{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T10:36:44Z","timestamp":1768473404417,"version":"3.49.0"},"reference-count":60,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>A software bug is characterized by its attributes. Various prediction models have been developed using these attributes to enhance the quality of software products. The reporting of bugs leads to high irregular patterns. The repository size is also increasing with enormous rate, resulting in uncertainty and irregularities. These uncertainty and irregularities are termed as veracity in the context of big data. In order to quantify these irregular and uncertain patterns, the authors have appliedentropy-based measures of the terms reported in the summary and the comments submitted by the users. Both uncertainties and irregular patterns have been taken care of byentropy-based measures. In this paper, the authors considered that the bug fixing process does not only depend upon the calendar time, testing effort and testing coverage, but it also depends on the bug summary description and comments. The paper proposed bug dependency-based mathematical models by considering the summary description of bugs and comments submitted by users in terms of the entropy-based measures. The models were validated on different Eclipse project products. The models proposed in the literature have different types of growth curves. The models mainly follow exponential, S-shaped or mixtures of both types of curves. In this paper, the proposed models were compared with the modelsfollowingexponential, S-shaped and mixtures of both types of curves.<\/jats:p>","DOI":"10.3390\/e21010091","type":"journal-article","created":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T03:08:22Z","timestamp":1548126502000},"page":"91","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Quantitative Quality Evaluation of Software Products by Considering Summary and Comments Entropy of a Reported Bug"],"prefix":"10.3390","volume":"21","author":[{"given":"Madhu","family":"Kumari","sequence":"first","affiliation":[{"name":"Department of Computer Science, Delhi College of Arts and Commerce, Delhi 110023, India"}]},{"given":"Ananya","family":"Misra","sequence":"additional","affiliation":[{"name":"Department of Informatics, Technical University of Munich, 80333 Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-9331","authenticated-orcid":false,"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Atilim University, Ankara 06830, Turkey"},{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State 112212, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0778-0073","authenticated-orcid":false,"given":"Luis","family":"Fernandez Sanz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Alcala, 28801 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9990-1084","authenticated-orcid":false,"given":"Robertas","family":"Damasevicius","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Kaunas University of Technology, 44249 Kaunas, Lithuania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9601-7039","authenticated-orcid":false,"given":"V.B.","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Delhi College of Arts and Commerce, Delhi 110023, India"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"ref_1","unstructured":"Godbole, N.S. (2004). Software Quality Assurance: Principles and Practice, Alpha Science Intl Ltd."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Hassan, A.E. (2009, January 16\u201324). Predicting bugs using the complexity of code changes. Proceedings of the 31st International Conference on Software Engineering, Washington, DC, USA.","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A Mathematical Theory of Communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s13198-014-0226-5","article-title":"Predicting the complexity of code changes using entropy based measures","volume":"5","author":"Chaturvedi","year":"2014","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/s13198-014-0242-5","article-title":"Bug prediction modeling using complexity of code changes","volume":"6","author":"Singh","year":"2015","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Gupta, A., Suri, B., Kumar, V., Misra, S., Bla\u017eauskas, T., and Dama\u0161evi\u010dius, R. (2018). Software Code Smell Prediction Model Using Shannon, R\u00e9nyi and Tsallis Entropies. Entropy, 20.","DOI":"10.3390\/e20050372"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1049\/sej.1992.0030","article-title":"A software reliability growth model for an error-removal phenomenon","volume":"7","author":"Kapur","year":"1992","journal-title":"Softw. Eng. