{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:12:28Z","timestamp":1777097548335,"version":"3.51.4"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031105418","type":"print"},{"value":"9783031105425","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10542-5_4","type":"book-chapter","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:03:02Z","timestamp":1658469782000},"page":"49-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Feature Selection-Based K-NN Model for Fast Software Defect Prediction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1020-4432","authenticated-orcid":false,"given":"Joseph Bamidele","family":"Awotunde","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-9331","authenticated-orcid":false,"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2728-0116","authenticated-orcid":false,"given":"Abidemi Emmanuel","family":"Adeniyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3049-1184","authenticated-orcid":false,"given":"Moses Kazeem","family":"Abiodun","sequence":"additional","affiliation":[]},{"given":"Manju","family":"Kaushik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8661-3737","authenticated-orcid":false,"given":"Morolake Oladayo","family":"Lawrence","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,23]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.eswa.2017.04.014","volume":"82","author":"SS Rathore","year":"2017","unstructured":"Rathore, S.S., Kumar, S.: Towards an ensemble based system for predicting the number of software faults. Expert Syst. Appl. 82, 357\u2013382 (2017)","journal-title":"Expert Syst. Appl."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.infsof.2014.07.005","volume":"58","author":"IH Laradji","year":"2015","unstructured":"Laradji, I.H., Alshayeb, M., Ghouti, L.: Software defect prediction using ensemble learning on selected features. Inf. Softw. Technol. 58, 388\u2013402 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Abisoye, O.A., Akanji, O.S., Abisoye, B.O., Awotunde, J.: Slow hypertext transfer protocol mitigation model in software defined networks. In: 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy, ICDABI 2020, 9325601 (2020)","DOI":"10.1109\/ICDABI51230.2020.9325601"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Malhotra, R., Jain, J.: Handling imbalanced data using ensemble learning in software defect prediction. In: 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 300\u2013304. IEEE (2020)","DOI":"10.1109\/Confluence47617.2020.9058124"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Awotunde, J.B., Ayo, F.E., Ogundokun, R.O., Matiluko, O.E., Adeniyi, E.A.: Investigating the roles of effective communication among stakeholders in collaborative software development projects. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2020, 12254 LNCS, pp. 311\u2013319 (2020)","DOI":"10.1007\/978-3-030-58817-5_24"},{"issue":"209","key":"4_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-981-16-2972-3_10","volume":"2021","author":"JB Awotunde","year":"2021","unstructured":"Awotunde, J.B., Folorunso, S.O., Bhoi, A.K., Adebayo, P.O., Ijaz, M.F.: Disease diagnosis system for IoT-based wearable body sensors with machine learning algorithm. Intelligent Systems Reference Library 2021(209), 201\u2013222 (2021)","journal-title":"Intelligent Systems Reference Library"},{"issue":"109","key":"4_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-93453-8_2","volume":"2022","author":"JB Awotunde","year":"2022","unstructured":"Awotunde, J.B., Misra, S.: Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks. Lecture Notes Data Eng. .ications Technol. 2022(109), 21\u201344 (2022)","journal-title":"Lecture Notes Data Eng. .ications Technol."},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-319-95174-4_32","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2018: 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part V","author":"RK Behera","year":"2018","unstructured":"Behera, R.K., Shukla, S., Rath, S.K., Misra, S.: Software reliability assessment using machine learning technique. In: Gervasi, O., et al. (eds.) Computational Science and Its Applications \u2013 ICCSA 2018: 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part V, pp. 403\u2013411. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95174-4_32"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco, D., Jurman, G.: The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics 21(1), 1\u201313 (2020)","journal-title":"BMC Genomics"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-981-13-2348-5_5","volume-title":"Towards Extensible and Adaptable Methods in Computing","author":"S Shukla","year":"2018","unstructured":"Shukla, S., Behera, R.K., Misra, S., Rath, S.K.: Software reliability assessment using deep learning technique. In: Chakraverty, S., Goel, A., Misra, S. (eds.) Towards Extensible and Adaptable Methods in Computing, pp. 57\u201368. