首页 > 最新文献

網際網路技術學刊最新文献

英文 中文
Can App Reviews Help Developers to Improve Mobile User Interface Design? 应用评论能帮助开发者改进手机用户界面设计吗?
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404013
Wenge Le Wenge Le, Yong Wang Wenge Le, Cuiyun Gao Yong Wang, Liangfen Wei Cuiyun Gao, Fei Yang Liangfen Wei
For mobile user interface (M-UI) design, it has an important impact on app user’s usage. However, M-UI design is limited by subjective factors, even professional developers can’t determine whether the M-UI design is good or bad. App reviews provide an opportunity to proactively collect user complaints and promptly improve the user experience of apps. Therefore, it is meaningful to explore whether app reviews can help developers to improve M-UI design. In this article, we randomly select six different categories of apps from Google Play Store and App Store, with over 160000 reviews, and conduct a preliminary empirical study to answer the question. Specially, we gather M-UI-related reviews, and compare the average rating of M-UI-related reviews and total reviews of each app. We observe that the M-UI is concerned by users and the average rating for M-UI-related reviews is lower than the average rating for total reviews. By extracting the topics of M-UI-related reviews, we estimate the sentiment of the M-UI-related topics. The results show that the number of M-UI-related topics are about three or four, and the sentiment of M-UI-related topics is related to the app itself. Further, by investigating the relation between the M-UI-related topics and M-UI design. We observe that users are concerned about the M-UI usability the most, and it is the various aspects of the M-UI that are causing user frustration. In particular, our findings show that M-UI-related reviews reflect the severity of M-UI-related issues and app reviews can help developers to improve M-UI design about appearance, usability, fault-tolerance, of which usability deserves the most attention. 
对于移动用户界面(M-UI)设计来说,它对应用程序用户的使用有着重要的影响。然而,M-UI设计受到主观因素的限制,即使是专业的开发人员也无法判断M-UI设计的好坏。应用评论提供了一个主动收集用户投诉并及时改善应用用户体验的机会。因此,探讨应用评论是否能帮助开发者改进M-UI设计是很有意义的。在本文中,我们从Google Play Store和App Store中随机选择了6种不同类型的应用,并针对这些应用进行了初步的实证研究。特别地,我们收集了与M-UI相关的评论,并将每个应用的M-UI相关评论的平均评分与总评论进行比较。我们观察到M-UI受到用户的关注,并且M-UI相关评论的平均评分低于总评论的平均评分。通过提取与m - ui相关评论的主题,我们估计了与m - ui相关主题的情感。结果显示,与m - ui相关的话题数量约为3 - 4个,与m - ui相关的话题的情绪与应用本身有关。进一步,通过调查与M-UI相关的主题与M-UI设计之间的关系。我们观察到用户最关心的是M-UI的可用性,而正是M-UI的各个方面导致了用户的挫败感。特别是,我们的研究结果表明,与M-UI相关的评论反映了与M-UI相关问题的严重程度,应用程序评论可以帮助开发者从外观、可用性、容错等方面改进M-UI设计,其中可用性是最值得关注的。
{"title":"Can App Reviews Help Developers to Improve Mobile User Interface Design?","authors":"Wenge Le Wenge Le, Yong Wang Wenge Le, Cuiyun Gao Yong Wang, Liangfen Wei Cuiyun Gao, Fei Yang Liangfen Wei","doi":"10.53106/160792642023072404013","DOIUrl":"https://doi.org/10.53106/160792642023072404013","url":null,"abstract":"\u0000 For mobile user interface (M-UI) design, it has an important impact on app user’s usage. However, M-UI design is limited by subjective factors, even professional developers can’t determine whether the M-UI design is good or bad. App reviews provide an opportunity to proactively collect user complaints and promptly improve the user experience of apps. Therefore, it is meaningful to explore whether app reviews can help developers to improve M-UI design. In this article, we randomly select six different categories of apps from Google Play Store and App Store, with over 160000 reviews, and conduct a preliminary empirical study to answer the question. Specially, we gather M-UI-related reviews, and compare the average rating of M-UI-related reviews and total reviews of each app. We observe that the M-UI is concerned by users and the average rating for M-UI-related reviews is lower than the average rating for total reviews. By extracting the topics of M-UI-related reviews, we estimate the sentiment of the M-UI-related topics. The results show that the number of M-UI-related topics are about three or four, and the sentiment of M-UI-related topics is related to the app itself. Further, by investigating the relation between the M-UI-related topics and M-UI design. We observe that users are concerned about the M-UI usability the most, and it is the various aspects of the M-UI that are causing user frustration. In particular, our findings show that M-UI-related reviews reflect the severity of M-UI-related issues and app reviews can help developers to improve M-UI design about appearance, usability, fault-tolerance, of which usability deserves the most attention.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Failure Patterns in Machine Learning-based Object Detection Tasks in Software Development Courses 在软件开发课程中研究基于机器学习的对象检测任务的失败模式
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404017
