Optimization of association rules using hybrid data mining technique

被引:0
|
作者
Sahana P. Shankar
E. Naresh
Harshit Agrawal
机构
[1] Ramaiah University of Applied Sciences,
[2] M S Ramaiah Institute of Technology,undefined
关键词
Defect prediction; Data mining; Spread; Confidence; Support count; Association rules; Quality; NASA; MDP; Promise repository;
D O I
暂无
中图分类号
学科分类号
摘要
Software quality has been the important area of interest for decades now in the IT sector and software firms. Defect prediction gives the tester the pointers as to where the bugs will most likely be hidden in the software product. Identifying and reporting the defect probe areas is the main job of software defect prediction techniques. Early detection of software defects during Software Development Life Cycle could lead to a reduction in cost of development, time involved in further testing activities and rework effort post-production and maintenance phase, thus resulting in more reliable software. Software metrics can be used for developing the defect prediction models. Several data mining techniques can be applied on the available open-source software datasets. These datasets are extracted from software programs. Such datasets made publicly available by National Aeronautics and Space Administration for their various softwares have been extensively used in software engineering-related research activities. These datasets contain information on associated Software Metrics at module level. The proposed idea is a novel hybrid data mining technique consisting of Clustering and Modified Apriori Algorithm that results in improved efficiency and reliability of Software Defect Prediction. This technique works by reducing the number of association rules generated. The results are achieved by using interestingness measure called spread. The paper also does a comparative analysis of the results obtained from the novel technique with the existing hybrid technique of Clustering and Apriori.
引用
收藏
页码:251 / 261
页数:10
相关论文
共 50 条
  • [41] Association rules for web data mining in WHOWEDA
    Madria, SK
    Raymond, C
    Bhowmick, S
    Mohania, M
    2000 KYOTO INTERNATIONAL CONFERENCE ON DIGITAL LIBRARIES: RESEARCH AND PRACTICE, PROCEEDINGS, 2000, : 227 - 233
  • [42] Mining association rules in big data with NGEP
    Yunliang Chen
    Fangyuan Li
    Junqing Fan
    Cluster Computing, 2015, 18 : 577 - 585
  • [43] Mining Association Rules in Seasonal Transaction Data
    Ayu, Sabrina Kusuma
    Surjandari, Isti
    Zulkarnain
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 321 - 325
  • [44] Mining association rules in big data with NGEP
    Chen, Yunliang
    Li, Fangyuan
    Fan, Junqing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (02): : 577 - 585
  • [45] MINING ASSOCIATION RULES FOR TRAJECTORIES OF SPATIOTEMPORAL DATA
    Hong, Hao
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 247 - 253
  • [46] Improvements in data mining association rules algorithm
    Li, Dai
    International Journal of Database Theory and Application, 2015, 8 (02): : 1 - 10
  • [47] A framework for mining association rules in data warehouses
    Tjioe, HC
    Taniar, D
    INTELLIGENT DAA ENGINEERING AND AUTOMATED LEARNING IDEAL 2004, PROCEEDINGS, 2004, 3177 : 159 - 165
  • [48] Parallel Bees Swarm Optimization for Association Rules Mining Using GPU Architecture
    Djenouri, Youcef
    Drias, Habiba
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2014, PT II, 2014, 8795 : 50 - 57
  • [49] An incremental updating technique for mining indirect association rules
    Zheng, Cheng
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 217 - 221
  • [50] Improving the Performance of Association Rules Hiding using Hybrid Optimization Algorithm
    Murthy, T. Satyanarayana
    Roy, Mettu Sumender
    Varma, Mohan Krishna
    JOURNAL OF APPLIED SECURITY RESEARCH, 2020, 15 (03) : 423 - 437