Wavelet theory (WT) is essential for analyzing non-stationary signals, particularly in real-world applications requiring time-frequency analysis. A key challenge is to identify the optimal wavelet function that matche...
详细信息
Wavelet theory (WT) is essential for analyzing non-stationary signals, particularly in real-world applications requiring time-frequency analysis. A key challenge is to identify the optimal wavelet function that matches signal characteristics, enabling efficient and precise analysis. This study presents WaveConstLib, an open-source java library for wavelet analysis and construction. It provides tools to create wavelet functions tailored to specific signals while adhering to WT conditions. Unlike traditional methods, WaveConstLib employs multi-objective evolutionary algorithms (MOEAs) optimization to construct signal-specific wavelet functions, ensuring superior adaptability and performance. The library includes numerical implementations of first-generation wavelet construction techniques, along with signal processing tools, wavelet operations, and transformations applicable to diverse tasks. WaveConstLib simplifies the construction of wavelet functions that extract distinctive signal information and supports integration into external systems, making it a valuable resource for research and practical applications.
Injection attacks exploit vulnerabilities in how applications handle user input, allowing malicious code to infiltrate the execution environment of web applications, leading to severe consequences, such as data leaks ...
详细信息
Injection attacks exploit vulnerabilities in how applications handle user input, allowing malicious code to infiltrate the execution environment of web applications, leading to severe consequences, such as data leaks and system crashes. Traditional dynamic and static detection methods suffer from limitations in manual rule or pattern design and intraprocedural analysis, lacking the capability to automatically learn complex features. Meanwhile, deep learning models encounter challenges, such as feature redundancy and inefficiency, in processing long code sequences. Here, we propose a prototype for detecting Injection Vulnerabilities in java web applications based on Interprocedural analysis and the bidirectional encoder representations from transformers BERT-BiLSTM-CRF model (IVIB), effectively transforming vulnerability detection into text sequence annotation. IVIB employs interprocedural analysis to trace complete program data flow, control flow, method and class dependencies, reducing redundancy through a system dependency graph. Then, we develop intermediate language representation rules and conversion mechanisms specifically for java programs, symbolically representing code snippets and annotating them to construct a corpus. IVIB achieves remarkable results, with over 96% accuracy, precision, recall, and F1-score in binary classification, surpassing other state-of-the-art models in multiclassification performance. Evaluation on real-world projects demonstrates IVIB's effectiveness, detecting 28 vulnerabilities out of 30 vulnerable slices with low false positives and no false negatives.
Various static code analysis tools have been designed to automatically detect software faults and security vulnerabilities. This paper aims to 1) conduct an empirical evaluation to assess the performance of five free ...
详细信息
Various static code analysis tools have been designed to automatically detect software faults and security vulnerabilities. This paper aims to 1) conduct an empirical evaluation to assess the performance of five free and state-of-the-art static analysis tools in detecting java security vulnerabilities using a well-defined and repeatable approach;2) report on the vulnerabilities that are best and worst detected by static java analyzers. We used the Juliet benchmark test suite in a controlled experiment to assess the effectiveness of five widely used java static analysis tools. The vulnerabilities were successfully detected by one, two, or three tools. Only one vulnerability has been detected by four tools. The tools missed 13% of the java vulnerability categories appearing in our experiment. More critically, none of the five tools could identify all the vulnerabilities in our experiment. We conclude that, despite recent improvements in their methodologies, current state-of-the-art static analysis tools are still ineffective for identifying the security vulnerabilities occurring in a small-scale, artificial test suite.
Data lakes are typically large data repositories where enterprises store data in a variety of data formats. From the perspective of data storage, data can be categorized into structured, semi-structured, and unstructu...
