Enhanced Bug Priority Prediction via Priority-Sensitive Long Short-Term Memory–Attention Mechanism
Abstract
:1. Introduction
- Feature Extraction: Relevant features, including product and component details, are extracted from bug reports in the repository. Additional priority-specific attributes are identified to enhance predictive accuracy.
- Preprocessing and Model Training: The extracted features are preprocessed and input into the LSTM–Attention model, which combines temporal data analysis capabilities with an Attention mechanism to focus on the most relevant features for priority prediction.
- Priority Prediction: The trained model predicts the priority of each bug report, providing developers and managers with automated recommendations.
- Innovative Algorithm Design: A priority-sensitive LSTM–Attention mechanism was developed and combined with priority-based feature extraction, resulting in enhanced bug priority prediction accuracy.
- Robust Comparative Analysis: Extensive evaluations against diverse baseline models using datasets from Eclipse and Mozilla highlighted the superior performance of the proposed approach, supported by statistical significance.
- Practical Implications: By automating bug priority prediction, the proposed method can enhance developer productivity and enable project managers to allocate resources more effectively, ultimately improving the efficiency of the software development process.
2. Background Knowledge
2.1. Bug Report
2.2. Bug Priority
3. Our Approach
- Preprocessing: Bug reports from the bug repository are preprocessed to ensure consistency and remove irrelevant or noisy data, following established preprocessing techniques [12]. This step standardizes the input data for the subsequent stages of the workflow.
- Feature Extraction: Features relevant to each bug report, such as the product and its components, are extracted from the preprocessed data. This extraction process is guided by the priority of the bug, ensuring that features most indicative of the priority level are selected.
- Priority-Based Feature Selection: The extracted features undergo a priority-based selection process [8], where attributes particularly relevant to distinguishing between priority levels are retained. This step ensures that the model focuses on the most informative features for priority prediction.
- LSTM and Attention Mechanism: The selected features are input into a Long Short-Term Memory (LSTM) network, which captures temporal and sequential patterns in the data. The output of the LSTM network is then passed through an Attention mechanism, which identifies and emphasizes the most critical features for predicting the priority level of the bug.
3.1. Preprocessing
3.2. Feature Selection Algorithm
3.3. LSTM–Attention Algorithm
- Forget Gate: This gate determines which information from the previous step should be discarded. Using a sigmoid activation function, it outputs values between 0 and 1, where 0 represents complete forgetting and 1 indicates full retention of the information.
- Input Gate: This gate decides which new information should be added to the cell state. It utilizes a sigmoid layer to determine the update values and a tanh layer to generate candidate values for integration.
- Cell State Update: The cell state is updated by combining the retained information from the forget gate with the new information from the input gate. This allows the model to dynamically preserve or overwrite information over time.
- Output Gate: The output gate determines the information to pass forward. The updated cell state is processed through a tanh activation function and multiplied by the sigmoid output, producing the final output of the cell.
- Context Vector Calculation: A context vector is computed by taking a weighted sum of the encoder’s hidden states, with the weights determined by an Attention score.
- Dynamic Focus: The attention score for each input element is calculated using a compatibility function, which measures the relevance of the input element to the current decoding step. This ensures that the model emphasizes the most relevant portions of the input sequence.
- Output Generation: The context vector, combined with the decoder’s hidden state, guides the generation of the current output, enabling the model to adaptively utilize information from the input sequence.
- (1)
- Encoder–Decoder Framework
- The input sequence is processed word-by-word by the encoder LSTM, which captures both short-term and long-term dependencies.
- A context vector is generated using the encoder’s hidden states and attention weights.
- (2)
- Attention-Enhanced Decoding
- The decoder LSTM generates the output sequence using the context vector and its own hidden states.
- The attention mechanism dynamically assigns weights to different parts of the input sequence, ensuring that the decoder focuses on the most relevant information at each step.
4. Experimental Result
4.1. Dataset
4.2. Evaluation Metrics
4.3. Baseline
4.4. Research Questions
- RQ1: Does the proposed model predict bug priorities well?
