Neural Network Based Bug Priority Prediction Model Using Text Classification Techniques

Main Article Content

Pooja Awana Choudhary


As open source software systems are becoming larger and more complicated, the task of bug detection and fixing to improve the performance of the software is also getting more complex, time consuming and inefficient. To improve the quality and efficiency of the software, developers allow users to report bugs that are found by them using bug tracking system such as Bugzilla. In Bugzilla users specify the details of the bug, such as the description, the component, the version, the product and the severity. Depending on this information the developers assign the priority levels to the reported bugs. The task of prioritizing the bug reports is manual, therefore it is time-consuming and inconsistent. In this dissertation, Neural Network technique is used for developing prediction models for five different versions (2.0, 2.1, 3.0, 3.1, and 3.2) of Eclipse that will assign the priority levels based on the information provided in each bug report. The features that potentially affect the priority of a bug are temporal, textual, author-related, severity, product and component. The collected dataset is used to train and test the classification algorithms. ROC and F-measure are used to interpret the results.


Download data is not yet available.

Article Details



A. Lamkanfi, . S. Demeyer , Q. D. Soetens and T. Verdonck, "Comparing Mining Algorithms for Predicting the Severity of a Reported Bug," in 15th European Conference on Software Maintenance and Reengineering (CSMR), 2011, Oldenburg, Germany, 2011.

N. Serrano and . I. Ciordia, "Bugzilla, ITracker, and Other Bug Trackers," IEEE Software, pp. 11-13, MarchApril 2005.

Y. Tian, D. Lo and C. Sun, "DRONE: Predicting Priority of Reported Bugs by Multi-Factor Analysis," in 2013 IEEE International Conference on Software Maintenance, 2013.

J. Kanwal and O. Maqbool, "Bug prioritization to facilitate bug report triage," Journal of Computer Science and Technology, vol. 27, no. 2, pp. 397-412, March 2012.

M. Porter, "An Algorithm for Suffix Stripping, Program," Program, vol. 14, no. 3, pp. 130-137, 1980.

A. Lamkanfi, S. Demeyer, E. Giger and B. Goethals, "Predicting the Severity of a Reported Bug," in Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, Cape Town, South Africa, 2010.

X. Wang, L. Zhang, T. Xie, J. Anvik and J. Sun, "An Approach to Detecting Duplicate Bug Reports Using Natural Language and Execution Information.," in Software Engineering, 2008. ICSE '08. ACM/IEEE 30th International Conference on, Leipzig, Germany, 2008.

C. Sun, . D. Lo, S.-C. Khoo and J. Jiang, "Towards more accurate retrieval of duplicate bug reports," in Automated Software Engineering (ASE), 2011 26th IEEE/ACM International Conference on, Lawrence, KS, USA, 2011.

Y. Singh, A. Kaur and R. Malhotra, "Empirical validation of object-oriented metrics for predicting fault proneness models," Software Quality Journal, vol. 18, no. 3, pp. 3-35, March 2010.

. I. G. Permata and Sari, "An Attribute Selection For Severity Level Determination According To The Support Vector Machine Classification Result," in 1st International Conference on Information Systems For Business Competitiveness (ICISBC) 2011, 2011.

T. Menzies and A. Marcus, "Automated Severity Assessment of Software Defect Reports," in Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM'08), Beijing, China, 2008.

F. Khomh, . B. Chan, Y. Zou and . A. . E. Hassan, "An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox," in Reverse Engineering (WCRE), 2011 18th Working Conference on, Limerick, Ireland, 2011.

L. Huang, V. Ng, I. Persing, M. Chen, Z. Li, R. Geng and J. Tian, "AutoODC: Automated generation of orthogonal defect classifications," Automated Software Engineering, vol. 22, no. 1, p. 3–46, March 2015.

. Y. Tian, D. Lo and C. Sun, "Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction," in Reverse Engineering (WCRE), 2012 19th Working Conference on, Kingston, ON, Canada, 2012.

Eclipse, " Reporting FAQ#What is the difference between Severity and Priority.3F," 2012. [Online].

H. Hosseini, . R. Nguyen and M. W. Godfrey, "A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes," in Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on, Szeged, Hungary, 2012.

G. . D. Boetticher, "Applying Machine Learners to GUI Specifications in Formulating Early Life Cycle Project Estimations," in Software Engineering with Computational Intelligence, Springer, 2003, pp. 1-16.

S. R. Chidamber and C. F. Kemerer, "A Metrics Suite for Object Oriented Design," IEEE Transactions on Software Engineering, vol. 20, no. 6, pp. 476-493, June 1994.

M. Gayathri and A. Sudha, "Software defect prediction system using multilayer perceptron neural network with data mining," International Journal of Recent Technology and Engineering, vol. 3, no. 2, pp. 54-59, May 2014.

H. Kapila and S. Singh, "Analysis of CK Metrics to Predict Software Fault-Proneness using Bayesian Inference," International Journal of Computer Applications, vol. 74, no. 2, July 2013.

N. Katiyar and R. Singh, "Prediction of Software Development Faults Using Neural Network," VSRD-IJCSIT, vol. 1, no. 8, pp. 556-566, 2011.

Y. Tian, D. Lo, X. Xia and C. Sun, "Automated prediction of bug report priority using multi-factor analysis," Empirical Software Engineering, vol. 20, no. 5, pp. 1354-1383, 2014.

A. Lazar, S. Ritchey and B. Sharif, "Improving the Accuracy of Duplicate Bug Report Detection Using Textual Similarity Measures," in 11th Working Conference on Mining Software Repositories, Hyderabad, India, 2014.

Y. Bengio and Y. Grandvalet, "No unbiased estimator of the variance of k-fold cross-validation," The Journal of Machine Learning Research, vol. 5, pp. 1089-1105, 2004.

P. Cohen and D. Jensen, "Overfitting explained," in Preliminary Papers of the Sixth International Workshop on Artificial Intelligence and Statistics, 1997.

M. Stone, "Cross-Validatory Choice and Assessment of Statistical Predictions," Journal of the Royal Statistical Society,Ser B, vol. 36, no. 2, pp. 111-147, 1974.

Y. Singh, A. Kaur and R. Malhotra, "Prediction of Fault-Prone Software Modules using," International Journal of Computer Applications, vol. 1, no. 22, pp. 8-15, 2010.