首页 > 最新文献

Proceedings of the 2021 European Symposium on Software Engineering最新文献

英文 中文
Systematizing the Meta-Analytical Process in Software Engineering 系统化软件工程中的元分析过程
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501775
M. L. Jaccheri, Zamira Kholmatova, G. Succi
The generalization of knowledge is a necessary part of every scientific field. Meta-analysis is already advocated as a tool for generalization in different areas such as medicine, psychology, business, and this process is already standardized for them. Software engineering started using meta-analysis as a tool for aggregating results from families of experiments, but not so long for generalization of results coming from different studies, and for this purpose, the meta-analytical approach is not yet clarified. In this paper, we attempt to systematize the application of meta-analysis as a secondary study to the software engineering field suggesting our preliminary protocol. To see the reliability of the proposed protocol we conducted several studies using it. Following even uniform protocol with these studies, we identified the issues preventing the wide usage of meta-analysis in software engineering and proposed our solutions for them.
知识的概括是每一个科学领域的必要组成部分。在医学、心理学、商业等不同领域,元分析已经被提倡作为一种概括的工具,并且这个过程已经为他们标准化了。软件工程开始使用元分析作为汇总实验结果的工具,但对来自不同研究的结果进行概括的时间并不长,为此目的,元分析方法尚未明确。在本文中,我们试图将元分析作为辅助研究系统化地应用于软件工程领域,并提出我们的初步方案。为了验证提议方案的可靠性,我们使用它进行了几项研究。遵循这些研究的统一协议,我们确定了阻碍元分析在软件工程中广泛使用的问题,并提出了我们的解决方案。
{"title":"Systematizing the Meta-Analytical Process in Software Engineering","authors":"M. L. Jaccheri, Zamira Kholmatova, G. Succi","doi":"10.1145/3501774.3501775","DOIUrl":"https://doi.org/10.1145/3501774.3501775","url":null,"abstract":"The generalization of knowledge is a necessary part of every scientific field. Meta-analysis is already advocated as a tool for generalization in different areas such as medicine, psychology, business, and this process is already standardized for them. Software engineering started using meta-analysis as a tool for aggregating results from families of experiments, but not so long for generalization of results coming from different studies, and for this purpose, the meta-analytical approach is not yet clarified. In this paper, we attempt to systematize the application of meta-analysis as a secondary study to the software engineering field suggesting our preliminary protocol. To see the reliability of the proposed protocol we conducted several studies using it. Following even uniform protocol with these studies, we identified the issues preventing the wide usage of meta-analysis in software engineering and proposed our solutions for them.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating energy efficiency measurement into CICD pipeline 将能效测量集成到CI / CD管道中
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501777
A. Kruglov, G. Succi, X. Vasquez
In this paper we present the method and tool for linking the analysis of a software at the development stage with the efficiency of the developed product during operation mode from the energy consumption perspective. The purpose of the method is to recognize the bottlenecks of a program and provide recommendations for improving the structure and run-time behavior of the software. The developed tool consists of two subsystems: first is responsible for static analysis of the code and relevant software metrics, second performs analysis of the power consumption of the application. Analysis of the outputs of both components allows us to create a close-loop system for continuous analysis and optimization of the developing software product.
