Optimization of association rules using hybrid data mining technique

被引:0
|
作者
Sahana P. Shankar
E. Naresh
Harshit Agrawal
机构
[1] Ramaiah University of Applied Sciences,
[2] M S Ramaiah Institute of Technology,undefined
关键词
Defect prediction; Data mining; Spread; Confidence; Support count; Association rules; Quality; NASA; MDP; Promise repository;
D O I
暂无
中图分类号
学科分类号
摘要
Software quality has been the important area of interest for decades now in the IT sector and software firms. Defect prediction gives the tester the pointers as to where the bugs will most likely be hidden in the software product. Identifying and reporting the defect probe areas is the main job of software defect prediction techniques. Early detection of software defects during Software Development Life Cycle could lead to a reduction in cost of development, time involved in further testing activities and rework effort post-production and maintenance phase, thus resulting in more reliable software. Software metrics can be used for developing the defect prediction models. Several data mining techniques can be applied on the available open-source software datasets. These datasets are extracted from software programs. Such datasets made publicly available by National Aeronautics and Space Administration for their various softwares have been extensively used in software engineering-related research activities. These datasets contain information on associated Software Metrics at module level. The proposed idea is a novel hybrid data mining technique consisting of Clustering and Modified Apriori Algorithm that results in improved efficiency and reliability of Software Defect Prediction. This technique works by reducing the number of association rules generated. The results are achieved by using interestingness measure called spread. The paper also does a comparative analysis of the results obtained from the novel technique with the existing hybrid technique of Clustering and Apriori.
引用
收藏
页码:251 / 261
页数:10
相关论文
共 50 条
  • [11] An Improved Documents Classification Technique Using Association Rules Mining
    Qureshi, Mohammad Naved
    Aldheleai, Hassan Faisal Hamood
    Tamandani, Yahya Kord
    2015 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2015, : 460 - 465
  • [12] Mining Association Rules Using Hash-Index Technique
    Geeta, R. B.
    Mamillapalli, Omkar
    Totad, Shasikumar G.
    Reddy, P. V. G. D. Prasad
    ADVANCES IN DIGITAL IMAGE PROCESSING AND INFORMATION TECHNOLOGY, 2011, 205 : 239 - +
  • [13] Study of Diabetes Mellitus (DM) with Ophthalmic Complication Using Association Rules of Data Mining Technique
    Kasemthaweesab, Pornnapas
    Kurutach, Werasak
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 2011, 6922 : 527 - 536
  • [14] The Optimization Algorithm Of Association Rules Mining
    Liu, Zhenyu
    Song, Zhihui
    Yan, Ruiqing
    Zhang, Zeng
    INTERNATIONAL CONFERENCE MACHINERY, ELECTRONICS AND CONTROL SIMULATION, 2014, 614 : 405 - 408
  • [15] Optimization for MASK scheme in privacy preserving data mining for association rules
    Andruszkiewicz, Piotr
    ROUGH SETS AND INTELLIGENT SYSTEMS PARADIGMS, PROCEEDINGS, 2007, 4585 : 465 - 474
  • [16] Mining association rules using fuzzy inference on Web data
    Martínez, M
    Vargas, G
    Dorado, A
    Millán, M
    ADVANCES IN WEB INTELLIGENCE, 2003, 2663 : 73 - 82
  • [17] Association Rules Mining on Retail Data
    Dagaslani, Hatice
    Basar, Ozlem Deniz
    EKOIST-JOURNAL OF ECONOMETRICS AND STATISTICS, 2022, (37):
  • [18] Formalizing Data Mining with Association Rules
    Rauch, Jan
    2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), 2012, : 406 - 411
  • [19] Study on the association rules of data mining
    Li, YR
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 459 - 462
  • [20] Data mining in law with association rules
    Stranieri, A
    Zeleznikow, J
    Turner, H
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON LAW AND TECHNOLOGY, 2000, : 129 - 134