Ziyuan Wang Ziyuan Wang, Jinwu Guo Ziyuan Wang, Dexin Bu Jinwu Guo, Chongchong Shi Dexin Bu
Object detection, one of the popular tasks in computer vision, is to find all objects of interest in an image and determine their category and location. When people use deep learning frameworks to implement object detection networks, defects are often caused by human-introduced faults. These defects may cause different types of failures. Exploring frequent failure patterns in object detection programs can help developers detect and fix defects more effectively and efficiently. Therefore, we conducted an empirical study on failure patterns in deep learning-based object detection programs submitted in university software development courses. By exploring 101 submissions of a Yolov4 object detection task completed by 104 students, we found the most frequent 13 failure patterns in these submissions and six types of root causes of these failures. To help students and entry-level software engineers avoid possible faults in object detection programs, 13 concrete suggestions that belong to six classes are given in this paper. These results can reveal some basic laws of failures and mistakes in the development of deep learning-based object detection programs and provide guidances to assist students and entry-level developers in improving their skills in developing object detection programs.  
目标检测是计算机视觉中的一个热门任务,它是找到图像中所有感兴趣的物体,并确定它们的类别和位置。当人们使用深度学习框架实现目标检测网络时,缺陷通常是由人为引入的故障引起的。这些缺陷可能导致不同类型的故障。在对象检测程序中探索频繁的故障模式可以帮助开发人员更有效地检测和修复缺陷。因此,我们对大学软件开发课程中提交的基于深度学习的目标检测程序的失败模式进行了实证研究。通过研究104名学生完成的101份提交的Yolov4对象检测任务,我们发现了这些提交中最常见的13种失败模式以及导致这些失败的六种根本原因。为了帮助学生和初级软件工程师避免目标检测程序中可能出现的错误,本文给出了分6类的13条具体建议。这些结果可以揭示基于深度学习的目标检测程序开发中失败和错误的一些基本规律,并为帮助学生和初级开发人员提高开发目标检测程序的技能提供指导。
{"title":"Investigating Failure Patterns in Machine Learning-based Object Detection Tasks in Software Development Courses","authors":"Ziyuan Wang Ziyuan Wang, Jinwu Guo Ziyuan Wang, Dexin Bu Jinwu Guo, Chongchong Shi Dexin Bu","doi":"10.53106/160792642023072404017","DOIUrl":"https://doi.org/10.53106/160792642023072404017","url":null,"abstract":"\u0000 Object detection, one of the popular tasks in computer vision, is to find all objects of interest in an image and determine their category and location. When people use deep learning frameworks to implement object detection networks, defects are often caused by human-introduced faults. These defects may cause different types of failures. Exploring frequent failure patterns in object detection programs can help developers detect and fix defects more effectively and efficiently. Therefore, we conducted an empirical study on failure patterns in deep learning-based object detection programs submitted in university software development courses. By exploring 101 submissions of a Yolov4 object detection task completed by 104 students, we found the most frequent 13 failure patterns in these submissions and six types of root causes of these failures. To help students and entry-level software engineers avoid possible faults in object detection programs, 13 concrete suggestions that belong to six classes are given in this paper. These results can reveal some basic laws of failures and mistakes in the development of deep learning-based object detection programs and provide guidances to assist students and entry-level developers in improving their skills in developing object detection programs. \u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Reconstruction Attack with Label Guessing for Federated Learning 基于标签猜测的联邦学习数据重构攻击
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404007
Jinhyeok Jang Jinhyeok Jang, Yoonju Oh Jinhyeok Jang, Gwonsang Ryu Yoonju Oh, Daeseon Choi Gwonsang Ryu
In light of recent advancements in deep and machine learning, federated learning has been proposed as a means to prevent privacy invasion. However, a reconstruction attack that exploits gradients to leak learning data has recently been developed. With increasing research into federated learning and the importance of data usage, it is crucial to prepare for such attacks. Specifically, when face data are used in federated learning, the damage caused by privacy infringement can be significant. Therefore, attack studies are necessary to develop effective defense strategies against these attacks. In this study, we propose a new attack method that uses labels to achieve faster and more accurate reconstruction performance than previous reconstruction attacks. We demonstrate the effectiveness of our proposed method on the Yale Face Database B, MNIST, and CIFAR-10 datasets, as well as under non-IID conditions, similar to real federated learning. The results show that our proposed method outperforms random labeling in terms of reconstruction performance in all evaluations for MNIST and CIFAR-10 datasets in round 1. 
