{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T15:12:56Z","timestamp":1768489976705,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"31","license":[{"start":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T00:00:00Z","timestamp":1708128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T00:00:00Z","timestamp":1708128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18456-w","type":"journal-article","created":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T05:02:11Z","timestamp":1708146131000},"page":"76551-76586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Hybrid deep architecture for software defect prediction with improved feature set"],"prefix":"10.1007","volume":"83","author":[{"given":"C.","family":"Shyamala","sequence":"first","affiliation":[]},{"given":"S.","family":"Mohana","sequence":"additional","affiliation":[]},{"given":"M.","family":"Ambika","sequence":"additional","affiliation":[]},{"given":"K.","family":"Gomathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,17]]},"reference":[{"key":"18456_CR1","doi-asserted-by":"publisher","first-page":"69405","DOI":"10.1109\/ACCESS.2021.3078265","volume":"9","author":"C Yu","year":"2021","unstructured":"Yu C, Ding Z, Chen X (2021) HOPE: Software Defect Prediction Model Construction Method via Homomorphic Encryption. IEEE Access 9:69405\u201369417. https:\/\/doi.org\/10.1109\/ACCESS.2021.3078265","journal-title":"IEEE Access"},{"issue":"2","key":"18456_CR2","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/TR.2020.3020238","volume":"70","author":"T Chakraborty","year":"2021","unstructured":"Chakraborty T, Chakraborty AK (2021) Hellinger Net: A Hybrid Imbalance Learning Model to Improve Software Defect Prediction. IEEE Trans Reliab 70(2):481\u2013494. https:\/\/doi.org\/10.1109\/TR.2020.3020238","journal-title":"IEEE Trans Reliab"},{"key":"18456_CR3","doi-asserted-by":"publisher","first-page":"110059","DOI":"10.1109\/ACCESS.2020.3001440","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang J, Wu J, Chen C, Zheng Z, Lyu MR (2020) CDS: A Cross-Version Software Defect Prediction Model With Data Selection. IEEE Access 8:110059\u2013110072. https:\/\/doi.org\/10.1109\/ACCESS.2020.3001440","journal-title":"IEEE Access"},{"key":"18456_CR4","doi-asserted-by":"publisher","first-page":"8249","DOI":"10.1007\/s00521-020-04960-1","volume":"33","author":"K Wang","year":"2021","unstructured":"Wang K, Liu L, Yuan C et al (2021) Software defect prediction model based on LASSO\u2013SVM. Neural Comput Applic 33:8249\u20138259. https:\/\/doi.org\/10.1007\/s00521-020-04960-1","journal-title":"Neural Comput Applic"},{"issue":"11","key":"18456_CR5","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1109\/TSE.2019.2957794","volume":"47","author":"S Herbold","year":"2021","unstructured":"Herbold S (2021) On the Costs and Profit of Software Defect Prediction. IEEE Trans Software Eng 47(11):2617\u20132631. https:\/\/doi.org\/10.1109\/TSE.2019.2957794","journal-title":"IEEE Trans Software Eng"},{"key":"18456_CR6","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s41870-018-0262-5","volume":"13","author":"S Singh","year":"2021","unstructured":"Singh S, Singla R (2021) Defect prediction model of static code features for cross-company and cross-project software. Int J Inf Tecnol 13:667\u2013675. https:\/\/doi.org\/10.1007\/s41870-018-0262-5","journal-title":"Int J Inf Tecnol"},{"key":"18456_CR7","doi-asserted-by":"publisher","first-page":"3977","DOI":"10.1007\/s10664-020-09861-4","volume":"25","author":"S Morasca","year":"2020","unstructured":"Morasca S, Lavazza L (2020) On the assessment of software defect prediction models via ROC