{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:21:34Z","timestamp":1758273694108,"version":"3.41.2"},"reference-count":27,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJWIS"],"published-print":{"date-parts":[[2024,11,19]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study aims to solve the problems of large training sample size, low data sample quality, low efficiency of the currently used classical model, high computational complexity of the existing concern mechanism, and high graphics processing unit (GPU) occupancy in the current visualization software defect prediction, proposing a method for software defect prediction termed recurrent criss-cross attention for weighted activation functions of recurrent SE-ResNet (RCCA-WRSR). First, following code visualization, the activation functions of the SE-ResNet model are replaced with a weighted combination of Relu and Elu to enhance model convergence. Additionally, an SE module is added before it to filter feature information, eliminating low-weight features to generate an improved residual network model, WRSR. To focus more on contextual information and establish connections between a pixel and those not in the same cross-path, the visualized red as integer, green as integer, blue as integer images are inputted into a model incorporating a fused RCCA module for defect prediction.<\/jats:p>\n<\/jats:sec>\n<jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Software defect prediction based on code visualization is a new software defect prediction technology, which mainly realizes the defect prediction of code by visualizing code as image, and then applying attention mechanism to extract the features of image. However, the challenges of current visualization software defect prediction mainly include the large training sample size and low sample quality of the data, and the classical models used today are not efficient, and the existing attention mechanisms have high computational complexity and high GPU occupancy.<\/jats:p>\n<\/jats:sec>\n<jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Experimental evaluation using ten open-source Java data sets from PROMISE and five existing methods demonstrates that the proposed approach achieves an F-measure value of 0.637 in predicting 16 cross-version projects, representing a 6.1% improvement.<\/jats:p>\n<\/jats:sec>\n<jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>RCCA-WRSR is a new visual software defect prediction based on recurrent criss-cross attention and improved residual network. This method effectively enhances the performance of software defect prediction.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijwis-07-2024-0200","type":"journal-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T05:44:02Z","timestamp":1730785442000},"page":"621-638","source":"Crossref","is-referenced-by-count":1,"title":["Visual software defect prediction method based on improved recurrent criss-cross residual network"],"prefix":"10.1108","volume":"20","author":[{"given":"Liqiong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Lei","family":"Yunjie","sequence":"additional","affiliation":[]},{"given":"Sun","family":"Huaiying","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"issue":"4","key":"key2024111805341148800_ref001","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1108\/DTA-03-2019-0040","article-title":"An approach for fault prediction in SOA-based systems using machine learning techniques","volume":"53","year":"2019","journal-title":"Data Technologies and Applications"},{"key":"key2024111805341148800_ref002","first-page":"259","article-title":"Some investigations of machine learning models for software defects","volume-title":"IEEE\/ACM 45th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","year":"2023"},{"issue":"4","key":"key2024111805341148800_ref003","first-page":"865","article-title":"A just-in-time software defect prediction model and its interpretability research","volume":"43","year":"2022","journal-title":"Journal of Chinese Computer Systems(Chinese)"},{"issue":"22","key":"key2024111805341148800_ref004","doi-asserted-by":"crossref","first-page":"4712","DOI":"10.3390\/rs13224712","article-title":"Review of image classification algorithms based on convolutional neural networks","volume":"13","year":"2021","journal-title":"Remote Sensing"},{"key":"key2024111805341148800_ref005","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1145\/3377811.3380389","article-title":"Software visualization and deep transfer learning for effective software defect prediction","volume-title":"Proceedings of the ACM\/IEEE 42nd international conference on software engineering","year":"2020"},{"issue":"3","key":"key2024111805341148800_ref006","first-page":"1","article-title":"A review of the f-measure: its history, properties, criticism, and alternatives","volume":"56","year":"2023","journal-title":"ACM Computing Surveys"},{"issue":"3","key":"key2024111805341148800_ref007","first-page":"1044","article-title":"Data preparation for software vulnerability prediction: a systematic literature review","volume":"49","year":"2022","journal-title":"IEEE Transactions on Software Engineering"},{"key":"key2024111805341148800_ref008","first-page":"56","article-title":"Method of software defect prediction based on mixed attention mechanism","volume":"31","year":"2023","journal-title":"Computer Measurement and Control"},{"issue":"2","key":"key2024111805341148800_ref009","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1108\/IJICC-10-2020-0147","article-title":"A new correlation-based approach