Mobile Edge Computing (MEC) technology enables offloading of network tasks at the edge, combining edge IoT devices to provide proximity services for devices or terminals, solving the pressure and shortage of data storage, performance computing and decision analysis in the cloud platform. However, in the scenario of large-scale dense networking, the terminal deployment order is large and the tasks are large. Therefore, the system model based on mobile edge computing needs to be further optimized to meet the service requirements. In addition, the computing and storage resources of the edge computing nodes are limited, and there is a possibility of backlog of intensive task processing. Therefore, the mobile edge computing in the 5G intensive networking scenario still faces the task scheduling problem. Based on the above analysis, this paper proposes a task load balancing algorithm based on game theory. The algorithm can prove the upper limit of system cost by establishing a mathematical model for multi-terminal task processing and combining with the game mathematics theory to solve the optimal solution. he simulation results show that the algorithm proposed in this paper can reasonably utilize the edge resources and ensure the maximum benefit of the terminal equipment.
{"title":"Optimal Load Scheduling Based on Mobile Edge Computing Technology in 5G Dense Networking","authors":"Luohui Xia, Dandan Guo, Yongjun Wang, Dandan Sun, Weijing Zhen, Congrui Jing","doi":"10.1109/ACCC58361.2022.00030","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00030","url":null,"abstract":"Mobile Edge Computing (MEC) technology enables offloading of network tasks at the edge, combining edge IoT devices to provide proximity services for devices or terminals, solving the pressure and shortage of data storage, performance computing and decision analysis in the cloud platform. However, in the scenario of large-scale dense networking, the terminal deployment order is large and the tasks are large. Therefore, the system model based on mobile edge computing needs to be further optimized to meet the service requirements. In addition, the computing and storage resources of the edge computing nodes are limited, and there is a possibility of backlog of intensive task processing. Therefore, the mobile edge computing in the 5G intensive networking scenario still faces the task scheduling problem. Based on the above analysis, this paper proposes a task load balancing algorithm based on game theory. The algorithm can prove the upper limit of system cost by establishing a mathematical model for multi-terminal task processing and combining with the game mathematics theory to solve the optimal solution. he simulation results show that the algorithm proposed in this paper can reasonably utilize the edge resources and ensure the maximum benefit of the terminal equipment.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122351956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00019
Pei-Hao Wang, Yan Lin, Zhiping Wang
The outbreak of the novel coronavirus pneumonia and the turbulent international situation in recent years have seriously disrupted the normal operation of the entire supply chain (SC). As an emerging technology, blockchain is characterized by decentralization, reliability, transparency and traceability, which can be effectively applied to solve social, environmental and economic concerns and achieve sustainability of supply chain. However, whether blockchain is suitable for every function of a sustainable supply chain (SSC), or what function is best suited for the application of a set of blockchain criteria, can be viewed as a multi-criteria group decision-making (MCGDM) problem. This paper presents a combined MCGDM technique utilizing the social network analysis (SNA) and Multi-Attributive Border Approximation Area Comparison (MABAC), for selecting an appropriate function of SSCs to implement blockchain technology with Neutrosophic information. The framework gives quantitative consideration to the weight of relevant blockchain criteria and decision makers under high uncertainty. This study can also facilitate the effective allocation of resources and enhance the competitiveness of SSCs in the coordinated planning of various blockchain deployments.
