CFP last date
20 December 2024
Reseach Article

An NLP approach for Identification and Detection of Self-admitted Technical Debt: A Review of existing Techniques

by Adelaide Anim-Annor, Fredrick Boafo, Solomon Mensah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 31
Year of Publication: 2023
Authors: Adelaide Anim-Annor, Fredrick Boafo, Solomon Mensah
10.5120/ijca2023923074

Adelaide Anim-Annor, Fredrick Boafo, Solomon Mensah . An NLP approach for Identification and Detection of Self-admitted Technical Debt: A Review of existing Techniques. International Journal of Computer Applications. 185, 31 ( Aug 2023), 38-44. DOI=10.5120/ijca2023923074

@article{ 10.5120/ijca2023923074,
author = { Adelaide Anim-Annor, Fredrick Boafo, Solomon Mensah },
title = { An NLP approach for Identification and Detection of Self-admitted Technical Debt: A Review of existing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 31 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number31/32895-2023923074/ },
doi = { 10.5120/ijca2023923074 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:35.738718+05:30
%A Adelaide Anim-Annor
%A Fredrick Boafo
%A Solomon Mensah
%T An NLP approach for Identification and Detection of Self-admitted Technical Debt: A Review of existing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 31
%P 38-44
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Programmers tend to leave deficient, non-permanent bypass and demented codes that require rework in software development and such phenomenon is referred to as Self-admitted Technical Debt (SATD). Previous studies have shown that SATD is common in released software artefacts and is mostly found in source code comments. SATD negatively affects software project development and incurs high maintenance overheads. In this study, the authors seek to identify plausible approaches utilized by researchers to identify and detect SATD prone tasks in software artefacts prior to release to the market or clients. Accordingly, a literature review is carried out to perform this investigative study. Two popular approaches were found for identifying and detecting SATD prone tasks from a pool of SATD related research papers, namely manual and text mining approach.

