this paper proposes a marker-based Augmented Reality (AR) electric circuit meant to help students grasp the knowledge of electrical circuits, especially the usage of capacitors. Recognizing components like the battery...
详细信息
the Kapur entropy multilevel thresholding image segmentation algorithm based on the two-dimensional histogram does not consider the spatial contextual information of image pixels, and the algorithm's time complexi...
详细信息
WebAssembly (Wasm) is a binary instruction format designed for secure and efficient execution within sandboxed environments - predominantly web apps and browsers - to facilitate performance, security, and flexibility ...
详细信息
ISBN:
(纸本)9798400717017
WebAssembly (Wasm) is a binary instruction format designed for secure and efficient execution within sandboxed environments - predominantly web apps and browsers - to facilitate performance, security, and flexibility of web programming languages. In recent years, Wasm has gained significant attention from the academic research community and industrial development projects to engineer high-performance web applications. Despite the offered benefits, developers encounter a multitude of issues rooted in Wasm (e.g., faults, errors, failures) and are often unaware of their root causes that impact the development of web applications. To this end, we conducted an empirical study that mines and documents practitioners' knowledge expressed as 385 issues from 12 open-source Wasm projects deployed on Github and 354 question-answer posts via Stack Overflow. Overall, we identified 120 types of issues, which were categorized into 19 subcategories and 9 categories to create a taxonomical classification of issues encountered in Wasm-based applications. Furthermore, root cause analysis of the issues helped us identify 278 types of causes, which have been categorized into 29 subcategories and 10 categories as a taxonomy of causes. Our study led to first-of-its-kind taxonomies of the issues faced by developers and their underlying causes in Wasm-based applications. the issue-cause taxonomies - identified from Github and SO, offering empirically derived guidelines - can guide researchers and practitioners to design, develop, and refactor Wasm-based applications.
Low Density Parity Check Code (LDPC) can meet the decoding requirements of a variety of code lengths and rates in different communication scenarios, but the LDPC code check matrix is irregular, which has problems with...
详细信息
For 5G communication, the angle of arrival (AOA) positioning has low success rate and low accuracy caused by base station shortage, put forward a combination positioning solution for AOA positioning technology and red...
详细信息
software-defined n etworking (SDN) is a promising technology for future smart grid (SG) systems, since SGs heavily rely on communication networks. With SDN, communication network part of SGs becomes programmable by ab...
详细信息
Adware represents a pervasive threat in the mobile ecosystem, yet its inherent characteristics have been largely overlooked by previous research. this work takes a crucial step towards demystifying Android adware. We ...
详细信息
Gender imbalance is a well-known phenomenon observed throughout sciences which is particularly severe in software development and Free/Open Source software communities. Little is know yet about the geography of this p...
详细信息
ISBN:
(纸本)9781665495943
Gender imbalance is a well-known phenomenon observed throughout sciences which is particularly severe in software development and Free/Open Source software communities. Little is know yet about the geography of this phenomenon in particular when considering large scales for both its time and space dimensions. We contribute to fill this gap with a longitudinal study of the population of contributors to publicly available software source code. We analyze the development history of 160 million software projects for a total of 2.2 billion commits contributed by 43 million distinct authors over a period of 50 years. We classify author names by gender using name frequencies and author geographical locations using heuristics based on email addresses and time zones. We study the evolution over time of contributions to public code by gender and by world region. For the world overall, we confirm previous findings about the low but steadily increasing ratio of contributions by female authors. When breaking down by world regions we find that the long-term growth of female participation is a world-wide phenomenon. We also observe a decrease in the ratio of female participation during the COVID-19 pandemic, suggesting that women's ability to contribute to public code has been more hindered than that of men.
In order to improve the convergence speed of the constant modulus algorithm (CMA) for continuous phase frequency shift keying (CPFSK) signal blind equalization under certain steady-state error conditions, a variable m...
详细信息
Withthe continuous improvement of artificial intelligence technology, autonomous driving technology has been greatly developed. Hence automated driving software has drawn more and more attention from both researchers...
详细信息
ISBN:
(纸本)9798350329964
Withthe continuous improvement of artificial intelligence technology, autonomous driving technology has been greatly developed. Hence automated driving software has drawn more and more attention from both researchers and practitioners. Code clone is a commonly used to speed up the development cycle in software development, but many studies have shown that code clones may affect software maintainability. Currently, there is little research investigating code clones in automated driving software. To bridge this gap, we conduct a comprehensive experience study on the code clones in automated driving software. through the analysis of Apollo and Autoware, we have presented that code clones are prevalent in automated driving software. about 30% of code lines are involved in code clones and more than 50% of files contain code clones. Moreover, a notable portion of these code clones has caused bugs and co-modifications. Due to the high complexity of autonomous driving, the automated driving software is often designed to be modular, with each module responsible for a single task. When considering each module individually, we have found that Perception, Planning, Canbus, and Sensing modules are more likely to encounter code clones, and more likely to have bug-prone and co-modified clones. Finally, we have shown that there exist cross-module clones to propagate bugs and co-modifications in different modules, which undermine the software's modularity.
暂无评论