{"title":"An Integrated Neutrosophic SNA-MABAC Approach for Blockchain Applicability Evaluation in Sustainable Supply Chains","authors":"Pei-Hao Wang, Yan Lin, Zhiping Wang","doi":"10.1109/ACCC58361.2022.00019","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00019","url":null,"abstract":"The outbreak of the novel coronavirus pneumonia and the turbulent international situation in recent years have seriously disrupted the normal operation of the entire supply chain (SC). As an emerging technology, blockchain is characterized by decentralization, reliability, transparency and traceability, which can be effectively applied to solve social, environmental and economic concerns and achieve sustainability of supply chain. However, whether blockchain is suitable for every function of a sustainable supply chain (SSC), or what function is best suited for the application of a set of blockchain criteria, can be viewed as a multi-criteria group decision-making (MCGDM) problem. This paper presents a combined MCGDM technique utilizing the social network analysis (SNA) and Multi-Attributive Border Approximation Area Comparison (MABAC), for selecting an appropriate function of SSCs to implement blockchain technology with Neutrosophic information. The framework gives quantitative consideration to the weight of relevant blockchain criteria and decision makers under high uncertainty. This study can also facilitate the effective allocation of resources and enhance the competitiveness of SSCs in the coordinated planning of various blockchain deployments.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional meteorological service was generally provided through the 2nd/3rd Generation (2G/3G) Short Message Service (SMS), websites and the 4th Generation (4G) mobile weather apps. However, with the growing demand for meteorological service and the rapid revolution of information technology, the deficiencies of previous service modes are inevitably emerged such as inflexible information, inconvenient interaction and over-reliance on apps. The 5th Generation (5G) Rich Communication Suite (RCS) is the next generation of SMS with the advantages of multimedia information and convenient interaction. And it is regarded as one of the crucial ways for urging social promotion and enhancing users' experience of the meteorological service field in the foreseeable future. This study focuses on a comprehensive solution named Weather China for meteorological service based on the 5G RCS information system, including the service scenarios, technical architecture and operational challenges. First, we put forward three typical scenarios and the RCS product forms for each scenario. Then design a meteorological service hierarchical structure with the 5G RCS, give the general workflow for the public by the 5G communication channel and develop a chatbot to achieve interactive intentions on specific scenarios based on natural language processing. In addition, to better investigate this solution, the typical cases of meteorological information query products are successfully developed. At last, the suggestions and upcoming challenges for further business operation are summarized. The solution discussed in this study provides a benchmark for meteorological service based on 5G RCS.
传统气象服务一般透过第二/第三代(2G/3G)短讯服务、网站及第四代(4G)流动天气应用程式提供。然而,随着气象服务需求的增长和信息技术的快速革命,以往服务模式的不足不可避免地暴露出来,如信息不灵活、交互不方便、过度依赖应用程序等。5G (5th Generation) RCS (Rich Communication Suite)是下一代短信技术,具有信息多媒体化、交互便捷等优势。在可预见的未来,它被认为是推动气象服务领域社会推广和提升用户体验的重要途径之一。本文重点研究了基于5G RCS信息系统的气象业务综合解决方案“中国天气”,包括业务场景、技术架构和业务挑战。首先,我们提出了三种典型场景,以及每种场景的RCS产品形态。然后设计了基于5G RCS的气象服务分层结构,通过5G通信通道给出了面向公众的通用工作流程,并开发了基于自然语言处理的聊天机器人,实现了特定场景下的交互意图。此外,为了更好地考察该解决方案,成功开发了气象信息查询产品的典型案例。最后总结了今后业务运营的建议和面临的挑战。本研究讨论的解决方案为基于5G RCS的气象业务提供了基准。
{"title":"Weather China: A 5G RCS Solution for Meteorological Service","authors":"Hanhua Qu, Wei Tang, Yanpeng Li, Siyuan Sun, Shibo Tang, Xiaoran Zhao","doi":"10.1109/ACCC58361.2022.00021","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00021","url":null,"abstract":"Traditional meteorological service was generally provided through the 2nd/3rd Generation (2G/3G) Short Message Service (SMS), websites and the 4th Generation (4G) mobile weather apps. However, with the growing demand for meteorological service and the rapid revolution of information technology, the deficiencies of previous service modes are inevitably emerged such as inflexible information, inconvenient interaction and over-reliance on apps. The 5th Generation (5G) Rich Communication Suite (RCS) is the next generation of SMS with the advantages of multimedia information and convenient interaction. And it is regarded as one of the crucial ways for urging social promotion and enhancing users' experience of the meteorological service field in the foreseeable future. This study focuses on a comprehensive solution named Weather China for meteorological service based on the 5G RCS information system, including the service scenarios, technical architecture and operational challenges. First, we put forward three typical scenarios and the RCS product forms for each scenario. Then design a meteorological service hierarchical structure with the 5G RCS, give the general workflow for the public by the 5G communication channel and develop a chatbot to achieve interactive intentions on specific scenarios based on natural language processing. In addition, to better investigate this solution, the typical cases of meteorological information query products are successfully developed. At last, the suggestions and upcoming challenges for further business operation are summarized. The solution discussed in this study provides a benchmark for meteorological service based on 5G RCS.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130855662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00012
S. Yu, Fucheng Yang, R. Han, H. Duan, Feifei Li, Peishun Liu
When using the traditional SEIR infectious disease model to predict the trend of novel coronavirus pneumonia epidemic, numerous initial parameters need to be tuned, and the parameters cannot change over time during the prediction process, which reduces the accuracy of the model. Firstly, thesis used a logistic model to preprocess the SEIR model parameters and proposed a SEIR model based on time series recovery rate optimization with a new parameter of effective immunity rate. Secondly, the model was trained with epidemic data from domestic and foreign provinces and cities, and the usability of the model was demonstrated experimentally, and the mean absolute percentage error (MAPE) and goodness of fit (R2) were used to compare with other models, which proved the superiority of the model prediction and indicated further research directions.
