User Experience (UX) evaluation has a significant importance for any interactive application. Mobile device applications have additional limitations to convey good user experiences (UX) due to the usage and features o...
详细信息
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by develop...
详细信息
ISBN:
(纸本)9798350311846
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by developers. Indiscriminate robustness changes (e.g., the addition of empty catch blocks) can indicate design decisions that negatively impact the internal quality of software systems. As it is known in the literature, multiple occurrences of poor code structures, namely code smells, are strong indicators of design problems. Still, existing studies focus mainly on the correlation of maintainability smells with design problems. However, using only these smells may not be enough since developers need more context (e.g., system domain) to identify the problems in certain scenarios. Moreover, these studies do not explore how changes in the exceptional code of the methods combined with maintainability smells can give complementary evidence of design problems. By covering both regular and exception codes, the developer can have more context about the system and find complementary code smells that reinforce the presence of design problems. This work aims to leverage the identification of design problems by tracking poor robustness changes combined with maintainability smells. We investigated the correlation between robustness changes and maintainability smells on the commit history of more than 160k methods from different releases of 10 open-source software systems. We observed that maintainability smells can be worsened or even introduced when robustness changes are performed. This scenario mainly happened for the smells Feature Envy, Long Method, and Dispersed Coupling. We also analyzed the co-occurrence between robustness and maintainability smells. We identified that the empty catch block and catch throwable robustness smells were the ones that co-occurred the most with maintainability smells related to the Concern Overload and Misplaced Concern design problems. T
To reduce the work effort for developing and managing Digital Twin (DT)-based services, so-called DT platforms have emerged recently. These DT platforms make it easier to collect, store, and manage data from physical ...
详细信息
The human voice carries a great deal of useful information. This information can be utilized in various areas such as call centers, security and medicine among many others. This work aims at implementing a speech emot...
详细信息
Respiratory sound auscultation with digital stethoscopes is a common technique for identifying lung disorders, however, it requires a qualified medical expert to interpret the sounds, and inter-listener variability re...
详细信息
Modeling and replicating the channel effects between a transmitter and receiver, is crucial in any telecommunication system, in order to evaluate the impact on the transmitted data. Therefore the necessity of having a...
Modeling and replicating the channel effects between a transmitter and receiver, is crucial in any telecommunication system, in order to evaluate the impact on the transmitted data. Therefore the necessity of having access to a real time channel emulator is vital. In order to meet these constraints, in this work we present a flexible, high performance and resource efficient FPGA-based channel emulator, focusing on fading models. Additionally, we perform a trade-off analysis between bit accuracy, resources utilization and system’s accuracy in terms of Mean Relative Error and the Probability Density Function. Our study shows that by using a circuit with reduced bit-widths, we can achieve 24%–46% reduction in various resources, while preserving the algorithmic accuracy of the channel emulator and operating at a throughput of 500Msps.
The influence maximization problem (IMP) has been proposed in social networks. Nowadays, it is considered an important and practical problem due to the earnings potential by identifying a set of influential nodes, and...
详细信息
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and wide...
详细信息
ISBN:
(数字)9798350368833
ISBN:
(纸本)9798350368840
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and widespread appeal, deception of this sort is hurting millions of people and growing more dangerous. The current work, as part of the AILA (Artificial Intelligence-driven Framework and Legal Advice Tools for Phishing Prevention and Mitigation in Information Systems) project, aims to specify and validate an AI-driven multifactor (human, technology and legal) anti-phishing data model, with the implementation of focus group studies. The findings assist to provide human, technology, and legislative user model endpoints that will be identified and discussed for explicit and implicit user modeling, which will guide the development of the corresponding AI-driven user modeling and profiling mechanisms. To this end a Large Language System is planned to be employed.
One of the biggest problems in V2X communication is the inclusion of faulty or illegal nodes in the network. In V2X systems using PKI, the primary approach is to revoke the certificates of malicious and compromised ve...
详细信息
Information is widely available and accessible, but frequently leads to information overload and overexposure and the effort for coding, storing, hiding, securing, transmitting, and retrieving it may be excessive. Int...
详细信息
暂无评论