With the consistent advancement of science and technology, the quality of life for individuals has been continuously enhanced. However, due to their physiological limitations, individuals with disabilities have faced ...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
With the consistent advancement of science and technology, the quality of life for individuals has been continuously enhanced. However, due to their physiological limitations, individuals with disabilities have faced difficulties in obtaining equal level of welfare compared with others during the technological progress. In response to the above challenges, this essay will introduce an accessible music control device, which utilizes gesture recognition technology to help individuals with disabilities to lightly control the music software. The principle of this design is to transmit different gesture information (up, down, left, right, front, back, clock-wise, counterclockwise, and fluctuating) read by the gesture recognition sensor PAJ7620U2 to the Arduino Leonardo core processor through the I2C communication serial port. The software program run by the Arduino IDE (Integrated Development Environment) software drives the OLED 0.96 display, and then the recognized gestures will be displayed on the OLED 0.96 screen, enabling the tar-get group to use music software for volume adjustment, track switching and other essential functions.
Background. The emergence of tools based on artificial intelligence (AI) to support software development suggests an overhaul on how developers program and interact among themselves. This disruption might bring challe...
详细信息
ISBN:
(纸本)9798400705335
Background. The emergence of tools based on artificial intelligence (AI) to support software development suggests an overhaul on how developers program and interact among themselves. This disruption might bring challenges regarding human and social aspects of the software development process. Objective. This paper is a first exploration of the consequences of AI-based tools for software development teams and their members. Method. We conducted a social science fiction exercise, a sort of thought experiment, narrating two fictional stories about a futuristic software company employing AI-based tools. Then, we evaluated the plausibility of one of the scenarios through a qualitative experiment with 38 students to observe their perception regarding the use of AI-based tools. Results. The stories suggest potential challenges related to the adoption of these tools: a change on how developers perceive themselves, a clash between quantitative and qualitative worker contribution assessment, and the training of future developers to handle the imminent changes on their profession. In the qualitative experiment, we collected evidence supporting negative feelings, such as lack of trust and control and fear of being replaced. We also identified other attitudes and perceptions of developers, such as positive feelings towards AI-based tools. Conclusion. We identified several aspects that might influence the adoption of AI-based tools and their implications for individuals involved. They should be further investigated and represent a challenge for the research on human aspects of softwareengineering. We also demonstrated the use of social science fiction to explore novel research problems.
The advent of Virtual Reality (VR) technology has significantly affected most of our life sectors such as entertaining applications, education, gaming, knowledge acquisition, engineering, and science fields, to mentio...
详细信息
ISBN:
(纸本)9798350351491;9798350351484
The advent of Virtual Reality (VR) technology has significantly affected most of our life sectors such as entertaining applications, education, gaming, knowledge acquisition, engineering, and science fields, to mention a few. This is due to the innovative ways that VR offers in terms of interactions and the immersive experience with the environment, which is necessarily different from the traditional 2D ways. However, one of the most frequent issues in the VR applications are the approaches used in evaluating the quality of these applications. Hence, this paper proposes VR application for visualizing big and complex biological data. Then, the proposed application is assessed under a variety of VR software evaluation metrics. Questionnaires are distributed to expert biologists aiming at having accurate insights about the quality of the proposed VR application. The metrics used in the assessment are;performance, usability, user engagement, accuracy, and safety. The findings showed promising results that can be adopted by VR developers.
Transparency has become an important non-functional quality requirement of software products and processes. In softwareengineering, stakeholders, especially software developers and requirements engineers, do not full...
详细信息
In recent years, Deep Learning (DL) applications in JavaScript environment have become increasingly popular. As the infrastructure for DL applications, JavaScript DL frameworks play a crucial role in the development a...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
In recent years, Deep Learning (DL) applications in JavaScript environment have become increasingly popular. As the infrastructure for DL applications, JavaScript DL frameworks play a crucial role in the development and deployment. It is essential to ensure the quality of JavaScript DL frameworks. However, the bottleneck of limited computational resources in the JavaScript environment brings new challenges to framework testing. Specifically, JavaScript DL frameworks are equipped with various optimization mechanisms (e.g., cache reuse, inference acceleration) to overcome the bottleneck of limited computational resources. These optimization mechanisms are overlooked by existing methods, resulting in many bugs in JavaScript DL frameworks being missed. To address the above challenges, we propose a mutation-based JavaScript DL framework testing method named DLJSFuzzer. DLJSFuzzer designs 13 tensor mutation rules targeting the cache reuse mechanism to generate test input tensors. Besides, DLJSFuzzer designs eight model mutation rules targeting the inference acceleration mechanism to generate test input models. To evaluate the effectiveness of DLJSFuzzer, we conduct experiments on the most widely-used JavaScript DL framework, ***. The experimental results show that DLJSFuzzer outperforms state-of-the-art methods in both effectiveness and efficiency. DLJSFuzzer successfully detects 21 unique crashes and 126 unique NaN & Inconsistency bugs. All detected crashes have been reported to the open-source community, with 12 of them already confirmed by developers. Additionally, DLJSFuzzer has improved by over 47% in model generation efficiency and over 91% in bug detection efficiency compared to all baselines.