{"title":"Improved SEIR Model Based on Recovery Rate Optimization to Predict COVID-19","authors":"S. Yu, Fucheng Yang, R. Han, H. Duan, Feifei Li, Peishun Liu","doi":"10.1109/ACCC58361.2022.00012","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00012","url":null,"abstract":"When using the traditional SEIR infectious disease model to predict the trend of novel coronavirus pneumonia epidemic, numerous initial parameters need to be tuned, and the parameters cannot change over time during the prediction process, which reduces the accuracy of the model. Firstly, thesis used a logistic model to preprocess the SEIR model parameters and proposed a SEIR model based on time series recovery rate optimization with a new parameter of effective immunity rate. Secondly, the model was trained with epidemic data from domestic and foreign provinces and cities, and the usability of the model was demonstrated experimentally, and the mean absolute percentage error (MAPE) and goodness of fit (R2) were used to compare with other models, which proved the superiority of the model prediction and indicated further research directions.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the application range of iot terminal becomes wider and wider, people put forward higher requirements on the performance of iot device, which leads to a huge increase in the testing tasks of iot terminal device. In order to solve the problems of complex system structure, resource waste and low detection efficiency of the current detection equipment, this paper proposes a test task scheduling strategy based on improved genetic algorithm. By updating fitness function, the test task order is optimized and the test resources of the integrated test platform are rationally utilized. Based on the simulation results, the improved algorithm proposed in this paper can effectively improve the task test efficiency and maximize the test benefits.
{"title":"Research on Test Task Management Scheduling of Integrated Test Platform Based on Improved Genetic Algorithm","authors":"Dandan Guo, Luohui Xia, Yongjun Wang, Lili Liang, Cuiya Qin, Tongle Fan","doi":"10.1109/ACCC58361.2022.00011","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00011","url":null,"abstract":"As the application range of iot terminal becomes wider and wider, people put forward higher requirements on the performance of iot device, which leads to a huge increase in the testing tasks of iot terminal device. In order to solve the problems of complex system structure, resource waste and low detection efficiency of the current detection equipment, this paper proposes a test task scheduling strategy based on improved genetic algorithm. By updating fitness function, the test task order is optimized and the test resources of the integrated test platform are rationally utilized. Based on the simulation results, the improved algorithm proposed in this paper can effectively improve the task test efficiency and maximize the test benefits.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"15 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00007
Dinghua Zhang, Quan Pan, Yang Li
The deep integration of cryptography with industrial control protocols is a technical difficulty. Both the industry and academia are carrying out in-depth application research on industrial control system cryptography application. Security assessment is one of the important tasks for industrial control cryptography applications. This paper presented a quantitative evaluation method for industrial control cryptography applications. Using this method, targeting at the general security framework presented in NIST SP 800–82, we analyzed the cryptography applications at network and communication level, and at application data security level respectively. It shows that technological breakthroughs at these two levels can improve the overall quantitative analysis results of the industrial control system by about 10%. Based on the quantitative analysis results, this paper puts forward relevant suggestions on the cryptography application of industrial control system, which has reference significance for the research and development of industrial control system cryptography technology.