- RQ2: Is the proposed model applicable to bug report priority prediction?
4.5. Results
4.5.1. Result of Our Approach
4.5.2. Comparison Results
- For Eclipse (H10, H20, H30, H40, H50, H60, H70), there is no significant difference between the proposed model and the baseline models (Naïve Bayes, Decision Tree, Random Forest, SVM, CNN, LSTM, and CNN-LSTM).
- For Mozilla (H80, H90, H100, H110, H120, H130, H140), there is no significant difference between the proposed model and the same baseline models.
- H1a, H2a, H3a, H4a, H5a, H6a, and H7a: The proposed model and Naïve Bayes, Decision Tree, Random Forest, SVM, CNN, LSTM, and CNN-LSTM differed for Eclipse.
- H8a, H9a, H10a, H11a, H12a, H13a, and H14a: The proposed model and Naïve Bayes, Decision Tree, Random Forest, SVM, CNN, LSTM, and CNN-LSTM differed for Mozilla.
5. Discussion
5.1. Results
5.2. Threats and Validity
- Internal Validity: The datasets used in this study were derived exclusively from the Eclipse and Mozilla open-source projects. While these datasets are widely recognized and provide a diverse range of bug reports, they may not fully represent the characteristics and complexities of other open-source or enterprise-level software projects. The reliance on specific datasets introduces the possibility that the observed performance improvements may not be generalizable to other contexts.
- External Validity: The study’s findings may face limitations in applicability when they are extended to other domains or projects with different data structures or reporting formats. Many open-source projects have unique ways of structuring and prioritizing bug reports, and proprietary or business-oriented software projects often follow distinct processes for bug tracking and resolution. Additional verification on datasets from other open-source and industrial projects is necessary to confirm the generalizability and robustness of the proposed model.
- Construct Validity: The study assumes that priority-based feature selection effectively captures the most relevant aspects of bug reports for priority prediction. However, this assumption may vary depending on the quality and consistency of the bug reports in different projects. Variability in how bug reports are written, such as the inconsistent use of terminology or incomplete data, could impact the model’s ability to generalize across different datasets.
- Data Imbalance: An imbalance in the distribution of bug report priorities was observed in both the Eclipse and Mozilla datasets, particularly for certain priority levels such as P3 and P5. This imbalance could bias the model’s predictions and limit its ability to accurately represent underrepresented categories. Addressing this issue through techniques such as oversampling, data augmentation, or normalization could enhance the model’s performance and improve its robustness across diverse datasets.
6. Related Work
- Integration of Priority-Based Feature Selection: Many prior works focus solely on textual or emotional features extracted from bug reports. This study incorporates priority-specific feature selection, emphasizing product and component attributes that are often overlooked. By tailoring the feature extraction process to priority levels, the proposed model provides a more focused and relevant input to the prediction framework.
- Hybrid LSTM-Attention Architecture: Unlike models that rely solely on CNNs, RNNs, or traditional ML algorithms, the proposed approach combines LSTM’s capability to capture sequential dependencies with an attention mechanism that dynamically focuses on the most relevant features. This hybrid architecture improves interpretability and prediction accuracy.
- Statistical Validation: While many studies report performance improvements, this study performs rigorous statistical testing to confirm the significance of the results. This ensures that the observed differences between the proposed model and baselines are not due to random variation.
- Comprehensive Evaluation Across Datasets: The proposed model is evaluated on two widely used datasets (Eclipse and Mozilla), showcasing its robustness and generalizability. Many previous studies focus on a single dataset or domain, limiting their applicability.
- Addressing Data Imbalances: The study identifies challenges related to imbalanced priority distributions and highlights potential solutions, such as normalization and resampling, for future improvements. Previous works often overlook these data-related limitations.
- Comparison with Broader Baselines: The study benchmarks the proposed model against a wide range of traditional and deep learning models, including SVM, NB, CNN, LSTM, and CNN-LSTM, providing a holistic assessment of its effectiveness.