在本文中,我们提出了从能耗角度将软件开发阶段的分析与已开发产品在运行模式下的效率联系起来的方法和工具。该方法的目的是识别程序的瓶颈,并为改进软件的结构和运行时行为提供建议。开发的工具由两个子系统组成:第一个子系统负责代码和相关软件度量的静态分析,第二个子系统执行应用程序功耗的分析。分析这两个组件的输出使我们能够创建一个闭环系统,用于持续分析和优化开发中的软件产品。
{"title":"Incorporating energy efficiency measurement into CICD pipeline","authors":"A. Kruglov, G. Succi, X. Vasquez","doi":"10.1145/3501774.3501777","DOIUrl":"https://doi.org/10.1145/3501774.3501777","url":null,"abstract":"In this paper we present the method and tool for linking the analysis of a software at the development stage with the efficiency of the developed product during operation mode from the energy consumption perspective. The purpose of the method is to recognize the bottlenecks of a program and provide recommendations for improving the structure and run-time behavior of the software. The developed tool consists of two subsystems: first is responsible for static analysis of the code and relevant software metrics, second performs analysis of the power consumption of the application. Analysis of the outputs of both components allows us to create a close-loop system for continuous analysis and optimization of the developing software product.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":" 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120828824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Alternative Acquisition Functions of Bayesian Optimization in terms of Noisy Observation 基于噪声观测的贝叶斯优化的可选获取函数
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501791
Jia-yi Hu, Yuze Jiang, Jiayu Li, Tianyue Yuan
In this paper, we introduce a variety of acquisition functions currently used in Bayesian optimization. Besides the traditional acquisition functions like Probability Improvement (PI), Expected Improvement (EI) and Gaussian Process-Upper Confidence Bound (GP-UCB), we also present some modified or improved EI and PI methods, Knowledge Gradient (KG) and Predictive Entropy Search (PES) methods to explore ways to reduce the impact of observational noise. In experimental part, we choose a benchmark function and use Bayesian optimization algorithm to find its global minimum. We add different scales of noise in particular following the Gaussian distribution to the benchmark function, to compare the performance of BO algorithm using different acquisition functions. Combined with the experimental results, we also present a discussion of the pros and cons of using those acquisition functions. Hope this can provide some experience and suggestions for choosing acquisition functions in terms of noisy observation.
在本文中,我们介绍了目前贝叶斯优化中使用的各种采集函数。除了传统的概率改进(PI)、期望改进(EI)和高斯过程上置信度(GP-UCB)等获取函数外,我们还提出了改进的EI和PI方法、知识梯度(KG)和预测熵搜索(PES)方法来探索降低观测噪声影响的方法。在实验部分,我们选择一个基准函数,并使用贝叶斯优化算法找到它的全局最小值。我们在基准函数中加入了不同尺度的噪声,特别是遵循高斯分布的噪声,以比较使用不同采集函数的BO算法的性能。结合实验结果,我们还讨论了使用这些采集函数的利弊。希望能为噪声观测中采集函数的选择提供一些经验和建议。
{"title":"Alternative Acquisition Functions of Bayesian Optimization in terms of Noisy Observation","authors":"Jia-yi Hu, Yuze Jiang, Jiayu Li, Tianyue Yuan","doi":"10.1145/3501774.3501791","DOIUrl":"https://doi.org/10.1145/3501774.3501791","url":null,"abstract":"In this paper, we introduce a variety of acquisition functions currently used in Bayesian optimization. Besides the traditional acquisition functions like Probability Improvement (PI), Expected Improvement (EI) and Gaussian Process-Upper Confidence Bound (GP-UCB), we also present some modified or improved EI and PI methods, Knowledge Gradient (KG) and Predictive Entropy Search (PES) methods to explore ways to reduce the impact of observational noise. In experimental part, we choose a benchmark function and use Bayesian optimization algorithm to find its global minimum. We add different scales of noise in particular following the Gaussian distribution to the benchmark function, to compare the performance of BO algorithm using different acquisition functions. Combined with the experimental results, we also present a discussion of the pros and cons of using those acquisition functions. Hope this can provide some experience and suggestions for choosing acquisition functions in terms of noisy observation.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131735315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Multiclass Classification of Cybersecurity Breaches in Railway Infrastructure using Imbalanced Learning 利用不平衡学习改进铁路基础设施网络安全漏洞多类分类
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501789
Aleksandr N. Nebaba, I. Savvas, M. Butakova, A. Chernov, Petr S. Shevchuk
Machine learning approaches and algorithms are spreading in wide areas in research and technology. Cybersecurity breaches are the common anomalies for networked and distributed infrastructures which are monitored, registered, and described carefully. However, the description of each security breaches episode and its classification is still a difficult problem, especially in highly complex telecommunication infrastructure. Railway information infrastructure usually has a large scale and large diversity of possible security breaches. Today's situation shows the registering of the security breaches has a mature and stable character, but the problem of their automated classification is not solved completely. Many studies on security breaches multiclass classification show inadequate accuracy of classification. We investigated the origins of this problem and suggested the possible roots consist in disbalance the datasets used for machine learning multiclass classification. Thus, we proposed an approach to improve the accuracy of the classification and verified our approach on the really collected datasets with cybersecurity breaches in railway telecommunication infrastructure. We analyzed the results of applying three imbalanced learning methodologies, namely random oversampling, synthetic minority oversampling technique, and the last one with Tomek links. We have implemented three machine learning algorithms, namely Naïve Bayes, K-means, and support vector machine, on disbalances and balanced data to estimate imbalance learning methodologies with comparing results. The proposed approach demonstrated the increase of the accuracy for multiclass classification in the range from 30 to 41%, depending on the imbalanced learning technique.
