Research Article

Investigating Tree Family Machine Learning Techniques for a Predictive System to Unveil Software Defects

Table 13

Specificity analysis by each TF-ML technique on individual dataset.

TechniqueAR1AR3CM1KC2KC3MW1PC1PC2PC3PC4

CDT??00.60980.83980.50.5714?0.26320.9162
CS-Forest0.20.40.24320.49420.81440.27780.38200.16670.35870.8898
DS00.75?0.50380.86390.3530???0.8779
Forest-PA00.666700.65670.811500.6923?0.45450.9109
HT?0.375?0.63890.8135????0.8814
J480.28570.50.17650.55210.85540.45460.5455?0.43690.9426
LMT00.50.14290.70490.8430.71430.230800.18750.9166
RF00.71430.27270.6220.83150.46150.5897?0.55560.9212
RT0.250.50.21670.53930.81760.20510.3620.04170.28290.9229
REP-T?0.500.58460.83150.20.5882?0.43750.9216