{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:36:44Z","timestamp":1775281004324,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811534249","type":"print"},{"value":"9789811534256","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3425-6_22","type":"book-chapter","created":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T19:02:58Z","timestamp":1585767778000},"page":"269-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Multi-objective Bat Algorithm for Software Defect Prediction"],"prefix":"10.1007","author":[{"given":"Di","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jiangjiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shaojin","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Xingjuan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Guoyou","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,2]]},"reference":[{"issue":"12","key":"22_CR1","first-page":"1226","volume":"8","author":"I Sommerville","year":"2008","unstructured":"Sommerville, I.: Softw. Eng. 8(12), 1226\u20131241 (2008)","journal-title":"Softw. Eng."},{"issue":"5","key":"22_CR2","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.jss.2007.07.040","volume":"81","author":"KO Elish","year":"2008","unstructured":"Elish, K.O., Elish, M.O.: Predicting defect-prone software modules using support vector machines. J. Syst. Softw. 81(5), 649\u2013660 (2008)","journal-title":"J. Syst. Softw."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Canfora, A.D.L.G., Penta, M.D., Oliveto, R., Panichella, A.: Multi-objective cross-project defect prediction. In: IEEE Sixth International Conference on Software Testing, Verification and Validation, pp. 252\u2013261. IEEE Computer Society, Luxembourg (2013)","DOI":"10.1109\/ICST.2013.38"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.asoc.2014.11.023","volume":"27","author":"R Malhotra","year":"2015","unstructured":"Malhotra, R.: A systematic review of machine learning techniques for software fault prediction. Appl. Soft Comput. J. 27, 504\u2013518 (2015)","journal-title":"Appl. Soft Comput. J."},{"key":"22_CR5","first-page":"281","volume":"9","author":"V Vapnik","year":"1996","unstructured":"Vapnik, V., Golowich, S.E., Smola, A.: Support vector method for function approximation, regression estimation, and signal processing. Adv. Neural Inf. Process. Syst. 9, 281\u2013287 (1996)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"36","key":"22_CR6","first-page":"71","volume":"45","author":"ZB Cui","year":"2009","unstructured":"Cui, Z.B., Tang, G.M.: Software reliability prediction model based on support vector machine optimized by genetic algorithm. Comput. Eng. Appl. 45(36), 71\u201374 (2009)","journal-title":"Comput. Eng. Appl."},{"issue":"6","key":"22_CR7","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.3724\/SP.J.1016.2011.01148","volume":"34","author":"JH Yan","year":"2011","unstructured":"Yan, J.H.: Research of software defect prediction model based on ACO-SVM. Chin. J. Comput. 34(6), 1148\u20131154 (2011)","journal-title":"Chin. J. Comput."},{"issue":"3","key":"22_CR8","first-page":"739","volume":"15","author":"H Dong","year":"2015","unstructured":"Dong, H., Jian, G.: Parameter selection of a support vector machine, based on a chaotic particle swarm optimization algorithm. Cybern. Inf. Technol. 15(3), 739\u2013743 (2015)","journal-title":"Cybern. Inf. Technol."},{"issue":"4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1504\/IJICA.2017.088162","volume":"8","author":"XT Rong","year":"2017","unstructured":"Rong, X.T., Cui, Z.H.: Hybrid algorithm for two-objective software defect prediction problem. Int. J. Innovative Comput. Appl. 8(4), 207\u2013212 (2017)","journal-title":"Int. J. Innovative Comput. Appl."},{"key":"22_CR10","unstructured":"Shan, C.: Software Defect Distribution Prediction Techniques and Application. Beijing Institute of Technology (2015)"},{"issue":"1","key":"22_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11219-016-9342-6","volume":"26","author":"L Chen","year":"2016","unstructured":"Chen, L., Fang, B., Shang, Z., Tang, Y.: Tackling class overlap and imbalance problems in software defect prediction. Softw. Qual. J. 26(1), 97\u2013125 (2016). \nhttps:\/\/doi.org\/10.1007\/s11219-016-9342-6","journal-title":"Softw. Qual. J."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar, T.M., Gao, K., Seliya, N.: Attribute selection and imbalanced data: Problems in software defect prediction. In: 22nd IEEE International Conference on Tools with Artificial Intelligence, vol. 1, pp. 137\u2013144 (2010)","DOI":"10.1109\/ICTAI.2010.27"},{"key":"22_CR13","unstructured":"Wang, Q.: Distance metric learning based software defect prediction. Nanjing University of Posts and Telecommunications (2016)"},{"issue":"5","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TSMCA.2009.2020804","volume":"39","author":"DJ Drown","year":"2009","unstructured":"Drown, D.J., Khoshgoftaar, T.M., Seliya, N.: Evolutionary sampling and software quality modeling of high-assurance systems. