Research Article
Investigating Tree Family Machine Learning Techniques for a Predictive System to Unveil Software Defects
Table 5
Incorrectly classified instances analysis by each TF-ML technique on individual dataset.
| | Technique | AR1 | AR3 | CM1 | KC2 | KC3 | MW1 | PC1 | PC2 | PC3 | PC4 |
| | CDT | 9 | 8 | 53 | 89 | 35 | 31 | 72 | 23 | 169 | 158 | | CS-Forest | 18 | 10 | 87 | 109 | 36 | 47 | 98 | 27 | 238 | 162 | | DS | 11 | 6 | 49 | 106 | 35 | 36 | 77 | 23 | 160 | 178 | | Forest-PA | 10 | 7 | 50 | 86 | 39 | 32 | 72 | 23 | 161 | 145 | | HT | 9 | 10 | 49 | 87 | 37 | 31 | 77 | 23 | 160 | 174 | | J48 | 12 | 8 | 60 | 97 | 40 | 32 | 74 | 23 | 173 | 155 | | LMT | 10 | 8 | 54 | 82 | 40 | 25 | 84 | 24 | 170 | 141 | | RF | 12 | 5 | 54 | 87 | 36 | 32 | 70 | 23 | 154 | 136 | | RT | 13 | 8 | 83 | 100 | 57 | 54 | 99 | 45 | 226 | 194 | | REP-T | 9 | 8 | 54 | 96 | 40 | 34 | 71 | 23 | 162 | 150 |
|
|