A large number of bug reports are created during the evolution of a software system. Locating the source code files that need to be changed in order to fix these bugs is a challenging task. Information retrieval-based...
A large number of bug reports are created during the evolution of a software system. Locating the source code files that need to be changed in order to fix these bugs is a challenging task. Information retrieval-based bug localization techniques do so by correlating bug reports with historical information about the source code (e.g., previously resolved bug reports, commit logs). These techniques have shown to be efficient and easy to use. However, one flaw that is nearly omnipresent in all these techniques is that they ignore code refactorings. Code refactorings are common during software system evolution, but from the perspective of typical version control systems, they break the code history. For example, a class when renamed then appears as two separate classes with separate histories. Obviously, this is a problem that affects any technique that leverages code history. This paper proposes a refactoring-aware traceability model to keep track of the code evolution history. With this model, we reconstruct the code history by analyzing the impact of code refactorings to correctly stitch together what would otherwise be a fragmented history. To demonstrate that a refactoring aware history is indeed beneficial, we investigated three widely adopted bug localization techniques that make use of code history, which are important components in existing approaches. Our evaluation on 11 open source projects shows that taking code refactorings into account significantly improves the results of these bug localization techniques without significant changes to the techniques themselves. The more refactorings are used in a project, the stronger the benefit we observed. Based on our findings, we believe that much of the state of the art leveraging code history should benefit from our work.
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitor...
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitoring and anti-theft alarming system with enhanced physical security mechanisms. The focus of this research was to create a holistic and secure smart home system, combining cutting-edge physical security measures. The study introduced novel Intruder Access Prevention methods rooted in human behavior and voice pattern recognition, while also incorporating blockchain and network traffic analysis to safeguard the homeowner's data. Furthermore, a pioneering voice-controlled monitoring mechanism, utilizing protective energy-saving plug technology, was devised to enhance safety within contemporary households. The human behavior recognition and voice recognition-based intruder access prevention system demonstrated over 80% accuracy in intruder prevention, while user data protection mechanism prevents the communication channel from cyber hackings. Further, the smart plug demonstrates reliable and accurate physical environment monitoring with minimum latency. These results underscore the system's significant contribution to home security, marking a noteworthy advancement in the Smart Home concept.
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, imp...
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, implementation changes can create errors (e.g., parallelism errors), which are difficult to identify since the aggregate behavior of an incorrect implementation of a stochastic network simulation can fall within the distributions expected from correct implementations. In this paper, we propose the first approach that applies machine learning to traces of network simulations to detect errors. Our technique transforms simulation traces into images by reordering the network's adjacency matrix, and then training supervised machine learning models. Our evaluation on three simulation models shows that we can easily detect previously encountered types of errors and even confidently detect new errors. This work opens up numerous opportunities by examining other simulation models, representations (i.e., matrix reordering algorithms), or machine learning techniques.
Making the decision to purchase or invest in real estate can be a very crucial process due to its high financial risk. The purchasing decision of residential real estate properties can be even more decisive because, a...
详细信息
Bug localization is the task of recommending source code locations (typically files) that probably contain the cause of a bug and hence need to be changed to fix the bug. Along these lines, information retrieval-based...
Bug localization is the task of recommending source code locations (typically files) that probably contain the cause of a bug and hence need to be changed to fix the bug. Along these lines, information retrieval-based bug localization (IRBL) approaches have been adopted, which identify the most bug-prone files from the source code space. In current practice, a series of state-of-the-art IRBL techniques leverage the combination of different components, e.g., similar reports, version history, code structure, to achieve better performance. ABLoTS is a recently proposed approach with the core component, TraceScore, that utilizes requirements and traceability information between different issue reports, i.e., feature requests and bug reports, to identify buggy source code snippets with promising results. To evaluate the accuracy of these results and obtain additional insights into the practical applicability of ABLoTS, supporting of future more efficient and rapid replication and comparison, we conducted a replication study of this approach with the original data set and also on an extended data set. The extended data set includes 16 more projects comprising 25,893 bug reports and corresponding source code commits. While we find that the TraceScore component as the core of ABLoTS produces comparable results with the extended data set, we also find that the ABLoTS approach no longer achieves promising results, due to an overlooked side effect of incorrectly choosing a cut-off date that led to training data leaking into test data with significant effects on performance.
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges f...
详细信息
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making *** overcome this challenge,extracting suggestions from opinionated text is a possible *** this study,the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’reviews.A classification using a word-embedding approach is used via the XGBoost *** two datasets used in this experiment relate to online hotel reviews and Microsoft Windows App Studio discussion reviews.F1,precision,recall,and accuracy scores are *** results demonstrated that the XGBoost classifier outperforms—with an accuracy of more than 80%.Moreover,the results revealed that suggestion keywords and phrases are the predominant features for suggestion ***,this study contributes to knowledge and practice by comparing feature extraction classifiers and identifying XGBoost as a better suggestion mining process for identifying online reviews.
The traditional decentralised supply chains are facing challenges to meet the increasing demands for openness, transparency, trust and efficiency. As a result, blockchain-based decentralised supply chains are emerging...
The traditional decentralised supply chains are facing challenges to meet the increasing demands for openness, transparency, trust and efficiency. As a result, blockchain-based decentralised supply chains are emerging. However, how to identify and discover various services in a decentralised supply chain remains an unsolved issue. This paper presents a new framework for modelling and discovering services in decentralised supply chain systems. In the framework, W3C Decentralised Identifier (DID) is adopted to describe service attributes to meet different business and technical requirements for a supply chain service. While blockchain is used for publishing and storing DID, a graphic-database-based service repository is proposed to organize these DID strings in a natural way as a graph for better service discovery. An Ethereum-based prototype is implemented as a proof of concept to demonstrate its feasibility and usefulness.
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o...
详细信息
Microgrids are localized power systems that can function independently or alongside the main grid. They consist of interconnected generators, energy storage, and loads that can be managed locally. Using SystemC-AMS, w...
Microgrids are localized power systems that can function independently or alongside the main grid. They consist of interconnected generators, energy storage, and loads that can be managed locally. Using SystemC-AMS, we demonstrate how microgrid components, including solar panels and converters, can be accurately modeled and simulated, along with their interactions. Real-time simulations are crucial for understanding microgrid behavior and optimizing components. This approach facilitates seamless integration with hardware prototypes and automation systems, supporting various development stages. Our study presents a best-case scenario for real-time simulation, assuming each loop takes less time than the simulation time step, with fallback to the previous value if data isn’t received in time. This article introduces the first known real-time simulation strategy using SystemC-AMS, enabling the real-time simulation of microgrid components and integration with external devices. The implementation adopts a model-based design approach, creating increasingly complex systems with grid components and controllers.
Due to The lack of comparison studies and practical applications of RNN, LSTM, and hybrid RNN-LSTM models for intrusion detection systems, especially when managing class imbalances in complex network datasets, represe...
详细信息
暂无评论