鉴于深度学习和机器学习的最新进展,联邦学习被提出作为防止隐私侵犯的一种手段。然而,一种利用梯度来泄漏学习数据的重构攻击最近被开发出来。随着对联邦学习和数据使用重要性的研究不断增加,为此类攻击做好准备至关重要。具体来说,当人脸数据用于联邦学习时,隐私侵犯造成的损害可能是巨大的。因此,攻击研究对于制定有效的防御策略是必要的。在本研究中,我们提出了一种新的攻击方法,利用标签来实现比以前的重构攻击更快、更准确的重构性能。我们在耶鲁人脸数据库B、MNIST和CIFAR-10数据集上证明了我们提出的方法的有效性,以及在非iid条件下的有效性,类似于真正的联邦学习。结果表明,在第一轮对MNIST和CIFAR-10数据集的所有评估中,我们提出的方法在重建性能方面优于随机标记。
{"title":"Data Reconstruction Attack with Label Guessing for Federated Learning","authors":"Jinhyeok Jang Jinhyeok Jang, Yoonju Oh Jinhyeok Jang, Gwonsang Ryu Yoonju Oh, Daeseon Choi Gwonsang Ryu","doi":"10.53106/160792642023072404007","DOIUrl":"https://doi.org/10.53106/160792642023072404007","url":null,"abstract":"\u0000 In light of recent advancements in deep and machine learning, federated learning has been proposed as a means to prevent privacy invasion. However, a reconstruction attack that exploits gradients to leak learning data has recently been developed. With increasing research into federated learning and the importance of data usage, it is crucial to prepare for such attacks. Specifically, when face data are used in federated learning, the damage caused by privacy infringement can be significant. Therefore, attack studies are necessary to develop effective defense strategies against these attacks. In this study, we propose a new attack method that uses labels to achieve faster and more accurate reconstruction performance than previous reconstruction attacks. We demonstrate the effectiveness of our proposed method on the Yale Face Database B, MNIST, and CIFAR-10 datasets, as well as under non-IID conditions, similar to real federated learning. The results show that our proposed method outperforms random labeling in terms of reconstruction performance in all evaluations for MNIST and CIFAR-10 datasets in round 1.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
G-DCS: GCN-Based Deep Code Summary Generation Model 基于gcn的深度代码摘要生成模型
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404014
Changsheng Du Changsheng Du, Yong Li Changsheng Du, Ming Wen Yong Li
In software engineering, software personnel faced many large-scale software and complex systems, these need programmers to quickly and accurately read and understand the code, and efficiently complete the tasks of software change or maintenance tasks. Code-NN is the first model to use deep learning to accomplish the task of code summary generation, but it is not used the structural information in the code itself. In the past five years, researchers have designed different code summarization systems based on neural networks. They generally use the end-to-end neural machine translation framework, but many current research methods do not make full use of the structural information of the code. This paper raises a new model called G-DCS to automatically generate a summary of java code; the generated summary is designed to help programmers quickly comprehend the effect of java methods. G-DCS uses natural language processing technology, and training the model uses a code corpus. This model could generate code summaries directly from the code files in the coded corpus. Compared with the traditional method, it uses the information of structural on the code. Through Graph Convolutional Neural Network (GCN) extracts the structural information on the code to generate the code sequence, which makes the generated code summary more accurate. The corpus used for training was obtained from GitHub. Evaluation criteria using BLEU-n. Experimental results show that our approach outperforms models that do not utilize code structure information. 
