this paper described how to use VC++ mixed programming with MATLAB to realize the detection system of button cell brand. It introduced the principle of its composition, and specifically describes the means to achieve ...
详细信息
the paper is devoted to the study of algorithms for optimization of inhibitory rules relative to the length and coverage. In contrast with usual rules that have on the right-hand side a relation "attribute ≠ val...
详细信息
this paper proposes a hybrid method QPSO-SQP, which combines a quantum-inspired particle swarm evolution algorithm(QPSO) and the sequential quadratic programming (SQP) method to solve large-scale economic dispatch pro...
详细信息
ISBN:
(纸本)9783642245527
this paper proposes a hybrid method QPSO-SQP, which combines a quantum-inspired particle swarm evolution algorithm(QPSO) and the sequential quadratic programming (SQP) method to solve large-scale economic dispatch problems(EDPs). Due to the combination of quantum rotation gates and the updating mechanism of PSO, the QPSO has strong search ability and fast convergence speed, therefore it is employed as a global searcher to obtain good solutions for EDPs. As SQP is a gradient-based nonlinear programming method, it is used as a local optimizer to fine tune the best result of the QPSO. the proposed QPSO-SQP is applied to two large-scale EDPs to validate its effectiveness. the experiment results show that the proposed QPSO-SQP can obtain high-quality solutions and produce a satisfactory performance among most existing techniques.
the acts to submit the copied programs of other person make problems in the subject of the programming exercise in university curriculum. Teachers could not make accurate scores and evaluate the reached learning level...
详细信息
ISBN:
(纸本)9780769548425
the acts to submit the copied programs of other person make problems in the subject of the programming exercise in university curriculum. Teachers could not make accurate scores and evaluate the reached learning level of students. the code clone detection technique is to automatically detect the copied programs. Researches of the code clone detection technique have been proposed. the object of these researches, however, focused on the source code of industrial field. there are some problems to detect illicit copied codes of reports made by students. In this research, we developed the code clone detection algorithm focusing on the detection of illicit copied codes of submitted reports of students in a programming exercise. Our proposed algorithm is based on the comparison of tokens and can declare the illicit copied codes invalid. the features of illicit copied codes such as swapping the functions and program lines, renaming variable names, changing digits, comments and string constants and changing source codes using formatting tools are detected. We implemented the proposed algorithm and experimented to evaluate our system for the submitted subjects of 119 students. Compared to the human detection for small size of source codes of students in a programming exercise, our system found 32 codes as the illicit copy in 36 illicit copied codes among 14,042 combination detective rules withthe threshold which are realized the recall=0.8. the miss detection finding as the copied code was 72 codes with precision=0.302.
We propose a methodology for flexible software design, runtime programming, by means of incremental software modifications at runtime. Runtime programming acknowledges that software designs are often incomplete, and r...
详细信息
the following paper proposes a novel procedure for liveness verification in video authentication systems. Decision on granting or denying access to the system is based on visual information only. System prompts random...
详细信息
Every element of a software architecture, e. g. a subsystem, package, or class, should have a well-defined interface that exposes or hides its subelements according to the principles of information hiding and encapsul...
详细信息
ISBN:
(纸本)9780769548401;9781467331272
Every element of a software architecture, e. g. a subsystem, package, or class, should have a well-defined interface that exposes or hides its subelements according to the principles of information hiding and encapsulation. Similar to other object-oriented programming languages, Java supports defining interfaces on several levels. the accessibility of types, methods, and fields can be restricted by using access modifiers. Withthese modifiers, developers are able to define interfaces of packages and classes tailored for different groups of clients. However, in programming practice, types and members seem to be often declared with too generous access modifiers, i.e. they are accessible by more clients than necessary. this can lead to unwanted dependencies and software quality degradation. We developed an approach to measuring the usage of access modifiers for types and methods in Java by defining two new software metrics: Inappropriate Generosity with Accessibility of Types (IGAT) and Inappropriate Generosity with Accessibility of Methods (IGAM). Furthermore, we created a tool called AccessAnalysis that calculates and displays these metrics. Using AccessAnalysis, we conducted a survey on twelve open source Java projects. the results support our assumption that access modifiers are often chosen more generously than necessary. On average, around one third of all type and method access modifiers fall into this category. Especially top-level types are almost always declared as public, so that package interfaces typically expose more types than necessary. Only 2% of all investigated top-level types are encapsulated inside their package.
Graphics Processing Units (GPUs) are powerful computing devices that withthe advent of CUDA/OpenCL are becomming useful for general purpose computations. Obsidian is an embedded domain specific language that generate...
详细信息
We study the Λμ-calculus, extended with explicit substitution, and define a compositional output-based translation into a variant of the π-calculus with pairing. We show that this translation preserves single-step ...
详细信息
In this study, variables from the Unified theory of Acceptance and Use of Technology and Social Cognitive theory were chosen as important factors in students' behavior and attitude towards Computer Science Educati...
详细信息
暂无评论