{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:17Z","timestamp":1750306277703,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905123","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparative Performance of Fault-Prone Prediction Classes with K-means Clustering and MLP"],"prefix":"10.1145","author":[{"given":"Satwinder","family":"Singh","sequence":"first","affiliation":[{"name":"Central University of Punjab, Bathinda"}]},{"given":"Rozy","family":"Singla","sequence":"additional","affiliation":[{"name":"Shankara Institute of Technology, Jaipur"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"313","volume-title":"Proceedings of the 48th Annual Convention of CSI Vol II, CSI Vishakapatnam Chapter","author":"Ramaswamy V.","year":"2013","unstructured":"Ramaswamy , V. , Pushphavathi , T.P. , and Suma , V ., \" Defect Prediction Apporaches for Software Projects using Genetic Fuzzy Data Mining\", ICT and Critical Infrastructure , Proceedings of the 48th Annual Convention of CSI Vol II, CSI Vishakapatnam Chapter , 13-15 Dec , 2013 , pp. 313 -- 320 . Ramaswamy, V., Pushphavathi, T.P., and Suma, V., \"Defect Prediction Apporaches for Software Projects using Genetic Fuzzy Data Mining\", ICT and Critical Infrastructure, Proceedings of the 48th Annual Convention of CSI Vol II, CSI Vishakapatnam Chapter, 13-15 Dec, 2013, pp. 313--320."},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"288","article-title":"Software Defect Prediction Models for Quality Improvement: A Literature Study","volume":"9","author":"Rawat M.S.","year":"2012","unstructured":"Rawat , M.S. , Dubey , S.K. , \" Software Defect Prediction Models for Quality Improvement: A Literature Study \", IJCSI International Journal of Computer Science Issues , Vol. 9 , No 2 , pp. 288 -- 296 , September , 2012 . Rawat, M.S., Dubey, S.K., \"Software Defect Prediction Models for Quality Improvement: A Literature Study\", IJCSI International Journal of Computer Science Issues, Vol. 9, No 2, pp. 288--296, September, 2012.","journal-title":"IJCSI International Journal of Computer Science Issues"},{"issue":"2","key":"e_1_3_2_1_3_1","article-title":"Study of Predicting Fault Prone Software Modules","volume":"2","author":"Sharma R.","year":"2012","unstructured":"Sharma , R. , Budhija , N. , Singh , B. , \" Study of Predicting Fault Prone Software Modules \", International Journal of Advanced Research in Computer Science and Software Engineering , Vol. 2 , No. 2 , February 2012 . Sharma, R., Budhija, N., Singh, B., \"Study of Predicting Fault Prone Software Modules\", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 2, February 2012.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2393596.2393669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/32.815326"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/TSE.2010.90"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/32.815326"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.4018\/978-1-59140-941-1.ch010"},{"key":"e_1_3_2_1_9_1","first-page":"70","article-title":"Software Defect Prediction Tool based on Neural Network","volume":"0975","author":"Singh M.","unstructured":"Singh , M. , and Salaria , D. S ., \" Software Defect Prediction Tool based on Neural Network ,\" International Journal of Computer Applications ( 0975-8887 ) Vol. 70 , No. 22, pp. 22--28, May 2013. Singh, M., and Salaria, D. S., \"Software Defect Prediction Tool based on Neural Network,\" International Journal of Computer Applications (0975-8887) Vol. 70, No. 22, pp. 22--28, May 2013.","journal-title":"International Journal of Computer Applications ("},{"key":"e_1_3_2_1_10_1","first-page":"65","volume-title":"Advances in Image Understanding","author":"Jain K.","unstructured":"Jain , Anil K. , Dubes , Richard C. , 1988. \" Algorithms for Clustering Data\". Prentice Hall. Jain, Anil K. , Flynn , P. , 1996. Image segmentation using clustering . In: Advances in Image Understanding . IEEE Computer Society Press , pp. 65 -- 83 Jain, Anil K., Dubes, Richard C., 1988. \"Algorithms for Clustering Data\". Prentice Hall. Jain, Anil K., Flynn, P., 1996. Image segmentation using clustering. In: Advances in Image Understanding. IEEE Computer Society Press, pp. 65--83"},{"volume-title":"A Novel Method Of Data Analysis And Pattern Classification. Technical report NTISAD 69 9616","author":"Ball G.","unstructured":"Ball , G. , Hall , D. , 1965. ISO DATA , A Novel Method Of Data Analysis And Pattern Classification. Technical report NTISAD 69 9616 . Stanford Research Institute , Stanford, CA . Ball, G.,Hall, D., 1965. ISO DATA, A Novel Method Of Data Analysis And Pattern Classification. Technical report NTISAD 69 9616. Stanford Research Institute, Stanford, CA.","key":"e_1_3_2_1_11_1"},{"unstructured":"Forgy E. W. 1965. Cluster analysis of multivariate data: Efficiency vs. interpretability of classifications. Biometrics 21 768--769.  Forgy E. W. 1965. Cluster analysis of multivariate data: Efficiency vs. interpretability of classifications. Biometrics 21 768--769.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/32.295895"},{"unstructured":"Henderson-Sellers B. \"Software Metrics\" Prentice Hall Hemel Hempstaed U.K. 1996.  Henderson-Sellers B. \"Software Metrics\" Prentice Hall Hemel Hempstaed U.K. 1996.","key":"e_1_3_2_1_14_1"}],"event":{"acronym":"ICTCS '16","name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905123","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":14,"alternative-id":["10.1145\/2905055.2905123","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905123","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}