在软件工程中,软件人员面对许多大型软件和复杂的系统,这些都需要程序员快速准确地阅读和理解代码,并高效地完成软件变更任务或维护任务。code - nn是第一个使用深度学习来完成代码摘要生成任务的模型,但它没有使用代码本身的结构信息。在过去的五年中,研究人员设计了不同的基于神经网络的代码摘要系统。它们一般使用端到端神经机器翻译框架,但目前的许多研究方法并没有充分利用代码的结构信息。本文提出了一种新的模型G-DCS来自动生成java代码摘要;生成的摘要旨在帮助程序员快速理解Java方法的效果。G-DCS采用自然语言处理技术,使用代码语料库对模型进行训练。该模型可以直接从编码语料库中的代码文件生成代码摘要。与传统方法相比,该方法利用了结构在代码上的信息。通过图卷积神经网络(GCN)提取代码上的结构信息生成代码序列,使生成的代码摘要更加准确。用于训练的语料库来自GitHub。使用BLEU-n的评价标准。实验结果表明,我们的方法优于不利用代码结构信息的模型。
{"title":"G-DCS: GCN-Based Deep Code Summary Generation Model","authors":"Changsheng Du Changsheng Du, Yong Li Changsheng Du, Ming Wen Yong Li","doi":"10.53106/160792642023072404014","DOIUrl":"https://doi.org/10.53106/160792642023072404014","url":null,"abstract":"\u0000 In software engineering, software personnel faced many large-scale software and complex systems, these need programmers to quickly and accurately read and understand the code, and efficiently complete the tasks of software change or maintenance tasks. Code-NN is the first model to use deep learning to accomplish the task of code summary generation, but it is not used the structural information in the code itself. In the past five years, researchers have designed different code summarization systems based on neural networks. They generally use the end-to-end neural machine translation framework, but many current research methods do not make full use of the structural information of the code. This paper raises a new model called G-DCS to automatically generate a summary of java code; the generated summary is designed to help programmers quickly comprehend the effect of java methods. G-DCS uses natural language processing technology, and training the model uses a code corpus. This model could generate code summaries directly from the code files in the coded corpus. Compared with the traditional method, it uses the information of structural on the code. Through Graph Convolutional Neural Network (GCN) extracts the structural information on the code to generate the code sequence, which makes the generated code summary more accurate. The corpus used for training was obtained from GitHub. Evaluation criteria using BLEU-n. Experimental results show that our approach outperforms models that do not utilize code structure information.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134031030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Agricultural Pest Identification Based on Multiple Convolutional Models 基于多卷积模型的物联网农业有害生物识别
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404008
Yaru Zhang Yaru Zhang
This topic focuses on the corresponding research and simulation of multiple convolutional models for the detection methods of leaf pests and disease identification. Currently, crop pest identification in China mainly relies on field observation by farmers or experts, which is less accurate, time-consuming and extremely expensive, and not feasible for millions of small and medium-sized farms. To improve the recognition accuracy, crop pest recognition is performed by a convolutional neural network (CNN) after combining the plant leaf collection dataset, which has the features of automatic image feature extraction, strong generalization ability, and high recognition rate, and combined with the advantage of similarity by transfer learning, a crop pest recognition algorithm based on the comparison of multiple convolutional neural networks is implemented. After comparison experiments, the algorithm has 99.8% accuracy in the test set and can accurately distinguish seven health states of apples and grapes. This algorithm can help agricultural workers to conduct agricultural activities more scientifically, which is important for improving crop yield and agricultural intelligence. 
本课题主要针对叶片病虫害鉴定检测方法的多重卷积模型进行相应的研究与仿真。目前,中国的作物有害生物鉴定主要依靠农民或专家的实地观察,这种方法准确性低、耗时长、成本高,对数以百万计的中小农场来说不可行。为提高识别精度,结合具有图像特征自动提取、泛化能力强、识别率高等特点的植物叶片采集数据集,采用卷积神经网络(CNN)进行作物病虫害识别,并结合迁移学习的相似性优势,实现基于多个卷积神经网络比较的作物病虫害识别算法。经过对比实验,该算法在测试集中准确率达到99.8%,能够准确区分苹果和葡萄的七种健康状态。该算法可以帮助农业劳动者更科学地开展农业活动,对提高作物产量和农业智能化具有重要意义。
{"title":"IoT Agricultural Pest Identification Based on Multiple Convolutional Models","authors":"Yaru Zhang Yaru Zhang","doi":"10.53106/160792642023072404008","DOIUrl":"https://doi.org/10.53106/160792642023072404008","url":null,"abstract":"\u0000 This topic focuses on the corresponding research and simulation of multiple convolutional models for the detection methods of leaf pests and disease identification. Currently, crop pest identification in China mainly relies on field observation by farmers or experts, which is less accurate, time-consuming and extremely expensive, and not feasible for millions of small and medium-sized farms. To improve the recognition accuracy, crop pest recognition is performed by a convolutional neural network (CNN) after combining the plant leaf collection dataset, which has the features of automatic image feature extraction, strong generalization ability, and high recognition rate, and combined with the advantage of similarity by transfer learning, a crop pest recognition algorithm based on the comparison of multiple convolutional neural networks is implemented. After comparison experiments, the algorithm has 99.8% accuracy in the test set and can accurately distinguish seven health states of apples and grapes. This algorithm can help agricultural workers to conduct agricultural activities more scientifically, which is important for improving crop yield and agricultural intelligence.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124097778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neural Network Method for Systematic Evaluation of Informatization Development Level in Smart Court Construction 智能法院信息化发展水平系统评价的神经网络方法
