Recognition regarding code clones equivalent or similar source code fragments is of concern both to researchers along with to practitioners. An evaluation of the clone detection results for a single source code versio...
详细信息
ISBN:
(纸本)9781479940400
Recognition regarding code clones equivalent or similar source code fragments is of concern both to researchers along with to practitioners. An evaluation of the clone detection results for a single source code version gives a developer with details about a discrete state in the development of the software system. Nevertheless, tracing clones throughout several source code versions enables a clone analysis to take into consideration a temporal dimension. This kind of an analysis of clone evolution may be utilized to find out the patterns as well as characteristics displayed by clones as they evolve within a system. Developers may utilize the outcomes of this analysis to recognize the clones more thoroughly, which may guide them to handle the clones more consequentially. Hence, studies of clone evolution provide a important role in perceiving as well as handling concerns of cloning in software. This paper gives a systematic overview of the literature on clone evolution. Specifically, we give a complete analysis of 20 appropriate papers that we found as per our review protocol. The review outcomes are arranged to deal with three research questions. As a result of our outcomes to these questions, we provide the approaches that researchers have utilized to analyze clone evolution, the patterns that researchers have detected evolving clones to exhibit, as well as the data that researchers have established concerning the extent of conflicting adjustment gone through clones throughout software evolution. Overall, the review outcomes show that while researchers have carried out many bench marked studies of clone evolution, there are conflicts among the noted findings, specifically concerning the lifetimes of clone lineages as well as the persistence with which clones are modified throughout software evolution. We recognize human-based benchmarked studies along with classification of clone evolution patterns as two areas in specifically require of further work.
The object of this work is the thermal and moisture performance analysis of building exterior walls, by means of a software code developed by the authors, according to the European Standard ISO 13788:2001. In particul...
详细信息
The object of this work is the thermal and moisture performance analysis of building exterior walls, by means of a software code developed by the authors, according to the European Standard ISO 13788:2001. In particular, the European Standard focuses on two of the main reasons that cause moisture degradation in building envelopes: critical surface humidity and interstitial condensation. The approach is based on the steady-state diffusion theory and calculations are carried out on monthly basis, taking into account internal moisture production rates and outdoor climatic conditions. A user-friendly software tool (TMCE, i.e. thermal and moisture control for envelopes), developed in order to quickly and easily assess moisture and thermal behaviour of building components, is presented. The software, with graphical user interface, allows: (i) to determine the minimum thermal resistance of a building component in order to avoid critical surface humidity, and (ii) to check if interstitial condensation occurs in a multi-layer wall. In case of condensation occurrence during the winter months, the rate of condensed vapour is calculated, and the possibility that the moisture is completely removed during the warmer periods is evaluated. TMCE has been then used to analyse moisture and thermal characteristics of building components on varying input parameters such as outdoor climatic conditions and indoor moisture production;some relevant results and a case study are also presented. (C) 2003 Published by Elsevier Science Ltd.
Recent availability of video-cameras with CCD-type sensors (charge coupled device) has proved to be particularly stimulating for all those applications requiring photometric measurements, above all for the measurement...
详细信息
Recent availability of video-cameras with CCD-type sensors (charge coupled device) has proved to be particularly stimulating for all those applications requiring photometric measurements, above all for the measurement of luminance values related to the physical and technical qualities of a built environment. This method allows the instantaneous capture of an image, thus enabling collection of luminance values relating to the points of measurement;this in turn leads to the evaluation of luminance distribution and lighting levels of the surfaces that make up the environment. Setting up this system requires the following basic configuration: a photopic filter V(lambda), an optic interface, a computer equipped with an appropriate card for the capture and digitalisation of the acquired image (the "frame grabber") and, finally, suitable software for the processing of collected data. In this article a detailed description of this acquisition system is reported, and subsequently a report on the procedure adopted for its calibration so as to enable the capture of relevant photometric values. Final analysis and validation of results are carried out by means of field test. A case study of CCD photometer application has been then performed using a basic software tool autonomously developed to evaluate indoor lighting level;the luminance map of a diffuse light source has been used as "input" data for the developed software, and the "output" data, i.e. illumination levels, have been then compared with measured values. (C) 2002 Elsevier Science Ltd. All rights reserved.
A method is proposed, which allows evaluation of moisture in building envelopes taking into account sorption properties of timber or other materials with pronounced sorption. This is essential in many situations when ...
详细信息
A method is proposed, which allows evaluation of moisture in building envelopes taking into account sorption properties of timber or other materials with pronounced sorption. This is essential in many situations when apparently no risk of degradation of the envelope occurs in the absence of condensation. The method implemented was the 3D numerical code, which allows to take into account the risks of thermal bridges. The results of computation can be compared to standard requirements on moisture content in the envelope. (c) 2005 Elsevier Ltd. All rights reserved.
Genetic algorithm (GA) has been adopted for the optimisation of the slow wave structure (SWS) of an X-band helix travelling wave tube. To reduce the optimisation time and to achieve the desired performance, a software...
详细信息
Genetic algorithm (GA) has been adopted for the optimisation of the slow wave structure (SWS) of an X-band helix travelling wave tube. To reduce the optimisation time and to achieve the desired performance, a software code based on GA has been developed to automate the optimisation process of the helix SWS. A two-section SWS has been optimised. The pitches and the lengths of all the subsections have been considered with the objective of achieving the desired saturated output power and the saturated gain over the operating frequency range. The procedure for the implementation of the GA has been demonstrated. Multiple trials have been conducted for achieving the most optimal set of parameters. The cost over several generations for all the trials is presented and the optimised values of the saturated output power and the saturated gain are also shown.
