{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T20:45:03Z","timestamp":1778273103980,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:00:00Z","timestamp":1618531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:00:00Z","timestamp":1618531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s10586-021-03282-8","type":"journal-article","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T06:04:37Z","timestamp":1618553077000},"page":"2581-2595","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Principal component based support vector machine (PC-SVM): a hybrid technique for software defect detection"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5055-5969","authenticated-orcid":false,"given":"Mohd.","family":"Mustaqeem","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2125-2162","authenticated-orcid":false,"given":"Mohd.","family":"Saqib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"issue":"1","key":"3282_CR1","doi-asserted-by":"publisher","first-page":"163","DOI":"10.14257\/ijdta.2017.10.1.15","volume":"10","author":"JRL Florence","year":"2017","unstructured":"Florence, J.R.L., Arya, A.: A review on software defect prediction techniques using product metrics. Int. J. Database Theory Appl. 10(1), 163\u2013174 (2017)","journal-title":"Int. J. Database Theory Appl."},{"key":"3282_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/oxrep\/grz035","volume":"36","author":"RM del Rio-Chanona","year":"2020","unstructured":"del Rio-Chanona, R.M., Mealy, P., Pichler, A., Lafond, F., Farmer, D.: Supply and demand shocks in the COVID-19 pandemic: an industry and occupation perspective. Oxf. Rev. Econ. Policy 36, 1\u201338 (2020)","journal-title":"Oxf. Rev. Econ. Policy"},{"issue":"1","key":"3282_CR3","doi-asserted-by":"publisher","first-page":"e1003376","DOI":"10.1371\/journal.pcbi.1003376","volume":"10","author":"M-O Gewaltig","year":"2014","unstructured":"Gewaltig, M.-O., Cannon, R.: Current practice in software development for computational neuroscience and how to improve it. PLoS Comput. Biol. 10(1), e1003376 (2014)","journal-title":"PLoS Comput. Biol."},{"key":"3282_CR4","doi-asserted-by":"crossref","unstructured":"Jamil, A., Arif, M., Abubakar, N., Ahmad, A.: Software testing techniques: a literature review (2016)","DOI":"10.1109\/ICT4M.2016.045"},{"issue":"1","key":"3282_CR5","first-page":"252","volume":"4","author":"RM Sharma","year":"2014","unstructured":"Sharma, R.M.: Quantitative analysis of automation and manual testing. Int. J. Eng. Innov. Technol. 4(1), 252\u2013257 (2014)","journal-title":"Int. J. Eng. Innov. Technol."},{"key":"3282_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.4018\/jte.2011040104","volume":"2","author":"R Cohen-Almagor","year":"2011","unstructured":"Cohen-Almagor, R.: Internet history. Int. J. Technoethics 2, 45\u201364 (2011)","journal-title":"Int. J. Technoethics"},{"issue":"1","key":"3282_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/23738871.2016.1157619","volume":"1","author":"J Naughton","year":"2016","unstructured":"Naughton, J.: The evolution of the Internet: from military experiment to general purpose technology. J. Cyber Policy 1(1), 5\u201328 (2016)","journal-title":"J. Cyber Policy"},{"key":"3282_CR8","doi-asserted-by":"crossref","unstructured":"Uskov, V.L.: Mobile software engineering in mobile computing curriculum In: Proceedings of the 2013 3rd Interdisciplinary Engineering Design Education Conference, pp. 93\u201399 (2013)","DOI":"10.1109\/IEDEC.2013.6526767"},{"key":"3282_CR9","unstructured":"Tomiyasu, H.: Feature articles: technology for innovating software production software production technologies that support large-scale system development"},{"key":"3282_CR10","doi-asserted-by":"crossref","unstructured":"Wang, J., Ren, D.: Research on software testing technology under the background of big data. In: Proceedings of the 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), pp. 2679\u20132682 (2018)","DOI":"10.1109\/IMCEC.2018.8469275"},{"key":"3282_CR11","doi-asserted-by":"crossref","unstructured":"Sneha, K., Malle, G.M.: Research on software testing techniques and software automation testing tools. In: Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 77\u201381 (2017)","DOI":"10.1109\/ICECDS.2017.8389562"},{"key":"3282_CR12","unstructured":"Rahman, A., Sunny, F.H., Mishu, H.M., Sumi, F.: Open access software testing algorithm units. 