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/0026-2714(94)00054-R","article-title":"Software reliability growth model with error dependency","volume":"35","author":"Kapur","year":"1995","journal-title":"Microelectron. Reliab."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TR.1983.5221735","article-title":"S-shaped reliability growth modeling for software error detection","volume":"32","author":"Yamada","year":"1983","journal-title":"IEEE Trans. Reliab."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1080\/00207540600926113","article-title":"Software reliability growth model with change-point and effort control using a power function of the testing time","volume":"46","author":"Kapur","year":"2008","journal-title":"Int. J. Prod. Res."},{"key":"ref_11","first-page":"127","article-title":"Software reliability growth modeling using power function of testing time","volume":"12","author":"Kapur","year":"2006","journal-title":"Int. J. Oper. Quant. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TR.2006.879607","article-title":"Software reliability analysis by considering fault dependency and debugging time lag","volume":"55","author":"Huang","year":"2006","journal-title":"IEEE Trans. Reliab."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11633-007-0359-y","article-title":"Considering the fault dependency concept with debugging time lag in software reliability growth modeling using a power function of testing time","volume":"4","author":"Singh","year":"2007","journal-title":"Int. J. Autom. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TR.1979.5220566","article-title":"Time-dependent error-detection rate model for software reliability and other performance measures","volume":"28","author":"Goel","year":"1979","journal-title":"IEEE Trans. Reliab."},{"key":"ref_15","first-page":"5","article-title":"Generalized Erlang software reliability growth model","volume":"14","author":"Kapur","year":"1995","journal-title":"Asor Bull."},{"key":"ref_16","unstructured":"Huang, C.Y., Kuo, S.Y., and Chen, Y. (1997, January 2\u20135). Analysis of a software reliability growth model with logistic testing-effort function. Proceedings of the Eighth International Symposium on Software Reliability Engineering, Albuquerque, NM, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/TR.1986.4335332","article-title":"Software reliability growth models with testing-effort","volume":"35","author":"Yamada","year":"1986","journal-title":"IEEE Trans. Reliab."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.jss.2004.04.024","article-title":"Performance analysis of software reliability growth models with testing-effort and change-point","volume":"76","author":"Huang","year":"2005","journal-title":"J. Syst. Softw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/TR.2002.801847","article-title":"Analysis of incorporating logistic testing-effort function into software reliability modeling","volume":"51","author":"Huang","year":"2002","journal-title":"IEEE Trans. Reliab."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TR.2002.804489","article-title":"Software reliability growth with test coverage","volume":"51","author":"Malaiya","year":"2002","journal-title":"Ieee Trans. Reliab."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSMC.2016.2557479","article-title":"Learning from uncertainty for big data: Future analytical challenges and strategies","volume":"2","author":"Wang","year":"2016","journal-title":"IEEE Syst. ManCybern. Mag."},{"key":"ref_22","unstructured":"(2018, June 28). Available online: http:\/\/bugs.eclipse.org\/bugs\/."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","article-title":"An algorithm for suffix stripping","volume":"14","author":"Porter","year":"1980","journal-title":"Program"},{"key":"ref_24","unstructured":"Murphy, G., and Cubranic, D. (2004, January 20\u201324). Automatic bug triage using text categorization. Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering, Banff, AB, Canada."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Anvik, J., Hiew, L., and Murphy, G.C. (2006, January 20\u201328). Who should fix this bug?. Proceedings of the 28th international Conference on Software Engineering, Shanghai, China.","DOI":"10.1145\/1134285.1134336"},{"key":"ref_26","unstructured":"Moin, A., and Neumann, G. (2012, January 18\u201323). Assisting bug triage in large open source projects using approximate string matching. Proceedings of the 7th nternational Conference on Software Engineering Advances (ICSEA 2012), Lissabon, Portugal."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1016\/j.jss.2012.04.053","article-title":"Automated, highly-accurate, bug assignment using machine learning and tossing graphs","volume":"85","author":"Bhattacharya","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tamrawi, A., Nguyen, T.T., Al-Kofahi, J.M., and Nguyen, T.N. (2011, January 5\u20139). Fuzzy set and cache-based approach for bug triaging. Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, Szeged, Hungary.","DOI":"10.1145\/2025113.2025163"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bhattacharya, P., and Neamtiu, I. (2010, January 12\u201318). Fine-grained incremental learning and multi-feature tossing graphs to improve bug triaging. Proceedings of the 2010 IEEE International Conference Software Maintenance (ICSM), Timisoara, Romania.","DOI":"10.1109\/ICSM.2010.5609736"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.4304\/jsw.8.9.2185-2190","article-title":"Efficient Bug Triaging Using Text Mining","volume":"8","author":"Alenezi","year":"2013","journal-title":"JSW"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Jeong, G., Kim, S., and Zimmermann, T. (2009, January 24\u201328). Improving bug triage with bug tossing graphs. Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, Amsterdam, The Netherlands.","DOI":"10.1145\/1595696.1595715"},{"key":"ref_32","unstructured":"Xuan, J., Jiang, H., Ren, Z., Yan, J., and Luo, Z. (arXiv, 2017). Automatic bug triage using semi-supervised text classification, arXiv."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Govindasamy, V., Akila, V., Anjanadevi, G., Deepika, H., and Sivasankari, G. (2016, January 20\u201321). Data reduction for bug triage using effective prediction of reduction order techniques. Proceedings of the 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), Chennai, India.","DOI":"10.1109\/ICCPEIC.2016.7557229"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1109\/TKDE.2014.2324590","article-title":"Towards effective bug triage with software data reduction techniques","volume":"27","author":"Xuan","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Tian, Y., Wijedasa, D., Lo, D., and Le Goues, C. (2016, January 16\u201317). Learning to rank for bug report assignee recommendation. Proceedings of the 2016 IEEE 24th International Conference on Program Comprehension (ICPC), Austin, TX, USA.","DOI":"10.1109\/ICPC.2016.7503715"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2000791.2000794","article-title":"Reducing the effort of bug report triage: Recommenders for development-oriented decisions","volume":"20","author":"Anvik","year":"2011","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Shokripour, R., Anvik, J., Kasirun, Z.M., and Zamani, S. (2013, January 18\u201319). Why so complicated? simple term filtering and weighting for location-based bug report assignment recommendation. Proceedings of the 2013 10th IEEE Working Conference on Mining Software Repositories (MSR), San Francisco, CA, USA.","DOI":"10.1109\/MSR.2013.6623997"},{"key":"ref_38","unstructured":"Goyal, A., and Sardana, N. (2017, January 22). Efficient bug triage in issue tracking systems. Proceedings of the Doctoral Consortium at the 13th International Conference on Open Source Systems, Buenos Aires, Argentina."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"933","DOI":"10.12988\/ces.2016.6695","article-title":"Improving Predictions about Bug Severity by Utilizing Bugs Classified as Normal","volume":"9","author":"Jin","year":"2016","journal-title":"Contemp. Eng. Sci."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Zhang, T., Yang, G., Lee, B., and Chan, A.T. (2015, January 13\u201317). Predicting severity of bug report by mining bug repository with concept profile. Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain.","DOI":"10.1145\/2695664.2695872"},{"key":"ref_41","unstructured":"Roy, N.K.S., and Rossi, B. (2014, January 27\u201329). Towards an improvement of bug severity classification. Proceedings of the 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Verona, Italy."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"32","DOI":"10.4018\/jossp.2012040103","article-title":"An empirical comparison of machine learning techniques in predicting the bug severity of open and closed source projects","volume":"4","author":"Chaturvedi","year":"2012","journal-title":"Int. J. Open Source Softw. Process. (IJOSSP)"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Tian, Y., Lo, D., and Sun, C. (2012, January 15\u201318). Information retrieval based nearest neighbor classification for fine-grained bug severity prediction. Proceedings of the 2012 19th Working Conference on Reverse Engineering, Kingston, ON, Canada.","DOI":"10.1109\/WCRE.2012.31"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Yang, C.Z., Hou, C.C., Kao, W.C., and Chen, X. (2012, January 4\u20137). An Empirical Study on Improving Severity Prediction of Defect Reports using Feature Selection. Proceedings of the 19th Asia-Pacific Software Engineering Conference, Hong Kong, China.","DOI":"10.1109\/APSEC.2012.144"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Chaturvedi, K.K., and