curves. Empir Software Eng 25:3977\u20134019. https:\/\/doi.org\/10.1007\/s10664-020-09861-4","journal-title":"Empir Software Eng"},{"key":"18456_CR8","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1007\/s11390-019-1958-0","volume":"34","author":"X Chen","year":"2019","unstructured":"Chen X, Zhang D, Cui ZQ et al (2019) DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy. J Comput Sci Technol 34:1020\u20131038. https:\/\/doi.org\/10.1007\/s11390-019-1958-0","journal-title":"J Comput Sci Technol"},{"key":"18456_CR9","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/s10664-018-9633-6","volume":"24","author":"KE Bennin","year":"2019","unstructured":"Bennin KE, Keung JW, Monden A (2019) On the relative value of data resampling approaches for software defect prediction. Empir Software Eng 24:602\u2013636. https:\/\/doi.org\/10.1007\/s10664-018-9633-6","journal-title":"Empir Software Eng"},{"key":"18456_CR10","doi-asserted-by":"publisher","first-page":"13679","DOI":"10.1007\/s00500-019-03907-6","volume":"23","author":"A Marjuni","year":"2019","unstructured":"Marjuni A, Adji TB, Ferdiana R (2019) Unsupervised software defect prediction using signed Laplacian-based spectral classifier. Soft Comput 23:13679\u201313690. https:\/\/doi.org\/10.1007\/s00500-019-03907-6","journal-title":"Soft Comput"},{"key":"18456_CR11","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s11334-021-00399-2","volume":"17","author":"P Suresh Kumar","year":"2021","unstructured":"Suresh Kumar P, Behera HS, Nayak J et al (2021) Bootstrap aggregation ensemble learning-based reliable approach for software defect prediction by using characterized code feature. Innov Syst Softw Eng 17:355\u2013379. https:\/\/doi.org\/10.1007\/s11334-021-00399-2","journal-title":"Innov Syst Softw Eng"},{"key":"18456_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10515-021-00289-8","volume":"28","author":"A Ali","year":"2021","unstructured":"Ali A, Khan N, Abu-Tair M et al (2021) Discriminating features-based cost-sensitive approach for software defect prediction. Autom Softw Eng 28:11. https:\/\/doi.org\/10.1007\/s10515-021-00289-8","journal-title":"Autom Softw Eng"},{"key":"18456_CR13","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s00500-020-05159-1","volume":"25","author":"C Jin","year":"2021","unstructured":"Jin C (2021) Software defect prediction model based on distance metric learning. Soft Comput 25:447\u2013461. https:\/\/doi.org\/10.1007\/s00500-020-05159-1","journal-title":"Soft Comput"},{"key":"18456_CR14","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.1007\/s11063-020-10355-z","volume":"52","author":"L Niu","year":"2020","unstructured":"Niu L, Wan J, Wang H et al (2020) Cost-sensitive Dictionary Learning for Software Defect Prediction. Neural Process Lett 52:2415\u20132449. https:\/\/doi.org\/10.1007\/s11063-020-10355-z","journal-title":"Neural Process Lett"},{"key":"18456_CR15","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/s42979-020-0119-4","volume":"1","author":"TT Khuat","year":"2020","unstructured":"Khuat TT, Le MH (2020) Evaluation of Sampling-Based Ensembles of Classifiers on Imbalanced Data for Software Defect Prediction Problems. SN Comput Sci 1:108. https:\/\/doi.org\/10.1007\/s42979-020-0119-4","journal-title":"SN Comput Sci"},{"key":"18456_CR16","doi-asserted-by":"publisher","first-page":"13465","DOI":"10.1007\/s00500-021-06096-3","volume":"25","author":"SK Pandey","year":"2021","unstructured":"Pandey SK, Tripathi AK (2021) An empirical study toward dealing with noise and class imbalance issues in software defect prediction. Soft Comput 25:13465\u201313492. https:\/\/doi.org\/10.1007\/s00500-021-06096-3","journal-title":"Soft