Defect Prediction in Software Using Predictive Models Based on Historical Data

  • Daniel Czyczyn-EgirdEmail author
  • Adam Slowik
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 801)


Nowadays, there are many methods and good practices in software engineering that aim to provide high quality software. However, despite the efforts of software developers, there are often defects in projects, the removal of which is often associated with a large financial effort and time. The article presents an example approach to defect prediction in IT projects based on prediction models built on historical information and product metrics collected from various data repositories.


Data mining in software Defect prediction models Software metrics 


  1. 1.
    Petersen, K., Wohlin, C.: Software process improvement through the Lean Measurement (LEAM) method. J. Syst. Softw. 83(7), 1275–1287 (2010)CrossRefGoogle Scholar
  2. 2.
    Wojszczyk, R.: Quality assessment of implementation of strategy design pattern. In: Advances in Intelligent Systems and Computing, vol. 620, pp. 37–44. Springer (2018)Google Scholar
  3. 3.
    Ramler, R., Himmelbauer, J.: Building defect prediction models in practice. In: Handbook of Research on Emerging Advancements in Software Engineering, pp. 540–565 (2014)Google Scholar
  4. 4.
    Jureczko, M., Magott, J.: QualitySpy: a framework for monitoring software development processes. J. Theor. Appl. Comput. Sci. 6(1), 35–45 (2012)Google Scholar
  5. 5.
    Jureczko, M. and Contributors: Quality Spy.
  6. 6.
    The Apache Software Foundation, Apache License, Version 2.0.
  7. 7.
  8. 8.
    SVN. Enterprise-class centralized version control.
  9. 9.
    D’Ambros, M., Lanza, M.: Distributed and collaborative software evolution analysis with churrasco. Sci. Comput. Program. 75, 276–287 (2010)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Madeyski, L., Majchrzak, M.: Software Measurement and defect prediction with depress extensible framework. Found. Comput. Decis. Sci. 39(4), 249–270 (2014)CrossRefGoogle Scholar
  11. 11.
    Berthold, M.R., Cebron, N., Dill, F., Gabriel, T.R., Meinl, T., Ohl, P., Sieb, C., Thiel, K., Wiswedel, B.: KNIME: the konstanz information miner. In: Studies in Classification, Data Analysis, and Knowledge Organization (GfKL 2007). Springer (2007)Google Scholar
  12. 12.
    Czyczyn-Egird, D., Wojszczyk, R.: The effectiveness of data mining techniques in the detection of DDoS attacks. In: 14th International Conference on Distributed Computing and Artificial Intelligence, vol. 620, pp. 53–60. Springer (2018)Google Scholar
  13. 13.
    Kazim, A.: A study of software development life cycle process models. Int. J. Adv. Res. Comput. Sci. 8(1) (2017)Google Scholar
  14. 14.
    RebelLabs. Developer Productivity Report 2013 – How Engineering Tools & Practices Impact Software Quality & Delivery. Accessed Feb 2018
  15. 15.
    Slowik, A., Kwasnicka, H.: Nature inspired methods and their industry applications - swarm intelligence algorithms. IEEE Trans. Ind. Inform. 14(3), 1004–1015 (2018)CrossRefGoogle Scholar
  16. 16.
  17. 17.
  18. 18.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Electronics and Computer ScienceKoszalin University of TechnologyKoszalinPoland

Personalised recommendations