首页 > 最新文献

IET Software最新文献

英文 中文
Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality 利用优化的机器学习技术进行软件故障预测的科学编程,以提高软件质量
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-01-06 DOI: 10.1049/sfw2.12091
Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Y. Daradkeh, Mohammad Shabaz
{"title":"Scientific programming using optimized machine learning techniques for software fault prediction to improve software quality","authors":"Muhammad Shafiq, Fatemah H. Alghamedy, Nasir Jamal, Tahir Kamal, Y. Daradkeh, Mohammad Shabaz","doi":"10.1049/sfw2.12091","DOIUrl":"https://doi.org/10.1049/sfw2.12091","url":null,"abstract":"","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43336830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concurrent software fine-coarse-grained automatic modelling by Coloured Petri Nets for model checking 基于有色Petri网的并行软件粗粒度自动建模
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-30 DOI: 10.1049/sfw2.12084
Wenjie Zhong, Jian-tao Zhou, Tao Sun

The state space explosion restricts the error detection of concurrent software. The abstraction can provide a solution to avoid state space explosion, but it is easy to ignore important details, resulting in inaccurate detection results. This paper proposes a methodology of fine-coarse-grained automatic modelling for Java source programs. By the principle that the execution details of property-unchecked, non-interactive, and unrelated statements do not affect the model checking results, we model coarse-grained model fragments for such statements, while fine-grained model fragments for property-checked, interactive, and related statements. Our method reduces the model and state space and ensures the error detection of the source program based on model checking. Moreover, we prove the equivalence of the fine-grained model, the coarse-grained model, and the program. Finally, this paper gives an experiment to verify the effectiveness of the proposed method.

状态空间爆炸限制了并发软件的错误检测。抽象可以提供避免状态空间爆炸的解决方案,但很容易忽略重要细节,导致检测结果不准确。本文提出了一种Java源程序的粗粒度自动建模方法。根据属性未检查、非交互式和不相关语句的执行细节不影响模型检查结果的原则,我们为此类语句建模粗粒度的模型片段,而为属性已检查、交互式和相关语句建模细粒度的模型片段。我们的方法减少了模型和状态空间,并确保了基于模型检查的源程序的错误检测。此外,我们还证明了细粒度模型、粗粒度模型和程序的等价性。最后,通过实验验证了该方法的有效性。
{"title":"Concurrent software fine-coarse-grained automatic modelling by Coloured Petri Nets for model checking","authors":"Wenjie Zhong,&nbsp;Jian-tao Zhou,&nbsp;Tao Sun","doi":"10.1049/sfw2.12084","DOIUrl":"https://doi.org/10.1049/sfw2.12084","url":null,"abstract":"<p>The state space explosion restricts the error detection of concurrent software. The abstraction can provide a solution to avoid state space explosion, but it is easy to ignore important details, resulting in inaccurate detection results. This paper proposes a methodology of fine-coarse-grained automatic modelling for Java source programs. By the principle that the execution details of property-unchecked, non-interactive, and unrelated statements do not affect the model checking results, we model coarse-grained model fragments for such statements, while fine-grained model fragments for property-checked, interactive, and related statements. Our method reduces the model and state space and ensures the error detection of the source program based on model checking. Moreover, we prove the equivalence of the fine-grained model, the coarse-grained model, and the program. Finally, this paper gives an experiment to verify the effectiveness of the proposed method.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 1","pages":"55-75"},"PeriodicalIF":1.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for developing dependable systems using a component-based software development approach (MDDS-CBSD) 使用基于组件的软件开发方法开发可靠系统的模型(MDDS-CBSD)
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-30 DOI: 10.1049/sfw2.12085
Hasan Kahtan, Mansoor Abdulhak, Ahmad Salah Al-Ahmad, Yehia Ibrahim Alzoubi

