pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. pseudo-code helps developers and researchers represent their algorithms using...
详细信息
pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. pseudo-code helps developers and researchers represent their algorithms using human-readable language. Generally, researchers can convert the pseudo-code into computer source code using different conversion techniques. The efficiency of such conversion methods is measured based on the converted algorithm's correctness. Researchers have already explored diverse technologies to devise conversion methods with higher accuracy. This paper proposes a novel pseudo-code conversion learning method that includes natural language processing-based text preprocessing and a sequence-to-sequence deep learning-based model trained with the SPoC dataset. We conducted an extensive experiment on our designed algorithm using descriptive bilingual understudy scoring and compared our results with state-of-the-art techniques. Result analysis shows that our approach is more accurate and efficient than other existing conversion methods in terms of several performances metrics. Furthermore, the proposed method outperforms the existing approaches because our method utilizes two Long-Short-Term-Memory networks that might increase the accuracy.
code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most...
详细信息
code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most circumstances,binary-level code similarity analysis(BCSA)has been paid much attention *** recent years,many BCSA studies incorporating Al techniques focus on deriving semantic information from binary functions with code representations such as assembly code,intermediate representations,and control flow graphs to measure the ***,due to the impacts of different compilers,architectures,and obfuscations,binaries compiled from the same source code may vary considerably,which becomes the major obstacle for these works to obtain robust *** this paper,we propose a solution,named UPPC(Unleashing the Power of pseudo-code),which leverages the pseudo-code of binary function as input,to address the binary code similarity analysis challenge,since pseudocode has higher abstraction and is platform-independent compared to binary *** selectively inlines the functions to capture the full function semantics across different compiler optimization levels and uses a deep pyramidal convolutional neural network to obtain the semantic embedding of the *** evaluated UPPC on a data set containing vulnerabilities and a data set including different architectures(X86,ARM),different optimization options(O0-O3),different compilers(GCC,Clang),and four obfuscation *** experimental results show that the accuracy of UPPC in function search is 33.2%higher than that of existing methods.
The paper presents an experiential approach to a real time activity of designers at a conceptual stage of their work. The offered approach is based on a pseudo-code simulation of such activity. The simulation are bein...
详细信息
ISBN:
(纸本)9780956494467
The paper presents an experiential approach to a real time activity of designers at a conceptual stage of their work. The offered approach is based on a pseudo-code simulation of such activity. The simulation are being implemented by the designer who investigate own actions aimed at the conceptual solution of the project task.
The availability of data is the driving force behind most of the state-of-the-art techniques for machine translation tasks. Understandably, this availability of data motivates researchers to propose new techniques and...
详细信息
The availability of data is the driving force behind most of the state-of-the-art techniques for machine translation tasks. Understandably, this availability of data motivates researchers to propose new techniques and claim about the superiority of their techniques over the existing ones by using suitable evaluation measures. However, the performance of underlying learning algorithms can be greatly influenced by the correctness and the consistency of the corpus. We present our investigations for the relevance of a publicly available python to pseudo-code parallel corpus for automated documentation task, and the studies performed using this corpus. We found that the corpus had many visible issues like overlapping of instances, inconsistency in translation styles, incompleteness, and misspelled words. We show that these discrepancies can significantly influence the performance of the learning algorithms to the extent that they could have caused previous studies to draw incorrect conclusions. We performed our experimental study using statistical machine translation and neural machine translation models. We have recorded a significant difference (similar to 10% on BLEU score) in the models' performance after removing the issues from the corpus.
pseudo-code is a well-known and widely used tool for beginners in learning programming. It supposes a first approach to a textual programming language avoiding in part the formalities of these, for example, using the ...
详细信息
ISBN:
(数字)9781665474641
ISBN:
(纸本)9781665474641
pseudo-code is a well-known and widely used tool for beginners in learning programming. It supposes a first approach to a textual programming language avoiding in part the formalities of these, for example, using the mother tongue pseudocode. The intuitive idea is that much of the pseudo-code used today is similar and quite close to a direct translation from high level programming languages. The motivation of this work is to investigate to what extent the pseudo-code fulfills its function of approach to programming. the main objective of pseudo-code is to express the tasks to be carried out by the program. Therefor, to facilitate learning, pseudo-code's constructions should be easy to understand. This work focuses on keywords commonly used for basic instructions and execution flow control. It consists of a survey of students from different vocational training cycles about these keywords. The initial result seems to show that, in some cases, their responses match the "classic" pseudo-code, but in others they are quite different. However, we believe it is convenient to extend the study to a greater population.