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Yang, G.; Zhang, T.; Lee, B. Towards semi-automatic bug triage and severity prediction based on topic model and multi-feature of bug reports. In Proceedings of the 38th IEEE Annual International Computer Software and Applications Conference, Vasteras, Sweden, 21–25 July 2014; pp. 97–106. [Google Scholar]
- Bettenburg, N.; Just, S.; Schröter, A.; Weiß, C.; Premraj, R.; Zimmermann, T. Quality of bug reports in eclipse. In Proceedings of the 2007 OOPSLA Workshop on Eclipse Technology eXchange, Montreal, QC, Canada, 21 October 2007; pp. 21–25. [Google Scholar]
- Banerjee, S.; Helmick, J.; Syed, Z.; Cukic, B. Eclipse vs. Mozilla: A comparison of two large-scale open source problem report repositories. In Proceedings of the 2015 IEEE 16th International Symposium on High Assurance Systems Engineering, Daytona Beach Shores, FL, USA, 8–10 January 2015; pp. 263–270. [Google Scholar]
- Zhou, C.Y.; Zeng, C.; He, P. An Exploratory Study of Bug Prioritization and Severity Prediction based on Source Code Features. In Proceedings of the International Conference on Software Engineering and Knowledge Engineering, Pittsburgh, PA, USA, 1–10 July 2022. [Google Scholar]
- Shatnawi, M.Q.; Alazzam, B. An Assessment of Eclipse Bugs’ Priority and Severity Prediction Using Machine Learning. Int. J. Commun. Networks Inf. Secur. 2022, 14, 62–69. [Google Scholar] [CrossRef]
- Pasikanti, N.; Kawaf, C. Bugs Prioritization in Software Engineering: A Systematic Literature Review on Techniques and Methods. Bachelor’s Thesis, Linnaeus University, Växjö, Sweden, 2022. [Google Scholar]
- Kim, S.; Kang, M. Financial series prediction using Attention LSTM. arXiv 2019, arXiv:1902.10877. [Google Scholar]
- Shang, W.; Huang, H.; Zhu, H.; Lin, Y.; Qu, Y.; Wang, Z. A novel feature selection algorithm for text categorization. Expert Syst. Appl. 2007, 33, 1–5. [Google Scholar] [CrossRef]
- Gravetter, F.J.; Wallnau, L.B. Introduction to the t statistic. Essent. Stat. Behav. Sci. 2014, 8, 252. [Google Scholar]
- Rosner, B.; Glynn, R.J.; Lee, M.L.T. The Wilcoxon signed rank test for paired comparisons of clustered data. Biometrics 2006, 62, 185–192. [Google Scholar] [CrossRef] [PubMed]
- Android #240016030. Available online: https://issuetracker.google.com/issues/240016030 (accessed on 1 January 2025).