详细信息
Data lakes are typically large data repositories where enterprises store data in a variety of data formats. From the perspective of data storage, data can be categorized into structured, semi-structured, and unstructured data. On the one hand, due to the complexity of data forms and transformation procedures, many enterprises simply pour valuable data into data lakes without organizing and managing them effectively. This can create data silos (or data islands) or even data swamps, with the result that some data will be permanently invisible. Although data are integrated into a data lake, they are simply physically stored in the same environment and cannot be correlated with other data to leverage their precious value. On the other hand, processing data from a data lake into a desired format is always a difficult and tedious task that requires experienced programming skills, such as conversion from structured to semi-structured. In this article, a novel software framework called java Annotation for Manipulating Data Lakes (JAMDL) that can manage heterogeneous data is proposed. This approach uses java annotations to express the properties of data in metadata (data about data) so that the data can be converted into different formats and managed efficiently in a data lake. Furthermore, this article suggests using artificial intelligence (AI) translation models to generate Data Manipulation Language (DML) operations for data manipulation and uses AI recommendation models to improve the visibility of data when data precipitation occurs.
Building past snapshots of a software project has shown to be of interest both for researchers and practitioners. However, little attention has been devoted specifically to tests available in those past snapshots, whi...
详细信息
Building past snapshots of a software project has shown to be of interest both for researchers and practitioners. However, little attention has been devoted specifically to tests available in those past snapshots, which are fundamental for the maintenance of old versions still in production. The aim of this study is to determine to which extent tests of past snapshots can be executed successfully, which would mean these past snapshots are still testable. Given a software project, we build all its past snapshots from source code, including tests, and then run the tests. When tests do not result in success, we also record the reasons, allowing us to determine factors that make tests fail. We run this method on a total of 86 java projects. On average, for 52.53% of the project snapshots on which tests can be built, all tests pass. However, on average, 94.14% of tests pass in previous snapshots when we take into account the percentage of tests passing in the snapshots used for building those tests. In real software projects, successfully running tests in past snapshots is not something that we can take for granted: we have found that in a large proportion of the projects we studied this does not happen frequently. We have found that the building from source code is the main limitation when running tests on past snapshots. However, we have found some projects for which tests run successfully in a very large fraction of past snapshots, which allows us to identify good practices. We also provide a framework and metrics to quantify testability (the extent to which we are able to run tests of a snapshot with a success result) of past snapshots from several points of view, which simplifies new analyses on this matter, and could help to measure how any project performs in this respect.
Researchers and tool developers working on dynamic analysis, software testing, automated program repair, verification, and validation, need large compiled, compilable, and executable code corpora to test their ideas. ...
详细信息
Researchers and tool developers working on dynamic analysis, software testing, automated program repair, verification, and validation, need large compiled, compilable, and executable code corpora to test their ideas. The publicly available corpora are relatively small, and/or non-compilable, and/or non-executable. Developing a compiled code corpus is a laborious activity demanding significant manual effort and human intervention. To facilitate large-scale program analysis research, we develop SourcererJBF, a java Build Framework that can automatically build a large java code corpus without project-specific instructions and human intervention. To generate a compiled code corpus, SourcererJBF creates an offline knowledge base by collecting external dependencies from the project directories and existing build scripts (if available). It constructs indices of those collected external dependencies that enable a fast search for resolving dependencies during the project compilation. As the output of the large-scale compilation, it produces JAigantic, a compilable java corpus containing compiled projects, their bytecode, dependencies, normalized build script, and build command. We evaluated SourcererJBF's effectiveness, correctness, performance, and scalability in a large collection of java projects. Our experimental results demonstrate that SourcererJBF is significantly effective and scalable in building large java code corpus. Besides, it substantiates reasonable performance and correctness similar to projects' existing build systems.
We propose a java library, called robustDEA , facilitating the exploration of all scenarios pertinent to Data Envelopment Analysis. These scenarios encompass feasible weights for inputs and outputs, other model parame...
详细信息
We propose a java library, called robustDEA , facilitating the exploration of all scenarios pertinent to Data Envelopment Analysis. These scenarios encompass feasible weights for inputs and outputs, other model parameter values, and the performances of units under examination. The software conducts robustness analysis employing either ratio -based or additive value efficiency models. The integrated methods employ mathematical programming to deliver precise, robust outcomes and Monte Carlo simulations for generating stochastic acceptability indices. The software considers various dimensions of efficiency - scores, pairwise relations, and rankings - while accommodating user -defined preferences through linear constraints and the hierarchical structure of indicators. It has been applied to real -world problems across economics, energy, healthcare, and transport.