The ATML documents are used to describe test information and are represented in XML format. We can consider using computer to automatically identify and extract relevant test information in the document, based on whic...
详细信息
ISBN:
(数字)9781728157122
ISBN:
(纸本)9781728157122
The ATML documents are used to describe test information and are represented in XML format. We can consider using computer to automatically identify and extract relevant test information in the document, based on which the test program of the test system can be automatically generated. Therefore, it is necessary to analyze the documents that representing the elements of the test system to determine the pseudo-code representation of these elements, so as to facilitate the automatic generation of test programs. This paper analyses the test capability of test instruments in ATML test description document and the test requirements of UUT, as well as the cable connection between ATE, ITA and UUT. On this basis, the data structures of connectors, ports, resources, switches, capabilities and cable connections are defined, which lays the foundation for automatic generation of test programs.
pseudo-code written in natural language and mathematical expressions is a useful description of source code. pseudocode aids programmers in understanding the code written in a programming language they are not familia...
详细信息
ISBN:
(纸本)9781728112411
pseudo-code written in natural language and mathematical expressions is a useful description of source code. pseudocode aids programmers in understanding the code written in a programming language they are not familiar with. However, writing pseudo-code for each code statement is labour intensive. In this paper, we propose a novel approach to automatically generate pseudo-code from source code using Neural Machine Translation. Our model is built upon the deep learning encoder-decoder using the attention-based Long Short-Term Memory architecture to capture the long-term dependencies in both source code and pseudo-code. An empirical evaluation on a real Python dataset demonstrates the applicability of our approach in practice.
The California Department of Energy oversees a set of standards and rules that new constructions (i.e., buildings) must adhere to within the State of California (the California Energy code). Energy code Ace (ECA) is a...
详细信息
ISBN:
(纸本)9798350327830
The California Department of Energy oversees a set of standards and rules that new constructions (i.e., buildings) must adhere to within the State of California (the California Energy code). Energy code Ace (ECA) is a website that helps users plan their future construction in California and see if the plans for their structure comply with the California Energy code. However, there are thousands of details and sections in the California Energy code that need to be translated into questions and fields on the website for the user to fill out. To do this, the Department of Energy provides a web development team at Binary Evolution with XML schematics that contain details of each field and pseudo-code of the logic that fields should follow compared to the other fields on the ECA website. A very large portion of the developers' job involves reading the pseudo-code and writing real code in a language developed by Binary Evolution. Reading and handwriting the code as described in the schematics can take up to hours of a developer's time. This paper presents ECAi, a new approach for automatically generating executable code from pseudo-code schematics. ECAi uses a Decision Tree Classifier trained on 23,864 lines of pseudo-code and had to classify a line of pseudo-code into one of 13 categories achieving an 89.87% F1-score. Leveraging the classifier category, ECAi then calls a code-writing algorithm to parse the line of pseudo-code and writes the executable code that corresponds with the given pseudo-code line. The implementation of a prototype of the system shows a statistically significant (p=0.0116) decrease in the time it takes a developer to obtain an executable piece of code. ECAi has saved countless hours of development work during the maintenance workflow of ECA.
The present researchers urgently need a network tool that is able to edit pseudo-code and convert it into source code on-line. This paper puts forward an XML-based pseudo- code online editing and conversion system. Th...
详细信息
The present researchers urgently need a network tool that is able to edit pseudo-code and convert it into source code on-line. This paper puts forward an XML-based pseudo- code online editing and conversion system. The pseudo-code is described and saved with XML document which is analyzed and parsed by DOM4J, so as to realize the reuse of pseudo- code and source code.
In this paper, the design of a pseudo-code CW Rendezvous and Docking (RVD) radar signal processor is presented. The system is made of radar and transponder, radar transmits spread-spectrum signal modu
In this paper, the design of a pseudo-code CW Rendezvous and Docking (RVD) radar signal processor is presented. The system is made of radar and transponder, radar transmits spread-spectrum signal modu
暂无评论