Scientific java programs often need to interact with specialized programming environments, such as Octave and Matlab, that focus on numerical computations. This paper presents the HDFjavaIO library that allows java pr...
详细信息
ISBN:
(纸本)9781538676936
Scientific java programs often need to interact with specialized programming environments, such as Octave and Matlab, that focus on numerical computations. This paper presents the HDFjavaIO library that allows java programs to interact with Octave using Hierarchical Data Format 5 (HDF5) files, which are commonly used in the scientific community for working with large data sets. Because features of HDF5 files include almost all of the features of NetCDF, this library and method may also be used to create data files that can be used with NCL scripts and other applications that use these largedata formats without the need for further modifications by java application developers. This paper presents the relevant details of the Octave HDF5 file format and the java techniques used to build the data interchange library. It also presents the results of an experimental analysis of the library's performance and its comparison to existing approaches.
Image manipulation represents a true "art", which takes into account the images with a lot of their properties. There are many ways a digital photo can be manipulated, so the forger can use one or more combi...
详细信息
ISBN:
(纸本)9781538649015
Image manipulation represents a true "art", which takes into account the images with a lot of their properties. There are many ways a digital photo can be manipulated, so the forger can use one or more combinations of these in order to make their detection more difficult. On the other hand, only one detection technique is specific to a single image manipulation. For instance, a duplication detection method is based on an existing correlation between the segment of the original image and the copied image. This paper presents a robust java implementation of an algorithm detecting such a Copy-Move forged pictures.
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommu...
详细信息
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the java programming language. JDK 1.7 as the java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the java compiler. Eclipse, a java SDK and the Android SDK as a java source code editor.
In the face of rich game resources, it is necessary to have a good tool to manage games and improve the user's game experience. This is the meaning of the game platform. The game platform described in this paper a...
详细信息
In the face of rich game resources, it is necessary to have a good tool to manage games and improve the user's game experience. This is the meaning of the game platform. The game platform described in this paper adopts java technology, and uses C/S mode and My SQL database to complete the design of the platform. This game platform has the functions of login module, management module and so on. Through the platform, it can realize jigsaw puzzle, Snake game and real-time battle of LAN tank war game. The paper describes in detail the early preparation, overall design, specific implementation and functional testing of the game platform. All functions of the platform can be used normally, the game can also run normally under the rules, which has completed the requirements.
Source Code Summarization is the task of writing short, natural language descriptions of source code. The main use for these descriptions is in software documentation e.g. the one-sentence java method descriptions in ...
详细信息
Performance bugs, i.e., program source code that is unnecessarily inefficient, have received significant attention by the research community in recent years. A number of empirical studies have investigated how these b...
详细信息
ISBN:
(纸本)9781728149837
Performance bugs, i.e., program source code that is unnecessarily inefficient, have received significant attention by the research community in recent years. A number of empirical studies have investigated how these bugs differ from "ordinary" bugs that cause functional deviations and several approaches to aid their detection, localization, and removal have been proposed. Many of these approaches focus on certain subclasses of performance bugs, e.g., those resulting from redundant computations or unnecessary synchronization, and the evaluation of their effectiveness is usually limited to a small number of known instances of these bugs. To provide researchers working on performance bug detection and localization techniques with a larger corpus of performance bugs to evaluate against, we conduct a study of more than 700 performance bug fixing commits across 13 popular open source projects written in C and C++ and investigate the relative frequency of bug types as well as their complexity. Our results show that many of these fixes follow a small set of bug patterns, that they are contributed by experienced developers, and that the number of lines needed to fix performance bugs is highly project dependent.
Automatic Software Repair (APR) has significant potential to reduce software maintenance costs by reducing the human effort required to localize and fix bugs. State-of-the-art generate-and-validate APR techniques sele...
