Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Software defect detection algorithm based on dictionary learning
ZHANG Lei, ZHU Yixin, XU Chun, YU Kai
Journal of Computer Applications    2016, 36 (9): 2486-2491.   DOI: 10.11772/j.issn.1001-9081.2016.09.2486
Abstract441)      PDF (881KB)(349)       Save
Since the exsiting dictionary learning methods can not effectively construct discriminant structured dictionary, a discriminant dictionary learning method with discriminant and representative ability was proposed and applied in software defect detection. Firstly, sparse representation model was redesigned to train structured dictionary by adding the discriminant constraint term into the object function, which made the class-dictionary have strong representation ability for the corresponding class-samples but poor representation ability for the irrelevant class-samples. Secondly, the Fisher criterion discriminant term was added to make the representative coefficients have discriminant ability in different classes. Finally, the optimization of the designed dictionary learning model was solved to obtain strongly structured and sparsely representative dictionary. The NASA defect dataset was selected as the experiment data, and compared with Principal Component Analysis (PCA), Logistics Regression (LR), decision tree, Support Vector Machine (SVM) and the typical dictionary learning method, the accuracy and F-measure value of the proposed method were both increased. Experimental results indicate that the proposed method can increase detection accuracy with improving the classifier performance.
Reference | Related Articles | Metrics
Cyclic network model of optimal allocation for aircraft aviation security resources
ZHU Qidan LYU Kaidong LI Xinfei
Journal of Computer Applications    2013, 33 (11): 3276-3279.  
Abstract668)      PDF (601KB)(368)       Save
To optimize the aviation security resources of carrier-based aircraft which included traction equipments, security devices, equipped ammunition, personnel allocation, etc, the cycle operation characteristic of aviation security process was studied. The types of working procedures of aviation security and their logical relationship, and required resources of each working procedure were analyzed. The cyclic network technology was introduced and an optimization control method of aircraft aviation security resources was obtained. This method improved the utilization rate of equipments and ensured aviation security personnel at the work state of combining exertion and rest. The experimental results show that the optimal allocation method for aircraft aviation security resources based on the cyclic network is effective.
Related Articles | Metrics