Code smells in software systems create maintenance and extension challenges for developers. While many tools detect code smells, few provide refactoring suggestions. Some of the tools support live detection in an inte...
详细信息
ISBN:
(纸本)9789897586477
Code smells in software systems create maintenance and extension challenges for developers. While many tools detect code smells, few provide refactoring suggestions. Some of the tools support live detection in an integrated development environment. We present a tool for the live detection of data clumps in Java with generated suggestions and semi-automatic refactoring. To achieve this, our research examines projects and their associated abstract syntax trees and analyzes types of variables. thereby, we aim to detect data clumps, a type of code smells, and generate suggestions to counteract them. We implemented our approach to live data clumps detection as an IntelliJ integrated development environment application plugin. the live detection achieved a median of less than 0.5 s for the ArgoUML software project, which we analyzed as an example. From over 1500 investigated files, our approach detected 125 files with data clumps and that of CBSD (Code Bad Smell Detector) detected 97 files with data clumps. For both approaches, 92 of the files found were the same. We combined the manual steps for refactoring, resulting in a semi-automatic elimination of data clumps.
Agile development methods have pervaded softwareengineering and are increasingly applied in large projects and organizations. At the same time, security threats and restrictive legislation regarding security and priv...
详细信息
ISBN:
(纸本)9798400707728
Agile development methods have pervaded softwareengineering and are increasingly applied in large projects and organizations. At the same time, security threats and restrictive legislation regarding security and privacy are steadily rising. these two trends of agile software development at scale and increasingly important security requirements are often at odds with each other. Academic literature widely acknowledges the challenges therefrom and discusses approaches to integrate these two partly conflicting trends. However, several researchers point out a need for empirical studies and evaluations of these approaches in practice. To fill this research gap, we conducted a case study in the finance industry. We identified 27 agile security approaches in academic literature. Based on these theoretical findings, we carried out observations, document analysis, and unstructured interviews to identify which approaches the case company applies. We then conducted semi-structured interviews with 10 experts and a survey with 62 participants to evaluate 14 approaches. One of the key results is that role and knowledge approaches, such as dedicated security roles and communities, are especially important in scaled agile development environments. In addition, the most beneficial security activities are easy-to-integrate, such as a security tagging system, peer security code reviews, security stories, and threat poker. We also contribute evaluation criteria as well as drivers and obstacles for the adoption of agile security approaches that can be used for further research and practice.
the proceedings contain 49 papers. the topics discussed include: a sparsifier model for efficient information retrieval;enhancing sales prediction accuracy through incorporation of expert knowledge as constraints into...
ISBN:
(纸本)9798350387537
the proceedings contain 49 papers. the topics discussed include: a sparsifier model for efficient information retrieval;enhancing sales prediction accuracy through incorporation of expert knowledge as constraints into the model;large language models-aided literature reviews: a study on few-shot relevance classification;diabetes detection based on iridology;developing automated software for improving feedback analysis and self-debriefing in high-fidelity medical simulation;experimental setup for verifying the funneling illusion on the upper facial region;opinion score distribution prediction via AI-based observers in media quality assessment;and solar-powered automated drone for industrial safety and anomaly detection.
An anomaly of software refers to a bug or defect or anything that causes the software to deviate from its normal behavior. Anomalies should be identified properly to make more stable and error-free software systems. T...
详细信息
ISBN:
(纸本)9789897586477
An anomaly of software refers to a bug or defect or anything that causes the software to deviate from its normal behavior. Anomalies should be identified properly to make more stable and error-free software systems. there are various machine learning-based approaches for anomaly detection. For proper anomaly detection, feature selection is a necessary step that helps to remove noisy and irrelevant features and thus reduces the dimensionality of the given feature vector. Most of the existing feature selection methods rank the given features using different selection criteria, such as mutual information (MI) and distance. Furthermore, these, especially MI-based methods fail to capture feature interaction during the ranking/selection process in case of larger feature dimensions which degrades the discrimination ability of the selected feature set. Moreover, it becomes problematic to make a decision about the appropriate number of features from the ranked feature set to get acceptable performance. To solve these problems, in this paper we propose anomaly detection for software data (ADSD), which is a feature subset selection method and is able to capture interactive and relevant feature subsets. Experimental results on 15 benchmark software defect datasets and two bug severity classification datasets demonstrate the performance of ADSD in comparison to four state-of-the-art methods.
In this paper, overview of Active Power Cycling (APC) test of SiC half-bridge modules is presented. Description covers all key practical aspects of Accelerated Lifetime Testing, from setting up the APC test, through p...
