = { 14-18 }, doi = { 10.5120/8610-2462 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A Bharavi Mishra %A K. K. Shukla %T Mining Attributes Patterns of Defective Modules for Object Oriented Software%T %J International Journal of Computer Applications %V 54 %N 11 %P 14-18 %R 10.5120/8610-2462 %I Foundation of Computer Science (FCS), NY, USA
Defect prediction is the process of predicting the fault prone module using some pre-mined patterns or rules. Several statistical and mathematical strategies have been used in recent past to mine these rules. However, the interpretability of these rules is the matter of concern. In real development process an expert is required to demonstrate the working of mined patterns which prevents the use of these mined patterns in software development process. Considering these facts, in this study we tried to find the combination of attribute-value pair which indicates the bug. These attribute-value pair is known as defect pattern. For defect pattern mining we used GUHA (General Unary Hypothesis Automaton) procedure which is oldest yet very powerful method of pattern mining. The basic idea of GUHA procedure is to mine the entire possible and interesting hypothesis supported by the data in predefined logical form. The experimental results show that the mined patterns can be used as a rule to identify the defective module. Moreover, the mined patterns do not suffer from the interpretability problems.