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404009
dan Zhang dan ZHANG, Ting-Jie Lu Dan Zhang, Wenyu Zhang Tingjie Lu, Chenxing Yang Wenyu Zhang
The systematic evaluation of informatization development level (IDL) is an evaluation that follows the development trend of digitization, networking and intelligence, and focuses on the formation of business capabilities of informatization. Research on informatization evaluation methods has been extensively studied by both domestic and international academics over the years. However, traditional evaluation methods suffer from flaws like complex mechanism design, unreliable metric conversion, difficulty obtaining the relative importance of indexes, complex evaluation process, and high computational volume. This paper attempts to introduce the neural network method into the information system evaluation, and uses the Extreme Learning Machine (ELM) algorithm to establish the evaluation model. The evaluation of the smart court system is used as an example to simulate and test the model, and the results show that the neural network-based evaluation model of informatization system is more applicable to large-scale evaluation indexes, and by continuously increasing the learning samples, it objectively improves the accuracy of evaluation, effectively avoids human subjective factors, and has the advantageous features of advanced, accurate and convenient. 
信息化发展水平的系统评价(IDL)是顺应数字化、网络化、智能化发展趋势,关注信息化业务能力形成的一种评价。多年来,国内外学者对信息化评价方法进行了广泛的研究。但传统的评价方法存在机制设计复杂、度量转换不可靠、指标相对重要性难以获取、评价过程复杂、计算量大等缺陷。本文尝试将神经网络方法引入到信息系统评价中,并采用极限学习机(ELM)算法建立评价模型。以智能法院系统的评估为例,对模型进行仿真和测试,结果表明,基于神经网络的信息化系统评估模型更适用于大规模的评估指标,并且通过不断增加学习样本,客观上提高了评估的准确性,有效避免了人为的主观因素,具有先进性、准确性和便捷性等优势特点。
{"title":"A Neural Network Method for Systematic Evaluation of Informatization Development Level in Smart Court Construction","authors":"dan Zhang dan ZHANG, Ting-Jie Lu Dan Zhang, Wenyu Zhang Tingjie Lu, Chenxing Yang Wenyu Zhang","doi":"10.53106/160792642023072404009","DOIUrl":"https://doi.org/10.53106/160792642023072404009","url":null,"abstract":"\u0000 The systematic evaluation of informatization development level (IDL) is an evaluation that follows the development trend of digitization, networking and intelligence, and focuses on the formation of business capabilities of informatization. Research on informatization evaluation methods has been extensively studied by both domestic and international academics over the years. However, traditional evaluation methods suffer from flaws like complex mechanism design, unreliable metric conversion, difficulty obtaining the relative importance of indexes, complex evaluation process, and high computational volume. This paper attempts to introduce the neural network method into the information system evaluation, and uses the Extreme Learning Machine (ELM) algorithm to establish the evaluation model. The evaluation of the smart court system is used as an example to simulate and test the model, and the results show that the neural network-based evaluation model of informatization system is more applicable to large-scale evaluation indexes, and by continuously increasing the learning samples, it objectively improves the accuracy of evaluation, effectively avoids human subjective factors, and has the advantageous features of advanced, accurate and convenient.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121365528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-Based Self-Admitted Technical Debt Detection Empirical Research 基于深度学习的自承认技术债务检测实证研究
Pub Date : 2023-07-01 DOI: 10.53106/160792642023072404015
Yubin Qu Yubin Qu, Tie Bao Yubin Qu, Meng Yuan Tie Bao, Long Li Meng Yuan
Self-Admitted Technical Debt (SATD) is a workaround for current gains and subsequent software quality in software comments. Some studies have been conducted using NLP-based techniques or CNN-based classifiers. However, there exists a class imbalance problem in different software projects since the software code comments with SATD features are significantly less than those without Non-SATD. Therefore, to design a classification model with the ability of dealing with this class imbalance problem is necessary for SATD detection. We propose an improved loss function based on information entropy. Our proposed function is studied in a variety of application scenarios. Empirical research on 10 JAVA software projects is conducted to show the competitiveness of our new approach. We find our proposed approach can perform significantly better than state-of-the-art baselines.  
