Ajou University repository

Classification of Bugs in Cloud Computing Applications Using Machine Learning Techniquesoa mark
  • Tabassum, Nadia ;
  • Namoun, Abdallah ;
  • Alyas, Tahir ;
  • Tufail, Ali ;
  • Taqi, Muhammad ;
  • Kim, Ki Hyung
Citations

SCOPUS

7

Citation Export

DC Field Value Language
dc.contributor.authorTabassum, Nadia-
dc.contributor.authorNamoun, Abdallah-
dc.contributor.authorAlyas, Tahir-
dc.contributor.authorTufail, Ali-
dc.contributor.authorTaqi, Muhammad-
dc.contributor.authorKim, Ki Hyung-
dc.date.issued2023-03-01-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/33286-
dc.description.abstractIn software development, the main problem is recognizing the security-oriented issues within the reported bugs due to their unacceptable failure rate to provide satisfactory reliability on customer and software datasets. The misclassification of bug reports has a direct impact on the effectiveness of the bug prediction model. The misclassification issue surely compromises the accuracy of the system. Manually reviewing bug reports is necessary to solve this problem, but doing so takes a lot of time and is tiresome for developers and testers. This paper proposes a novel hybrid approach based on natural language processing (NLP) and machine learning. To address these issues, the intended outcomes are multi-class supervised classification and bug prioritization using supervised classifiers. After being collected, the dataset was prepared for vectorization, subjected to exploratory data analysis, and preprocessed. The feature extraction and selection methods used for a bag of words are TF-IDF and word2vec. Machine learning models are created after the dataset has undergone a full transformation. This study proposes, develops, and assesses four classifiers: multinomial Naive Bayes, decision tree, logistic regression, and random forest. The hyper-parameters of the models are tuned, and it is concluded that random forest outperformed with a 91.73% test and 100% training accuracy. The SMOTE technique was used to balance the highly imbalanced dataset, which was initially created for the justified classification. The comparison between balanced and imbalanced dataset models clearly showed the importance of the balanced dataset in classification as it outperformed in all experiments.-
dc.description.sponsorshipThis research was partially supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP2021-2021-0-01835) and the research grant (No. 2021-0-00590 Decentralized High-Performance: 2021-0-00590; IITP2021-2021-0-01835). This research was also partially supported by KIAT (Korea Institute for Advancement of Technology) grant funded by the Korea Government (MOTIE) (P0008703, The Competency Development Program for Industry Specialist) and the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2021R1F1A1045861).-
dc.language.isoeng-
dc.publisherMDPI-
dc.titleClassification of Bugs in Cloud Computing Applications Using Machine Learning Techniques-
dc.typeArticle-
dc.citation.titleApplied Sciences (Switzerland)-
dc.citation.volume13-
dc.identifier.bibliographicCitationApplied Sciences (Switzerland), Vol.13-
dc.identifier.doi10.3390/app13052880-
dc.identifier.scopusid2-s2.0-85149995007-
dc.identifier.urlwww.mdpi.com/journal/applsci/-
dc.subject.keywordbugs-
dc.subject.keywordclassification-
dc.subject.keywordcloud computing-
dc.subject.keywordmachine learning-
dc.subject.keywordNLP-
dc.description.isoatrue-
dc.subject.subareaMaterials Science (all)-
dc.subject.subareaInstrumentation-
dc.subject.subareaEngineering (all)-
dc.subject.subareaProcess Chemistry and Technology-
dc.subject.subareaComputer Science Applications-
dc.subject.subareaFluid Flow and Transfer Processes-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Kim, Ki-Hyung  Image
Kim, Ki-Hyung 김기형
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.