for ensemble selection in random forests","volume":"14","year":"2021","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"10","key":"key2024111805341148800_ref010","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3387073","article-title":"Bayesian optimization for sparse neural networks with trainable activation functions","volume":"46","year":"2024","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"key2024111805341148800_ref011","article-title":"Software defect prediction method based on stable learning","volume":"78","year":"2024","journal-title":"Computers, Materials and Continua"},{"first-page":"603","article-title":"Ccnet: Crisscross attention for semantic segmentation","year":"2019","key":"key2024111805341148800_ref012"},{"key":"key2024111805341148800_ref013","first-page":"1","article-title":"Botnet detection method based on parallel cbam-resnet and self-attention","volume-title":"IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","year":"2022"},{"key":"key2024111805341148800_ref014","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISCON57294.2023.10112194","article-title":"A survey of software defects research based on deep learning","volume-title":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","year":"2023"},{"key":"key2024111805341148800_ref015","first-page":"236","article-title":"Research progress of machine learning in software defect prediction","volume-title":"IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT)","year":"2023"},{"issue":"2","key":"key2024111805341148800_ref016","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1108\/IJICC-11-2023-0385","article-title":"A hybrid approach for optimizing software defect prediction using a grey wolf optimization and multilayer perceptron","volume":"17","year":"2024","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"1","key":"key2024111805341148800_ref017","first-page":"84","article-title":"Deeplinedp: towards a deep learning approach for line-level defect prediction","volume":"49","year":"2022","journal-title":"IEEE Transactions on Software Engineering"},{"key":"key2024111805341148800_ref018","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2024.3393415","article-title":"Code multiview hypergraph representation learning for software defect prediction","year":"2024","journal-title":"IEEE Transactions on Reliability"},{"key":"key2024111805341148800_ref019","first-page":"189","article-title":"Visualization-based software defect prediction via convolutional neural network with global self-attention","volume-title":"IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","year":"2022"},{"issue":"1","key":"key2024111805341148800_ref020","article-title":"Application of weighted combinations of activation functions to defect prediction in software development","volume":"73","year":"2023","journal-title":"IEEE Transactions on Reliability"},{"issue":"1","key":"key2024111805341148800_ref021","first-page":"5550801","article-title":"Cross-project defect prediction using transfer learning with long short-term memory networks","volume":"2024","year":"2024","journal-title":"IET Software"},{"issue":"2","key":"key2024111805341148800_ref022","first-page":"1396","article-title":"Cnn explainer: Learning convolutional neural networks with interactive visualization","volume":"27","year":"2020","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"key2024111805341148800_ref023","doi-asserted-by":"crossref","first-page":"110385","DOI":"10.1109\/ACCESS.2022.3214536","article-title":"A crossproject defect prediction model based on deep learning with self-attention","volume":"10","year":"2022","journal-title":"IEEE Access"},{"key":"key2024111805341148800_ref024","first-page":"45","article-title":"Software defect prediction model based on SDL-lightgbm ensemble learning","volume":"3","year":"2024","journal-title":"Computer Engineering and Design(Chinese)"},{"key":"key2024111805341148800_ref025","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3144975","article-title":"Visualizing the scripts of data wrangling with somnus","year":"2022","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"key2024111805341148800_ref026","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/ISoIRS59890.2023.00043","article-title":"Software defect prediction method based on rgb image and deep learning","volume-title":"2023 International Symposium on Intelligent Robotics and Systems (ISoIRS)","year":"2023"},{"key":"key2024111805341148800_ref027","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/DSA52907.2021.00025","article-title":"Use of deep learning model with attention mechanism for software fault prediction","volume-title":"2021 8th International Conference on Dependable Systems and Their Applications (DSA)","year":"2021"}],"container-title":["International Journal of Web Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-07-2024-0200\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-07-2024-0200\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:24:12Z","timestamp":1753395852000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijwis\/article\/20\/6\/621-638\/1221281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":27,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,11,7]]},"published-print":{"date-parts":[[2024,11,19]]}},"alternative-id":["10.1108\/IJWIS-07-2024-0200"],"URL":"https:\/\/doi.org\/10.1108\/ijwis-07-2024-0200","relation":{},"ISSN":["1744-0084","1744-0092"],"issn-type":[{"type":"print","value":"1744-0084"},{"type":"electronic","value":"1744-0092"}],"subject":[],"published":{"date-parts":[[2024,11,7]]}}}