Comput"},{"key":"18456_CR17","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1186\/s40537-019-0250-z","volume":"6","author":"A Marjuni","year":"2019","unstructured":"Marjuni A, Adji TB, Ferdiana R (2019) Unsupervised software defect prediction using median absolute deviation threshold based spectral classifier on signed Laplacian matrix. J Big Data 6:87. https:\/\/doi.org\/10.1186\/s40537-019-0250-z","journal-title":"J Big Data"},{"issue":"1","key":"18456_CR18","first-page":"34","volume":"2","author":"MB Wagh","year":"2019","unstructured":"Wagh MB, Gomathi N (2019) Improved GWO-CS Algorithm-Based Optimal Routing Strategy in VANET. J Netw Commun Syst 2(1):34\u201342","journal-title":"J Netw Commun Syst"},{"issue":"3","key":"18456_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.46253\/jcmps.v2i3.a3","volume":"2","author":"B Sadashiv Halbhavi","year":"2019","unstructured":"Sadashiv Halbhavi B, Kodad SF, Ambekar SK, Manjunath D (2019) Enhanced Invasive Weed Optimization Algorithm with Chaos Theory for Weightage based Combined Economic Emission Dispatch. J Comput Mech Power Syst Control 2(3):19\u201327","journal-title":"J Comput Mech Power Syst Control"},{"issue":"3","key":"18456_CR20","first-page":"1","volume":"2","author":"AN Jadhav","year":"2019","unstructured":"Jadhav AN, Gomathi N (2019) DIGWO: Hybridization of Dragonfly Algorithm with Improved Grey Wolf Optimization Algorithm for Data Clustering. Multimedia Res 2(3):1\u201311","journal-title":"Multimedia Res"},{"issue":"2","key":"18456_CR21","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TR.2020.3047396","volume":"70","author":"H Wang","year":"2021","unstructured":"Wang H, Zhuang W, Zhang X (2021) Software Defect Prediction Based on Gated Hierarchical LSTMs. IEEE Trans Reliab 70(2):711\u2013727. https:\/\/doi.org\/10.1109\/TR.2020.3047396","journal-title":"IEEE Trans Reliab"},{"issue":"5","key":"18456_CR22","doi-asserted-by":"publisher","first-page":"10925","DOI":"10.1007\/s10586-017-1235-3","volume":"22","author":"M Anbu","year":"2019","unstructured":"Anbu M, Anandha Mala GS (2019) Feature selection using firefly algorithm in software defect prediction. Cluster Comput 22(5):10925\u201310934. https:\/\/doi.org\/10.1007\/s10586-017-1235-3","journal-title":"Cluster Comput"},{"issue":"12","key":"18456_CR23","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TSE.2018.2877612","volume":"46","author":"S Wang","year":"2020","unstructured":"Wang S, Liu T, Nam J, Tan L (2020) Deep Semantic Feature Learning for Software Defect Prediction. IEEE Trans Softw Eng 46(12):1267\u20131293. https:\/\/doi.org\/10.1109\/TSE.2018.2877612","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"18456_CR24","doi-asserted-by":"publisher","first-page":"389","DOI":"10.23919\/JSEE.2021.000032","volume":"32","author":"X Xiaolong","year":"2021","unstructured":"Xiaolong X, Wen C, Xinheng W (2021) RFC: A feature selection algorithm for software defect prediction. J Syst Eng Electron 32(2):389\u2013398. https:\/\/doi.org\/10.23919\/JSEE.2021.000032","journal-title":"J Syst Eng Electron"},{"key":"18456_CR25","doi-asserted-by":"publisher","first-page":"83812","DOI":"10.1109\/ACCESS.2019.2925313","volume":"7","author":"H Liang","year":"2019","unstructured":"Liang H, Yu Y, Jiang L, Xie Z (2019) Seml: A Semantic LSTM Model for Software Defect Prediction. IEEE Access 7:83812\u201383824. https:\/\/doi.org\/10.1109\/ACCESS.2019.2925313","journal-title":"IEEE Access"},{"key":"18456_CR26","doi-asserted-by":"publisher","first-page":"60865","DOI":"10.1109\/ACCESS.2021.3072993","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Li Z, Wang D, Miao H, Wang Z (2021) Software Defects Prediction Based on Hybrid Particle Swarm Optimization and Sparrow Search Algorithm. IEEE Access 9:60865\u201360879. https:\/\/doi.org\/10.1109\/ACCESS.2021.3072993","journal-title":"IEEE Access"},{"issue":"Suppl 4","key":"18456_CR27","doi-asserted-by":"publisher","first-page":"9847","DOI":"10.1007\/s10586-018-1696-z","volume":"22","author":"C Manjula","year":"2019","unstructured":"Manjula C, Florence L (2019) Deep neural network based hybrid approach for software defect prediction using software metrics. Clust Comput 22(Suppl 4):9847\u20139863. https:\/\/doi.org\/10.1007\/s10586-018-1696-z","journal-title":"Clust Comput"},{"issue":"Suppl 1","key":"18456_CR28","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10586-018-1730-1","volume":"22","author":"R Jayanthi","year":"2019","unstructured":"Jayanthi R, Florence L (2019) Software defect prediction techniques using metrics based on neural network classifier. Cluster Comput 22(Suppl 1):77\u201388. https:\/\/doi.org\/10.1007\/s10586-018-1730-1","journal-title":"Cluster Comput"},{"issue":"2","key":"18456_CR29","first-page":"100105","volume":"2","author":"K Tameswar","year":"2022","unstructured":"Tameswar K, Suddul G, Dookhitram K (2022) A hybrid deep learning approach with genetic and coral reefs metaheuristics for enhanced defect detection in software. Int J Inf Manag Data Insights 2(2):100105","journal-title":"Int J Inf Manag Data Insights"},{"key":"18456_CR30","doi-asserted-by":"crossref","unstructured":"Trojovsk\u00fd P, Dehghani M (2022) Pelican optimization algorithm: A novel nature-inspired algorithm for engineering applications. Sensors 22(3):855","DOI":"10.3390\/s22030855"},{"key":"18456_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/924652","volume":"2014","author":"H Lu","year":"2014","unstructured":"Lu H, Wang X, Fei Z, Qiu M (2014) The Effects of Using Chaotic Map on Improving the Performance of Multiobjective Evolutionary Algorithms. Math Probl Eng 2014:1\u201316. https:\/\/doi.org\/10.1155\/2014\/924652","journal-title":"Math Probl Eng"},{"key":"18456_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/6871298","volume":"2019","author":"C Aci","year":"2019","unstructured":"Aci C, G\u00fclcan H (2019) A Modified Dragonfly Optimization Algorithm for Single- and Multiobjective Problems Using Brownian Motion. Comput Intell Neurosci 2019:1\u201317. https:\/\/doi.org\/10.1155\/2019\/6871298","journal-title":"Comput Intell Neurosci"},{"issue":"7","key":"18456_CR33","first-page":"1717","volume":"13","author":"SG Varun Kumar","year":"2017","unstructured":"Varun Kumar SG, Panneerselvam R (2017) A Study of Crossover Operators for Genetic Algorithms to Solve VRP and its Variants and New Sinusoidal Motion Crossover Operator. Int J Comput Intell Res 13(7):1717\u20131733 ISSN 0973-1873","journal-title":"Int J Comput Intell Res"},{"key":"18456_CR34","doi-asserted-by":"crossref","unstructured":"Zhou X, Lin J, Zhang Z, Shao Z, Chen S, Liu H (2020) Improved itracker combined with bidirectional long short-term memory for 3D gaze estimation using appearance cues. Neurocomputing 390:217\u201325","DOI":"10.1016\/j.neucom.2019.04.099"},{"key":"18456_CR35","unstructured":"Goodfellow IJ, Warde-Farley D, Mirza M, Courville A, Bengio Y (2013) Maxout Networks, Proceedings of the 30 th International Conference on Machine Learning, Atlanta, Georgia, USA"},{"key":"18456_CR36","doi-asserted-by":"crossref","unstructured":"Naruei I, Keynia F (2021) A new optimization method based on COOT bird natural life model. Expert Systems with Applications 183:115352","DOI":"10.1016\/j.eswa.2021.115352"},{"key":"18456_CR37","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.engappai.2019.08.025","volume":"86","author":"SHS