Quality assurance is a continuous process throughout the project lifecycle from inception till post-delivery. software metrics are tools to help developers in achieving software quality objectives. software metrics ar...
详细信息
Quality assurance is a continuous process throughout the project lifecycle from inception till post-delivery. software metrics are tools to help developers in achieving software quality objectives. software metrics are used to predict the fault-proneness of classes in software using machine-learning and statistical techniques. However, these methodologies are difficult for daily tasks. Simpler and on the fly methodologies such as threshold values are needed. Metric thresholds can be used to control software quality and to recommend improvements on software code. Thresholds detect the parts of software that need more verification and validation. Many threshold identification techniques were proposed in previous research. However, the techniques do not provide consistent thresholds. The authors compare eight threshold identification techniques to diagnose software fault-proneness. The eight techniques are derived from diagnosis measures such as specificity, sensitivity, recall and precision. Five threshold identification techniques have derived thresholds that are skewed and have large standard deviations. Only three techniques are selected for threshold identification based on consistency and variation in selecting thresholds of software metrics in the systems under study. These techniques find thresholds that have the least variation among the studied techniques. The median of the 11 systems is selected as a representative of all thresholds.
Motivated by the idea of reusing existing source code from previous projects within a software company, in this paper, we present a new source code recommendation technique called "SoCeR" to help programmers...
详细信息
ISBN:
(纸本)9781728173030
Motivated by the idea of reusing existing source code from previous projects within a software company, in this paper, we present a new source code recommendation technique called "SoCeR" to help programmers find relevant implementations or sample code based on software requirement specifications. SoCeR assists programmers to search existing code repositories using natural language query. Our proposed approach summarizes Python code into sentences or phrases to match them against user queries. SoCeR extracts and analyzes the content of the code (such as variables, functions, docstrings, and comments) to generate code summary for each function which is then mapped to the respective functions. For evaluation purposes, we developed a web-based tool for users to enter a textual search query and get the relevant code search results that were most relevant to the query. In SoCeR, users can also upload new code to enrich the code base with tested code. If adopted, then SoCeR will benefit a software company to build a trusted code base enabling large-scale software code reuse.
This work presents inspect4py, a static code analysis framework designed to automatically extract the main features, metadata and documentation of Python code repositories. Given an input folder with code, inspect4py ...
详细信息
ISBN:
(纸本)9781450393034
This work presents inspect4py, a static code analysis framework designed to automatically extract the main features, metadata and documentation of Python code repositories. Given an input folder with code, inspect4py uses abstract syntax trees and state of the art tools to find all functions, classes, tests, documentation, call graphs, module dependencies and control flows within all code files in that repository. Using these findings, inspect4py infers different ways of invoking a software component. We have evaluated our framework on 95 annotated repositories, obtaining promising results for software type classification (over 95% F1-score). With inspect4py, we aim to ease the understandability and adoption of software repositories by other researchers and developers.
The security concerns of EDA tools have long been ignored because IC designers and integrators only focus on their functionality and performance. This lack of trusted EDA tools hampers hardware security researchers...
详细信息
ISBN:
(纸本)9783981537024
The security concerns of EDA tools have long been ignored because IC designers and integrators only focus on their functionality and performance. This lack of trusted EDA tools hampers hardware security researchers' efforts to design trusted integrated circuits. To address this concern, a novel EDA tools trust evaluation framework has been proposed to ensure the trustworthiness of EDA tools through its functional operation, rather than scrutinizing the software code. As a result, the newly proposed framework lowers the evaluation cost and is a better fit for hardware security researchers. To support the EDA tools evaluation framework, a new gate-level information assurance scheme is developed for security property checking on any gatelevel netlist. Helped by the gate-level scheme, we expand the territory of proof-carrying based IP protection from RT-level designs to gate-level netlist, so that most of the commercially trading third-party IP cores are under the protection of proof-carrying based security properties. Using a sample AES encryption core, we successfully prove the trustworthiness of Synopsys Design Compiler in generating a synthesized netlist.
Background: The use of mobile devices for delivering health -related services (mobile health [mHealth]) has rapidly increased, leading to a demand for summarizing the state of the art and practice through systematic r...
详细信息
Background: The use of mobile devices for delivering health -related services (mobile health [mHealth]) has rapidly increased, leading to a demand for summarizing the state of the art and practice through systematic reviews. However, the systematic review process is a resource -intensive and time-consuming process. Generative artificial intelligence (AI) has emerged as a potential solution to automate tedious tasks. Objective: This study aimed to explore the feasibility of using generative AI tools to automate time-consuming and resource -intensive tasks in a systematic review process and assess the scope and limitations of using such tools. Methods: We used the design science research methodology. The solution proposed is to use cocreation with a generative AI, such as ChatGPT, to produce software code that automates the process of conducting systematic reviews. Results: A triggering prompt was generated, and assistance from the generative AI was used to guide the steps toward developing, executing, and debugging a Python script. Errors in code were solved through conversational exchange with ChatGPT, and a tentative script was created. The code pulled the mHealth solutions from the Google Play Store and searched their descriptions for keywords that hinted toward evidence base. The results were exported to a CSV file, which was compared to the initial outputs of other similar systematic review processes. Conclusions: This study demonstrates the potential of using generative AI to automate the time-consuming process of conducting systematic reviews of mHealth apps. This approach could be particularly useful for researchers with limited coding skills. However, the study has limitations related to the design science research methodology, subjectivity bias, and the quality of the search results used to train the language model.
暂无评论