Singh, V.B. (2012, January 5\u20137). Determining Bug Severity Using Machine Learning Techniques. Proceedings of the 2012 CSI Sixth International Conference on Software Engineering, Indore, India.","DOI":"10.1109\/CONSEG.2012.6349519"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Lamkanfi, A., Demeyer, S., Giger, E., and Goethals, B. (2010, January 2\u20133). Predicting the Severity of a Reported Bug. Proceedings of the 2010 7th IEEE Working Conference on Mining Software Repositories, Cape Town, South Africa.","DOI":"10.1109\/MSR.2010.5463284"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Lamkanfi, A., Demeyer, S., Soetens, Q.D., and Verdonck, T. (2011, January 1\u20134). Comparing Mining Algorithms for Predicting the Severity of a Reported Bug. Proceedings of the 2011 15th European Conference on Software Maintenance and Reengineering, Oldenburg, Germany.","DOI":"10.1109\/CSMR.2011.31"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Menzies, T., and Marcus, A. (October, January 28). Automated Severity Assessment of Software Defect Reports. Proceedings of the 2008 IEEE International Conference Software Maintenance, Beijing, China.","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Alenezi, M., and Banitaan, S. (2013, January 4\u20137). Bug Reports Prioritization: Which Features and Classifier to Use?. Proceedings of the 2013 12th International Conference on Machine Learning and Applications, Miami, FL, USA.","DOI":"10.1109\/ICMLA.2013.114"},{"key":"ref_50","unstructured":"Kanwal, J., and Maqbool, O. (2010, January 22\u201324). Managing open bug repositories through bug report prioritization using SVMs. Proceedings of the International Conference on Open-Source Systems and Technologies, Lahore, Pakistan."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/s11390-012-1230-3","article-title":"Bug prioritization to facilitate bug report triage","volume":"27","author":"Kanwal","year":"2012","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Sharma, M., Bedi, P., Chaturvedi, K.K., and Singh, V.B. (2012, January 27\u201329). Predicting the priority of a reported bug using machine learning techniques and cross project validation. Proceedings of the 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), Kochi, India.","DOI":"10.1109\/ISDA.2012.6416595"},{"key":"ref_53","first-page":"64","article-title":"Measuring the semantic similarity of comments in bug reports","volume":"8","author":"Dit","year":"2008","journal-title":"Proc. 1st Stsm"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"072105","DOI":"10.1007\/s11432-015-0582-8","article-title":"Developer recommendation on bug commenting: A ranking approach for the developer crowd","volume":"60","author":"Xuan","year":"2017","journal-title":"Sci. China Inf. Sci."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/S0377-2217(02)00181-9","article-title":"NHPP software reliability and cost models with testing coverage","volume":"145","author":"Pham","year":"2003","journal-title":"Eur. J. Oper. Res."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Inoue, S., and Yamada, S. (2009, January 8\u201311). Two-dimensional software reliability measurement technologies. Proceedings of the 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, China.","DOI":"10.1109\/IEEM.2009.5373378"},{"key":"ref_57","unstructured":"Kapur, P.K., Garg, R.B., Aggarwal, A.G., and Tandon, A. (2010, January 25\u201326). Two dimensional flexible software reliability growth model and related release policy. Proceedings of the 4th National Conference, INDIACom-2010, New Delhi, India."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Zhang, W., Cui, Y., and Yoshida, T. (2017). En-LDA: An novel approach to automatic bug report assignment with entropy optimized latent dirichletallocation. Entropy, 19.","DOI":"10.3390\/e19050173"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/TSE.2017.2766070","article-title":"Entropy Based Software Reliability Analysis of Multi-Version Open Source Software","volume":"44","author":"Singh","year":"2018","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/j.jvcir.2018.06.021","article-title":"Joint entropy based learning model for image retrieval","volume":"55","author":"Wu","year":"2018","journal-title":"J. Vis. Commun. Image Represent."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/1\/91\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:27:20Z","timestamp":1760185640000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/1\/91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":60,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["e21010091"],"URL":"https:\/\/doi.org\/10.3390\/e21010091","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,19]]}}}