机器学习方法和算法正在广泛的研究和技术领域中传播。网络安全漏洞是网络和分布式基础设施的常见异常,需要仔细监控、注册和描述。然而,安全漏洞事件的描述及其分类仍然是一个难题,特别是在高度复杂的电信基础设施中。铁路信息基础设施通常具有规模大、种类多的安全漏洞。目前的情况表明,安全漏洞的登记具有成熟和稳定的特点,但其自动分类的问题并没有完全解决。许多关于安全漏洞多类分类的研究表明,分类的准确性不足。我们研究了这个问题的根源,并提出可能的根源在于用于机器学习多类分类的数据集的不平衡。因此,我们提出了一种提高分类准确性的方法,并在铁路电信基础设施中具有网络安全漏洞的真实收集数据集上验证了我们的方法。我们分析了三种不平衡学习方法的结果,即随机过采样技术、合成少数过采样技术和最后一种带有Tomek链接的不平衡学习方法。我们在失衡和平衡数据上实现了三种机器学习算法,即Naïve贝叶斯、K-means和支持向量机,通过比较结果来估计失衡学习方法。根据不平衡学习技术的不同,所提出的方法可以将多类分类的准确率提高30%到41%。
{"title":"Improving Multiclass Classification of Cybersecurity Breaches in Railway Infrastructure using Imbalanced Learning","authors":"Aleksandr N. Nebaba, I. Savvas, M. Butakova, A. Chernov, Petr S. Shevchuk","doi":"10.1145/3501774.3501789","DOIUrl":"https://doi.org/10.1145/3501774.3501789","url":null,"abstract":"Machine learning approaches and algorithms are spreading in wide areas in research and technology. Cybersecurity breaches are the common anomalies for networked and distributed infrastructures which are monitored, registered, and described carefully. However, the description of each security breaches episode and its classification is still a difficult problem, especially in highly complex telecommunication infrastructure. Railway information infrastructure usually has a large scale and large diversity of possible security breaches. Today's situation shows the registering of the security breaches has a mature and stable character, but the problem of their automated classification is not solved completely. Many studies on security breaches multiclass classification show inadequate accuracy of classification. We investigated the origins of this problem and suggested the possible roots consist in disbalance the datasets used for machine learning multiclass classification. Thus, we proposed an approach to improve the accuracy of the classification and verified our approach on the really collected datasets with cybersecurity breaches in railway telecommunication infrastructure. We analyzed the results of applying three imbalanced learning methodologies, namely random oversampling, synthetic minority oversampling technique, and the last one with Tomek links. We have implemented three machine learning algorithms, namely Naïve Bayes, K-means, and support vector machine, on disbalances and balanced data to estimate imbalance learning methodologies with comparing results. The proposed approach demonstrated the increase of the accuracy for multiclass classification in the range from 30 to 41%, depending on the imbalanced learning technique.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125507902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploratory Teaching Proposal of Greek History Independence Events based on STEAM Epistemology, Educational Robotics and Smart Learning Technologies 基于STEAM认识论、教育机器人和智能学习技术的希腊历史独立事件探索性教学方案
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501792
Spyridon Kourtis, Apostolos Xenakis, K. Kalovrektis, Antonios Plageras, Ioanna Chalvantzi
Digital technologies help students to delve into the process of scientific discovery. Curriculum integration of STEM contents based on constructivism theories of learning as a context to implement the Science, Technology, Engineering, Mathematics (STEM) epistemology. In this work, we proposed an Inquiry based STEM constructivist teaching and learning methodology for Historical events of the Greek Revolution, enriched with smart learning technologies and engineering practices, while combining Educational Robotics approach. In particular, students design and built a history – line and program their robot to move towards each station, which represent an important timestamp event for Greek Revolution. The robot reads the station's QR code, via a smartphone attached to it, and then returns back to its base. Students retrieve information regarding historical events and according to an APP on their smartphone, they play a knowledge game, concerning these events. This work also highlights, via qualitative results, the additional value that smart learning technologiesand educational robotics give to theoretical subjects, such as History, which should need to be taught in an exploratory way. In that way, students are actively involved in hands – on activities and engineering design process, gaining knowledge from subjects as technology, computer science and engineering.