- Kao, A.; Poteet, S.R. Natural Language Processing and Text Mining; Springer: Cham, Switzerland, 2007. [Google Scholar]
- Goutte, C.; Gaussier, E. A Probabilistic Interpretation of Precision, Recall and F-Score, with Implication for Evaluation. In Advances in Information Retrieval; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3408, pp. 345–359. [Google Scholar]
- Zhou, J.; Zhang, H.; Lo, D. Where Should the Bugs Be Fixed? More Accurate Information Retrieval-Based Bug Localization Based on Bug Reports. In Proceedings of the 2012 34th International Conference on Software Engineering, Zurich, Switzerland, 2–9 June 2012; pp. 14–24. [Google Scholar]
- Sharma, M.; Bedi, P.; Chaturvedi, K.K.; Singh, V.B. Predicting the priority of a reported bug using machine learning techniques and cross project validation. In Proceedings of the 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), Kochi, India, 27–29 November 2012; pp. 539–545. [Google Scholar]
- Alenezi, M.; Banitaan, S. Bug reports prioritization: Which features and classifier to use? In Proceedings of the 2013 12th International Conference on Machine Learning and Applications, Miami, FL, USA, 4–7 December 2013; Volume 2, pp. 112–116. [Google Scholar]
- Zhang, J.; Li, Y.; Tian, J.; Li, T. LSTM-CNN hybrid model for text classification. In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 October 2018; pp. 1675–1680. [Google Scholar]
- González-Estrada, E.; Cosmes, W. Shapiro–Wilk test for skew normal distributions based on data transformations. J. Stat. Comput. Simul. 2019, 89, 3258–3272. [Google Scholar] [CrossRef]
- Rathnayake, R.M.D.S.; Kumara, B.T.G.S.; Ekanayake, E.M.U.W.J.B. CNN-Based Priority Prediction of Bug Reports. In Proceedings of the 2021 International Conference on Decision Aid Sciences and Application (DASA), Sakheer, Bahrain, 7–8 December 2021; pp. 299–303. [Google Scholar]
- Umer, Q.; Liu, H.; Sultan, Y. Emotion based automated priority prediction for bug reports. IEEE Access 2018, 6, 35743–35752. [Google Scholar] [CrossRef]
- Choudhary, P.A.; Singh, S. Neural network-based bug priority prediction model using text classification techniques. Adv. Res. Comput. Sci. 2017, 8, 1315–1319. [Google Scholar]
- Yu, L.; Tsai, W.T.; Zhao, W.; Wu, F. Predicting defect priority based on neural networks. In Proceedings of the International Conference on Advanced Data Mining and Applications, Chongqing, China, 19–21 November 2010; pp. 356–367. [Google Scholar]
- Kanwal, J.; Maqbool, O. Bug prioritization to facilitate bug report triage. J. Comput. Sci. Technol. 2012, 27, 397–412. [Google Scholar] [CrossRef]
- Tian, Y.; Lo, D.; Sun, C. Drone: Predicting priority of reported bugs by multi-factor analysis. In Proceedings of the IEEE International Conference on Software Maintenance, Eindhoven, The Netherlands, 22–28 September 2013; pp. 200–209. [Google Scholar]
- Bani-Salameh, H.; Sallam, M. A deep-learning-based bug priority prediction using RNN-LSTM neural networks. e-Inform. Softw. Eng. 2021, 15. [Google Scholar]
- Kumari, M.; Singh, V.B. An improved classifier based on entropy and deep learning for bug priority prediction. In Proceedings of the IEEE International Conference on Intelligent Systems Design and Applications (ISDA), Vellore, India, 6–8 December 2018; pp. 571–580. [Google Scholar]
- Pushpalatha, M.N.; Mrunalini, M.; Bista, S.R. Predicting the priority of bug reports using classification algorithms. Indian J. Comput. Sci. Eng. 2020, 11, 811–818. [Google Scholar]
- Ahmed, H.A.; Bawany, N.Z.; Shamsi, J.A. Capbug-a framework for automatic bug categorization and prioritization using nlp and machine learning algorithms. IEEE Access 2021, 9, 50496–50512. [Google Scholar] [CrossRef]
