{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:36:28Z","timestamp":1743100588700,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030197377"},{"type":"electronic","value":"9783030197384"}],"license":[{"start":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T00:00:00Z","timestamp":1557273600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-19738-4_14","type":"book-chapter","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T15:53:35Z","timestamp":1557244415000},"page":"130-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing"],"prefix":"10.1007","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"given":"Agata","family":"Gie\u0142czyk","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,8]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Vetro\u2019 A, Torchiano M, Morisio M (2010) Assessing the precision of findbugs by mining Java projects developed at a university. In: Second international conference on intelligent computation technology and automation. 7th IEEE working conference on mining software repositories (MSR 2010), Changsha, Hunan, pp 110\u2013113. \n                  https:\/\/doi.org\/10.1109\/MSR.2010.5463283","DOI":"10.1109\/MSR.2010.5463283"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Adak MF (2018) Software defect detection by using data mining based fuzzy logic. In: Sixth international conference on digital information, networking, and wireless communications (DINWC), Beirut, pp 65\u201369. \n                  https:\/\/doi.org\/10.1109\/DINWC.2018.8356997","DOI":"10.1109\/DINWC.2018.8356997"},{"key":"14_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94463-0","volume-title":"Neural Networks and Deep Learning","author":"Charu C. Aggarwal","year":"2018","unstructured":"Aggarwal CC (2018) Neural networks and deep learning: a textbook. \n                  https:\/\/doi.org\/10.1007\/978-3-319-94463-0"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Li X et al (2017) A mining approach to obtain the software vulnerability characteristics. In: Fifth international conference on advanced cloud and big data (CBD), pp 296\u2013301. \n                  https:\/\/doi.org\/10.1109\/CBD.2017.58","DOI":"10.1109\/CBD.2017.58"},{"issue":"1","key":"14_CR5","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Int Res 16(1):321\u2013357 \n                  http:\/\/dl.acm.org\/citation.cfm?id=1622407.1622416","journal-title":"J Artif Int Res"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10111-018-0494-y","volume":"21","author":"Micha\u0142 Chora\u015b","year":"2018","unstructured":"Chora\u015b M, Kozik R, Puchalski D, Renk R (2019) Increasing product owners\u2019 cognition and decision-making capabilities by data analysis approach. Cogn Technol Work. \n                  https:\/\/doi.org\/10.1007\/s10111-018-0494-y","journal-title":"Cognition, Technology & Work"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Chun-mei Z, Zhi-ling L (2010) Applying data mining techniques in software development. In: 2nd IEEE international conference on information management and engineering, Chengdu, pp 535\u2013538. \n                  https:\/\/doi.org\/10.1109\/ICIME.2010.5477841","DOI":"10.1109\/ICIME.2010.5477841"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2010) An extensive comparison of bug prediction approaches. In: Proceedings of MSR 2010 7th IEEE working conference on mining software repositories. IEEE CS Press, pp 31\u201341","DOI":"10.1109\/MSR.2010.5463279"},{"key":"14_CR9","series-title":"Springer Texts in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7","volume-title":"An Introduction to Statistical Learning","author":"Gareth James","year":"2013","unstructured":"James G, Witten D, Hastie T, Tibshirani R (2013) An introduction to statistical learning. In: Cluster computing 2018. \n                  https:\/\/doi.org\/10.1007\/978-1-4614-7138-7"},{"key":"14_CR10","unstructured":"Kohavi R (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, pp 1137\u20131145"},{"issue":"5","key":"14_CR11","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1007\/s12652-018-0784-5","volume":"10","author":"Rafa\u0142 Kozik","year":"2018","unstructured":"Kozik R, Chora\u015b M, Puchalski D, Renk R (2019) Q-rapids framework for advanced data analysis to improve rapid software development. J Ambient Intell Humaniz Comput. \n                  https:\/\/doi.org\/10.1007\/s12652-018-0784-5","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Lo J (2009) The implementation of artificial neural networks applying to software reliability modeling. In: 2009 Chinese control and decision conference, pp 4349\u20134354. \n                  https:\/\/doi.org\/10.1109\/CCDC.2009.5192431","DOI":"10.1109\/CCDC.2009.5192431"},{"key":"14_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4","volume-title":"Data mining and knowledge discovery handbook","author":"O Maimon","year":"2010","unstructured":"Maimon O, Rokach L (2010) Data mining and knowledge discovery handbook, 2nd edn. Springer, Heidelberg","edition":"2"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Moser R, Pedrycz W, Succi G (2008) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th international conference on software engineering, ICSE 2008. ACM, New York, pp 181\u2013190. \n                  https:\/\/doi.org\/10.1145\/1368088.1368114","DOI":"10.1145\/1368088.1368114"},{"key":"14_CR15","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33747-0","volume-title":"Advances in Neural Networks","year":"2016","unstructured":"Bassis S, Esposito A, Morabito FC, Pasero E (2016) Advances in neural networks. \n                  https:\/\/doi.org\/10.1007\/978-3-319-33747-0"},{"key":"14_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43162-8","volume-title":"Artificial Neural Networks","author":"Ivan Nunes da Silva","year":"2017","unstructured":"da Silva IN, Spatti DH, Flauzino RA, Liboni LHB, dos Reis Alves SF (2017) Artificial neural networks a practical course. \n                  https:\/\/doi.org\/10.1007\/978-3-319-43162-8"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Viji C, Rajkumar N, Duraisamy S (2018) Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm. In: Cluster computing 2018. \n                  https:\/\/doi.org\/10.1007\/s10586-018-1923-7","DOI":"10.1007\/s10586-018-1923-7"}],"container-title":["Advances in Intelligent Systems and Computing","Progress in Computer Recognition Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19738-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:54:31Z","timestamp":1558151671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19738-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,8]]},"ISBN":["9783030197377","9783030197384"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19738-4_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,5,8]]},"assertion":[{"value":"8 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CORES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Recognition Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Polanica-Zdr\u00f3j","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cores2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cores.pwr.edu.pl","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}