数字技术帮助学生深入研究科学发现的过程。基于建构主义学习理论的STEM课程整合:以科学、技术、工程、数学(STEM)认识论为背景。在这项工作中,我们提出了一种基于探究的STEM建构主义教学方法,用于希腊革命的历史事件,丰富了智能学习技术和工程实践,同时结合了教育机器人方法。特别地,学生们设计并建造了一条历史线,并对机器人进行编程,使其向每个车站移动,这些车站代表了希腊革命的一个重要时间戳事件。机器人通过连接在其上的智能手机读取车站的二维码,然后返回基地。学生检索有关历史事件的信息,并根据智能手机上的一个APP,就这些事件进行知识游戏。通过定性结果,这项工作还强调了智能学习技术和教育机器人给理论学科(如历史)带来的额外价值,这些学科应该以探索的方式进行教学。通过这种方式,学生们积极参与实践活动和工程设计过程,从技术、计算机科学和工程等学科中获得知识。
{"title":"An Exploratory Teaching Proposal of Greek History Independence Events based on STEAM Epistemology, Educational Robotics and Smart Learning Technologies","authors":"Spyridon Kourtis, Apostolos Xenakis, K. Kalovrektis, Antonios Plageras, Ioanna Chalvantzi","doi":"10.1145/3501774.3501792","DOIUrl":"https://doi.org/10.1145/3501774.3501792","url":null,"abstract":"Digital technologies help students to delve into the process of scientific discovery. Curriculum integration of STEM contents based on constructivism theories of learning as a context to implement the Science, Technology, Engineering, Mathematics (STEM) epistemology. In this work, we proposed an Inquiry based STEM constructivist teaching and learning methodology for Historical events of the Greek Revolution, enriched with smart learning technologies and engineering practices, while combining Educational Robotics approach. In particular, students design and built a history – line and program their robot to move towards each station, which represent an important timestamp event for Greek Revolution. The robot reads the station's QR code, via a smartphone attached to it, and then returns back to its base. Students retrieve information regarding historical events and according to an APP on their smartphone, they play a knowledge game, concerning these events. This work also highlights, via qualitative results, the additional value that smart learning technologiesand educational robotics give to theoretical subjects, such as History, which should need to be taught in an exploratory way. In that way, students are actively involved in hands – on activities and engineering design process, gaining knowledge from subjects as technology, computer science and engineering.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"78 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
You don't need a Microservices Architecture (yet): Monoliths may do the trick 你还不需要一个微服务架构(目前):单体架构可以满足你的需求
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501780
Dimitrios Gravanis, George Kakarontzas, V. Gerogiannis
Within the past decade, the advent of cloud computing in terms of infrastructure, technology stacks, availability of services and tooling, along with the gradual improvement of its market environment, has driven many organizations to either consider or migrate many existing software systems to the cloud, either fully or partially. A common predicament in most cases, is the existence of a complex, monolithic application, potentially considered legacy at the time, that was not designed to be cloud-native and therefore requires a degree of redesign/reimplementation in order to benefit from cloud deployment. In such cases, the decomposition of the monolith to a set of loosely coupled, highly cohesive and self-contained microservices is a valid recommendation, provided that the organization is prepared to withstand the additional cost, in terms of human and financial resources, along with the unavoidable development overhead, which is inevitable during the early stages. However, the tendency of the tech world to embrace new trends and jump on hype trains for fear of obsoletion, has led to an excessive adoption of the microservices architecture (MSA), even in cases where such an architecture is not viable for the organization, or does not derive from any business requirements. This research focuses on establishing the position of a traditional monolith in the modern software architecture landscape and determine use cases that can still benefit from this paradigm, as well as use cases that could benefit from a partial or full transition to microservices architectures instead.