The prevalence of bulbuls in the Indonesian cage bird trade raises concerns about its impact on their distributions and, consequently, the ecological balance. This study delves into the trade dynamics of bulbuls, exam...
详细信息
The prevalence of bulbuls in the Indonesian cage bird trade raises concerns about its impact on their distributions and, consequently, the ecological balance. This study delves into the trade dynamics of bulbuls, examining their market prevalence and its correlation with their abundance in the wild and their suitable habitats. We conducted bird market surveys across java, supplemented by online trade surveys to ascertain market prevalence. Concurrently, we collected bulbul's presence data from three databases and field surveys from 2018 to 2023. We used a Random Forest algorithm to predict the suitable habitats for bulbuls. The findings revealed that 20 bulbul species, comprising 11 native and 9 non-native to java, were encountered in 20 bird markets, totalling 35,715 individuals. Sooty-headed (Pycnonotus aurigaster) and yellow-vented (P. goiavier) bulbuls, both Least Concern, dominated the field-RAI (Relative Abundance Index) and trade-RAI. Notably, rare species such as the strawheaded bulbul (P. zeylanicus, Critically Endangered) and extirpated from java, were present in markets. We found no relationship between the field-RAI and the trade-RAI, suggesting that all species were sought after regardless of their abundance. However, we found that threatened species face over-harvesting based on the ratio between trade-RAI and field-RAI. A significant portion of predicted suitable habitats for resident species fell outside bird-friendly areas. Urgent intervention measures, targeting small-scale agroforestry landowners and key sites for population protection, are imperative to mitigate the potential ecological consequences of the bulbul trade and ensure their continued contribution to tropical ecosystem health.
Many plant species native to java are at risk of becoming extinct. The importance of studying the conservation of Smilax on the java Island arises due to limited information regarding its ecology, endemism, and conser...
详细信息
Many plant species native to java are at risk of becoming extinct. The importance of studying the conservation of Smilax on the java Island arises due to limited information regarding its ecology, endemism, and conservation status on the IUCN Red List. Smilax nageliana is an endemic species in East java. This research aims to determine the distribution, population status, and microclimate conditions of S. nageliana, and to provide an update on its conservation status based on the IUCN Red List Categories and Criteria. With an Area of Occupancy (AOO) of 28 km2, S. nageliana is qualified as Critically Endangered, falling under the category of Endangered (EN) according to the IUCN Red List Criteria B1ab(iii) + B2ab(iii). Restricted to only two locations and experiencing a steady decrease in area, distribution, and habitat quality because of forest degradation and conversion, this study proposes that the conservation status of S. nageliana should be labelled as critically endangered (CR) C2a(i), D. The MaxEnt model estimated about 108.99 km2 of East java Province as highly suitable area for S. nageliana' habitat located in seven regencies, i.e. Blitar, Jember, Lumajang, Magetan, Malang, Pasuruan, and Probolinggo. This study also provides information on the population structure, habitat preferences, ecology, and phenology of S. nageliana. This species has been conserved as part of the ex-situ collection at the Purwodadi Botanical Gardens.
Method overriding is a valuable mechanism that happens when an instance method is defined in a subclass and has the same signature and return type as an instance method in the superclass. However, in java, if those me...
详细信息
Method overriding is a valuable mechanism that happens when an instance method is defined in a subclass and has the same signature and return type as an instance method in the superclass. However, in java, if those methods are static, then instead method hiding happens, which is a programming weakness and may produce unexpected results. Static analysis is an approach in software testing that examines code to identify variousAbstractprogramming Abstract programming weaknesses throughout the software development process without running it. This paper addresses the detection of method-hiding problem in java programs. We implemented a new automated checker under the SpotBugs static analysis tool that can detect the mentioned problem. According to our results, the checker precisely detected the related issues in both custom test cases and real- world programs.
暂无评论