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 39(5), 1097\u20131107 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Pelayo, L., Dick, S.: Applying novel resampling strategies to software defect prediction. In: NAFIPS 2007\u20132007 Annual Meeting of the North American Fuzzy Information Processing Society, pp. 69\u201372 (2007)","DOI":"10.1109\/NAFIPS.2007.383813"},{"key":"22_CR16","unstructured":"Yang, L.: Research of the software defect prediction method for imbalanced data. China University of Petroleum (East China) (2014)"},{"key":"22_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5478","author":"XJ Cai","year":"2019","unstructured":"Cai, X.J., et al.: An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search. Concurr. Comput. Pract. Exp. (2019). \nhttps:\/\/doi.org\/10.1002\/cpe.5478","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"3","key":"22_CR18","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"22_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2906679","author":"L Pan","year":"2019","unstructured":"Pan, L., Li, L., He, C., Tan, K.C.: A subregion division-based evolutionary algorithm with effective mating selection for many-objective optimization. IEEE Trans. Cybern. (2019). \nhttps:\/\/doi.org\/10.1109\/TCYB.2019.2906679","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"22_CR20","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s12293-017-0237-2","volume":"10","author":"M Zhang","year":"2017","unstructured":"Zhang, M., Wang, H., Cui, Z., Chen, J.: Hybrid multi-objective cuckoo search with dynamical local search. Memetic Comput. 10(2), 199\u2013208 (2017). \nhttps:\/\/doi.org\/10.1007\/s12293-017-0237-2","journal-title":"Memetic Comput."},{"issue":"3","key":"22_CR21","doi-asserted-by":"publisher","first-page":"279","DOI":"10.3233\/ICA-170542","volume":"24","author":"L Pan","year":"2017","unstructured":"Pan, L., He, C., Tian, Y., Su, Y., Zhang, X.: A region division based diversity maintaining approach for many-objective optimization. Integr. Comput.-Aided Eng. 24(3), 279\u2013296 (2017)","journal-title":"Integr. Comput.-Aided Eng."},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Wang, G.G., Cai, X.J., Cui, Z.H., Min, G.Y., Chen, J.J.: High performance computing for cyber physical social systems by using evolutionary multi-objective optimization algorithm. IEEE Trans. Emerg. Top. Comput. (2017)","DOI":"10.1109\/TETC.2017.2703784"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.asoc.2017.08.024","volume":"61","author":"C He","year":"2017","unstructured":"He, C., Tian, Y., Jin, Y., Zhang, X., Pan, L.: A radial space division based evolutionary algorithm for many-objective optimization. Appl. Soft Comput. 61, 603\u2013621 (2017)","journal-title":"Appl. Soft Comput."},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jpdc.2019.03.010","volume":"129","author":"ZH Cui","year":"2019","unstructured":"Cui, Z.H., Du, L., Wang, P.H., Cai, X.J., Zhang, W.S.: Malicious code detection based on CNNs and multi-objective algorithm. J. Parallel Distrib. Comput. 129, 50\u201358 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"1","key":"22_CR25","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TEVC.2018.2802784","volume":"23","author":"L Pan","year":"2018","unstructured":"Pan, L., He, C., Tian, Y., Wang, H., Zhang, X., Jin, Y.: A classification-based surrogate-assisted evolutionary algorithm for expensive many-objective optimization. IEEE Trans. Evol. Comput. 23(1), 74\u201388 (2018)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Wu, D., Zhang, J.J., Geng, S.J., Ren, Y.Q., Cai, X.J., Zhang, G.Y.: A parallel computing optimization algorithm based on many-objective. In: IEEE 21st International Conference on High Performance Computing and Communications (2019). \nhttps:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2019.00254","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00254"},{"issue":"6","key":"22_CR27","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"Hall, T., Beecham, S., Bowes, D., Gray, D., Counsell, S.: A systematic literature review on fault prediction performance in software engineering. IEEE Trans. Softw. Eng. 38(6), 1276\u20131304 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"22_CR28","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16(1), 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"issue":"6","key":"22_CR29","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/TSMCA.2009.2027131","volume":"39","author":"C Seiffert","year":"2009","unstructured":"Seiffert, C., Khoshgoftaar, T.M., Hulse, J.V.: Improving software-quality predictions with data sampling and boosting. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 39(6), 1283\u20131294 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum."}],"container-title":["Communications in Computer and Information Science","Bio-inspired Computing: Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3425-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T01:32:13Z","timestamp":1585791133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3425-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811534249","9789811534256"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3425-6_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIC-TA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-Inspired Computing: Theories and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bicta2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.bicta.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"197","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}