{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:08:35Z","timestamp":1750133315967,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_56","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"561-572","source":"Crossref","is-referenced-by-count":10,"title":["Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code Smells"],"prefix":"10.1007","author":[{"given":"Kamaldeep","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Shilpi","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"56_CR1","unstructured":"Pigoski, T. M.: Practical software maintenance: Best practices for managing your software investment. Wiley Computer Pub., New York (1996)"},{"key":"56_CR2","doi-asserted-by":"crossref","unstructured":"Khomh, F., Di Penta, M., Gueheneuc, Y. G.: An exploratory study of the impact of code smells on software change-proneness. In: 16th IEEE Working Conf. on Reverse Engineering (WCRE), pp. 75\u201384(2009)","DOI":"10.1109\/WCRE.2009.28"},{"key":"56_CR3","unstructured":"DTREG, https:\/\/www.dtreg.com\/"},{"key":"56_CR4","unstructured":"Fowler, M.: Refactoring: improving the design of existing code. Pearson Education, India (1999)"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Chen, C. T., Cheng, Y. C., Hseih, C. Y., WU, I. L.: Exception handling refactorings: Directed by goals and driven by bug fixing. J.Systems and Software, vol. 82(2), pp. 333\u2013345 (2009)","DOI":"10.1016\/j.jss.2008.06.035"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Tsantalis, N., Fokaefs, M., Chatzigeorgiou, A.: JDeodorant: Identification and removal of feature envy bad smells. IEEE Int\u2019l Conf. on Software Maintenance (ICSM), pp. 519\u2013520(2007)","DOI":"10.1109\/ICSM.2007.4362679"},{"key":"56_CR7","unstructured":"Robusta, http:\/\/pl.csie.ntut.edu.tw\/project\/Robusta\/Robusta_User_Instruction.pdf"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Kreimer, J.: Adaptive detection of design flaws. Electronic Notes in Theoretical Computer Science, vol. 141 (4), pp. 117\u201313(2005)","DOI":"10.1016\/j.entcs.2005.02.059"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Yamashita, A., Counsell, S.: Code smells as system-level indicators of maintainability: An empirical study. J. Systems and Software, vol. 86 (10), pp. 2639\u20132653 (2013)","DOI":"10.1016\/j.jss.2013.05.007"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Li, W., Shatnawi, R.: An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. J. Systems and Software, vol. 80(7), pp. 1120\u20131128 (2007)","DOI":"10.1016\/j.jss.2006.10.018"},{"key":"56_CR11","doi-asserted-by":"crossref","unstructured":"M\u00e4ntyl\u00e4, M., Vanhanen, J., Lassenius, C.: A taxonomy and an initial empirical study of bad smells in code. IEEE Int\u2019l Conf. on Software Maintenance (ICSM), pp. 381\u2013384 (2003)","DOI":"10.1109\/ICSM.2003.1235447"},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Emden, E., Moonen, L.: Java quality assurance by detecting code smells. In: 9th IEEE Working Conf. on Reverse Engineering, pp. 97\u2013106 (2002)","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"56_CR13","unstructured":"Rao, A. A., Reddy, K. N.: Detecting bad smells in object oriented design using design change propagation probability matrix. Int\u2019l MultiConf. on Engineers and Computer Scientists. vol. I, pp. 19\u201321, Hong Kong (2008)"},{"key":"56_CR14","doi-asserted-by":"crossref","unstructured":"Olbrich, S. M.,Cruze, D. S., Sj\u00f8berg,D. IK.: Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems. IEEE Int\u2019l. Conf. on Software Maintenance (ICSM),pp. 1\u201310 (2010)","DOI":"10.1109\/ICSM.2010.5609564"},{"key":"56_CR15","doi-asserted-by":"crossref","unstructured":"Ambros, M. D., Bacchelli, A., Lanza,M.: On the impact of design flaws on software defects. In: 10th IEEE Int\u2019l. Conf. on Quality Software (QSIC), pp. 23\u201331 (2010)","DOI":"10.1109\/QSIC.2010.58"},{"key":"56_CR16","unstructured":"Barstad, V., Goodwin, M., Gj\u00f8s\u00e6ter, T.: Predicting Source Code Quality with Static Analysis and Machine Learning.NorskInformatikkonferanse (NIK) (2014)"},{"key":"56_CR17","doi-asserted-by":"crossref","unstructured":"Mekruksavanich, S.: Design Flaws Detection in Object-Oriented Software with Analytical Learning Method. Int\u2019l. J. e-Education, e-Business, e-Management and e-Learning, vol. 1(3),p. 210 (2011)","DOI":"10.7763\/IJEEEE.2011.V1.33"},{"key":"56_CR18","doi-asserted-by":"crossref","unstructured":"Gao, K., Khoshgoftaar, T. M., Napolitano, A.: Combining feature subset selection and data sampling for coping with highly imbalanced software data. Proc. 27th Int\u2019l. Conf.on Software Engineering and Knowledge Engineering (2015)","DOI":"10.18293\/SEKE2015-182"},{"key":"56_CR19","unstructured":"WEKA, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"56_CR20","unstructured":"Hall, M.A.: Correlation-based feature selection for machine learning. PhD Diss. The University of Waikato (1999)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T22:55:36Z","timestamp":1750114536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_56","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}