在过去的十年中,云计算在基础设施、技术栈、服务可用性和工具方面的出现,以及其市场环境的逐步改善,促使许多组织考虑或将许多现有软件系统全部或部分迁移到云上。在大多数情况下,一个常见的困境是存在一个复杂的、单一的应用程序,在当时可能被认为是遗留的,它不是为云原生设计的,因此需要一定程度的重新设计/重新实现,以便从云部署中受益。在这种情况下,如果组织准备承受人力和财务资源方面的额外成本,以及不可避免的开发开销(这在早期阶段是不可避免的),那么将单体分解为一组松散耦合、高度内聚和自包含的微服务是一个有效的建议。然而,由于担心过时,科技界倾向于拥抱新趋势,并跳上炒作列车,这导致了对微服务体系结构(MSA)的过度采用,即使这种体系结构对组织来说是不可行的,或者不是来自任何业务需求。本研究的重点是确定传统的单体在现代软件架构中的地位,并确定仍然可以从这种范式中受益的用例,以及可以从部分或完全过渡到微服务架构中受益的用例。
{"title":"You don't need a Microservices Architecture (yet): Monoliths may do the trick","authors":"Dimitrios Gravanis, George Kakarontzas, V. Gerogiannis","doi":"10.1145/3501774.3501780","DOIUrl":"https://doi.org/10.1145/3501774.3501780","url":null,"abstract":"Within the past decade, the advent of cloud computing in terms of infrastructure, technology stacks, availability of services and tooling, along with the gradual improvement of its market environment, has driven many organizations to either consider or migrate many existing software systems to the cloud, either fully or partially. A common predicament in most cases, is the existence of a complex, monolithic application, potentially considered legacy at the time, that was not designed to be cloud-native and therefore requires a degree of redesign/reimplementation in order to benefit from cloud deployment. In such cases, the decomposition of the monolith to a set of loosely coupled, highly cohesive and self-contained microservices is a valid recommendation, provided that the organization is prepared to withstand the additional cost, in terms of human and financial resources, along with the unavoidable development overhead, which is inevitable during the early stages. However, the tendency of the tech world to embrace new trends and jump on hype trains for fear of obsoletion, has led to an excessive adoption of the microservices architecture (MSA), even in cases where such an architecture is not viable for the organization, or does not derive from any business requirements. This research focuses on establishing the position of a traditional monolith in the modern software architecture landscape and determine use cases that can still benefit from this paradigm, as well as use cases that could benefit from a partial or full transition to microservices architectures instead.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129872230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Merging Live Video Feeds for Remote Monitoring of a Mining Machine 合并实时视频馈送用于矿机远程监控
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501776
Andrew Flangas, J. Sattarvand, S. Dascalu, Fred Harris
This research entails using virtual reality to interpret video recordings in Unity from cameras on an unmanned machine used for mining excavations. The purpose of using a machine of this nature is to send it into hazardous mining environments rather than sending workers and having their lives jeopardized. This work is significant because it demonstrates how two separate fields, such as virtual reality and robotics, can be combined to complete useful tasks. It also illustrates how machines can be used to replace workers in hazardous conditions not only in the field of mining, but in other fields as well. The main contribution of the work presented in this paper is the creation of a panorama of live video feeds captured by several webcams, which can be seen using a VR headset. As also described in the paper the software developed for this engineering application has been created using appropriate software engineering techniques and tools. Results of merging live video feeds and testing camera placements are also presented and planned directions of future work are outlined.