Component-based software development (CBSD) is an emerging technology that integrates existing software components to swiftly develop and deploy big and complex software systems with little engineering effort, money, and time. CBSD, on the other hand, has difficulties with security trust, particularly dependability. When a system provides the desired outcomes while causing no harm to the environment, it is said to be dependable. Dependability encompasses several attributes, including availability, confidentiality, integrity, reliability, safety, and maintainability. Developing dependable component software is achieved by embedding dependability attributes in CBSD. Thus, the CBSD model must address the dependability attributes. Hence, the objectives of this work are: (1) to propose a model for developing a dependable system using component-based software development approach (hereafter the model is referred to as MDDS-CBSD), which aims to mitigate software component vulnerabilities, and (2) to assess the proposed model. The best-practice method was used to frame the CBSD architecture phases and processes, as well as embed the six dependability attributes. The MDDS-CBSD architecture was evaluated using expert opinion. The MDDS-CBSD was also used to develop an information and communications technology (ICT) portal using an empirical study method. Vulnerability Assessment Tools were used to assess the developed ICT portal's dependability. The MDDS-CBSD may be used to create web application systems and to protect them from attacks. Model developers may use CBSD to describe and assess dependability attributes at any point during the model development process. The reliability of this model can also let companies utilise CBSD with confidence.

基于组件的软件开发(CBSD)是一种新兴技术,它集成了现有的软件组件,以快速开发和部署大型复杂的软件系统,只需很少的工程精力、金钱和时间。另一方面,CBSD在安全信任方面存在困难,尤其是可靠性。当一个系统在不对环境造成损害的情况下提供了预期的结果时,它就被认为是可靠的。可靠性包括几个属性,包括可用性、机密性、完整性、可靠性、安全性和可维护性。开发可靠的组件软件是通过在CBSD中嵌入可靠性属性来实现的。因此,CBSD模型必须处理可靠性属性。因此,这项工作的目标是:(1)提出一个使用基于组件的软件开发方法开发可靠系统的模型(以下称为MDDS-CBSD),旨在减轻软件组件的漏洞;(2)评估所提出的模型。最佳实践方法用于构建CBSD体系结构的阶段和过程,并嵌入六个可靠性属性。MDDS-CBSD体系结构采用专家意见进行评估。MDDS-CBSD还用于使用实证研究方法开发信息和通信技术门户网站。脆弱性评估工具用于评估已开发的信息和通信技术门户网站的可靠性。MDDS-CBSD可用于创建web应用程序系统并保护它们免受攻击。模型开发人员可以在模型开发过程中的任何时候使用CBSD来描述和评估可靠性属性。该模型的可靠性也可以让公司放心地使用CBSD。
{"title":"A model for developing dependable systems using a component-based software development approach (MDDS-CBSD)","authors":"Hasan Kahtan,&nbsp;Mansoor Abdulhak,&nbsp;Ahmad Salah Al-Ahmad,&nbsp;Yehia Ibrahim Alzoubi","doi":"10.1049/sfw2.12085","DOIUrl":"https://doi.org/10.1049/sfw2.12085","url":null,"abstract":"<p>Component-based software development (CBSD) is an emerging technology that integrates existing software components to swiftly develop and deploy big and complex software systems with little engineering effort, money, and time. CBSD, on the other hand, has difficulties with security trust, particularly dependability. When a system provides the desired outcomes while causing no harm to the environment, it is said to be dependable. Dependability encompasses several attributes, including availability, confidentiality, integrity, reliability, safety, and maintainability. Developing dependable component software is achieved by embedding dependability attributes in CBSD. Thus, the CBSD model must address the dependability attributes. Hence, the objectives of this work are: (1) to propose a model for developing a dependable system using component-based software development approach (hereafter the model is referred to as MDDS-CBSD), which aims to mitigate software component vulnerabilities, and (2) to assess the proposed model. The best-practice method was used to frame the CBSD architecture phases and processes, as well as embed the six dependability attributes. The MDDS-CBSD architecture was evaluated using expert opinion. The MDDS-CBSD was also used to develop an information and communications technology (ICT) portal using an empirical study method. Vulnerability Assessment Tools were used to assess the developed ICT portal's dependability. The MDDS-CBSD may be used to create web application systems and to protect them from attacks. Model developers may use CBSD to describe and assess dependability attributes at any point during the model development process. The reliability of this model can also let companies utilise CBSD with confidence.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 1","pages":"76-92"},"PeriodicalIF":1.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Android malware detection via efficient application programming interface call sequences extraction and machine learning classifiers 通过高效的应用程序编程接口调用序列提取和机器学习分类器检测安卓恶意软件
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-26 DOI: 10.1049/sfw2.12083
Tanjie Wang, Yueshen Xu, Xinkui Zhao, Zhiping Jiang, Rui Li

