{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:59:59Z","timestamp":1775257199445,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10836-024-06116-8","type":"journal-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T08:01:55Z","timestamp":1712908915000},"page":"229-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Sahand: A Software Fault-Prediction Method Using Autoencoder Neural Network and K-Means Algorithm"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5202-6315","authenticated-orcid":false,"given":"Bahman","family":"Arasteh","sequence":"first","affiliation":[]},{"given":"Sahar","family":"Golshan","sequence":"additional","affiliation":[]},{"given":"Shiva","family":"Shami","sequence":"additional","affiliation":[]},{"given":"Farzad","family":"Kiani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"6116_CR1","doi-asserted-by":"publisher","first-page":"0045","DOI":"10.1016\/j.compeleceng.2022.107886","volume":"100","author":"B Iqra Batool","year":"2022","unstructured":"Iqra Batool B, Tamim Ahmed Khan AK (2022) Software fault prediction using data mining, machine learning and deep learning techniques: a systematic literature review. Comput Electr Eng 100:0045\u20137906. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107886","journal-title":"Comput Electr Eng"},{"key":"6116_CR2","doi-asserted-by":"publisher","unstructured":"Al-Laham M, Kassaymeh S, Al-Betar MA, Makhadmeh SN, Albashish D, Alweshah M, Part A (2023) 0045\u20137906, https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108923","DOI":"10.1016\/j.compeleceng.2023.108923"},{"key":"6116_CR3","doi-asserted-by":"publisher","first-page":"18715","DOI":"10.1007\/s10489-022-04427-x","volume":"53","author":"M Mafarja","year":"2023","unstructured":"Mafarja M, Thaher T, Al-Betar MA et al (2023) Classification framework for faulty-software using enhanced exploratory whale optimiser-based feature selection scheme and random forest ensemble learning. Appl Intell 53:18715\u201318757. https:\/\/doi.org\/10.1007\/s10489-022-04427-x","journal-title":"Appl Intell"},{"issue":"1","key":"6116_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.asej.2014.09.007","volume":"6","author":"HA Yousef","year":"2015","unstructured":"Yousef HA (2015) Extracting Software Static defect models using Data Mining. Ain Shams Eng J 6(1):133\u2013144","journal-title":"Ain Shams Eng J"},{"issue":"1","key":"6116_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10586-018-1730-1","volume":"22","author":"R Jayanthi","year":"2019","unstructured":"Jayanthi R, Florence L (2019) Software defect prediction techniques using metrics based on neural network classifier. Cluster Comput 22(1):77\u201388. https:\/\/doi.org\/10.1007\/s10586-018-1730-1","journal-title":"Cluster Comput"},{"issue":"3","key":"6116_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.6025\/jnt\/2018\/9\/3\/94-101","volume":"9","author":"B Arasteh","year":"2018","unstructured":"Arasteh B (2018) Software Fault-Prediction using combination of neural network and Naive Bayes Algorithm. J Netw Technol 9(3):94\u2013101. https:\/\/doi.org\/10.6025\/jnt\/2018\/9\/3\/94-101","journal-title":"J Netw Technol"},{"key":"6116_CR7","doi-asserted-by":"crossref","unstructured":"Catal C, Diri B (2009) Investigating the Effect of Dataset Size, Metrics Sets and Feature Selection Techniques on Software Fault Prediction Problem, Information Sciences, Vol. 179, No. 8, pp. 1040\u20131058, Mar","DOI":"10.1016\/j.ins.2008.12.001"},{"key":"6116_CR8","doi-asserted-by":"crossref","unstructured":"Radjenovi\u0107 D, Heri\u010dko M, Torkar R, \u017divkovi\u010d A (Aug 2013) Software Fault Prediction Metrics: a systematic literature review. Inf Softw Technol 55(8):1397\u20131418","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"6116_CR9","doi-asserted-by":"publisher","first-page":"10925","DOI":"10.1007\/s10586-017-1235-3","volume":"22","author":"M Anbu","year":"2019","unstructured":"Anbu M, Anandha GS (2019) Feature selection using firefly algorithm in software defect prediction. Cluster Comput 22:10925\u201310934. https:\/\/doi.org\/10.1007\/s10586-017-1235-3","journal-title":"Cluster Comput"},{"key":"6116_CR10","doi-asserted-by":"publisher","first-page":"0957","DOI":"10.1016\/j.eswa.2023.119806","volume":"223","author":"SC Rathi","year":"2023","unstructured":"Rathi SC, Misra S, Colomo-Palacios R, Adarsh R et al (2023) Empirical evaluation of the performance of data sampling and feature selection techniques for software fault prediction. Expert Syst Appl 223:0957\u20134174. https:\/\/doi.org\/10.1016\/j.eswa.2023.119806","journal-title":"Expert Syst Appl"},{"key":"6116_CR11","unstructured":"Promise software engineering repository [Online