1, 271\u2013275 (2017)"},{"key":"3282_CR13","first-page":"980","volume":"2","author":"A Sawant","year":"2012","unstructured":"Sawant, A., Bari, P., Chawan, P.: Software testing techniques and strategies. Int. J. Eng. Res. Appl. 2, 980\u2013986 (2012)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"3282_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.procs.2016.03.003","volume":"79","author":"D Kumar","year":"2016","unstructured":"Kumar, D., Mishra, K.: The impacts of test automation on software\u2019s cost, quality and time to market. Procedia Comput. Sci. 79, 8\u201315 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"3282_CR15","first-page":"87","volume":"3","author":"DP Srivastava","year":"2009","unstructured":"Srivastava, D.P., Kim, T.-H.: Application of genetic algorithm in software testing. Int. J. Softw. Eng. Appl. 3, 87\u201396 (2009)","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"3282_CR16","doi-asserted-by":"crossref","unstructured":"Karnavel, K., Santhoshkumar, J.: Automated software testing for application maintenance by using bee colony optimization algorithms (BCO). In: Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), pp. 327\u2013330 (2013)","DOI":"10.1109\/ICICES.2013.6508211"},{"issue":"1","key":"3282_CR17","first-page":"1","volume":"24","author":"M Kaur","year":"2011","unstructured":"Kaur, M., Kumari, R.: Comparative study of automated testing tools: TestComplete and QuickTest Pro. Int. J. Comput. Appl. 24(1), 1\u20137 (2011)","journal-title":"Int. J. Comput. Appl."},{"key":"3282_CR18","doi-asserted-by":"crossref","unstructured":"Miller, E.: Advanced methods in automated software test. In: Proceedings of the conference on software maintenance 1990, p. 111 (1990)","DOI":"10.1109\/ICSM.1990.131336"},{"issue":"6","key":"3282_CR19","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber, S.R., Kemerer, C.F.: A metrics suite for object oriented design. IEEE Trans. Softw. Eng. 20(6), 476\u2013493 (1994)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"s4","key":"3282_CR20","doi-asserted-by":"publisher","first-page":"9847","DOI":"10.1007\/s10586-018-1696-z","volume":"22","author":"CML Florence","year":"2019","unstructured":"Florence, C.M.L.: Deep neural network based hybrid approach for software defect prediction using software metrics. Clust. Comput. 22(s4), 9847\u20139863 (2019)","journal-title":"Clust. Comput."},{"key":"3282_CR21","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.asoc.2014.03.032","volume":"21","author":"R Malhotra","year":"2014","unstructured":"Malhotra, R.: Comparative analysis of statistical and machine learning methods for predicting faulty modules. Appl. Soft Comput. J. 21, 286\u2013297 (2014)","journal-title":"Appl. Soft Comput. J."},{"issue":"2","key":"3282_CR22","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.jss.2007.05.035","volume":"81","author":"I Gondra","year":"2008","unstructured":"Gondra, I.: Applying machine learning to software fault-proneness prediction. J. Syst. Softw. 81(2), 186\u2013195 (2008)","journal-title":"J. Syst. Softw."},{"key":"3282_CR23","unstructured":"Yang, B., Li, X: A study on software reliability prediction based on support vector machines (2008)"},{"key":"3282_CR24","doi-asserted-by":"crossref","unstructured":"Can, H., Jianchun, X., Ruide, Z., Juelong, L., Qiliang, Y., Liqiang, X.: A new model for software defect prediction using Particle Swarm Optimization and support vector machine, In: Proceedings of the 2013 25th Chinese Control and Decision Conference (CCDC), pp. 4106\u20134110 (2013)","DOI":"10.1109\/CCDC.2013.6561670"},{"issue":"2","key":"3282_CR25","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/TSMCC.2009.2033566","volume":"40","author":"PG Espejo","year":"2010","unstructured":"Espejo, P.G., Ventura, S., Herrera, F.: A survey on the application of genetic programming to classification. IEEE Trans. Syst. Man Cybern Part C 40(2), 121\u2013144 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern Part C"},{"key":"3282_CR26","doi-asserted-by":"crossref","unstructured":"Williams, L.J.: Principal component analysis, pp. 433\u2013459 (2010)","DOI":"10.1002\/wics.101"},{"key":"3282_CR27","doi-asserted-by":"publisher","first-page":"2949","DOI":"10.1007\/s00521-020-05107-y","volume":"33","author":"L Abualigah","year":"2021","unstructured":"Abualigah, L. Group search optimizer: a nature-inspired meta-heuristic optimization algorithm with its results, variants, and applications.