Malware detection is an important task for the ecosystem of mobile applications (APPs), especially for the Android ecosystem, and is vital to guarantee the user experience of Android APPs. There have been some exiting methods trying to solve the problem of malware detection, but the methods suffer from several defects, such as high time complexity and mediocre accuracy, which seriously decrease the practicability of existing methods. To solve these problems, in this study, we propose a novel Android malware detection framework, where we contribute an efficient Application Programming Interface (API) call sequences extraction algorithm and an investigation of different types of classifiers. In API call sequences extraction, we propose an algorithm for transforming the function call graph from a multigraph into a directed simple graph, which successfully avoids the unnecessary repetitive path searching. We also propose a pruning search, which further reduces the number of paths to be searched. Our algorithm greatly reduces the time complexity. We generate the transition matrix as classification features and investigate three types of machine learning classifiers to complete the malware detection task. The experiments are performed on real-world Android Packages (APKs), and the results demonstrate that our method significantly reduces the running time and produces high detection accuracy.

恶意软件检测是移动应用程序生态系统,尤其是安卓生态系统的一项重要任务,对保证安卓应用程序的用户体验至关重要。已经有一些现有的方法试图解决恶意软件检测的问题,但这些方法存在时间复杂度高、准确性差等缺陷,严重降低了现有方法的实用性。为了解决这些问题,在本研究中,我们提出了一种新的Android恶意软件检测框架,其中我们提供了一种高效的应用编程接口(API)调用序列提取算法,并对不同类型的分类器进行了研究。在API调用序列提取中,我们提出了一种将函数调用图从多重图转换为有向简单图的算法,成功地避免了不必要的重复路径搜索。我们还提出了一种修剪搜索,它进一步减少了要搜索的路径的数量。我们的算法大大降低了时间复杂度。我们生成转换矩阵作为分类特征,并研究了三种类型的机器学习分类器来完成恶意软件检测任务。实验在真实世界的Android软件包(APK)上进行,结果表明,我们的方法显著减少了运行时间,并产生了高检测精度。
{"title":"Android malware detection via efficient application programming interface call sequences extraction and machine learning classifiers","authors":"Tanjie Wang,&nbsp;Yueshen Xu,&nbsp;Xinkui Zhao,&nbsp;Zhiping Jiang,&nbsp;Rui Li","doi":"10.1049/sfw2.12083","DOIUrl":"https://doi.org/10.1049/sfw2.12083","url":null,"abstract":"<p>Malware detection is an important task for the ecosystem of mobile applications (APPs), especially for the Android ecosystem, and is vital to guarantee the user experience of Android APPs. There have been some exiting methods trying to solve the problem of malware detection, but the methods suffer from several defects, such as high time complexity and mediocre accuracy, which seriously decrease the practicability of existing methods. To solve these problems, in this study, we propose a novel Android malware detection framework, where we contribute an efficient Application Programming Interface (API) call sequences extraction algorithm and an investigation of different types of classifiers. In API call sequences extraction, we propose an algorithm for transforming the function call graph from a multigraph into a directed simple graph, which successfully avoids the unnecessary repetitive path searching. We also propose a pruning search, which further reduces the number of paths to be searched. Our algorithm greatly reduces the time complexity. We generate the transition matrix as classification features and investigate three types of machine learning classifiers to complete the malware detection task. The experiments are performed on real-world Android Packages (APKs), and the results demonstrate that our method significantly reduces the running time and produces high detection accuracy.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"348-361"},"PeriodicalIF":1.6,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50144704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic mapping study on machine learning methodologies for requirements management 用于需求管理的机器学习方法的系统映射研究
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-24 DOI: 10.1049/sfw2.12082
Chi Xu, Yuanbang Li, Bangchao Wang, Shi Dong

