1Department of Computer Science, University of Ilorin, Nigeria
2Department of Computer Science and Engineering, Obafemi Awolowo University, Nigeria
BibTex Citation Data :
@article{JTSISKOM13262, author = {Modinat Abolore Mabayoje and Abdullateef Olwagbemiga Balogun and Hajarah Afor Jibril and Jelili Olaniyi Atoyebi and Hammed Adeleye Mojeed and Victor Elijah Adeyemo}, title = {Parameter tuning in KNN for software defect prediction: an empirical analysis}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {7}, number = {4}, year = {2019}, keywords = {software defect prediction; parameter tuning; k-nearest neighbor; distance function; distance weighting}, abstract = {Software Defect Prediction (SDP) provides insights that can help software teams to allocate their limited resources in developing software systems. It predicts likely defective modules and helps avoid pitfalls that are associated with such modules. However, these insights may be inaccurate and unreliable if parameters of SDP models are not taken into consideration. In this study, the effect of parameter tuning on the k nearest neighbor (k-NN) in SDP was investigated. More specifically, the impact of varying and selecting optimal k value, the influence of distance weighting and the impact of distance functions on k-NN. An experiment was designed to investigate this problem in SDP over 6 software defect datasets. The experimental results revealed that k value should be greater than 1 (default) as the average RMSE values of k-NN when k>1(0.2727) is less than when k=1(default) (0.3296). In addition, the predictive performance of k-NN with distance weighing improved by 8.82% and 1.7% based on AUC and accuracy respectively. In terms of the distance function, kNN models based on Dilca distance function performed better than the Euclidean distance function (default distance function). Hence, we conclude that parameter tuning has a positive effect on the predictive performance of k-NN in SDP.}, issn = {2338-0403}, pages = {121--126} doi = {10.14710/jtsiskom.7.4.2019.121-126}, url = {https://jtsiskom.undip.ac.id/article/view/13262} }
Refworks Citation Data :
Article Metrics:
Last update:
Optimising classification in sport: a replication study using physical and technical-tactical performance indicators to classify competitive levels in rugby league match-play
Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems
Sampling-based novel heterogeneous multi-layer stacking ensemble method for telecom customer churn prediction
International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)
Binary Grey Wolf Optimizer with K-Nearest Neighbor classifier for Feature Selection
Computational Science and Its Applications – ICCSA 2021
Computational Science and Its Applications – ICCSA 2022 Workshops
Intelligent Algorithms in Software Engineering
Empirical analysis of tree-based classification models for customer churn prediction
Proceedings of International Conference on Advanced Computing Applications
When less is more: on the value of “co-training” for semi-supervised software defect predictors
Smell-Aware Bug Classification
Optimization of k value and lag parameter of k-nearest neighbor algorithm on the prediction of hotel occupancy rates
Advances in Computing and Data Sciences
Detecting block ciphers generic attacks: An instance-based machine learning method
A trustworthy hybrid model for transparent software defect prediction: SPAM-XAI
Software Engineering Perspectives in Systems
An Optimized LSTM Neural Network for Accurate Estimation of Software Development Effort
Impact of Feature Selection Methods on the Predictive Performance of Software Defect Prediction Models: An Extensive Empirical Study
Software Engineering Methods Design and Application
Machine Learning and Big Data Analytics
Computational Science and Its Applications – ICCSA 2020
Last update: 2024-11-13 21:24:09
Heterogeneous Ensemble with Combined Dimensionality Reduction for Social Spam Detection
Data Sampling-Based Feature Selection Framework for Software Defect Prediction
Search-Based Wrapper Feature Selection Methods in Software Defect Prediction: An Empirical Analysis
SMOTE-Based Homogeneous Ensemble Methods for Software Defect Prediction
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.