自我承认的技术债务(SATD)是软件评论中当前收益和后续软件质量的变通方法。一些研究使用基于nlp的技术或基于cnn的分类器进行。但是,由于具有SATD特征的软件代码注释明显少于不具有非SATD特征的软件代码注释,因此在不同的软件项目中存在类不平衡问题。因此,设计一个能够处理这种类不平衡问题的分类模型是SATD检测的必要条件。提出了一种改进的基于信息熵的损失函数。我们提出的功能在各种应用场景中进行了研究。对10个JAVA软件项目进行了实证研究,以显示我们的新方法的竞争力。我们发现我们提出的方法可以比最先进的基线执行得更好。
{"title":"Deep Learning-Based Self-Admitted Technical Debt Detection Empirical Research","authors":"Yubin Qu Yubin Qu, Tie Bao Yubin Qu, Meng Yuan Tie Bao, Long Li Meng Yuan","doi":"10.53106/160792642023072404015","DOIUrl":"https://doi.org/10.53106/160792642023072404015","url":null,"abstract":"\u0000 Self-Admitted Technical Debt (SATD) is a workaround for current gains and subsequent software quality in software comments. Some studies have been conducted using NLP-based techniques or CNN-based classifiers. However, there exists a class imbalance problem in different software projects since the software code comments with SATD features are significantly less than those without Non-SATD. Therefore, to design a classification model with the ability of dealing with this class imbalance problem is necessary for SATD detection. We propose an improved loss function based on information entropy. Our proposed function is studied in a variety of application scenarios. Empirical research on 10 JAVA software projects is conducted to show the competitiveness of our new approach. We find our proposed approach can perform significantly better than state-of-the-art baselines. \u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126679054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy Efficiency Based Secure Data Transmission in WBSN Using Novel Id-Based Group Signature Model and SECC Technique 基于新型id群签名模型和SECC技术的WBSN节能安全数据传输
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403014
C. R. K. C. Ramesh Kumar, T. G. K. C. Ramesh Kumar, A. H. T. Ganesh Kumar, D. R. T. A. Hemlathadhevi
A wireless network composed of wearable sensing along with computing systems connected via a wireless communication channel is termed Wireless Body Sensor Network (WBSN). It enables continuous monitoring through sensors for medical and nonmedical applications. WBSN faces several security problems such as loss of information, access control, and authentication. As WBSN collects vital information and operates in an unfriendly environment, severe security mechanisms are needed in order to prevent the network from anonymous interactions. The different security threats are evaluated with the support of the data transmitted via the sensor networks amongst smart wearable devices. The whole network lifetime together with the Data Transmission (DT) quality is mitigated whilst performing DT utilizing sensor networks, which consume more energy. Hence, in this paper, an energy-efficient secure data transmission mechanism is proposed in WBSN using a novel authentication id-based group signature model and SECC technique. At first, the Group Manager (GM) is selected from the sensors in the remote body sensor system using Normalized Opposition Based Learning BAT Optimization Algorithm (NOBL-BOA). Afterward, clustering with Information Entropy induced K-Means Algorithm (IEKMA) takes place to improve energy efficiency. Next, to provide security to the WBSN, message authentication is carried out based on novel authentication ID-based group signature protocol. Finally, Secret key induced Elliptic Curve Cryptography (SECC) is used to encrypt the message for secure transmission. The simulation results reveal that in comparison with existing works, the proposed work achieves improved security and energy efficiency. 