Requirements management (RM) plays an important role in requirements engineering. The development of machine learning (ML) is in full swing, and many ML software management techniques had been used to improve the performance of RM methods. However, as no research study is known that exists systematically to summarise the ML methods used in RM. To fill this gap, this paper adopts the systematic mapping study to survey the state-of-the-art ML methods for RM primary studies and were finally selected in this mapping, which was published on 36 conferences and journals. The 24 factors affecting the ML method of RM are determined, of which 9, 11 and 4 are the three parts of RM, namely requirements baseline maintenance, requirements traceability and requirements change management separately. The 18 objectives of the ML method for RM are summarised, of which 6, 7 and 5 are the three parts of RM. The eight ML methods used in RM and their time sequence are summarised. The 18 evaluation indexes for RM in the ML method are determined, and the performance of these methods on these parameters is analysed. The research direction of this paper is of great significance to the research of researchers in demand management.

需求管理在需求工程中发挥着重要作用。机器学习(ML)的发展正在如火如荼地进行,许多ML软件管理技术已经被用来提高RM方法的性能。然而,由于目前还没有系统总结RM中使用的ML方法的研究。为了填补这一空白,本文采用系统的映射研究来调查RM初级研究的最先进的ML方法,并最终入选该映射,该映射发表在36个会议和期刊上。确定了影响RM ML方法的24个因素,其中9、11和4是RM的三个部分,分别是需求基线维护、需求可追溯性和需求变更管理。总结了RM的ML方法的18个目标,其中6、7和5是RM的三个部分。总结了RM中使用的八种ML方法及其时间序列。确定了ML方法中RM的18个评价指标,并分析了这些方法在这些参数上的性能。本文的研究方向对需求管理研究者的研究具有重要意义。
{"title":"A systematic mapping study on machine learning methodologies for requirements management","authors":"Chi Xu,&nbsp;Yuanbang Li,&nbsp;Bangchao Wang,&nbsp;Shi Dong","doi":"10.1049/sfw2.12082","DOIUrl":"https://doi.org/10.1049/sfw2.12082","url":null,"abstract":"<p>Requirements management (RM) plays an important role in requirements engineering. The development of machine learning (ML) is in full swing, and many ML software management techniques had been used to improve the performance of RM methods. However, as no research study is known that exists systematically to summarise the ML methods used in RM. To fill this gap, this paper adopts the systematic mapping study to survey the state-of-the-art ML methods for RM primary studies and were finally selected in this mapping, which was published on 36 conferences and journals. The 24 factors affecting the ML method of RM are determined, of which 9, 11 and 4 are the three parts of RM, namely requirements baseline maintenance, requirements traceability and requirements change management separately. The 18 objectives of the ML method for RM are summarised, of which 6, 7 and 5 are the three parts of RM. The eight ML methods used in RM and their time sequence are summarised. The 18 evaluation indexes for RM in the ML method are determined, and the performance of these methods on these parameters is analysed. The research direction of this paper is of great significance to the research of researchers in demand management.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"405-423"},"PeriodicalIF":1.6,"publicationDate":"2022-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50142330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are Infinite-Failure NHPP-Based Software Reliability Models Useful? 基于无限故障nhpp的软件可靠性模型有用吗?
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-23 DOI: 10.3390/software2010001
Siqiao Li, T. Dohi, H. Okamura