Moosavi","year":"2019","unstructured":"Moosavi SHS, Bardsiri VK (2019) Poor and rich optimization algorithm: A new human-based and multi populations algorithm. Eng Appl Artif Intell 86:165\u2013181 (Cover date: November 2019)","journal-title":"Eng Appl Artif Intell"},{"key":"18456_CR38","doi-asserted-by":"publisher","first-page":"113609","DOI":"10.1016\/j.cma.2020.113609","volume":"376","author":"L Abualigah","year":"2021","unstructured":"Abualigah L, Diabat A, Mirjalili S, ElsayedAbdElaziz M, Gandomi A (2021) The Arithmetic Optimization Algorithm. Comput Methods Appl Mech Eng. 376:113609. https:\/\/doi.org\/10.1016\/j.cma.2020.113609","journal-title":"Comput Methods Appl Mech Eng."},{"key":"18456_CR39","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s10462-019-09732-5","volume":"53","author":"HA Alsattar","year":"2020","unstructured":"Alsattar HA, Zaidan AA, Zaidan BB (2020) Novel meta-heuristic bald eagle search optimisation algorithm. ArtifIntell Rev 53:2237\u20132264. https:\/\/doi.org\/10.1007\/s10462-019-09732-5","journal-title":"ArtifIntell Rev"},{"key":"18456_CR40","first-page":"253","volume-title":"Convolutional networks and applications in vision","author":"Y LeCun","year":"2010","unstructured":"LeCun Y, Kavukvuoglu K, Farabet C (2010) Convolutional networks and applications in vision. In Circuits and Systems, International Symposium on, pp 253\u2013256"},{"key":"18456_CR41","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.apenergy.2016.08.108","volume":"182","author":"HZ Wang","year":"2016","unstructured":"Wang HZ, Wang GB, Li GQ, Peng JC, Liu YT (2016) Deep belief network based deterministic and probabilistic wind speed forecasting approach. Appl Energy 182:80\u201393","journal-title":"Appl Energy"},{"key":"18456_CR42","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.jmsy.2020.07.020","volume":"57","author":"L-J Kao","year":"2020","unstructured":"Kao L-J, Chiu CC (2020) Application of integrated recurrent neural network with multivariate adaptive regression splines on SPC-EPC process. J Manuf Syst 57:109\u2013118","journal-title":"J Manuf Syst"},{"key":"18456_CR43","doi-asserted-by":"publisher","first-page":"106185","DOI":"10.1016\/j.compag.2021.106185","volume":"186","author":"H Zhu","year":"2021","unstructured":"Zhu H, Yang L, Han Z (2021) Recognition of carrot appearance quality based on deep feature and support vector machine. Comput Electron Agric. 186:106185 (Cover date: July 2021)","journal-title":"Comput Electron Agric."},{"issue":"1","key":"18456_CR44","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.insmatheco.2021.07.003","volume":"101","author":"D Makariou","year":"2021","unstructured":"Makariou D, Barrieu P, Chen Y (2021) A random forest based approach for predicting spreads in the primary catastrophe bond market. Insur Math Econ. 101(1):140\u2013162 (Cover date: November 2021)","journal-title":"Insur Math Econ."}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18456-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18456-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18456-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T08:22:59Z","timestamp":1725351779000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18456-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,17]]},"references-count":44,"journal-issue":{"issue":"31","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["18456"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18456-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,17]]},"assertion":[{"value":"27 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}