将可穿戴式传感器与通过无线通信信道连接的计算系统组成的无线网络称为无线人体传感器网络(WBSN)。它可以通过传感器进行连续监测,用于医疗和非医疗应用。WBSN面临着信息丢失、访问控制、身份验证等安全问题。由于WBSN收集重要信息,并且运行在不友好的环境中,因此需要严格的安全机制来防止网络中的匿名交互。在智能可穿戴设备之间通过传感器网络传输数据的支持下,评估了不同的安全威胁。利用传感器网络执行数据传输(DT)时,整个网络寿命和数据传输(DT)质量都会降低,而传感器网络消耗更多的能量。为此,本文采用基于身份验证id的组签名模型和SECC技术,提出了一种高效节能的WBSN安全数据传输机制。首先,使用归一化对立学习BAT优化算法(NOBL-BOA)从远程身体传感器系统中的传感器中选择组管理器(GM)。然后,利用信息熵诱导的k -均值算法(IEKMA)进行聚类,以提高能源效率。其次,为了保证WBSN的安全性,基于新的基于身份验证id的组签名协议进行消息认证。最后,采用密钥诱导椭圆曲线加密技术(SECC)对消息进行加密,保证消息的安全传输。仿真结果表明,与现有工作相比,本文提出的工作提高了安全性和能效。
{"title":"An Energy Efficiency Based Secure Data Transmission in WBSN Using Novel Id-Based Group Signature Model and SECC Technique","authors":"C. R. K. C. Ramesh Kumar, T. G. K. C. Ramesh Kumar, A. H. T. Ganesh Kumar, D. R. T. A. Hemlathadhevi","doi":"10.53106/160792642023052403014","DOIUrl":"https://doi.org/10.53106/160792642023052403014","url":null,"abstract":"\u0000 A wireless network composed of wearable sensing along with computing systems connected via a wireless communication channel is termed Wireless Body Sensor Network (WBSN). It enables continuous monitoring through sensors for medical and nonmedical applications. WBSN faces several security problems such as loss of information, access control, and authentication. As WBSN collects vital information and operates in an unfriendly environment, severe security mechanisms are needed in order to prevent the network from anonymous interactions. The different security threats are evaluated with the support of the data transmitted via the sensor networks amongst smart wearable devices. The whole network lifetime together with the Data Transmission (DT) quality is mitigated whilst performing DT utilizing sensor networks, which consume more energy. Hence, in this paper, an energy-efficient secure data transmission mechanism is proposed in WBSN using a novel authentication id-based group signature model and SECC technique. At first, the Group Manager (GM) is selected from the sensors in the remote body sensor system using Normalized Opposition Based Learning BAT Optimization Algorithm (NOBL-BOA). Afterward, clustering with Information Entropy induced K-Means Algorithm (IEKMA) takes place to improve energy efficiency. Next, to provide security to the WBSN, message authentication is carried out based on novel authentication ID-based group signature protocol. Finally, Secret key induced Elliptic Curve Cryptography (SECC) is used to encrypt the message for secure transmission. The simulation results reveal that in comparison with existing works, the proposed work achieves improved security and energy efficiency.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Sustainable Strategies to Reinforce the Benefit Awareness from Festival Events Management 探索可持续发展策略,强化节庆活动管理的效益意识
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403002
Yu-San Ting Yu-San Ting, Yu-Lun Hsu Yu-San Ting, Pi-Tzong Jan Yu-Lun Hsu
With international travel trending toward globalization, countries are increasingly focusing on preserving their unique local cultures while maintaining awareness about global tourism perspectives. Since 2017, Taiwan’s Tourism Bureau proposed the Taiwanese Sustainable Tourism Development Program for further development, the Program aims to encourage local governments to promote “Time for Celebration – Taiwan Tourism Events” and create tourism event highlights by promoting developments in regional tourism and related industries. This study aims to explore the role of local residents in festivals from a sustainable development perspective using survey data. It examines local residents’ attitudes and support residents toward festivals. The study details the influence of local residents on festivals, which in turn, depends on the benefits visitors gain from such participation. 