Available:http:\/\/promise.site.uottawa.ca\/SERepository\/datasets-page.html"},{"key":"6116_CR12","doi-asserted-by":"crossref","unstructured":"He P, Li B, Liu X, Chen J, Ma Y (2015) An Empirical Study on Software Defect Prediction with a Simplified Metric Set, Information and Software Technology, Vol. 59, pp. 170\u2013190, Mar","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"6116_CR13","unstructured":"Sujitha KC, Leninisha S (2014) Software Fault Prediction Using Single Linkage Clustering Method, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, No. 2, Apr"},{"key":"6116_CR14","doi-asserted-by":"crossref","unstructured":"Rathore SS, Kumar S (March 2017) Linear and non-linear heterogeneous ensemble methods to predict the number of faults in Software systems. Knowl Based Syst 119:232\u2013256","DOI":"10.1016\/j.knosys.2016.12.017"},{"key":"6116_CR15","doi-asserted-by":"crossref","unstructured":"Kaur S, Kumar D (2011) Quality Prediction of Object-Oriented Software Using Density Based Clustering Approach, International Journal of Engineering and Technology, Vol. 3, No. 4, pp. 440\u2013445, Aug","DOI":"10.7763\/IJET.2011.V3.267"},{"key":"6116_CR16","doi-asserted-by":"crossref","unstructured":"Catal C (April 2011) Software Fault Prediction: A literature review and current trends. Expert Syst Appl 38(4):4626\u20134636","DOI":"10.1016\/j.eswa.2010.10.024"},{"key":"6116_CR17","doi-asserted-by":"crossref","unstructured":"Jiang Y, Cukicc B, Menzies T (2007) Fault Prediction using Early Lifecycle Data, in Proceedings of 17th IEEE international symposium on software reliability, Sweden, pp. 237\u2013246","DOI":"10.1109\/ISSRE.2007.24"},{"key":"6116_CR18","unstructured":"Kaszycki G (1999) Using Process Metrics to Enhance Software Fault Prediction Models, Proceedings of 10th international symposium on software reliability engineering, Boca Raton, Florida"},{"key":"6116_CR19","doi-asserted-by":"crossref","unstructured":"Moeyersoms J, Junqu E, Dejaeger K, Baesens B, Martens D (February 2015) Comprehensible Software Fault and Effort Prediction: A Data Mining Approach. J Syst Softw 100:80\u201390","DOI":"10.1016\/j.jss.2014.10.032"},{"key":"6116_CR20","doi-asserted-by":"publisher","unstructured":"\u0130rsoy O, Alpayd\u0131n E (2017) Unsupervised feature extraction with autoencoder trees, Neurocomputing, Volume 258, Pages 63\u201373, ISSN 0925\u20132312, https:\/\/doi.org\/10.1016\/j.neucom.2017.02.075","DOI":"10.1016\/j.neucom.2017.02.075"},{"issue":"3","key":"6116_CR21","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.32604\/cmes.2023.024172","volume":"135","author":"F Gharehchopogh","year":"2023","unstructured":"Gharehchopogh F, Abdollahzadeh B, Arasteh B (2023) An Improved Farmland Fertility Algorithm with Hyper-Heuristic Approach for solving travelling salesman problem. CMES-Computer Model Eng Sci 135(3):1981\u20132006. https:\/\/doi.org\/10.32604\/cmes.2023.024172","journal-title":"CMES-Computer Model Eng Sci"},{"key":"6116_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10836-014-5438-8","volume":"30","author":"B Arasteh","year":"2014","unstructured":"Arasteh B, Miremadi SG, Rahmani AM (2014) Developing inherently resilient Software against soft-errors based on Algorithm Level inherent features. J Electron Test 30:193\u2013212. https:\/\/doi.org\/10.1007\/s10836-014-5438-8","journal-title":"J Electron Test"},{"key":"6116_CR23","doi-asserted-by":"publisher","unstructured":"Soleimanian F, Abdollahzadeh B, Barshandeh S, Arasteh B (2023) A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT, Internet of things. 24:2542\u20136605. https:\/\/doi.org\/10.1016\/j.iot.2023.100952","DOI":"10.1016\/j.iot.2023.100952"},{"issue":"2","key":"6116_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1108\/DTA-08-2019-0138","volume":"55","author":"B Arasteh","year":"2021","unstructured":"Arasteh B, Sadegi R, Arasteh K (2021) B\u00f6len: software module clustering method using the combination of shuffled frog leaping and genetic algorithm. Data Technol Appl 55(2):251\u2013279. https:\/\/doi.org\/10.1108\/DTA-08-2019-0138","journal-title":"Data Technol Appl"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06116-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06116-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06116-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T13:13:26Z","timestamp":1718889206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06116-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["6116"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06116-8","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"3 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and Informed Consent for data used"}},{"value":"The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or non-financial conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}