{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T11:39:20Z","timestamp":1725017960797},"reference-count":53,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET softw."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1049\/iet-sen.2019.0290","type":"journal-article","created":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T02:27:58Z","timestamp":1587781678000},"page":"213-220","source":"Crossref","is-referenced-by-count":4,"title":["Discovering software developer's coding expertise through deep learning"],"prefix":"10.1049","volume":"14","author":[{"given":"Farooq","family":"Javeed","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Technology University of Sargodha Sargodha Pakistan"}]},{"given":"Ansar","family":"Siddique","sequence":"additional","affiliation":[{"name":"Department of Software Engineering University of Gujrat Gujrat Pakistan"}]},{"given":"Akhtar","family":"Munir","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology University of Sargodha Sargodha Pakistan"}]},{"given":"Basit","family":"Shehzad","sequence":"additional","affiliation":[{"name":"Department of Software Engineering National University of Modern Languages Islamabad Pakistan"}]},{"given":"Muhammad I.U.","family":"Lali","sequence":"additional","affiliation":[{"name":"Department of Information Sciences, Division of Science and Technology University of Education Lahore Pakistan"}]}],"member":"265","published-online":{"date-parts":[[2020,6]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"crossref","unstructured":"Kong R. Wong G.K.W.: \u2018Teachers' perception of professional development in coding education\u2019.2017 IEEE 6th Int. Conf. on Teaching Assessment and Learning for Engineering (TALE) Tai Po Hong Kong 2017","DOI":"10.1109\/TALE.2017.8252365"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/itdj.20020"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijksr.2014010107"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(09)01206-6"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"Shahrokni A. Feldt R.: \u2018A systematic review of software robustness\u2019 Inf. Softw. Technol. 2013 55 (1) pp.1\u201317","DOI":"10.1016\/j.infsof.2012.06.002"},{"issue":"6","key":"e_1_2_7_7_1","first-page":"1547","article-title":"Risk management approaches for large scale software development","volume":"33","author":"Bakhsh S.T.","year":"2017","journal-title":"J. Inf. Sci. Eng."},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9144-9"},{"key":"e_1_2_7_9_1","doi-asserted-by":"crossref","unstructured":"Scanniello G. Romano S. Fucci D. et al.: \u2018Students' and professionals' perceptions of test-driven development: a focus group study\u2019.Proc. of the 31st Annual ACM Symp. on Applied Computing Pisa Italy 2016","DOI":"10.1145\/2851613.2851778"},{"key":"e_1_2_7_10_1","first-page":"8","volume-title":"The perils of ignoring software development","author":"And\u00e9n P.","year":"2014"},{"key":"e_1_2_7_11_1","article-title":"A theory on individual characteristics of successful coding challenge solvers","volume":"5","author":"Wyrich M.","year":"2019","journal-title":"Peer J. Comput. Sci."},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"Lee S.H. Matteson A. Hooshyar D. et al.: \u2018Comparing programming language comprehension between novice and expert programmers using EEG analysis\u2019.2016 IEEE 16th Int. Conf. on Bioinformatics and Bioengineering (BIBE) Taichung Taiwan 2016","DOI":"10.1109\/BIBE.2016.30"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","unstructured":"Ichinco M. Zemach A. Kelleher C.: \u2018Towards generalizing expert programmers' suggestions for novice programmers\u2019.2013 IEEE Symp. on Visual Languages and Human Centric Computing San Jose CA USA 2013","DOI":"10.1109\/VLHCC.2013.6645259"},{"key":"e_1_2_7_14_1","first-page":"101","volume-title":"Evaluating methods and technologies in software engineering with respect to developers\u2019 skill level","author":"Bergersen G.R.","year":"2012"},{"key":"e_1_2_7_15_1","unstructured":"Bengio Y.: \u2018Deep learning of representations for unsupervised and transfer learning\u2019.Proc. of ICML Workshop on Unsupervised and Transfer Learning Edinburgh Scotland Jun 272012 pp.17\u201336"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"Ertam F.: \u2018Deep learning based text classification with web scraping methods\u2019.2018 Int. Conf. on Artificial Intelligence and