{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:23:53Z","timestamp":1753439033284,"version":"3.28.0"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035342","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:08:51Z","timestamp":1584414531000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["The Impact of SMOTE and Grid Search on Maintainability Prediction Models"],"prefix":"10.1109","author":[{"given":"Elmidaoui","family":"Sara","sequence":"first","affiliation":[]},{"given":"Cheikhi","family":"Laila","sequence":"additional","affiliation":[]},{"given":"Idri","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref38","article-title":"OO Design Quality Metrics: an Analysis of Dependencies","volume":"2","author":"martin","year":"1995","journal-title":"ROAD 1995"},{"journal-title":"A Comparative Study of Different Source Code Metrics and Machine Learning Algorithms for Predicting Change Proneness of Object Oriented Systems","year":"2018","author":"lov","key":"ref33"},{"journal-title":"Machine Learning Neural and Statistical Classification Upper Saddle River","year":"1994","author":"michie","key":"ref32"},{"key":"ref31","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"journal-title":"jedit-Programmer's Text Editor","year":"0","key":"ref30"},{"key":"ref37","article-title":"An Empirical Study on Object-Oriented Metrics","author":"tang","year":"0","journal-title":"International Software Metrics Symposium"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"journal-title":"Object-Oriented Metrics Measures of Complexity","year":"1996","author":"henderson- sellers","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"journal-title":"Apache Log4J","year":"0","key":"ref28"},{"journal-title":"Home Apache Ivy TM","year":"0","key":"ref27"},{"journal-title":"Apache Tomcat","year":"0","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aca.2010.03.030"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084239"},{"journal-title":"Neural Networks A Comprehensive Foundation Prentice Hall","year":"1999","author":"haykin","key":"ref20"},{"key":"ref22","article-title":"The PROMISE Repository of Software Engineering Databases","author":"sayyad shirabad","year":"0","journal-title":"School of Information Technology and Engineering University of Ottawa"},{"key":"ref21","article-title":"The Optimality of Na&#x00EF;ve Bayes","author":"zhang","year":"0","journal-title":"International Florida Artificial Intelligence Research Society Conference"},{"journal-title":"Apache Ant","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"journal-title":"Apache Camel","year":"0","key":"ref26"},{"journal-title":"Apache POI - the Java API for Microsoft Documents","year":"0","key":"ref25"},{"key":"ref50","first-page":"1137","article-title":"A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection","volume":"2","author":"kohavi","year":"0","journal-title":"International Joint Conference on Artificial Intelligence"},{"key":"ref51","first-page":"615","article-title":"Benchmarking framework for maintainability prediction of open source software using object oriented metrics","volume":"12","author":"chug","year":"2016","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"ref11","article-title":"Defect prediction in software projects-using genetic algorithm based fuzzy c-means clustering and random forest classifier","volume":"5","author":"pushpavathi","year":"2014","journal-title":"Int J Sci Eng Res"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5220\/0005822701320139"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090212"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression","volume":"46","author":"altman","year":"1992","journal-title":"Am Stat"},{"journal-title":"K-nearest Neighbor","year":"0","author":"sayad","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2008.43"},{"key":"ref16","article-title":"An Empirical Study of Imputation Techniques for Software Data Sets","author":"yenduri","year":"2005","journal-title":"America Louisiana State University and Agricultural and Mechanical College"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref18","first-page":"237","article-title":"Classification and regression trees","volume":"37","author":"breiman","year":"1984","journal-title":"Wadsworth Int Gr"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1299015.1299021","article-title":"A Comparison of Machine Learning Techniques for Phishing Detection","author":"abu-nimeh","year":"2007","journal-title":"Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit ECrime '07"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref3","article-title":"Statistical Comparison of Machine Learning Techniques for Predicting Software Maintainability and Defects","author":"kaur","year":"2016","journal-title":"Guru Gobind Singh Indraprastha University"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2015.7274635"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref7","first-page":"1795","article-title":"Sampling Imbalance Dataset For Software Defect Prediction Using Hybrid Neuro-Fuzzy Systems With Naive Bayes Classifier","volume":"23","author":"punitha","year":"2016","journal-title":"Technical Gazette"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03969-0_21"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0001-2998(78)80014-2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/11941439_92"},{"key":"ref48","first-page":"67","article-title":"Power and type I errors rate of Scott-Knott, Tukey and Newman-Keuls tests under normal and no-normal distributions of the residues","volume":"21","author":"borges","year":"2003","journal-title":"Rev Matem&#x00E1;tica e Estatistica"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2307\/2529204"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499394"},{"key":"ref41","first-page":"1403","article-title":"On the Value of Ensemble Effort Estimation","volume":"38","author":"menzies","year":"0","journal-title":"IEEE Trans Softw Eng"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2945-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3143434.3143456"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2019,11,3]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035342.pdf?arnumber=9035342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T07:37:04Z","timestamp":1722584224000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035342","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}