Code summarization aims to facilitate code comprehension by automatically generating brief and informative summaries for source code. In software development, different projects often exhibit distinct characteristics....
详细信息
ISBN:
(纸本)9798350395693;9798350395686
Code summarization aims to facilitate code comprehension by automatically generating brief and informative summaries for source code. In software development, different projects often exhibit distinct characteristics. However, existing research frequently overlooks such project-specific knowledge, which may result in sub-optimal summarization performance. In this paper, we propose PRECOS, a retrieval-based method that leverages the historical examples within the project (i.e., internal corpus) for generating better code summaries. First we construct the internal corpus as a datastore, and extend the datastore by retrieving the most relevant examples for the current project from a large-scale external corpus based on the internal corpus. Then during generation, we retrieve the nearest neighbors from the datastore at each decoding step to interpolate the vanilla target-token distribution. For the retrieved neighbors, we introduce a novel locality-aware distance calibration mechanism, which calibrates the retrieval distance based on the locality of the nearest neighbors, thereby providing more accurate predictions. Experimental results demonstrate that PRECOS achieves a substantial improvement of up to 8.5 BLEU scores compared to the model before project-specific enhancement, and can generate better code summaries than other comparison methods while maintaining satisfactory results in additional storage, time overhead, and prediction speed(1).
Deep Learning (DL) has emerged as a promising means for vulnerability detection due to its ability to automatically derive features from vulnerable code. Unfortunately, current solutions struggle to focus on vulnerabi...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Deep Learning (DL) has emerged as a promising means for vulnerability detection due to its ability to automatically derive features from vulnerable code. Unfortunately, current solutions struggle to focus on vulnerability-related parts of vulnerable functions, and tend to exploit spurious correlations for prediction, thus undermining their effectiveness in practice. In this paper, we propose SNOPY, a novel DL-based approach, which bridges sample denoising with causal graph learning to capture real vulnerability patterns from vulnerable samples with numerous noise for effective detection. Specifically, SNOPY adopts a change-based sample denoising approach to automatically weed out vulnerability-irrelevant code elements in the vulnerable functions without sacrificing the label accuracy. Then, SNOPY constructs a novel Causality-Aware Graph Attention Network (CA-GAT) with Feature Caching Scheme (FCS) to learn causal vulnerability features while maintaining efficiency. Experiments on the three public benchmark datasets show that Snopy outperforms the state-of-the-art baselines by an average of 27.22%, 85.89%, and 75.50% in terms of F1-score, respectively.
SQL injection attacks have posed a significant threat to web applications for decades. They obfuscate malicious codes into natural SQL statements so as to steal sensitive data, making them difficult to detect. General...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
SQL injection attacks have posed a significant threat to web applications for decades. They obfuscate malicious codes into natural SQL statements so as to steal sensitive data, making them difficult to detect. Generally, malicious signals can be identified by using the contextual information of SQL statements. Such contextual information, however, is not always easily captured. Due to the fact that SQL as a formal language is highly structured, two tokens that are spatially far away may be semantically very close. An effective approach thus should take the structural feature of SQL statements into account when modeling their contextual information. In this paper, we present a novel abstract syntax tree-based neural network approach named TRIDENT for effectively detecting SQL injection attacks. Benefiting from the structural feature delivered by ASTs, TRIDENT realizes superior modeling of contextual information via tree-based positional embedding and well-designed neural networks. TRIDENT is widely evaluated on a public SQL injection dataset and an adversarial sample dataset. The results demonstrate that TRIDENT can significantly outperform the baselines.
In recent years, federated learning has emerged as an effective approach for the collaborative learning of decentralized data. Vertical federated learning (VFL) is a scenario of federated learning for cross-silo coope...
详细信息
ISBN:
(纸本)9781728190549
In recent years, federated learning has emerged as an effective approach for the collaborative learning of decentralized data. Vertical federated learning (VFL) is a scenario of federated learning for cross-silo cooperation, where multiple parties with different features about the same set of data jointly train machine learning models without exposing their raw data. Most existing works of VFL focus on a single-job training of one machine learning model. In this paper, we propose a new framework for multi-job VFL, where multiple independent models are trained simultaneously in a cross-silo environment. We formulate the multi-job VFL scheduling problem and propose an efficient solution based on the rolling horizon method. We conduct extensive experiment to evaluate the performance of the solution. The experimental results show that our algorithm outperforms the other baseline algorithms.
This paper analyzes the beam spatial arrangement of two-dimensional phased array radar. It defines the coordinate systems involved in beam arrangement, examines the coordinate transformations, and conducts simulation ...
详细信息
暂无评论