随着国际旅游的全球化趋势,各国越来越注重保护其独特的当地文化,同时保持对全球旅游前景的认识。自2017年起,台湾旅游局提出“台湾旅游可持续发展计划”进一步发展,该计划旨在鼓励地方政府推动“庆祝时间-台湾旅游事件”,通过推动区域旅游及相关产业的发展,创造旅游事件亮点。本研究旨在利用调查数据,从可持续发展的角度探讨当地居民在节日中的作用。它考察了当地居民对节日的态度和支持。该研究详细说明了当地居民对节日的影响,而这反过来又取决于游客从这种参与中获得的好处。
{"title":"Exploring the Sustainable Strategies to Reinforce the Benefit Awareness from Festival Events Management","authors":"Yu-San Ting Yu-San Ting, Yu-Lun Hsu Yu-San Ting, Pi-Tzong Jan Yu-Lun Hsu","doi":"10.53106/160792642023052403002","DOIUrl":"https://doi.org/10.53106/160792642023052403002","url":null,"abstract":"\u0000 With international travel trending toward globalization, countries are increasingly focusing on preserving their unique local cultures while maintaining awareness about global tourism perspectives. Since 2017, Taiwan’s Tourism Bureau proposed the Taiwanese Sustainable Tourism Development Program for further development, the Program aims to encourage local governments to promote “Time for Celebration – Taiwan Tourism Events” and create tourism event highlights by promoting developments in regional tourism and related industries. This study aims to explore the role of local residents in festivals from a sustainable development perspective using survey data. It examines local residents’ attitudes and support residents toward festivals. The study details the influence of local residents on festivals, which in turn, depends on the benefits visitors gain from such participation.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A PCA-IGRU Model for Stock Price Prediction 股票价格预测的PCA-IGRU模型
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403007
Jingyang Wang Jingyang Wang, Daoqun Liu Jingyang Wang, Lukai Jin Daoqun Liu, Qiuhong Sun Lukai Jin, Zhihong Xue Qiuhong Sun
Accurate stock price prediction is significant for investors to avoid risks and improve the return on investment. Stock price prediction is a typical nonlinear time-series problem, which many factors affect. Still, too much analysis of influencing factors will lead to input redundancy and a large amount of computation in the model. Although the stock prediction model based on Recurrent Neural Network (RNN) has a good prediction effect, it has the problem of oversaturation. This paper proposes a prediction model of stock closing price based on Principal Component Analysis (PCA) and Improved Gated Recurrent Unit (IGRU), PCA-IGRU. PCA can reduce the redundancy of input information without destroying the correlation of original data, thus reducing the time of model training and prediction. IGRU is an improved Gated Recurrent Unit (GRU) model, which prevents oversaturation by introducing the Anti-oversaturation Conversion Module (ACM) and enhances the sensitivity of model learning. This paper selects the stock trading data of the Shanghai Composite Index (SCI) of China as experimental data. The PCA-IGRU is compared with seven baseline models. The experimental results show that the model has better prediction accuracy and shorter training time. 
准确的股价预测对投资者规避风险、提高投资回报率具有重要意义。股票价格预测是一个典型的非线性时间序列问题,受多种因素的影响。但是,过多地分析影响因素会导致模型中的输入冗余和计算量过大。基于递归神经网络(RNN)的股票预测模型虽然具有较好的预测效果,但存在过饱和问题。本文提出了一种基于主成分分析(PCA)和改进门控循环单元(IGRU)的股票收盘价预测模型PCA-IGRU。PCA可以在不破坏原始数据相关性的前提下减少输入信息的冗余,从而减少模型训练和预测的时间。IGRU是一种改进的门控循环单元(GRU)模型,通过引入抗过饱和转换模块(Anti-oversaturation Conversion Module, ACM)来防止过饱和,提高了模型学习的灵敏度。本文选取中国上证综合指数(SCI)的股票交易数据作为实验数据。将PCA-IGRU与7个基线模型进行比较。实验结果表明,该模型具有较好的预测精度和较短的训练时间。
{"title":"A PCA-IGRU Model for Stock Price Prediction","authors":"Jingyang Wang Jingyang Wang, Daoqun Liu Jingyang Wang, Lukai Jin Daoqun Liu, Qiuhong Sun Lukai Jin, Zhihong Xue Qiuhong Sun","doi":"10.53106/160792642023052403007","DOIUrl":"https://doi.org/10.53106/160792642023052403007","url":null,"abstract":"\u0000 Accurate stock price prediction is significant for investors to avoid risks and improve the return on investment. Stock price prediction is a typical nonlinear time-series problem, which many factors affect. Still, too much analysis of influencing factors will lead to input redundancy and a large amount of computation in the model. Although the stock prediction model based on Recurrent Neural Network (RNN) has a good prediction effect, it has the problem of oversaturation. This paper proposes a prediction model of stock closing price based on Principal Component Analysis (PCA) and Improved Gated Recurrent Unit (IGRU), PCA-IGRU. PCA can reduce the redundancy of input information without destroying the correlation of original data, thus reducing the time of model training and prediction. IGRU is an improved Gated Recurrent Unit (GRU) model, which prevents oversaturation by introducing the Anti-oversaturation Conversion Module (ACM) and enhances the sensitivity of model learning. This paper selects the stock trading data of the Shanghai Composite Index (SCI) of China as experimental data. The PCA-IGRU is compared with seven baseline models. The experimental results show that the model has better prediction accuracy and shorter training time.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128299914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
網際網路技術學刊
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1