Research Article

Investigating Tree Family Machine Learning Techniques for a Predictive System to Unveil Software Defects

Table 15

Recall analysis by each TF-ML technique on individual dataset.

TechniqueAR1AR3CM1KC2KC3MW1PC1PC2PC3PC4

CDT0.92560.8730.90080.87050.53850.92950.94690.99590.89960.5909
CS-Forest0.94340.92450.92690.9371?0.94280.95780.99610.95260.8333
DS0.92440.91530.90160.89510.520.93520.93060.99590.8976?
Forest-PA0.9250.90.90140.861500.92290.9380.99590.90010.7143
HT0.92560.90910.90160.864400.92310.93060.99590.89760.75
J480.93860.92730.90440.87320.42860.93370.94520.99590.92120.5615
LMT0.9250.89830.90220.86120.40910.93430.93250.99590.89850.7033
RF0.92370.94640.90550.87270.50.93590.94950.99590.91390.71
RT0.93810.92730.91780.86370.20.93680.95340.9960.91710.454
REP-T0.92560.88520.90060.8490.3750.92460.9470.99590.90110.6186