In the literature, infinite-failure software reliability models (SRMs), such as Musa-Okumoto SRM (1984), have been demonstrated to be effective in quantitatively characterizing software testing processes and assessing software reliability. This paper primarily focuses on the infinite-failure (type-II) non-homogeneous Poisson process (NHPP)-based SRMs and evaluates the performances of these SRMs comprehensively by comparing with the existing finite-failure (type-I) NHPP-based SRMs. In more specific terms, to describe the software fault-detection time distribution, we postulate 11 representative probability distribution functions that can be categorized into the generalized exponential distribution family and the extreme-value distribution family. Then, we compare the goodness-of-fit and predictive performances with the associated 11 type-I and type-II NHPP-based SRMs. In numerical experiments, we analyze software fault-count data, collected from 16 actual development projects, which are commonly known in the software industry as fault-count time-domain data and fault-count time-interval data (group data). The maximum likelihood method is utilized to estimate the model parameters in both NHPP-based SRMs. In a comparison of the type-I with the type-II, it is shown that the type-II NHPP-based SRMs could exhibit better predictive performance than the existing type-I NHPP-based SRMs, especially in the early stage of software testing.
在文献中,无限故障软件可靠性模型(SRM),如Musa-Okumoto SRM(1984),已被证明在定量表征软件测试过程和评估软件可靠性方面是有效的。本文主要研究了基于无限失效(ii型)非齐次泊松过程(NHPP)的srm,并通过与现有基于有限失效(i型)NHPP的srm的比较,对这些srm的性能进行了综合评价。更具体地说,为了描述软件故障检测时间分布,我们假设了11个具有代表性的概率分布函数,这些概率分布函数可分为广义指数分布族和极值分布族。然后,我们将拟合优度和预测性能与相关的11种基于nhpp的i型和ii型srm进行比较。在数值实验中,我们分析了从16个实际开发项目中收集的软件故障计数数据,这些数据在软件行业中通常称为故障计数时域数据和故障计数时间间隔数据(组数据)。利用极大似然法对两种基于nhpp的srm模型参数进行估计。通过对i型和ii型模型的比较,发现ii型模型比现有的i型模型具有更好的预测性能,尤其是在软件测试的早期阶段。
{"title":"Are Infinite-Failure NHPP-Based Software Reliability Models Useful?","authors":"Siqiao Li, T. Dohi, H. Okamura","doi":"10.3390/software2010001","DOIUrl":"https://doi.org/10.3390/software2010001","url":null,"abstract":"In the literature, infinite-failure software reliability models (SRMs), such as Musa-Okumoto SRM (1984), have been demonstrated to be effective in quantitatively characterizing software testing processes and assessing software reliability. This paper primarily focuses on the infinite-failure (type-II) non-homogeneous Poisson process (NHPP)-based SRMs and evaluates the performances of these SRMs comprehensively by comparing with the existing finite-failure (type-I) NHPP-based SRMs. In more specific terms, to describe the software fault-detection time distribution, we postulate 11 representative probability distribution functions that can be categorized into the generalized exponential distribution family and the extreme-value distribution family. Then, we compare the goodness-of-fit and predictive performances with the associated 11 type-I and type-II NHPP-based SRMs. In numerical experiments, we analyze software fault-count data, collected from 16 actual development projects, which are commonly known in the software industry as fault-count time-domain data and fault-count time-interval data (group data). The maximum likelihood method is utilized to estimate the model parameters in both NHPP-based SRMs. In a comparison of the type-I with the type-II, it is shown that the type-II NHPP-based SRMs could exhibit better predictive performance than the existing type-I NHPP-based SRMs, especially in the early stage of software testing.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88562197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Retracted: A software-based framework for the development of smart healthcare systems using fog computing 收回:使用雾计算开发智能医疗系统的基于软件的框架
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-23 DOI: 10.1049/sfw2.12081
Prabhdeep Singh, Rajbir Kaur

Retraction: [Prabhdeep Singh, Rajbir Kaur, A software-based framework for the development of smart healthcare systems using fog computing, IET Software 2022 (https://doi.org/10.1049/sfw2.12081)].

The above article from IET Software, published online on 23 December 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.