这项研究需要使用虚拟现实来解释Unity中用于采矿挖掘的无人驾驶机器上的摄像机的视频记录。使用这种性质的机器的目的是将其送入危险的采矿环境,而不是派遣工人并使他们的生命受到威胁。这项工作意义重大,因为它展示了两个独立的领域,如虚拟现实和机器人技术,如何结合起来完成有用的任务。它还说明了机器如何在危险的条件下取代工人,不仅在采矿领域,而且在其他领域也是如此。本文中提出的工作的主要贡献是创建了由几个网络摄像头捕获的实时视频馈送全景,可以使用VR耳机看到。正如文中所描述的,为这个工程应用程序开发的软件是使用适当的软件工程技术和工具创建的。还介绍了合并实时视频馈送和测试摄像机位置的结果,并概述了未来工作的计划方向。
{"title":"Merging Live Video Feeds for Remote Monitoring of a Mining Machine","authors":"Andrew Flangas, J. Sattarvand, S. Dascalu, Fred Harris","doi":"10.1145/3501774.3501776","DOIUrl":"https://doi.org/10.1145/3501774.3501776","url":null,"abstract":"This research entails using virtual reality to interpret video recordings in Unity from cameras on an unmanned machine used for mining excavations. The purpose of using a machine of this nature is to send it into hazardous mining environments rather than sending workers and having their lives jeopardized. This work is significant because it demonstrates how two separate fields, such as virtual reality and robotics, can be combined to complete useful tasks. It also illustrates how machines can be used to replace workers in hazardous conditions not only in the field of mining, but in other fields as well. The main contribution of the work presented in this paper is the creation of a panorama of live video feeds captured by several webcams, which can be seen using a VR headset. As also described in the paper the software developed for this engineering application has been created using appropriate software engineering techniques and tools. Results of merging live video feeds and testing camera placements are also presented and planned directions of future work are outlined.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of Undefined Behavior on Compiler Optimization 未定义行为对编译器优化的影响
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501781
Zefan Shen
With the development of society and the improvement of life quality, people's requirements for software experience are becoming more and more stringent. Performance optimization is becoming more and more important in software design. At present, most compilers support the default optimization options of o 1, o 2 and o 3, such as the GCC compiler. In order to meet the different degrees of optimization needs of users, it provides nearly a hundred optimization options for compiling time, target file length, and execution. At the same time, compiler optimization options will adjust the code execution order, and different optimization options will treat undefined behaviors differently. This work mainly tests the impact of undefined behavior (UB) on compiler optimization at different levels. The results show that UB has both positive and negative effects on the compiler. In addition, this paper reminds programmers to learn to improve their code specifications and correctly handle these undefined behaviors.
随着社会的发展和生活质量的提高,人们对软件体验的要求也越来越严格。性能优化在软件设计中变得越来越重要。目前,大多数编译器都支持默认的0 1、0 2和0 3的优化选项,比如GCC编译器。为了满足用户不同程度的优化需求,提供了编译时间、目标文件长度、执行等近百种优化选项。同时,编译器优化选项会调整代码执行顺序,不同的优化选项对未定义行为的处理方式也不同。本工作主要测试未定义行为(UB)在不同层次上对编译器优化的影响。结果表明,UB对编译器既有积极的影响,也有消极的影响。此外,本文还提醒程序员要学会改进自己的代码规范,正确处理这些未定义的行为。
{"title":"The Impact of Undefined Behavior on Compiler Optimization","authors":"Zefan Shen","doi":"10.1145/3501774.3501781","DOIUrl":"https://doi.org/10.1145/3501774.3501781","url":null,"abstract":"With the development of society and the improvement of life quality, people's requirements for software experience are becoming more and more stringent. Performance optimization is becoming more and more important in software design. At present, most compilers support the default optimization options of o 1, o 2 and o 3, such as the GCC compiler. In order to meet the different degrees of optimization needs of users, it provides nearly a hundred optimization options for compiling time, target file length, and execution. At the same time, compiler optimization options will adjust the code execution order, and different optimization options will treat undefined behaviors differently. This work mainly tests the impact of undefined behavior (UB) on compiler optimization at different levels. The results show that UB has both positive and negative effects on the compiler. In addition, this paper reminds programmers to learn to improve their code specifications and correctly handle these undefined behaviors.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Evaluation of Machine Learning Algorithms for Indoor Localization using Dual-Band WiFi 基于双频WiFi的室内定位机器学习算法的实证评估
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501790
A. Tahat, Rozana Awwad, Nadia Baydoun, Shurooq Al-Nabih, T. Edwan
WiFi based indoor localization systems relying on received signal strength indicator (RSSI) have attained large acceptance over the past few years as mobile devices with WiFi capability are prevalent in everyday routines and practices, this is in view of the demand for low-cost indoor positioning systems (IPSs). Extant RSSI reliant WiFi based IPSs utilize raw RSSI of signals received from access points (APs) to evaluate device locations. However, the particular raw RSSI of signals may readily fluctuate and may be susceptible to interference as a consequence to multipath propagation channels, other wireless local area networks, device diverseness, and noise. To overcome these prevailing issues, we investigate performance enhancement of WiFi fingerprinting-based IPSs for increased accuracy and robustness in positioning over dual-band WiFi (such as IEEE 802.11n) that employs both of the 2.4GHz and 5GHz frequency spectrum bands as a conceivable substitute. To that end, based on empirical concurrent measurements, we conduct a comparative performance analysis of a collection of machine learning (ML) classification algorithms to evaluate their classification capacities in determining the location of a WiFi receiver device in a single and a dual frequency band operation setting. Numerical results demonstrated that in our IPS, the location could be effectively predicted by means of a subset of the collection of considered ML classification algorithms when using the raw RSSI of both of the 2.4GHz and 5GHz frequency bands. Computed evaluation metrics to characterize performance of the IPS served to identify an optimum ML algorithm based on attained results to accurately localize the device, and the existence of dual frequency information renders the positioning process to be more robust.