\u00a0Neural Comput. Appl.\u00a033,\u00a02949\u20132972 (2021)","journal-title":"Neural Comput. Appl."},{"key":"3282_CR28","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/B978-0-12-809633-8.20342-7","volume-title":"Encyclopedia of Bioinformatics and Computational Biology: ABC of Bioinformatics","author":"I Zoppis","year":"2019","unstructured":"Zoppis, I., Mauri, G., Dondi, R.: Kernel Methods: support vector machines. In: Ranganathan, S., Gribskov, M., Nakai, K., Sch\u00f6nbach, C.B. (eds.) Encyclopedia of Bioinformatics and Computational Biology: ABC of Bioinformatics, pp. 503\u2013510. Academic Press, Oxford (2019)"},{"key":"3282_CR29","unstructured":"Sayyad Shirabad, J., Menzies, T.J.: The {PROMISE} Repository of Software Engineering Databases (2005)"},{"key":"3282_CR30","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.asoc.2015.04.045","volume":"33","author":"\u00d6F Arar","year":"2015","unstructured":"Arar, \u00d6.F., Ayan, K.: Software defect prediction using cost-sensitive neural network. Appl. Soft Comput. 33, 263\u2013277 (2015)","journal-title":"Appl. Soft Comput."},{"key":"3282_CR31","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.knosys.2014.10.017","volume":"74","author":"G Abaei","year":"2015","unstructured":"Abaei, G., Selamat, A., Fujita, H.: An empirical study based on semi-supervised hybrid self-organizing map for software fault prediction. Knowl. Based Syst. 74, 28\u201339 (2015)","journal-title":"Knowl. Based Syst."},{"issue":"5","key":"3282_CR32","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.jss.2007.07.034","volume":"81","author":"O Vandecruys","year":"2008","unstructured":"Vandecruys, O., Martens, D., Baesens, B., Mues, C., De Backer, M., Haesen, R.: Mining software repositories for comprehensible software fault prediction models. J. Syst. Softw. 81(5), 823\u2013839 (2008)","journal-title":"J. Syst. Softw."},{"issue":"48","key":"3282_CR33","first-page":"1471","volume":"11","author":"Y-W Chang","year":"2010","unstructured":"Chang, Y.-W., Hsieh, C.-J., Chang, K.-W., Ringgaard, M., Lin, C.-J.: Training and testing low-degree polynomial data mappings via linear SVM. J. Mach. Learn. Res. 11(48), 1471\u20131490 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"3282_CR34","doi-asserted-by":"publisher","first-page":"2401496","DOI":"10.1155\/2016\/2401496","volume":"2016","author":"P Kumudha","year":"2016","unstructured":"Kumudha, P., Venkatesan, R.: Cost-sensitive radial basis function neural network classifier for software defect prediction. Sci. World J. 2016, 2401496 (2016)","journal-title":"Sci. World J."},{"issue":"12","key":"3282_CR35","first-page":"381","volume":"9","author":"A Hudaib","year":"2013","unstructured":"Hudaib, A., Zaghoul, F.A.L., Widian, J.A.L.: Investigation of software defects prediction based on classifiers (NB, SVM, KNN and decision tree). J. Am. Sci. 9(12), 381\u2013386 (2013)","journal-title":"J. Am. Sci."},{"issue":"10\u201312","key":"3282_CR36","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1166\/asl.2014.5641","volume":"20","author":"RS Wahono","year":"2014","unstructured":"Wahono, R.S., Herman, N.S., Ahmad, S.: Neural network parameter optimization based on genetic algorithm for software defect prediction. Adv. Sci. Lett. 20(10\u201312), 1951\u20131955 (2014)","journal-title":"Adv. Sci. Lett."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03282-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03282-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03282-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:56:48Z","timestamp":1744185408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03282-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,16]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["3282"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03282-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,16]]},"assertion":[{"value":"14 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}