{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:46:41Z","timestamp":1753922801927},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11219-023-09623-7","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T11:02:47Z","timestamp":1678273367000},"page":"991-1007","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Code quality control by bug report classification"],"prefix":"10.1007","volume":"31","author":[{"given":"Omid","family":"Bushehrian","sequence":"first","affiliation":[]},{"given":"Ziba","family":"Ghane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,8]]},"reference":[{"key":"9623_CR1","doi-asserted-by":"crossref","unstructured":"B\u00e1n, D., & Ferenc, R. (2014). Recognizing antipatterns and analyzing their effects on software maintainability. In Murgante, B., Misra, S., Rocha, A. M. A. C., Torre, C., Rocha, J. G., Falc\u00e3o, M. I., Taniar, D., Apduhan, B. O .& Gervasi, O. (Ed.s), 14th International Conference on Computational Science and Its Applications, ICCSA 2014.\u00a0Springer International Publishing, Cham, pp 337\u2013352.","DOI":"10.1007\/978-3-319-09156-3_25"},{"key":"9623_CR2","doi-asserted-by":"crossref","unstructured":"Bushehrian, O., Sayari, M., & Shamsinejad, P. (2021). Software deterioration control based on issue reports, e-Informatica Software Engineering Journal, 15, 1.","DOI":"10.37190\/e-Inf210106"},{"key":"9623_CR3","doi-asserted-by":"crossref","unstructured":"Chen, C., Lin, S., Shoga, M., Wang, Q., & Boehm, B. (2018). How do defects hurt qualities? An empirical study on characterizing a software maintainability ontology in open source software, 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), IEEE, 226\u2013237.","DOI":"10.1109\/QRS.2018.00036"},{"key":"9623_CR4","unstructured":"Christopher, D. M., Prabhakar, R., & Hinrich, S. (2008).\u00a0Introduction to information retrieval, Cambridge University Press."},{"key":"9623_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.knosys.2017.04.014","volume":"128","author":"FA Fontana","year":"2017","unstructured":"Fontana, F. A., & Zanoni, M. (2017). Code smell severity classification using machine learning techniques. Knowledge-Based Systems, 128, 43\u201358.","journal-title":"Knowledge-Based Systems"},{"key":"9623_CR6","unstructured":"Fowler, M. (2018).\u00a0Refactoring: Improving the design of existing code, Addison-Wesley Professional."},{"issue":"3","key":"9623_CR7","doi-asserted-by":"publisher","first-page":"2589","DOI":"10.1007\/s11063-020-10213-y","volume":"51","author":"S Guo","year":"2020","unstructured":"Guo, S., Zhang, X., Yang, X., Chen, R., Guo, C., Li, H., & Li, T. (2020). Developer activity motivated bug triaging: Via convolutional neural network. Neural Processing Letters, 51(3), 2589\u20132606.","journal-title":"Neural Processing Letters"},{"issue":"3","key":"9623_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh, F., Penta, M. D., Gu\u00e9h\u00e9neuc, Y.-G., & Antoniol, G. (2012). An exploratory study of the impact of antipatterns on class change- and fault-proneness. Empirical Software Engineering, 17(3), 243\u2013275.","journal-title":"Empirical Software Engineering"},{"issue":"11","key":"9623_CR9","first-page":"1597","volume":"39","author":"D Kim","year":"2013","unstructured":"Kim, D., Tao, Y., Kim, S., & Zeller, A. (2013). Where should we fix this bug? A Two-Phase Recommendation Model, IEEE Transactions on Software Engineering, 39(11), 1597\u20131610.","journal-title":"A Two-Phase Recommendation Model, IEEE Transactions on Software Engineering"},{"key":"9623_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38652-7","volume-title":"Dimensionality reduction with unsupervised nearest neighbors","author":"O Kramer","year":"2013","unstructured":"Kramer, O. (2013). Dimensionality reduction with unsupervised nearest neighbors. Springer."},{"key":"9623_CR11","unstructured":"Le, Q., & Mikolov, T. (2014). Distributed representations of sentences and documents, International conference on machine learning, PMLR, 1188\u20131196."},{"issue":"07","key":"9623_CR12","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1142\/S0218194016500352","volume":"26","author":"N Limsettho","year":"2016","unstructured":"Limsettho, N., Hata, H., Monden, A., & Matsumoto, K. (2016). Unsupervised bug report categorization using clustering and labeling algorithm. International Journal of Software Engineering and Knowledge Engineering, 26(07), 1027\u20131053.","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"08","key":"9623_CR13","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1142\/S0218194016500431","volume":"26","author":"R Malhotra","year":"2016","unstructured":"Malhotra, R., & Chug, A. (2016). Software maintainability: Systematic literature review and current trends. International Journal of Software Engineering and Knowledge Engineering, 26(08), 1221\u20131253.","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"1","key":"9623_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/181610.181623","volume":"19","author":"S