Bug Tracking System Report
Bug Tracking System Report
Guide:
This is to certify that the major project-1 entitled “Bug Tracking System”,
Group No. 24 of
Sr. No. Name of the Student IEN No.
Grade Obtained:
Date:
Place:
New Horizon Institute of Technology and Management
University of Mumbai
Department of Computer Engineering
Grade Obtained:
Date:
Place:
NEW HORIZON INSTITUTE OF
TECHNOLOGY AND MANAGEMENT
THANE
CERTIFICATE
This is to certify that the project entitled “Bug Tracking System” is a bonafied
work of “(Isha Thakkar, 12022015) , (Shreyas Pandhare, 12012022), (Jayesh
Shinde, 12022003)” submitted to the University of Mumbai in partial
fulfillment of the requirement for the award of the degree of Bachelor of
Engineering in Computer Engineering .
______________
Mrs. Indira Joshi
Guide
_____________ _______________
Date:
Place:
Declaration
-----------------------------------------
-----------------------------------------
-----------------------------------------
Date:
Abstract
For many years, bug-tracking mechanism is employed only in some of the large software
development houses. Most of the others never bothered with bug tracking at all, and instead
simply relied on shared lists and email to monitor the status of defects.
This procedure is error-prone and tends to cause those bugs judged least significant by
developers to be dropped or ignored. Bug Tracking System is an ideal solution to track the
bugs of a product, solution or an application.
We would like to express special thanks of gratitude to our guide Mrs. Indira Joshi as
well as our Project Coordinator Dr. S.Brinthakumari who gave us the golden opportunity
to do this wonderful project on the topic of Bug Tracking System which also helped us
in doing a lot of research and we came to know about so many new things. We are very
grateful to our Head of the Department Dr. Sanjay Sharma for extending her help directly
and indirectly through various channels in our project work. We would also like to
thank Principal Dr. Prashant Deshmukh for providing us the opportunity to implement
our project. We are really thankful to them. Finally we would also like to thank our
parents and friends who helped us a lot in finalizing this project within the limited time
frame.
Thanking You.
Table of Content
Certificate i
Approval Sheet ii
Declaration iii
Acknowledgement iv
List of Figures v
Abstract vi
1. Introduction 11
2. Literature Survey 12
3. Problem Statement, Objective and Scope 13
4. Proposed System 14
4.1 Analysis/Framework/ Algorithm
4.2 Design details
4.3 Methodology
5. Experimental Set up 16
4.1 Dataset
4.2 Performance Evaluation Metrics
4.3 Software and Hardware Setup
6. Implementation 20
7. References 21
List of Figures
Fig No Topic Page No
4.3 Methodology 15
Chapter 1
Introduction
The “Bug Tracking System” has been developed to override the problems prevailing in the
practicing manual system. This software is supported to eliminate and in some cases reduce
the hardships faced by this existing system. Moreover this system is designed for the
particular need of the company to carry out operations in a smooth and effective manner.
This application is reduced as much as possible to avoid errors while entering the data. It
also provides error message while entering invalid data. No formal knowledge is needed for
the user to use this system. Thus by this all it proves it is user-friendly. Bug Tracking
System, as described above, can lead to error free, secure, reliable and fast management
system. It can assist the user to concentrate on their other activities rather to concentrate on
the record keeping. Thus it will help organization in better utilization of resources. Every
software organization, whether big or small, has challenges to overcome and managing the
information of Project, Bug, Tester, Bug Category and Bug Type.
Bug Tracking System is the system which enables to detect the bugs. It not merely detects
the bugs but provides the complete information regarding bugs detected. Bug Tracking
System ensures the user of it who needs to know about a provide information regarding the
identified bug. Using this no bug will be unfixed in the developed application. The
developer develops the project as per customer requirements. In the testing phase the
tester will identify the bugs. Whenever the tester encounters number of bugs he adds
the bug id and information in the database. The tester reports to both project manager and
developer.
The bug details in the database table are accessible to both project manager and developer.
When a customer puts request or orders for a product to be developed. The project
manager is responsible for adding users to Bus Tracking System and assigning
projects to the users. The project manager itself assigns the developed applications to the
Testers for testing. The tester tests the application and identify the bugs in the application.
When the tester encounter no. of bugs, he generates a unique id number for each
individual bug. The bug information along with its id are mailed to the project manager
and developer. This is Bug Report. These are stored in the database. This is useful for
further reference. Bug information includes the bug id, bug name, bug priority, project
name, bug location, bug type. This whole process continues until all the bugs are got fixed
in the application. The bug report is mailed to the project manager and the developer as
soon as the bug is identified. This makes that no error will go unfixed because of poor
communication. It makes ensure that anyone who needs to know about a bug can learn of it
soon after it is reported. The Bug Tracking System maintains the different users separately
i.e., it provides separate environments for project manager, developer and tester.
Chapter 2
Literature Survey
• “Hinglish Profanity Filter and Hate Speech Detection”, written by Nirali Arora, Aartem
Singh, Laik Shaikh, Mawrah Khan,Yash Devadiga-2023.Hate speech could be defined as
any speech that targets a group of people based on race, religion, ethnicity, nationality,
sexual orientation, or gender. Hate speech is used to propagate violence. It can be used to
threaten people. It can cause people to feel anxious.