- Fang, S.; Tan, Y.S.; Zhang, T.; Xu, Z.; Liu, H. Effective prediction of bug-fixing priority via weighted graph convolutional networks. IEEE Trans. Reliab. 2021, 70, 563–574. [Google Scholar] [CrossRef]
- Malhotra, R.; Dabas, A.; Hariharasudhan, A.S.; Pant, M. A study on machine learning applied to software bug priority prediction. In Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 28–29 January 2021; pp. 965–970. [Google Scholar]
- Zhang, W.; Challis, C. Automatic bug priority prediction using DNN based regression. In Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery; Springer: Berlin/Heidelberg, Germany, 2019; pp. 333–340. [Google Scholar]
- Umer, Q.; Liu, H.; Illahi, I. CNN-based automatic prioritization of bug reports. IEEE Trans. Reliab. 2019, 69, 1341–1354. [Google Scholar] [CrossRef]
- Huang, Z.; Shao, Z.; Fan, G.; Yu, H.; Yang, K.; Zhou, Z. Bug Report Priority Prediction Using Developer-Oriented Socio-Technical Features. In Proceedings of the 13th Asia-Pacific Symposium on Internetware, Hohhot, China, 11–12 June 2012; pp. 202–211. [Google Scholar]
- Wang, Y.; He, T.; Zhang, W.; Fang, C.; Luo, B. Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization. In Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, San Francisco, CA, USA, 1–3 July 2016; pp. 179–184. [Google Scholar]
- Pecorelli, F.; Palomba, F.; Khomh, F.; De Lucia, A. Developer-driven code smell prioritization. In Proceedings of the 17th International Conference on Mining Software Repositories, Seoul, Republic of Korea, 29–30 June 2020; pp. 220–231. [Google Scholar]
- Zhou, L.; He, Q.; Tu, W.; Du, J.; Zhang, S.; Li, Q.; Zhang, X.; Guan, D. A Heterogeneous Streaming Vehicle Data Access Model for Diverse IoT Sensor Monitoring Network Management. IEEE Internet Things J. 2024, 11, 26929–26943. [Google Scholar] [CrossRef]
- Zhou, L.; Tu, W.; Wang, C.; Li, Q. A Heterogeneous Access Metamodel for Efficient IoT Remote Sensing Observation Management: Taking Precision Agriculture as an Example. IEEE Internet Things J. 2021, 9, 8616–8632. [Google Scholar] [CrossRef]
- Zhou, L.; Li, Q.; Tu, W.; Wang, C. A Heterogeneous Key Performance Indicator Metadata Model for Air Quality Monitoring in Sustainable Cities. Environ. Model. Softw. 2021, 136, 104955. [Google Scholar] [CrossRef]
Hypothesis | p-Value | Result |
---|---|---|
H10 | (Wilcox test) 0.001953 | H1a: Accept |
H20 | (t-test) 4.222 × 10−16 | H2a: Accept |
H30 | (t-test) 3.619 × 10−12 | H3a: Accept |
H40 | (Wilcox test) 0.001953 | H4a: Accept |
H50 | (t-test) 1.657 × 10−12 | H5a: Accept |
H60 | (t-test) 1.579 × 10−12 | H6a: Accept |
H70 | (t-test) 4.366 × 10−13 | H7a: Accept |
H80 | (t-test) 1.411 × 10−8 | H8a: Accept |
H90 | (t-test) 7.015 × 10−14 | H9a: Accept |
H100 | (t-test) 1.015 × 10−11 | H10a: Accept |
H110 | (t-test) 3.826 × 10−10 | H11a: Accept |
H120 | (t-test) 4.66 × 10−10 | H12a: Accept |
H130 | (t-test) 4.497 × 10−12 | H13a: Accept |
H140 | (t-test) 2.158 × 10−10 | H14a: Accept |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, G.; Ji, J.; Kim, J. Enhanced Bug Priority Prediction via Priority-Sensitive Long Short-Term Memory–Attention Mechanism. Appl. Sci. 2025, 15, 633. https://doi.org/10.3390/app15020633
Yang G, Ji J, Kim J. Enhanced Bug Priority Prediction via Priority-Sensitive Long Short-Term Memory–Attention Mechanism. Applied Sciences. 2025; 15(2):633. https://doi.org/10.3390/app15020633
Chicago/Turabian StyleYang, Geunseok, Jinfeng Ji, and Jaehee Kim. 2025. "Enhanced Bug Priority Prediction via Priority-Sensitive Long Short-Term Memory–Attention Mechanism" Applied Sciences 15, no. 2: 633. https://doi.org/10.3390/app15020633
APA StyleYang, G., Ji, J., & Kim, J. (2025). Enhanced Bug Priority Prediction via Priority-Sensitive Long Short-Term Memory–Attention Mechanism. Applied Sciences, 15(2), 633. https://doi.org/10.3390/app15020633