Mamone","year":"1994","unstructured":"Mamone, S. (1994). The IEEE standard for software maintenance. ACM SIGSOFT Software Engineering Notes, 19(1), 75\u201376.","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9623_CR15","doi-asserted-by":"crossref","unstructured":"Mushtaq, R. (2011). Augmented Dickey Fuller test, SSRN Electronic Journal.","DOI":"10.2139\/ssrn.1911068"},{"issue":"3","key":"9623_CR16","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1007\/s10664-017-9535-z","volume":"23","author":"F Palomba","year":"2018","unstructured":"Palomba, F., Bavota, G., Penta, M. D., Fasano, F., Oliveto, R., & Lucia, A. D. (2018). On the diffuseness and the impact on maintainability of code smells: A large scale empirical investigation. Empirical Software Engineering, 23(3), 1188\u20131221.","journal-title":"Empirical Software Engineering"},{"issue":"2","key":"9623_CR17","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TSE.2017.2770122","volume":"45","author":"F Palomba","year":"2019","unstructured":"Palomba, F., Zanoni, M., Fontana, F. A., Lucia, A. D., & Oliveto, R. (2019). Toward a smell-aware bug prediction model. IEEE Transactions on Software Engineering, 45(2), 194\u2013218.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9623_CR18","doi-asserted-by":"crossref","unstructured":"Piotrowski, P., & Madeyski, L. (2020). Software defect prediction using bad code smells: A systematic literature review.\u00a0Data-Centric Business and Applications, 77\u201399.","DOI":"10.1007\/978-3-030-34706-2_5"},{"key":"9623_CR19","doi-asserted-by":"publisher","first-page":"46846","DOI":"10.1109\/ACCESS.2019.2909746","volume":"7","author":"WY Ramay","year":"2019","unstructured":"Ramay, W. Y., Umer, Q., Yin, X. C., Zhu, C., & Illahi, I. (2019). Deep neural network-based severity prediction of bug reports. IEEE Access, 7, 46846\u201346857.","journal-title":"IEEE Access"},{"key":"9623_CR20","doi-asserted-by":"crossref","unstructured":"Taba, S. E. S., Khomh, F., Zou, Y., Hassan, A. E., & Nagappan, M. (2013). Predicting bugs using antipatterns.\u00a02013 IEEE International Conference on Software Maintenance, 270\u2013279.","DOI":"10.1109\/ICSM.2013.38"},{"key":"9623_CR21","doi-asserted-by":"crossref","unstructured":"Ubayawardana, G. M., & Karunaratna, D. D. (2018). Bug prediction model using code smells.\u00a02018 18th international conference on advances in ICT for emerging regions (ICTer), IEEE, 70\u201377.","DOI":"10.1109\/ICTER.2018.8615550"},{"issue":"3","key":"9623_CR22","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s10515-014-0175-x","volume":"23","author":"SA Vidal","year":"2016","unstructured":"Vidal, S. A., Marcos, C., & D\u00edaz-Pace, J. A. (2016). An approach to prioritize code smells for refactoring. Automated Software Engineering, 23(3), 501\u2013532.","journal-title":"Automated Software Engineering"},{"key":"9623_CR23","unstructured":"Wang, B., Xu, L., Yan, M., Liu, C., & Liu, L. (2020). Multi-dimension convolutional neural network for bug localization.\u00a0IEEE Transactions on Services Computing."},{"key":"9623_CR24","doi-asserted-by":"publisher","unstructured":"Yang, L., & Shami, A. (2020). On hyperparameter optimization of machine learning algorithms: Theory and practice, Neurocomputing, 415, 295\u2013316, ISSN0925\u20132312. https:\/\/doi.org\/10.1016\/j.neucom.2020.07.061","DOI":"10.1016\/j.neucom.2020.07.061"},{"key":"9623_CR25","unstructured":"Yu, L., Schach, S. R., & Chen, K. (2005). Measuring the maintainability of open-source software.\u00a02005 International Symposium on Empirical Software Engineering, IEEE, 7."},{"key":"9623_CR26","doi-asserted-by":"publisher","first-page":"213729","DOI":"10.1109\/ACCESS.2020.3040065","volume":"8","author":"SFA Zaidi","year":"2020","unstructured":"Zaidi, S. F. A., Awan, F. M., Lee, M., Woo, H., & Lee, C.-G. (2020). Applying convolutional neural networks with different word representation techniques to recommend bug fixers. IEEE Access, 8, 213729\u2013213747.","journal-title":"IEEE Access"},{"key":"9623_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhou, Y., & Zhu, C. (2017). An empirical study of the impact of bad designs on defect proneness.\u00a02017 International Conference on Software Analysis, Testing and Evolution (SATE), 1\u20139.","DOI":"10.1109\/SATE.2017.9"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-023-09623-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-023-09623-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-023-09623-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T10:24:56Z","timestamp":1693477496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-023-09623-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,8]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9623"],"URL":"https:\/\/doi.org\/10.1007\/s11219-023-09623-7","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,8]]},"assertion":[{"value":"22 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}