• “Profanity detection in social media text using a hybrid approach of NLP and machine
learning”, written by Raktim Chatterjee,Sukanya Bhattacharya, Soumyajeet Kabi-2021.
In the current digital world, Social Media is a place to find news, friendly chat and
meaningful information or breaking news. It also has some drawbacks because it is a
forum for some users for knee-jerk reactions, trolls and persecution and that can be listed
under the label of “Profanes”.
• “Profane or Not: Improving Korean Profane Detection using Deep Learning.”, written by
Jiyoung Woo; Sung Hee Park; Huy Kang Kim-2022. Abusive behaviors have become a
common issue in many online social media platforms. Profanity is common form of
abusive behavior in online.
To develop a machine learning model for detecting and filtering out profane words and
hate speech for Hindi language.
3.2 Objective:
• Filter Profanity: The primary objective of our system is to filter out profane and
offensive language from user-generated content. This will help maintain a respectful
• Detect Hate Speech: The system will also aim to identify and flag hate speech,
discriminatory language, and harmful content. By doing so, it will contribute to
reducing the dissemination of harmful ideologies and fostering healthier online
interactions.
3.3 Scope:
• Machine Learning Models: The system will employ machine learning models to
identify hate speech patterns. These models will be trained on a diverse dataset
of hate speech examples, enabling them to recognize variations of hate speech.
Chapter 4: Proposed System
4.1 Algorithm
Naive Bayes is a probabilistic machine learning algorithm that assumes that the
presence of a particular feature in a class is unrelated to the presence of any other
feature. Despite its "naive" assumption, it has proven to be effective in text
classification tasks and is known for its simplicity and speed.
Algorithm:
Step 1: Data Preprocessing - Clean and preprocess the text data, including tokenization
and removing stop words.
Step 2: Feature Extraction - Convert the text data into numerical feature vectors using
techniques like bag-of-words or TF-IDF.
Step 3: Training the Model - Use the labeled dataset to train the Naive Bayes model and
the SVM Model considering the conditional probability of features given the class labels.
Step 4: Model Evaluation - Evaluate the model's performance using metrics such as
accuracy, precision, recall, and F1 score on a separate test dataset.
Step 5: Model Deployment - Deploy the trained model to predict whether new text data
contains profanity or hate speech.
4.3 Methodology
Fig 4.3
5.1 Dataset
Hindi Bad Words
Fig 5.1.1
Fig 5.1.2
Hindi Hate Speech:
Fig 5.1.3
Fig 5.1.4
5.2 Performance Evaluation Metrics.
• Accuracy and Precision: Measure the overall accuracy of the model in correctly
identifying and filtering out profane words and hate speech. Precision provides insights
into the proportion of correctly identified instances among all the instances predicted as
positive.
• Recall and F1 Score: Assess the system's ability to detect all relevant instances of
profanity and hate speech. Recall helps to understand the proportion of correctly
identified instances of positive cases out of all actual positive cases. F1 score provides a
balance between precision and recall, offering a comprehensive assessment of the
model's performance.
• Confusion Matrix Analysis: Analyze the confusion matrix to gain insights into the true
positives, true negatives, false positives, and false negatives, providing a comprehensive
overview of the model's predictive capabilities.
Software Requirements:
Programming Language: Python, along with libraries such as Flask and NLTK (Natural
Language Toolkit) or spaCy for natural language processing tasks.
Data Collection and Preprocessing Tools: Tools for data scraping, data cleaning, and text
preprocessing. Pandas for data manipulation, and NumPy for numerical computations.
Hardware Requirements:
Processor: i3/i5/i7
Fig 6.1
Stage 2
Fig 6.2
Chapter 7
References
1. Hinglish Profanity Filter and Hate Speech Detection,Nirali Arora, Aartem Singh, Laik
Shaikh, Mawrah Khan,Yash Devadiga-2023
2. Profanity detection in social media text using a hybrid approach of NLP and machine
learning, Raktim Chatterjee,Sukanya Bhattacharya, Soumyajeet Kabi-2021
4. Profane or Not: Improving Korean Profane Detection using Deep Learning, Jiyoung
Woo; Sung Hee Park; Huy Kang Kim-2022
5. Elisabeth Métais et al., “Natural Language Processing and Information Systems,” 26th
International Conference on Applications of Natural Language to Information Systems,
vol. 12801, 2021.
6. “Profanity Filters: Everything You Need to Know + Our Top 5 Picks,” 2021.[Online].
Available: https://vpnoverview.com/internetsafety/kids-online/profanity-filters/
8. Sanjana Kumar, Srikrishna Veturi, and Varun Sreedhar, “Profanity Filter and Safe Chat
Application using Deep Learning,” International Research Journal of Engineering and
Technology, vol. 08 no. 07, 2021. [5]
10. Nur Chamidah, and Reiza Sahawaly, “Comparison Support Vector Machine and Naive
Bayes Methods for Classifying Cyberbullying in Twitter,” Jurnal Ilmiah Teknik Elektro
Komputer dan Informatika, vol. 7, no. 2, pp. 338, Crossref,
https://doi.org/10.10.26555/jiteki.v7i2.21175