Data Processing (IDAP) Malatya 2018","DOI":"10.1109\/IDAP.2018.8620790"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","unstructured":"Alwehaibi A. Roy K.: \u2018Comparison of pre-trained word vectors for Arabic text classification using deep learning approach\u2019.2018 17th IEEE Int. Conf. on Machine Learning and Applications (ICMLA) Florida USA 2018","DOI":"10.1109\/ICMLA.2018.00239"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"Lingzi X. Zhi L.: \u2018An overview of source code audit\u2019.2015 Int. Conf. on Industrial Informatics-Computing Technology Intelligent Technology Industrial Information Integration Wuhan China 2015","DOI":"10.1109\/ICIICII.2015.94"},{"issue":"3","key":"e_1_2_7_19_1","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/IDD-03-2017-0023","article-title":"Discovery and classification of user interests on social media","volume":"45","author":"Shahzad B.","year":"2017","journal-title":"Inf. Discovery Deliv."},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.vol30no1.5"},{"issue":"6","key":"e_1_2_7_21_1","first-page":"1465","article-title":"Identification of patterns in failure of software projects","volume":"33","author":"Shehzad B.","year":"2017","journal-title":"J. Inf. Sci. Eng."},{"issue":"5","key":"e_1_2_7_22_1","first-page":"27","article-title":"Source code author attribution using author's programming style and code smells","volume":"9","author":"Gull M.","year":"2017","journal-title":"Int. J. Intel. Syst. Appl."},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","unstructured":"Fokaefs M. Tsantalis N. Chatzigeorgiou A.: \u2018JDeodorant: identification and removal of feature envy bad smells. Software maintenance\u2019.ICSM 2007 IEEE Int. Conf. Paris 2007 pp.519\u2013520","DOI":"10.1109\/ICSM.2007.4362679"},{"key":"e_1_2_7_24_1","doi-asserted-by":"crossref","unstructured":"Sangeetha M. Sengottuvelan P.: \u2018Systematic exhortation of code smell detection using JSmell for java source code\u2019.2017 Int. Conf. on Inventive Systems and Control (ICISC) Coimbatore India 2017","DOI":"10.1109\/ICISC.2017.8068719"},{"issue":"2","key":"e_1_2_7_25_1","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s11219-017-9364-8","article-title":"Recognising object-oriented software design quality: a practitioner-based questionnaire survey","volume":"26","author":"Stevenson J.","year":"2018","journal-title":"Softw. Qual. J."},{"key":"e_1_2_7_26_1","doi-asserted-by":"crossref","unstructured":"Vizarreta P. Trivedi K. Helvik B. et al.: \u2018An empirical study of software reliability in SDN controllers\u2019.2017 13th Int. Conf. on Network and Service Management (CNSM) Tokyo Japan 2017","DOI":"10.23919\/CNSM.2017.8256002"},{"key":"e_1_2_7_27_1","unstructured":"Parizi R.M. Qian K. Shahriar H. et al.: \u2018Benchmark requirements for assessing software security vulnerability testing tools\u2019.2018 IEEE 42nd Annual Computer Software and Applications Conf. (COMPSAC) Tokyo Japan vol. 1 2018"},{"key":"e_1_2_7_28_1","unstructured":"PMD: Available athttp:\/\/pmd.sourceforge.net\/"},{"key":"e_1_2_7_29_1","unstructured":"StyleCop: Available athttp:\/\/stylecop.codeplex.com\/"},{"key":"e_1_2_7_30_1","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Munoz J. Garc\u00eda-Valls M. Escribano-Barreno J.: \u2018Improved metrics handling in SonarQube for software quality monitoring. InDistributed computing and artificial intelligence\u2019.13th Int. Conf. Springer Cham Switzerland 2016 pp.463\u2013470","DOI":"10.1007\/978-3-319-40162-1_50"},{"key":"e_1_2_7_31_1","doi-asserted-by":"crossref","unstructured":"Feigenspan J. K\u00e4stner C. Liebig J. et al.: \u2018Measuring programming experience\u2019.2012 20th IEEE Int. Conf. on Program Comprehension (ICPC) Passau Bavaria Germany 2012","DOI":"10.1109\/ICPC.2012.6240511"},{"key":"e_1_2_7_32_1","doi-asserted-by":"crossref","unstructured":"Rejab M.M. Noble J. Allan G.: \u2018Locating expertise in agile software development projects\u2019.Int. Conf. on Agile Software Development Springer Cham Switzerland 2014","DOI":"10.1109\/AGILE.2014.16"},{"key":"e_1_2_7_33_1","unstructured":"Bergersen G.R.: \u2018Measuring programming skill-construction and validation of an instrument for evaluating java developers\u2019. PhD thesis University of Oslo 2015 http:\/\/hdl.handle.net\/10852\/48583"},{"key":"e_1_2_7_34_1","doi-asserted-by":"crossref","unstructured":"Baltes S. Diehl S.: \u2018Towards a theory of software development expertise\u2019.Proc. of the 2018 26th ACM Joint Meeting on European Software Engineering Conf. and Symp. on the Foundations of Software Engineering Lake Buena Vista FL USA 2018 pp.187\u2013200","DOI":"10.1145\/3236024.3236061"},{"key":"e_1_2_7_35_1","unstructured":"Available athttp:\/\/groups.inf.ed.ac.uk\/cup\/javaGithub\/"},{"key":"e_1_2_7_36_1","unstructured":"Available athttps:\/\/cwe.mitre.org\/top25\/archive\/2019\/2019_cwe_top25.html"},{"key":"e_1_2_7_37_1","unstructured":"Available athttps:\/\/www.sans.org\/top25-software-errors\/"},{"key":"e_1_2_7_38_1","unstructured":"Available athttps:\/\/owasp.org\/www-project-topten\/OWASP_Top_Ten_2017\/Top_10-2017_Top_10.html"},{"issue":"1","key":"e_1_2_7_39_1","first-page":"34","article-title":"Reliability issues in open source software","volume":"34","author":"Pandey R.K.","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_7_40_1","unstructured":"SonarQube: Available athttps:\/\/docs.sonarqube.org\/latest\/userguide\/metric-definitions\/"},{"key":"e_1_2_7_41_1","doi-asserted-by":"crossref","unstructured":"Correia J.P. Kanellopoulos Y. Visser J.: \u2018A survey-based study of the mapping of system properties to ISO\/IEC 9126\u00a0maintainability characteristics\u2019.2009 IEEE Int. Conf. on Software Maintenance Alberta Canada 2009","DOI":"10.1109\/ICSM.2009.5306346"},{"key":"e_1_2_7_42_1","doi-asserted-by":"crossref","unstructured":"Stegeman M. Barendsen E. Smetsers S.: \u2018Towards an empirically validated model for assessment of code quality\u2019.Proc. of the 14th Koli Calling Int. Conf. on Computing Education Research ACM Koli Finland 2014","DOI":"10.1145\/2674683.2674702"},{"key":"e_1_2_7_43_1","unstructured":"Chhabra J.K.: \u2018Code cognitive complexity: a new measure\u2019.Proc. of the World Congress on Engineering Imperial College London London 2011 vol. 2 pp.6\u20138"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.106988"},{"key":"e_1_2_7_45_1","unstructured":"Available athttps:\/\/github.com\/Akhtar-Munir\/Developer-level-detect\/ tree\/master\/Convolution1D"},{"key":"e_1_2_7_46_1","doi-asserted-by":"crossref","unstructured":"Dike H.U. Zhou Y. Deveerasetty K.K. et al.: \u2018Unsupervised learning based on artificial neural network: a review\u2019.2018 IEEE Int. Conf. on Cyborg and Bionic Systems (CBS) Shenzhen China 2018","DOI":"10.1109\/CBS.2018.8612259"},{"key":"e_1_2_7_47_1","doi-asserted-by":"crossref","unstructured":"Eykholt K. Evtimov I. Fernandes E. et al.: \u2018Robust physical-world attacks on deep learning visual classification\u2019.Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition Salt Lake City UT USA 2018 pp.1625\u20131634","DOI":"10.1109\/CVPR.2018.00175"},{"issue":"3","key":"e_1_2_7_48_1","first-page":"197","article-title":"Deep learning: methods and applications","volume":"7","author":"Li D.","year":"2014","journal-title":"Found. Trends\u00ae in Signal Process."},{"key":"e_1_2_7_49_1","unstructured":"Available athttps:\/\/towardsdatascience.com\/understanding-lstm-and-its-quick-implementation-in-keras-for-sentiment-analysis-af410fd85b47"},{"key":"e_1_2_7_50_1","unstructured":"LSTM: Available athttps:\/\/pathmind.com\/wiki\/lstm"},{"key":"e_1_2_7_51_1","unstructured":"LSTM: Available athttp:\/\/colah.github.io\/posts\/2015-08-Understanding-LSTMs\/"},{"key":"e_1_2_7_52_1","doi-asserted-by":"crossref","unstructured":"Jacovi A. Shalom O.S. Goldberg Y.: \u2018Understanding convolutional neural networks for text classification\u2019. arXiv preprint arXiv:1809.08037 2018","DOI":"10.18653\/v1\/W18-5408"},{"key":"e_1_2_7_53_1","unstructured":"Hadji I. Wildes R.P.: \u2018What do we understand about convolutional networks?\u2019. arXiv preprint arXiv:1803.08834 2018"},{"key":"e_1_2_7_54_1","unstructured":"Available athttps:\/\/github.com\/Akhtar-Munir\/Developer-level-detect"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2019.0290","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-sen.2019.0290","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2019.0290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T15:42:57Z","timestamp":1612626177000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-sen.2019.0290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["10.1049\/iet-sen.2019.0290"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2019.0290","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}