详细信息
ISBN:
(纸本)9781538649695
Automatic Software Repair (APR) has significant potential to reduce software maintenance costs by reducing the human effort required to localize and fix bugs. State-of-the-art generate-and-validate APR techniques select between and instantiate various mutation operators to construct candidate patches, informed largely by heuristic probability distributions. This may reduce effectiveness in terms of both efficiency and output quality. In practice, human developers have many options in terms of how to edit code to fix bugs, some of which are far more common than others (e.g., deleting a line of code is more common than adding a new class). We mined the most recent 100 bug-fixing commits from each of the 500 most popular java projects in GitHub (the largest dataset to date) to create a probabilistic model describing edit distributions. We categorize, compare and evaluate the different mutation operators used in state-of-the-art approaches. We find that a probabilistic model-based APR approach patches bugs more quickly in the majority of bugs studied, and that the resulting patches are of higher quality than those produced by previous approaches. Finally, we mine association rules for multi-edit source code changes, an understudied but important problem. We validate the association rules by analyzing how much of our corpus can be built from them. Our evaluation indicates that 84.6% of the multi-edit patches from the corpus can be built from the association rules, while maintaining 90% confidence.
The Trusted Remote Function Interface (TRFI) is a small library that exposes services via a REST API to allow function execution with scientific programminglanguages. Functional units are uploaded to a remote server ...
详细信息
ISBN:
(纸本)9781728138862
The Trusted Remote Function Interface (TRFI) is a small library that exposes services via a REST API to allow function execution with scientific programminglanguages. Functional units are uploaded to a remote server using the provided REST API. The API stores registered functions for later execution. Maintaining code using this technique allows clients to repeatedly execute functions without having the native language, typically Octave or Python, installed on the client machine. A common problem in scientific applications is the requirement for a program to interface with scientific scripting languages. Typically, this is not a straightforward approach for accomplishing the data exchange and subsequent function execution on that data from popular languages such as java or javaScript. This task is extraordinarily cumbersome if the interpreter, used by the scientific programminglanguage, is not installed locally. By separating the function signature from the underlying implementation, and providing a uniform REST API, the TRFI library allows function interfacing in two ways. First, direct interfacing by using the equipped java library. Second, the more common scenario is interfacing remotely by deploying the library using aJAX-RS compatible web server. The result of the TRFI library's design and the provided REST API is the facilitation of code interoperability and reuse for scientific applications.
The paper deals with the principles of constructing a simulation model for studying the basic processes and devices in the computer I / O subsystem. The procedure for selecting the composition of the studied character...
详细信息
ISBN:
(纸本)9781728167015
The paper deals with the principles of constructing a simulation model for studying the basic processes and devices in the computer I / O subsystem. The procedure for selecting the composition of the studied characteristics of input-output devices, as well as the structure and level of detail of the parameters of the objects under study is considered. Typical computer hardware with keyboard and monitor is offered as a peripheral device. When modeling, probabilistic characteristics of data processing in the input-output subsystem are set. The modeling program is developed in java in NetBeans 8.1. A user interface based on the animation of the processes in I / O subsystem is described. This provides obtaining a visual representation of interrupts, generation of control signals, and transfer of codes from peripheral devices to the memory and the central processor. The user interface provides the setting of the necessary modes and simulation parameters. The simulation results are presented in the form of time charts of devices and the numerical values of these characteristics. The input / output system under study can operate in one of three modes: only with information input, with data input and output to a monitor, and also only with data processing and output to a monitor. The paper presents the study results of the simulated system in various modes, confirming the adequacy of the developed model.
EvoSuite is an automated unit test generation tool for java. It takes as input a java class under test, and produces JUnit tests optimised for code coverage, and enhanced with regression assertions, as output. This pa...
详细信息
ISBN:
(纸本)9783319992419;9783319992402
EvoSuite is an automated unit test generation tool for java. It takes as input a java class under test, and produces JUnit tests optimised for code coverage, and enhanced with regression assertions, as output. This paper is a tutorial on how to use EvoSuite to generate tests, on how to build and extend EvoSuite, and how to use EvoSuite to run experiments on search-based testing.
暂无评论