A cross-item defect prediction method using adversarial learning
In today’s information society, the rapid growth of information technology has resulted in software products being integrated into every aspect of people’s lives. Consequently, the ability to accurately identify software modules that may cause problems within a specified time frame has become crucia...
Published in: | Journal of Autonomous Intelligence |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Published: |
Frontier Scientific Publishing
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185701078&doi=10.32629%2fjai.v7i4.641&partnerID=40&md5=fec2051e314ae964c3211033579fd9d5 |
id |
2-s2.0-85185701078 |
---|---|
spelling |
2-s2.0-85185701078 Ma J.; Zain J.M.; Wang D.; Shi J. A cross-item defect prediction method using adversarial learning 2024 Journal of Autonomous Intelligence 7 4 10.32629/jai.v7i4.641 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185701078&doi=10.32629%2fjai.v7i4.641&partnerID=40&md5=fec2051e314ae964c3211033579fd9d5 In today’s information society, the rapid growth of information technology has resulted in software products being integrated into every aspect of people’s lives. Consequently, the ability to accurately identify software modules that may cause problems within a specified time frame has become crucial for determining software development progress. This is because ensuring software dependability is a critical component of software development. In this paper, the enhanced abstract continuous generative adversarial network (AC-GAN) technique covers data processing and model construction. Three levels: (1) convert the code of the source project and the target project into the form of an abstract syntax tree (Unified Abstract Syntax Tree, UAST), then traverse the abstract syntax tree in a depth-first manner to obtain a node sequence, and then use continuous recursion to replace the nodes in the node sequence; (2) the processed numerical vectors are sent to the GAN-based model; (3) the GAN-based model generates the final word vectors. The network structure model is utilized for feature extraction and data transfer, and a binary classifier is then employed to determine if the target item code file is flawed. 15 sets of source-target item pairings are used to evaluate the AC-GAN approach. The experimental findings demonstrate the usefulness of the technique. © 2024 by author(s). Frontier Scientific Publishing 26305046 English Article |
author |
Ma J.; Zain J.M.; Wang D.; Shi J. |
spellingShingle |
Ma J.; Zain J.M.; Wang D.; Shi J. A cross-item defect prediction method using adversarial learning |
author_facet |
Ma J.; Zain J.M.; Wang D.; Shi J. |
author_sort |
Ma J.; Zain J.M.; Wang D.; Shi J. |
title |
A cross-item defect prediction method using adversarial learning |
title_short |
A cross-item defect prediction method using adversarial learning |
title_full |
A cross-item defect prediction method using adversarial learning |
title_fullStr |
A cross-item defect prediction method using adversarial learning |
title_full_unstemmed |
A cross-item defect prediction method using adversarial learning |
title_sort |
A cross-item defect prediction method using adversarial learning |
publishDate |
2024 |
container_title |
Journal of Autonomous Intelligence |
container_volume |
7 |
container_issue |
4 |
doi_str_mv |
10.32629/jai.v7i4.641 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85185701078&doi=10.32629%2fjai.v7i4.641&partnerID=40&md5=fec2051e314ae964c3211033579fd9d5 |
description |
In today’s information society, the rapid growth of information technology has resulted in software products being integrated into every aspect of people’s lives. Consequently, the ability to accurately identify software modules that may cause problems within a specified time frame has become crucial for determining software development progress. This is because ensuring software dependability is a critical component of software development. In this paper, the enhanced abstract continuous generative adversarial network (AC-GAN) technique covers data processing and model construction. Three levels: (1) convert the code of the source project and the target project into the form of an abstract syntax tree (Unified Abstract Syntax Tree, UAST), then traverse the abstract syntax tree in a depth-first manner to obtain a node sequence, and then use continuous recursion to replace the nodes in the node sequence; (2) the processed numerical vectors are sent to the GAN-based model; (3) the GAN-based model generates the final word vectors. The network structure model is utilized for feature extraction and data transfer, and a binary classifier is then employed to determine if the target item code file is flawed. 15 sets of source-target item pairings are used to evaluate the AC-GAN approach. The experimental findings demonstrate the usefulness of the technique. © 2024 by author(s). |
publisher |
Frontier Scientific Publishing |
issn |
26305046 |
language |
English |
format |
Article |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677573645402112 |