{"title":"A Quantitative Evaluation Method for Cryptography Applications in Industrial Control Systems","authors":"Dinghua Zhang, Quan Pan, Yang Li","doi":"10.1109/ACCC58361.2022.00007","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00007","url":null,"abstract":"The deep integration of cryptography with industrial control protocols is a technical difficulty. Both the industry and academia are carrying out in-depth application research on industrial control system cryptography application. Security assessment is one of the important tasks for industrial control cryptography applications. This paper presented a quantitative evaluation method for industrial control cryptography applications. Using this method, targeting at the general security framework presented in NIST SP 800–82, we analyzed the cryptography applications at network and communication level, and at application data security level respectively. It shows that technological breakthroughs at these two levels can improve the overall quantitative analysis results of the industrial control system by about 10%. Based on the quantitative analysis results, this paper puts forward relevant suggestions on the cryptography application of industrial control system, which has reference significance for the research and development of industrial control system cryptography technology.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00022
Segundo Moisés Toapanta T, Eriannys Zharayth Gómez Díaz, Carmita Ines Suarez, Angel Ernesto Huerta Vélez, Carmen Suárez, Marcelo Zambrano Vizuete
The problems of security in educational institutions in the world and especially in Ecuador are evident for its management. The objective is to carry out an analysis to determine how to mitigate the risks in information security for management in higher education institutions. It was used the deductive method and exploratory research were used for the analysis of information. Turned out a relevant contribution in information security from several researchers from Ecuador, China, South Korea, Japan, the Republic of Latvia, Newark, Delaware, Islamic, among others, a context diagram of all the relevant actors and forms and trends for the evaluation of an indicator to mitigate the risks of information in a higher education institution. It was concluded that the relevant contributions of the countries, the context diagram, forms and trends obtained as results in this research should be applied in a higher education institution to mitigate the risks of information.
{"title":"Analysis to Mitigate Risks in Information Security for Management in Higher Education Institutions","authors":"Segundo Moisés Toapanta T, Eriannys Zharayth Gómez Díaz, Carmita Ines Suarez, Angel Ernesto Huerta Vélez, Carmen Suárez, Marcelo Zambrano Vizuete","doi":"10.1109/ACCC58361.2022.00022","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00022","url":null,"abstract":"The problems of security in educational institutions in the world and especially in Ecuador are evident for its management. The objective is to carry out an analysis to determine how to mitigate the risks in information security for management in higher education institutions. It was used the deductive method and exploratory research were used for the analysis of information. Turned out a relevant contribution in information security from several researchers from Ecuador, China, South Korea, Japan, the Republic of Latvia, Newark, Delaware, Islamic, among others, a context diagram of all the relevant actors and forms and trends for the evaluation of an indicator to mitigate the risks of information in a higher education institution. It was concluded that the relevant contributions of the countries, the context diagram, forms and trends obtained as results in this research should be applied in a higher education institution to mitigate the risks of information.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00020
Shuaijianni Xu, Yaodong You, Yuanying Xiao
With the development of the information technology industry and the expansion of software development requirements, the scale and complexity of software are increasing, which makes the software development process turn into a software supply chain with superior or subordinate relationships. However, due to the inherent fragility of the software supply chain and the uneven quality of third-party open-source software, accidents occur frequently, and the security of the software supply chain has received extensive attention. We first figure out the security risks faced by the software supply chain and then innovatively proposes a software supply chain management system based on blockchain. To the best of our knowledge, this is the first blockchain-based software supply chain management system. The transfer processes of all third-party components or software products in the system are permanently recorded in the distributed ledger through smart contracts, which become the basis when handling and tracking software supply chain security incidents.