详细信息
ISBN:
(纸本)9798350318272;9798350318265
In this paper, overview of Active Power Cycling (APC) test of SiC half-bridge modules is presented. Description covers all key practical aspects of Accelerated Lifetime Testing, from setting up the APC test, through post failure analysis of SiC modules, ending up on identification theirs reliability model. Post failure analysis consists of distinction of soft-failure and hard-failure, electrical measurement, Confocal Scanning Acoustic Measurement (C-SAM) and pull-wire shear test. In addition, DUTs were monitored for over 14 weeks after APC test to verify if there is any further change is SiC modules electrical parameters, which revealed continuous decay of MOSFET's V-GSth.
this study uses a novel method of segmenting and computing the tissue area in brain MRI images to predict the presence of brain tumors and classify the type of tumor into common types (pituitary, meningioma, and gliom...
详细信息
the development of new, complex mechatronic systems in custom engineering poses many challenges due to the unique nature of each product and specific customer requirements. Systems engineering (SE) provides a solution...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
the development of new, complex mechatronic systems in custom engineering poses many challenges due to the unique nature of each product and specific customer requirements. Systems engineering (SE) provides a solution by establishing a robust system architecture to ensure reliable products that meet customer requirements. Validation processes play a crucial role in SE to avoid unwanted developments and high costs. By using the right validation methods, potential problems can be identified early. this saves resources and contributes to sustainability. Users in the B2B sector, often with an engineering background, represent a significant potential for validation in system design, as they understand the system architecture. However, to exploit this potential, an analysis of validation methods is required. the aim of this paper is to identify the challenges and the potential of validation methods for system design in the B2B sector. the research question is addressed through a structured literature review. the results will be compared at a conference of 35 experts and then evaluated in a workshop by six experts from industry and research. the outcome will be an overview of validation methods compatible with system design in the B2B sector, providing practical insights and paving the way for further research.
Smart contracts are the logical programs holding the properties in Blockchain. these Blockchain technologies enable society towards trust-based applications. Smart contracts are prepared between the parties to hold th...
详细信息
ISBN:
(纸本)9789897586477
Smart contracts are the logical programs holding the properties in Blockchain. these Blockchain technologies enable society towards trust-based applications. Smart contracts are prepared between the parties to hold their deals. If the deal held by a smart contract is complex and non-trivial, then there is a high chance of attracting issues and loss of assets. these contracts also consider expensive assets. this necessitates the verification and testing of a smart contract. Since we have the source code of a smart contract, then it is reasonable to apply verification and testing techniques. From the traditional ways, it has been observed that mutation testing is one of the important testing techniques. But, this testing technique suffers from the issues of time and cost. It is true that fault-based testing is a good mechanism to perform. So, looking at the issues we introduce a new technique for Mutation Verification for Smart Contracts. In this paper, we present an approach for measuring the mutation score using a verification approach. We experimented with a total of 10 smart contracts.
the automotive industry is undergoing rapid growth driven by advancements such as electrification, necessitating efficient software development methodologies. While model-based system engineering is prevalent in autom...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
the automotive industry is undergoing rapid growth driven by advancements such as electrification, necessitating efficient software development methodologies. While model-based system engineering is prevalent in automotive software development, its application is typically confined to the requirements and design phases, with manual coding still dominating the development process, resulting in extended development efforts and cycles. To address these challenges, we propose Vehicle Domain-Specific Language (VDSL), a low-code development tool that integrates modeling and automatic code generation. With VDSL, users can simply specify their requirements and utilize graphical drag-and-drop along with parameter configuration to efficiently implement vehicle functionality with auto-generated code. Tested and evaluated on 3 vehicle models across 18 months at GAC Group, VDSL has demonstrated its effectiveness in significantly reducing development effort and costs, improving resource efficiency, and providing greater flexibility for system updates via Over-the-Air (OTA) Technology. this work further enhances the practicality of model-based development in the automotive domain, boosting development efficiency and potentially enhancing quality.
Modern automated program repair (APR) tools are well-tuned at repairing single fault programs (i.e., programs in which only one fault can occur at time). However, real-world software projects typically contain multipl...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Modern automated program repair (APR) tools are well-tuned at repairing single fault programs (i.e., programs in which only one fault can occur at time). However, real-world software projects typically contain multiple bugs at the same time, which can interact with and mask each other in a variety of ways. the complex interaction of faults in multi-fault programs makes the automated repair problem more challenging than the traditional practice of presuming that a program contains a single fault. this paper studies the repair problem of multi-fault programs and identifies the main obstacles that arise when handling such programs using current repair approaches. the paper also describes three repair approaches for multi-fault programs, namely iterative, parallel, and simultaneous. While the simultaneous repair strategy depends on using cutting-edge fault localization techniques that enable the APR approaches to locate many faults at once, the iterative and parallel repair approaches rely on adapting the existing repair techniques for single-fault programs to handle multi-fault programs. Finally, the paper discusses each approach's advantages and drawbacks as well as the conditions in which the approach can be used successfully. To our knowledge, this is the first paper to specifically study and address the repair problem of multi-fault programs.
暂无评论