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2348-5_5"},{"issue":"2021","key":"4_CR11","doi-asserted-by":"crossref","first-page":"7154587","DOI":"10.1155\/2021\/7154587","volume":"2021","author":"JB Awotunde","year":"2021","unstructured":"Awotunde, J.B., Chakraborty, C., Adeniyi, A.E.: Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wirel. Commun. Mob. Comput. 2021(2021), 7154587 (2021)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.procs.2021.10.052","volume":"193","author":"RO Ogundokun","year":"2021","unstructured":"Ogundokun, R.O., Awotunde, J.B., Sadiku, P., Adeniyi, E.A., Abiodun, M., Dauda, O.I.: An enhanced intrusion detection system using particle swarm optimization feature extraction technique. Procedia Computer Science 193, 504\u2013512 (2021)","journal-title":"Procedia Computer Science"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12859-020-3361-9","volume":"21","author":"R Jagdhuber","year":"2020","unstructured":"Jagdhuber, R., Lang, M., Stenzl, A., Neuhaus, J., Rahnenf\u00fchrer, J.: Cost-Constrained feature selection in binary classification: adaptations for greedy forward selection and genetic algorithms. BMC Bioinformatics 21(1), 1\u201321 (2020)","journal-title":"BMC Bioinformatics"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Kumari, A., Behera, R.K., Sahoo, B., Sahoo, S.P.: Prediction of link evolution using community detection in social network. Computing, 1\u201322 (2022)","DOI":"10.1007\/s00607-021-01035-4"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Mishra, N., Soni, H.K., Sharma, S., Upadhyay, A.K.: Development and analysis of artificial neural network models for rainfall prediction by using time-series data. International Journal of Intelligent Systems Applications, 10(1) (2018)","DOI":"10.5815\/ijisa.2018.01.03"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"30223","DOI":"10.1109\/ACCESS.2020.2972435","volume":"8","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Mohanty, S.N., Parida, A.K., Pani, S.K., Dong, B., Cheng, X.: Annual and non-monsoon rainfall prediction modelling using SVR-MLP: an empirical study from Odisha. IEEE Access 8, 30223\u201330233 (2020)","journal-title":"IEEE Access"},{"key":"4_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-981-13-0617-4_61","volume-title":"Cognitive Informatics and Soft Computing","author":"RS Jagdale","year":"2019","unstructured":"Jagdale, R.S., Shirsat, V.S., Deshmukh, S.N.: Sentiment analysis on product reviews using machine learning techniques. In: Mallick, P.K., Balas, V.E., Bhoi, A.K., Zobaa, A.F. (eds.) Cognitive Informatics and Soft Computing. AISC, vol. 768, pp. 639\u2013647. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-0617-4_61"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Hassonah, M.A., Al-Sayyed, R., Rodan, A., Ala\u2019M, A.Z., Aljarah, I., Faris, H.: An efficient hybrid filter and evolutionary wrapper approach for sentiment analysis of various topics on Twitter. Knowledge-Based Syst.192, 105353 (2020)","DOI":"10.1016\/j.knosys.2019.105353"},{"issue":"18","key":"4_CR19","doi-asserted-by":"publisher","first-page":"26597","DOI":"10.1007\/s11042-019-07788-7","volume":"78","author":"AU Rehman","year":"2019","unstructured":"Rehman, A.U., Malik, A.K., Raza, B., Ali, W.: A hybrid CNN-LSTM model for improving accuracy of movie reviews sentiment analysis. Multimedia Tools and Applications 78(18), 26597\u201326613 (2019)","journal-title":"Multimedia Tools and Applications"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Awotunde, J.B., Abiodun, K.M., Adeniyi, E.A., Folorunso, S.O., Jimoh, R.G.: A deep learning-based intrusion detection technique for a secured IoMT system. Communications in Computer and Information Science,\u00a02022, 1547 CCIS, pp. 50\u201362 (2021)","DOI":"10.1007\/978-3-030-95630-1_4"},{"issue":"4","key":"4_CR21","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"A Verma","year":"2020","unstructured":"Verma, A., Ranga, V.: Machine learning based intrusion detection systems for IoT applications. Wireless Pers. Commun. 111(4), 2287\u20132310 (2020)","journal-title":"Wireless Pers. Commun."