software vulnerability detection is crucial for maintaining the security and stability of softwaresystems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability...
software vulnerability detection is crucial for maintaining the security and stability of softwaresystems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability detection in source code slices. the TS-GGNN model effectively captures both local and global features of vulnerable code by fusing sequence features with graph features. To achieve this, we utilize graph structure and sequence structure learning approaches to comprehensively extract valuable information from the source code slices. Our experiments are conducted on the SARD dataset, which consists of 61,638 code samples annotated for the presence or absence of vulnerabilities. the results demonstrate that TS-GGNN has the best vulnerability detection performance, with an accuracy of 99.4%, a precision of 98.81%, and an F1 score as high as 99.4% thereby validating the effectiveness of the TS-GGNN model in capturing features relevant to software vulnerabilities.
At present, withthe iteration of existing technologies, the importance of blockchain is constantly being recognized by people, and cross-chain technology is also becoming more and more important withthe development ...
详细信息
To synthesize a safe and optimal controller for switched hybrid systems, one can first synthesize a shield that ensures safety, and then apply reinforcement learning within the constraints of the shield to obtain the ...
详细信息
Semantic Role Labeling (SRL) is a task in natural language understanding where the goal is to extract semantic roles for a given sentence. English SRL has achieved state-of-the-art performance using Transformer techni...
详细信息
Continuous placement of cellular networks keeps on revealing because of the inbuilt limitations of the network. To overcome these flaws, there is the next generation 6G concept which could properly assimilate importan...
详细信息
ISBN:
(纸本)9798400700446
Continuous placement of cellular networks keeps on revealing because of the inbuilt limitations of the network. To overcome these flaws, there is the next generation 6G concept which could properly assimilate important rate-hungry applications such as stretched reality, wireless brain-computer connections, independent automobiles, and others. 6G will also help in handling huge data transmission in rural areas. Many state-of-the-art trends and technologies are combined in it withthe aim of providing higher data rates for ultra-reliable and low-dormancy communications. this article deals withthe conceptualization of 6G cellular addressing system requirements, potential trends, technologies, services, applications, and research progress. this research includes a summary of open research issues and current research groups to benefit readers withthe technology roadmap and for consideration of challenges in their research regarding 6G research. the fourth industrial revolution in the textile sector can greatly benefit from 5G and 6G technologies in automated processes of textiles such as in spinning, weaving, and especially in garments manufacturing to meet competitive advantages, excellent communication, and for better and more flexible production. 3D modeling, simulation of virtual clothes on avatars, automation of robotics, and data communication can be improved by the concept of 5G and 6G technologies.
Recently, softwareengineering field is undergoing a significant transformation driven by the rapid advancement of emerging technologies. AI introduces intelligent automation in code generation, testing, and debugging...
详细信息
ISBN:
(数字)9798331504403
ISBN:
(纸本)9798331504410
Recently, softwareengineering field is undergoing a significant transformation driven by the rapid advancement of emerging technologies. AI introduces intelligent automation in code generation, testing, and debugging by significantly enhancing the development efficiency and reducing human error. Machine Learning (ML) algorithms further enhance the predictive maintenance and performance optimization. Block chain technology enables the creation of decentralized applications (DApps) and smart contracts, ensuring enhanced security, transparency, and automation. Internet of things (IoT) brings a paradigm shift with an exponential increase in connected devices, necessitating robust software solutions for real-time data processing and analytics, while also highlighting the security challenges.
this paper considers the issues related to evaluating the performance of strain gauge load cells, namely, the stress-strain state and its nonlinearity using open FEM code Code_Aster. the stress-strain state of a membr...
详细信息
this paper considers the issues related to evaluating the performance of strain gauge load cells, namely, the stress-strain state and its nonlinearity using open FEM code Code_Aster. the stress-strain state of a membrane load cell was simulated using Code_Aster and experimental verification was done. the verification results show that Code_Aster exhibited good performance with regards to calculating the strains in the elastic element of the considered load cell and fair performance with regards to simulating the nonlinearity of strain.
New opportunities for AI-powered healthcare systems have emerged thanks to the integration of 5G wireless technology, the Internet of things (IoT), and AI. this article presents a comprehensive analysis of the current...
详细信息
Program comprehension accounts for a large portion of software development costs and effort. the academic literature contains mainly research on program comprehension of short code snippets, but comprehension at the s...
详细信息
Program comprehension accounts for a large portion of software development costs and effort. the academic literature contains mainly research on program comprehension of short code snippets, but comprehension at the system level is no less important. We claim that comprehending a software system is a distinct activity that differs from code comprehension. We interviewed experienced developers, architects, and managers in the software industry and open-source community, to uncover the meaning of program comprehension at the system level;later we conducted a survey to verify the findings. the interviews demonstrate, among other things, that system comprehension is largely detached from code and programming language, and includes scope that is not captured in the code. It focuses on one hand on the structure of the system, and on the other hand on the flows in the system, but less on the code itself. System comprehension is a continuous, unending, iterative process, which utilizes white-box and black-box approaches at different layers of the system depending on needs, and combines both bottom-up and top-down comprehension strategies. In summary, comprehending a system is not just comprehending the code at a larger scale, and it is not possible to comprehend large systems at the same level as comprehending code.
Over the past decade, the software industry has steadily moved from large monolithic code repositories to small modular libraries. Micro services are the latest evolution in this transformation. Micro services are sof...
Over the past decade, the software industry has steadily moved from large monolithic code repositories to small modular libraries. Micro services are the latest evolution in this transformation. Micro services are softwaresystems specially designed to do one thing and only one thing but do it well. Internet of things systems are usually designed to operate in the field without manual supervision. As such these systems need to have sufficient software functionality to display fault tolerance, error state recovery and operational consistency. this project is designed to deliver these core Internet of things functionalities through an ecosystem of micro services. Specifically the project will focus on an in field gateway device – in this case a Raspberry Pi and implement micro services for environmental monitoring, command and control, device registration and on-boarding and over the air software upgrades. these systems will empower the gateway device to successfully integrate itself into a cloud connected content platform. For the purposes of this project all cloud components will be orchestrated on Amazon Web Services, the gateway device will be a Raspberry Pi Model B and the micro services built in Java.
暂无评论