Uncertainty-wise software anti-patterns detection: A possibilistic evolutionary machine learning approach
نویسندگان
چکیده
Code smells (a.k.a. anti-patterns) are manifestations of poor design solutions that can deteriorate software maintainability and evolution. Existing works did not take into account the issue uncertain class labels, which is an important inherent characteristic detection problem. More precisely, two human experts may have different degrees uncertainty about smelliness a particular only for smell task but also type identification one. Unluckily, existing approaches usually reject and/or ignore data correspond to classes (i.e. dataset instances) with labels. Throwing away disregarding factor could considerably degrade detection/identification process effectiveness. From solution approach viewpoint, there no work in literature proposed method able detect identify code while preserving aspect. The main goal our research handle factor, issued from experts, detecting identifying by proposing evolutionary deal anti-patterns classification We suggest Bi-ADIPOK, as effective search-based tool capable tackle previously mentioned challenge both cases. corresponds EA (Evolutionary Algorithm) optimizes set detectors encoded PK-NNs (Possibilistic K-nearest neighbors) based on bi-level hierarchy, upper level role consists finding optimal parameters, lower one generate PK-NNs. A newly fitness function has been PomAURPC-OVA_dist modified Area Under Recall Precision Curve One-Versus-All_distance, abbreviated PAURPC_d this paper). Bi-ADIPOK label using some concepts stemming Possibility Theory. Furthermore, even imbalanced data. notice first built then validated possibilistic base examples simulates mimics subjectivity engineers opinions. statistical analysis obtained results comparative experiments respect four relevant state-of-the-art methods shows merits proposal. demonstrate that, environment, ranges between 0.902 0.932 its IAC lies 0.9108 0.9407, certain 0.928 0.955 0.9477 0.9622. Similarly, results, indicate varies 0.8576 0.9273 0.8693 0.9318. For 0.8613 0.9351 values 0.8672 0.9476. With data, find 35% more than second best (i.e., BLOP). succeeded reduce number false alarms misclassified smelly 12%. In addition, 43% types BLOP reduces 32%. same demonstrating Bi-ADIPOK’s ability such environment.
منابع مشابه
An Interactive Possibilistic Programming Approach to Designing a 3PL Supply Chain Network Under Uncertainty
The design of closed-loop supply chain networks has attracted increasing attention in recent decades with environmental concerns and commercial factors. Due to the rapid growth of knowledge and technology, the complexity of the supply chain operations is increasing daily and organizations are faced with numerous challenges and risks in their management. Most organizations with limited resources...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملEmotion Detection in Persian Text; A Machine Learning Model
This study aimed to develop a computational model for recognition of emotion in Persian text as a supervised machine learning problem. We considered Pluthchik emotion model as supervised learning criteria and Support Vector Machine (SVM) as baseline classifier. We also used NRC lexicon and contextual features as training data and components of the model. One hundred selected texts including pol...
متن کاملEmail Spam Detection A Machine Learning Approach
Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn from data. A machine learning system could be trained to distinguish between spam and non-spam (ham) emails. We aim to analyze current methods in machine learning to identify the best techniques to use in content-based spam filtering.
متن کاملA Machine Learning Approach to Anomaly Detection
Much of the intrusion detection research focuses on signature (misuse) detection, where models are built to recognize known attacks. However, signature detection, by its nature, cannot detect novel attacks. Anomaly detection focuses on modeling the normal behavior and identifying significant deviations, which could be novel attacks. In this paper we explore two machine learning methods that can...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Soft Computing
سال: 2022
ISSN: ['1568-4946', '1872-9681']
DOI: https://doi.org/10.1016/j.asoc.2022.109620