},{"issue":"2","key":"4_CR22","doi-asserted-by":"publisher","first-page":"461","DOI":"10.3390\/s20020461","volume":"20","author":"A Amouri","year":"2020","unstructured":"Amouri, A., Alaparthy, V.T., Morgera, S.D.: A machine learning based intrusion detection system for mobile Internet of Things. Sensors 20(2), 461 (2020)","journal-title":"Sensors"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Matloob, F., Aftab, S., Iqbal, A.: A framework for software defect prediction using feature selection and ensemble learning techniques. International Journal of Modern Education Computer Sci. 11(12) (2019)","DOI":"10.5815\/ijmecs.2019.12.01"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Yal\u00e7\u0131ner, B., \u00d6zde\u015f, M.: Software defect estimation using machine learning algorithms. In: 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 487\u2013491. IEEE (2019)","DOI":"10.1109\/UBMK.2019.8907149"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.asoc.2015.04.045","volume":"33","author":"\u00d6F Arar","year":"2015","unstructured":"Arar, \u00d6.F., Ayan, K.: Software defect prediction using cost-sensitive neural network. Appl. Soft Comput. 33, 263\u2013277 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"4_CR26","first-page":"300","volume":"10","author":"A Iqbal","year":"2019","unstructured":"Iqbal, A., et al.: Performance analysis of machine learning techniques on software defect prediction using NASA datasets. Int. J. Adv. Comput. Sci. Appl 10(5), 300\u2013308 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"issue":"9","key":"4_CR27","doi-asserted-by":"publisher","first-page":"54","DOI":"10.5815\/ijmecs.2019.09.06","volume":"11","author":"A Iqbal","year":"2019","unstructured":"Iqbal, A., Aftab, S., Ullah, I., Bashir, M.S., Saeed, M.A.: A feature selection based ensemble classification framework for software defect prediction. Int. J. Modern Education Comput. Sci. 11(9), 54 (2019)","journal-title":"Int. J. Modern Education Comput. Sci."},{"key":"4_CR28","unstructured":"Lanubile, F., Lonigro, A., Vissagio, G.: Comparing models for identifying fault-prone software components. In: SEKE, pp. 312\u2013319 (1995)"},{"issue":"5","key":"4_CR29","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.jss.2007.07.040","volume":"81","author":"KO Elish","year":"2008","unstructured":"Elish, K.O., Elish, M.O.: Predicting defect-prone software modules using support vector machines. J. Syst. Softw. 81(5), 649\u2013660 (2008)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"4_CR30","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.jss.2007.05.035","volume":"81","author":"I Gondra","year":"2008","unstructured":"Gondra, I.: Applying machine learning to software fault-proneness prediction. J. Syst. Softw. 81(2), 186\u2013195 (2008)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"4_CR31","doi-asserted-by":"publisher","first-page":"9847","DOI":"10.1007\/s10586-018-1696-z","volume":"22","author":"C Manjula","year":"2018","unstructured":"Manjula, C., Florence, L.: Deep neural network based hybrid approach for software defect prediction using software metrics. Clust. Comput. 22(4), 9847\u20139863 (2018). https:\/\/doi.org\/10.1007\/s10586-018-1696-z","journal-title":"Clust. Comput."},{"issue":"1","key":"4_CR32","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/507338.507355","volume":"31","author":"IH Witten","year":"2002","unstructured":"Witten, I.H., Frank, E.: Data mining: practical machine learning tools and techniques with Java implementations. ACM SIGMOD Rec. 31(1), 76\u201377 (2002)","journal-title":"ACM SIGMOD Rec."},{"key":"4_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2021.106035","volume":"203","author":"H Dai","year":"2021","unstructured":"Dai, H., Hwang, H.G., Tseng, V.S.: Convolutional neural network based automatic screening tool for cardiovascular diseases using different intervals of ECG signals. Comput. Methods Programs Biomed. 203, 106035 (2021)","journal-title":"Comput. Methods Programs Biomed."},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Awotunde, J.B., et al.: An improved machine learnings diagnosis technique for COVID-19 pandemic using chest X-ray images. Communications in Computer and Information Science,\u00a02021, 1455 CCIS, pp. 319\u2013330 (2021)","DOI":"10.1007\/978-3-030-89654-6_23"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10542-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T17:05:05Z","timestamp":1727629505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10542-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105418","9783031105425"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10542-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"279","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285 Workshop submission accepted out of 815 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}