{"id":635,"date":"2016-11-06T15:20:48","date_gmt":"2016-11-06T06:20:48","guid":{"rendered":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/?post_type=jetpack-portfolio&#038;p=635"},"modified":"2016-11-06T15:39:47","modified_gmt":"2016-11-06T06:39:47","slug":"research","status":"publish","type":"jetpack-portfolio","link":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/portfolio\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<div class=\"entry-content\" itemprop=\"text\">\n<h2>Fault-proneness Filtering (2006~)<\/h2>\n<p>The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics. Such approaches, however, have difficulties in collecting the metrics and constructing mathematical models based on the metrics.<\/p>\n<p>In order to mitigate such difficulties, we propose a novel approach for detecting fault-prone modules using a spam filtering technique, named Fault-Prone Filtering. Because of the increase of needs for spam e-mail detection, the spam filtering technique has been progressed as a convenient and effective technique for text mining. In our approach, fault-prone modules are detected in a way that the source code modules are considered as text files and are applied to the spam filter directly.<\/p>\n<p>In order to show the usefulness of our approach, we conducted an experiment using a large source code repository of Java based open source project. The result of experiment shows that our approach can classify about 85% of software modules correctly. The result also indicates that fault-prone modules can be detected relatively low cost at an early stage.<\/p>\n<h2>Data Mining from Software Project Data in Industries (1998~)<\/h2>\n<p>We have applied various data mining techniques to data<br \/>\ncollected from industries in Japan. The aim of this study is<br \/>\nto investigate significant factors to either of the quality<br \/>\nof software product, cost for the development, and duration<br \/>\nof the development.<\/p>\n<p>So far, we used association rules mining, Bayesian belief<br \/>\nnetwork, decision trees, Bayesian classifier, factor<br \/>\nanalysis, and so on.\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div class=\"entry-summary\" itemprop=\"text\">\n<p>Fault-proneness Filtering (2006~) The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics. Such approaches, however, have difficulties in collecting the metrics and constructing mathematical models based on the metrics. In order to mitigate such difficulties, we propose a novel approach for detecting fault-prone modules using a spam filtering technique, named Fault-Prone Filtering. Because of the increase of needs for spam e-mail detection, the spam filtering technique has been progressed as a convenient and effective technique for text mining. In our approach, fault-prone modules are detected in a way that the source code modules &#8230;<\/p>\n\n<\/div>\n","protected":false},"author":1,"featured_media":644,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"jetpack-portfolio-type":[18],"jetpack-portfolio-tag":[],"class_list":["post-635","jetpack-portfolio","type-jetpack-portfolio","status-publish","format-standard","has-post-thumbnail","hentry","jetpack-portfolio-type-profile","entry-lead"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/jetpack-portfolio\/635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/jetpack-portfolio"}],"about":[{"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/types\/jetpack-portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/comments?post=635"}],"version-history":[{"count":0,"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/jetpack-portfolio\/635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/media\/644"}],"wp:attachment":[{"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/media?parent=635"}],"wp:term":[{"taxonomy":"jetpack-portfolio-type","embeddable":true,"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/jetpack-portfolio-type?post=635"},{"taxonomy":"jetpack-portfolio-tag","embeddable":true,"href":"https:\/\/se.is.kit.ac.jp\/~o-mizuno\/wp-json\/wp\/v2\/jetpack-portfolio-tag?post=635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}