References
  1. S. Mensah, J. Keung, J. Svajlenko, K. E. Bennin, and Q. Mi, “On the value of a prioritization scheme for resolving Self-admitted technical debt,” J. Syst. Softw., vol. 135, pp. 37–54, 2018, doi: 10.1016/j.jss.2017.09.026.
  2. A. Potdar and E. Shihab, “An exploratory study on self-admitted technical debt,” Proc. - 30th Int. Conf. Softw. Maint. Evol. ICSME 2014, pp. 91–100, 2014, doi: 10.1109/ICSME.2014.31.
  3. G. Bavota and B. Russo, “A large-scale empirical study on self-admitted technical debt,” Proc. - 13th Work. Conf. Min. Softw. Repos. MSR 2016, pp. 315–326, 2016, doi: 10.1145/2901739.2901742.
  4. W. Cunningham, “The WyCash Portfolio Management System,” 1992.
  5. S. Wehaibi, E. Shihab, and L. Guerrouj, “Examining the impact of self-admitted technical debt on software quality,” 2016 IEEE 23rd Int. Conf. Softw. Anal. Evol. Reengineering, SANER 2016, vol. 1, pp. 179–188, 2016, doi: 10.1109/SANER.2016.72.
  6. Q. Huang, E. Shihab, X. Xia, D. Lo, and S. Li, “Identifying self-admitted technical debt in open source projects using text mining,” Empir. Softw. Eng., vol. 23, no. 1, pp. 418–451, 2018, doi: 10.1007/s10664-017-9522-4.
  7. C. Fern and J. Garbajosa, “A Framework to Aid in Decision Making for Technical Debt Management,” pp. 69–76, 2015.
  8. E. D. S. Maldonado and E. Shihab, “Detecting and quantifying different types of self-admitted technical Debt,” 2015 IEEE 7th Int. Work. Manag. Tech. Debt, MTD 2015 - Proc., pp. 9–15, 2015, doi: 10.1109/MTD.2015.7332619.
  9. S. Maldonado, E. Shihab, and N. Tsantalis, “Using nutural language to Automatically Detect Self-Admitted Technical Debt,” vol. 43, no. 11, pp. 1044–1062, 2017.
  10. J. M. Corbin and A. Strauss, “Grounded theory research: Procedures, canons, and evaluative criteria,” Qual. Sociol., vol. 13, no. 1, pp. 3–21, 1990, doi: 10.1007/BF00988593.
  11. M. C. O. Silva, M. T. Valente, and R. Terra, “Does technical debt lead to the rejection of pull requests?,” SBSI 2016 - 12th Brazilian Symp. Inf. Syst. Inf. Syst. Cloud Comput. Era, Proc., no. ii, pp. 248–254, 2016, doi: 10.5753/sbsi.2016.5969.
  12. F. Zampetti, A. Serebrenik, and M. Di Penta, “Was self-admitted technical debt removal a real removal?: An in-depth perspective,” Proc. - Int. Conf. Softw. Eng., pp. 526–536, 2018, doi: 10.1145/3196398.3196423.
  13. A. Martini and J. Bosch, “Towards Prioritizing Architecture Technical Debt : Information Needs of Architects and Product Owners,” pp. 422–429, 2015, doi: 10.1109/SEAA.2015.78.
  14. S. Akbarinasaji and A. Bener, “Adjusting the Balance Sheet by Appending Technical Debt,” Proc. - 2016 IEEE 8th Int. Work. Manag. Tech. Debt, MTD 2016, pp. 36–39, 2016, doi: 10.1109/MTD.2016.14.
  15. G. Sierra, A. Tahmid, E. Shihab, and N. Tsantalis, “Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences?,” SANER 2019 - Proc. 2019 IEEE 26th Int. Conf. Softw. Anal. Evol. Reengineering, pp. 534–543, 2019, doi: 10.1109/SANER.2019.8667999.
  16. M. Yan, X. Xia, E. Shihab, D. Lo, J. Yin, and X. Yang, “Automating Change-level Self-admitted Technical Debt Determination,” vol. 5589, no. c, pp. 1–18, 2018, doi: 10.1109/TSE.2018.2831232.
  17. B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, “Systematic literature reviews in software engineering - A systematic literature review,” Inf. Softw. Technol., vol. 51, no. 1, pp. 7–15, 2009, doi: 10.1016/j.infsof.2008.09.009.
  18. B. Kitchenham and S. Charters, “Guidelines for performing Systematic Literature Reviews in SE,” pp. 1–44, 2007, doi: 10.1145/1134285.1134500.
  19. F. Sebastiani, “Machine Learning in Automated Text Categorization,” ACM Comput. Surv., vol. 34, no. 1, pp. 1–47, 2002, doi: 10.1145/505282.505283.
  20. D. Toruno, E. Çak, M. C. Ganiz, S. Akyoku, and M. Z. Gürbüz, “Analysis of Preprocessing Methods on Classification of Turkish Texts,” pp. 112–117, 2011.
  21. S. B. Kotsiantis, D. Kanellopoulos, and P. E. Pintelas, “Data Preprocessing for Supervised Leaning,” vol. 1, no. 2, pp. 111–117, 2006.
  22. X. Liu, “Full-Text Citation Analysis : A New Method to Enhance,” J. Am. Soc. Inf. Sci. Technol., vol. 64, no. July, pp. 1852–1863, 2013, doi: 10.1002/asi.
  23. G. Salton, “1988_Salton, G. and Buckley, C., 1988. Term-weighting approaches in automatic text retrieval._7896.pdf.” 1988.
  24. H. Sch, “Introduction to Information Retrieval IIR 8 : Evaluation & Result Summaries Recap Unranked evaluation Ranked evaluation,” Evaluation, 2008.
  25. M. Baena-garc, “TF-SIDF : Term Frequency , Sketched Inverse Document Frequency,” pp. 1044–1049, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Self-admitted Technical Debt Textual indicators Source code comment Lines of Code Text Mining