基于WiFi的室内定位系统依赖于接收信号强度指示器(RSSI)在过去几年中获得了广泛的接受,因为具有WiFi功能的移动设备在日常生活和实践中普遍存在,这是鉴于对低成本室内定位系统(ips)的需求。现有的依赖RSSI的基于WiFi的ips利用从接入点(ap)接收的原始RSSI信号来评估设备位置。然而,信号的特定原始RSSI可能很容易波动,并且可能容易受到多径传播信道、其他无线局域网、设备多样性和噪声的干扰。为了克服这些普遍存在的问题,我们研究了基于WiFi指纹识别的ips的性能增强,以提高在双频WiFi(如IEEE 802.11n)上定位的准确性和稳健性,双频WiFi(如2.4GHz和5GHz频谱带)作为可想象的替代品。为此,基于经验并发测量,我们对一系列机器学习(ML)分类算法进行了性能比较分析,以评估它们在单频段和双频段操作设置中确定WiFi接收器设备位置的分类能力。数值结果表明,在我们的IPS中,当使用2.4GHz和5GHz频段的原始RSSI时,可以通过考虑的ML分类算法集合的子集有效地预测位置。通过计算评估指标来表征IPS的性能,可以根据获得的结果识别出最优的机器学习算法来准确定位设备,双频信息的存在使得定位过程更加鲁棒。
{"title":"An Empirical Evaluation of Machine Learning Algorithms for Indoor Localization using Dual-Band WiFi","authors":"A. Tahat, Rozana Awwad, Nadia Baydoun, Shurooq Al-Nabih, T. Edwan","doi":"10.1145/3501774.3501790","DOIUrl":"https://doi.org/10.1145/3501774.3501790","url":null,"abstract":"WiFi based indoor localization systems relying on received signal strength indicator (RSSI) have attained large acceptance over the past few years as mobile devices with WiFi capability are prevalent in everyday routines and practices, this is in view of the demand for low-cost indoor positioning systems (IPSs). Extant RSSI reliant WiFi based IPSs utilize raw RSSI of signals received from access points (APs) to evaluate device locations. However, the particular raw RSSI of signals may readily fluctuate and may be susceptible to interference as a consequence to multipath propagation channels, other wireless local area networks, device diverseness, and noise. To overcome these prevailing issues, we investigate performance enhancement of WiFi fingerprinting-based IPSs for increased accuracy and robustness in positioning over dual-band WiFi (such as IEEE 802.11n) that employs both of the 2.4GHz and 5GHz frequency spectrum bands as a conceivable substitute. To that end, based on empirical concurrent measurements, we conduct a comparative performance analysis of a collection of machine learning (ML) classification algorithms to evaluate their classification capacities in determining the location of a WiFi receiver device in a single and a dual frequency band operation setting. Numerical results demonstrated that in our IPS, the location could be effectively predicted by means of a subset of the collection of considered ML classification algorithms when using the raw RSSI of both of the 2.4GHz and 5GHz frequency bands. Computed evaluation metrics to characterize performance of the IPS served to identify an optimum ML algorithm based on attained results to accurately localize the device, and the existence of dual frequency information renders the positioning process to be more robust.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software Acceleration of the Deformable Shape Tracking Application: How to eliminate the Eigen Library Overhead 可变形形状跟踪应用的软件加速:如何消除特征库开销
Pub Date : 2021-11-19 DOI: 10.1145/3501774.3501782
N. Petrellis, Stavros Zogas, P. Christakos, Panagiotis G. Mousouliotis, G. Keramidas, N. Voros, Christos D. Antonopoulos
