1
|
Jin C. A training sample selection method for predicting software defects. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04044-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
2
|
Quality and reliability studies in software defect management: a literature review. INTERNATIONAL JOURNAL OF QUALITY & RELIABILITY MANAGEMENT 2021. [DOI: 10.1108/ijqrm-07-2019-0235] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeThis paper is focused at studying the current state of research involving the four dimensions of defect management strategy, i.e. software defect analysis, software quality, software reliability and software development cost/effort.Design/methodology/approachThe methodology developed by Kitchenham (2007) is followed in planning, conducting and reporting of the systematic review. Out of 625 research papers, nearly 100 primary studies related to our research domain are considered. The study attempted to find the various techniques, metrics, data sets and performance validation measures used by researchers.FindingsThe study revealed the need for integrating the four dimensions of defect management and studying its effect on software performance. This integrated approach can lead to optimal use of resources in software development process.Research limitations/implicationsThere are many dimensions in defect management studies. The authors have considered only vital few based on the practical experiences of software engineers. Most of the research work cited in this review used public data repositories to validate their methodology and there is a need to apply these research methods on real datasets from industry to realize the actual potential of these techniques.Originality/valueThe authors believe that this paper provides a comprehensive insight into the various aspects of state-of-the-art research in software defect management. The authors feel that this is the only research article that delves into the four facets namely software defect analysis, software quality, software reliability and software development cost/effort.
Collapse
|
3
|
Analysis and modeling conditional mutual dependency of metrics in software defect prediction using latent variables. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2021.05.043] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
4
|
Wang C, Hu Z, Chiong R, Bao Y, Wu J. Identification of phishing websites through hyperlink analysis and rule extraction. ELECTRONIC LIBRARY 2020. [DOI: 10.1108/el-01-2020-0016] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of phishing websites and identify them accurately.
Design/methodology/approach
Hyperlink indicators along with URL-based features are used to build the identification model. In the proposed approach, very simple rules are first extracted based on individual features to provide meaningful and easy-to-understand rules. Then, the F-measure score is used to select high-quality rules for identifying phishing websites. To construct a reliable and promising phishing website identification model, the selected rules are integrated using a simple neural network model.
Findings
Experiments conducted using self-collected and benchmark data sets show that the proposed approach outperforms 16 commonly used classifiers (including seven non–rule-based and four rule-based classifiers as well as five deep learning models) in terms of interpretability and identification performance.
Originality/value
Investigating patterns of phishing websites based on hyperlink indicators using the efficient rule-based approach is innovative. It is not only helpful for identifying phishing websites, but also beneficial for extracting simple and understandable rules.
Collapse
|
5
|
Shao Y, Liu B, Wang S, Li G. Software defect prediction based on correlation weighted class association rule mining. Knowl Based Syst 2020. [DOI: 10.1016/j.knosys.2020.105742] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
6
|
Wang L, Liu C. Evolutionary Game Analysis on Government Supervision and Dairy Enterprise in the Process of Product Recall in China. INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS IN THE SERVICE SECTOR 2020. [DOI: 10.4018/ijisss.2020010104] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
On the basis of stating recall and regulation mode, this paper analyzes long-term evolutionary trend between dairy enterprise and government supervision on bounded rationality with evolutionary game. The authors use Python matplotlib to simulate research results. Studies show that it is helpful to build a standard recall system of defect and dairy products. This system should reduce the costs of government supervision. In addition, in case of mandatory recall, it should strengthen punishment intensity of the government supervision branch on dairy enterprise, increase more losing costs of dairy enterprise, and decrease external environment benefits of dairy enterprise. In case of voluntary recall, the system should encourage various strategies and subsidy of the government supervision branch on dairy enterprise and amplify social influence of dairy enterprise. Especially, the paper puts forward detailed strategies for dairy enterprise.
Collapse
Affiliation(s)
- Lei Wang
- School of Economics and Management, Northeast Agricultural University, Heilongjiang Province, China
| | - Chang Liu
- School of Economics and Management, Northeast Agricultural University, Heilongjiang Province, China
| |
Collapse
|
7
|
Wang Y, Open Education Institute, Chengdu Radio and TV University No.7, Section 1, Jianshe North Road, Chenghua District, Chengdu, Sichuan 610051, China. Efficient Prediction Method of Defect of Monitor Configuration Software. JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS 2019. [DOI: 10.20965/jaciii.2019.p0340] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
In order to solve the problem of low efficiency in software operation, we need to research the defect prediction of monitoring configuration software. The current method has the low efficiency in the defect prediction of software. Therefore, this paper proposed the software defect prediction method based on genetic optimization support vector machines. This method carried out feature selection for the measure of complexity of software, and built software defect prediction model of genetic optimized support vector machine, and completed the research on the efficient prediction method of software defects. Experimental results show that the proposed method improves the quality of software effectively.
Collapse
|