{"title":"Research on the Application of Blockchain Smart Contract in Software Supply Chain Management","authors":"Shuaijianni Xu, Yaodong You, Yuanying Xiao","doi":"10.1109/ACCC58361.2022.00020","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00020","url":null,"abstract":"With the development of the information technology industry and the expansion of software development requirements, the scale and complexity of software are increasing, which makes the software development process turn into a software supply chain with superior or subordinate relationships. However, due to the inherent fragility of the software supply chain and the uneven quality of third-party open-source software, accidents occur frequently, and the security of the software supply chain has received extensive attention. We first figure out the security risks faced by the software supply chain and then innovatively proposes a software supply chain management system based on blockchain. To the best of our knowledge, this is the first blockchain-based software supply chain management system. The transfer processes of all third-party components or software products in the system are permanently recorded in the distributed ledger through smart contracts, which become the basis when handling and tracking software supply chain security incidents.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"215 S681","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00015
Yasir Giani, Luo Ping, Syed Asad Shah
Code clones make software maintenance more challenging. Detecting bugs in large systems may significantly increase maintenance costs. Despite the fact that several techniques for clone identification have been proposed over the years, the accuracy and scalability of clone detection techniques remain hot research areas. Previously, Akram et al. proposed the DroidCC hybrid technique, where tokens were encoded into MD5 hash values by encoding them into 128-bit fingerprints, and clones were identified by matching identical hash values. Encoding tokens into MD5 hash values take more time due to the large fingerprint size of MD5 hash values. Due to the enormous chunk size, DroidCC cannot achieve higher accuracy. To overcome the weakness of the DroidCC technique, We proposed a novel AYAT a lightweight hybrid technique to detect clones at the fragment level. To speed up the detection process, we converted tokens into 32-bit polynomial values, and we set the chunk size to 5 lines per chunk to improve accuracy. We tested our technique on 10,968 java projects against 4.98 million lines of code. In comparison to the well-known DroidCC technique, it is significantly faster and more efficient. Our examination demonstrates that precision is significantly improved despite sacrificing scalability. AYAT code cloning detection technique has outscored DroidCC in every aspect.
{"title":"AYAT: A Lightweight and Efficient Code Clone Detection Technique","authors":"Yasir Giani, Luo Ping, Syed Asad Shah","doi":"10.1109/ACCC58361.2022.00015","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00015","url":null,"abstract":"Code clones make software maintenance more challenging. Detecting bugs in large systems may significantly increase maintenance costs. Despite the fact that several techniques for clone identification have been proposed over the years, the accuracy and scalability of clone detection techniques remain hot research areas. Previously, Akram et al. proposed the DroidCC hybrid technique, where tokens were encoded into MD5 hash values by encoding them into 128-bit fingerprints, and clones were identified by matching identical hash values. Encoding tokens into MD5 hash values take more time due to the large fingerprint size of MD5 hash values. Due to the enormous chunk size, DroidCC cannot achieve higher accuracy. To overcome the weakness of the DroidCC technique, We proposed a novel AYAT a lightweight hybrid technique to detect clones at the fragment level. To speed up the detection process, we converted tokens into 32-bit polynomial values, and we set the chunk size to 5 lines per chunk to improve accuracy. We tested our technique on 10,968 java projects against 4.98 million lines of code. In comparison to the well-known DroidCC technique, it is significantly faster and more efficient. Our examination demonstrates that precision is significantly improved despite sacrificing scalability. AYAT code cloning detection technique has outscored DroidCC in every aspect.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129534792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The micro program “TCM prescription data collection” was developed by using Wechat developer tools, MYSQL database, Spring Boot and other technologies to realize the collection, processing and analysis of patients' vital signs information, clinical examination and TCM prescription data. The intelligent information annotation, extraction and structured data storage of user interface text data are realized by NLP technology. The similarity analysis and visualization of classical prescriptions for cardiovascular and cerebrovascular diseases were mainly realized. Through the calculation of word frequency, it explores the relationship between each keyword, and deeply excavates the relationship between source data and diseases, which lays a foundation for the research on the law of prescription and medication of traditional Chinese medicine.
{"title":"Design of AI-Based TCM Prescription Analysis Applet","authors":"Tingting Huang, Xue-Fei Wang, Chen Yuan, Fei Wang, Xinyue Wang, Zhen-Liang Huang, Jian-Hua Li, Zezhi Shao","doi":"10.1109/ACCC58361.2022.00009","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00009","url":null,"abstract":"The micro program “TCM prescription data collection” was developed by using Wechat developer tools, MYSQL database, Spring Boot and other technologies to realize the collection, processing and analysis of patients' vital signs information, clinical examination and TCM prescription data. The intelligent information annotation, extraction and structured data storage of user interface text data are realized by NLP technology. The similarity analysis and visualization of classical prescriptions for cardiovascular and cerebrovascular diseases were mainly realized. Through the calculation of word frequency, it explores the relationship between each keyword, and deeply excavates the relationship between source data and diseases, which lays a foundation for the research on the law of prescription and medication of traditional Chinese medicine.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}