Shape tracking is based on landmark detection and alignment. Open-source code and pre-trained models are available for an implementation that is based on an ensemble of regression trees. The C++ Deformable Shape Tracking (DEST) implementation of face alignment that is using Eigen template library for algebraic operations is employed in this work. The overhead of the C++ Eigen library calls is measured and selected computational intensive operations are ported from Eigen implementation to custom C code achieving a remarkable acceleration in the shape tracking application. An important achievement of this work is the fact that the restructured code can be directly implemented with reconfigurable hardware for further speed improvement. Driver drowsiness and distraction detection applications are exploiting shape tracking by measuring landmark distances in order to detect eye blinking, yawning, etc. Fast video processing and accuracy is mandatory in these safety critical applications. The modified software implementation of the original DEST face alignment method presented in this paper, is almost 250 times faster due to the custom implementation of computational intensive vector/matrix operations and rotations. Eigen library is still used in non-time critical parts of the code for compact description and higher readability. Flattening of nested routines and inline implementation is also used to eliminate excessive argument copies and data type checking and conversions.
形状跟踪是基于地标检测和对齐。开源代码和预训练模型可用于基于回归树集合的实现。本工作采用了使用特征模板库进行代数运算的c++可变形形状跟踪(DEST)人脸对齐实现。测量了c++ Eigen库调用的开销,并将选择的计算密集型操作从Eigen实现移植到自定义C代码中,从而在形状跟踪应用程序中实现显著的加速。这项工作的一个重要成就是,重构后的代码可以直接用可重构硬件实现,从而进一步提高速度。驾驶员困倦和分心检测应用正在利用形状跟踪,通过测量地标距离来检测眨眼、打哈欠等行为。在这些安全关键应用中,快速视频处理和准确性是必不可少的。本文提出的原始DEST人脸对齐方法的改进软件实现由于自定义实现了计算密集型的向量/矩阵操作和旋转,速度几乎快了250倍。为了精简描述和提高可读性,在代码的非时间关键部分仍然使用特征库。平面化嵌套例程和内联实现也用于消除过多的参数拷贝和数据类型检查和转换。
{"title":"Software Acceleration of the Deformable Shape Tracking Application: How to eliminate the Eigen Library Overhead","authors":"N. Petrellis, Stavros Zogas, P. Christakos, Panagiotis G. Mousouliotis, G. Keramidas, N. Voros, Christos D. Antonopoulos","doi":"10.1145/3501774.3501782","DOIUrl":"https://doi.org/10.1145/3501774.3501782","url":null,"abstract":"Shape tracking is based on landmark detection and alignment. Open-source code and pre-trained models are available for an implementation that is based on an ensemble of regression trees. The C++ Deformable Shape Tracking (DEST) implementation of face alignment that is using Eigen template library for algebraic operations is employed in this work. The overhead of the C++ Eigen library calls is measured and selected computational intensive operations are ported from Eigen implementation to custom C code achieving a remarkable acceleration in the shape tracking application. An important achievement of this work is the fact that the restructured code can be directly implemented with reconfigurable hardware for further speed improvement. Driver drowsiness and distraction detection applications are exploiting shape tracking by measuring landmark distances in order to detect eye blinking, yawning, etc. Fast video processing and accuracy is mandatory in these safety critical applications. The modified software implementation of the original DEST face alignment method presented in this paper, is almost 250 times faster due to the custom implementation of computational intensive vector/matrix operations and rotations. Eigen library is still used in non-time critical parts of the code for compact description and higher readability. Flattening of nested routines and inline implementation is also used to eliminate excessive argument copies and data type checking and conversions.","PeriodicalId":255059,"journal":{"name":"Proceedings of the 2021 European Symposium on Software Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 2021 European Symposium on Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1