撤回:[Prabhdeep Singh,Rajbir Kaur,使用雾计算开发智能医疗系统的基于软件的框架,IET软件2022(https://doi.org/10.1049/sfw2.12081)]上述来自IET Software的文章于2022年12月23日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: A software-based framework for the development of smart healthcare systems using fog computing","authors":"Prabhdeep Singh,&nbsp;Rajbir Kaur","doi":"10.1049/sfw2.12081","DOIUrl":"https://doi.org/10.1049/sfw2.12081","url":null,"abstract":"<p>Retraction: [Prabhdeep Singh, Rajbir Kaur, A software-based framework for the development of smart healthcare systems using fog computing, <i>IET Software</i> 2022 (https://doi.org/10.1049/sfw2.12081)].</p><p>The above article from <i>IET Software</i>, published online on 23 December 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"632-638"},"PeriodicalIF":1.6,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50141553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Retracted: Self-attention Bi-RNN for developer emotion recognition based on EEG 基于EEG的开发者情绪识别的自注意双RNN
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-23 DOI: 10.1049/sfw2.12080
Yingdong Wang, Yuhui Zheng, Lu Cao, Zhiling Zhang, Qunsehng Ruan, Qingfeng Wu

Retraction: [Yingdong Wang, Yuhui Zheng, Lu Cao, Zhiling Zhang, Qunsehng Ruan, Qingfeng Wu, Self-attention Bi-RNN for developer emotion recognition based on EEG, IET Software 2022 (https://doi.org/10.1049/sfw2.12080)].

The above article from IET Software, published online on 23 December 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.

收回:[王英东,郑宇辉,曹璐,张志玲,阮群森,吴庆峰,基于EEG的开发者情绪识别的自注意Bi-RNN,IET软件2022(https://doi.org/10.1049/sfw2.12080)]上述来自IET Software的文章于2022年12月23日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Self-attention Bi-RNN for developer emotion recognition based on EEG","authors":"Yingdong Wang,&nbsp;Yuhui Zheng,&nbsp;Lu Cao,&nbsp;Zhiling Zhang,&nbsp;Qunsehng Ruan,&nbsp;Qingfeng Wu","doi":"10.1049/sfw2.12080","DOIUrl":"https://doi.org/10.1049/sfw2.12080","url":null,"abstract":"<p>Retraction: [Yingdong Wang, Yuhui Zheng, Lu Cao, Zhiling Zhang, Qunsehng Ruan, Qingfeng Wu, Self-attention Bi-RNN for developer emotion recognition based on EEG, <i>IET Software</i> 2022 (https://doi.org/10.1049/sfw2.12080)].</p><p>The above article from <i>IET Software</i>, published online on 23 December 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"620-631"},"PeriodicalIF":1.6,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50141552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DOOSRA—Distributed Object-Oriented Software Restructuring Approach using DIM-K-means and MAD-based ENRNN classifier DOOSRA——基于DIM-K和MAD的ENRNN分类器的分布式面向对象软件重构方法
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-21 DOI: 10.1049/sfw2.12076
G. Sudhakar, S. Nithiyanandam

There exists a need to generate well-designed software systems because of the extensive adoption of object-oriented programming in software growth. Thus, the total software maintenance cost is decreased and the component's reusability is augmented. However, the software system's internal structure worsens owing to extended maintenance activities. For enhancing the system's overall internal structure without varying its external behaviour, restructuring is an extensively utilised solution in this circumstance. Thus, utilising the Deterministic Initialisation Method based K-Means (DIM-K-Means) and Median Absolute Deviation-based Elastic Net Regulariser Neural Network (MAD-ENRNN) classifier, a framework called Distributed Object-Oriented (DOO) software restructuring model is created by the study. Five steps are undertaken by the developed framework. Centred on source code along with change history, the interactions amongst the classes are initially pre-processed where the dependencies of disparate classes are detected and formulated into a graphical structure. After that, from the graph, the extraction of significant features is done. Utilising a multi variant objective-based Aquila optimiser, the most pertinent features are selected as of the extracted features. Next, for minimising the complexity, the selected features are created into clusters. Then, the formed clusters are offered to the classifier named MAD-ENRNN. The DOO software is effectively restructured by MAD-ENRNN. The proposed methodology's performance is contrasted with the prevailing systems in an experimental evaluation. The outcomes displayed that the proposed framework is capable of restructuring the DOO software with improved accuracy of 9.94% when analogised to the top-notch methods.

由于在软件开发中广泛采用了面向对象编程,因此需要生成设计良好的软件系统。因此,降低了软件维护的总成本,增强了组件的可重用性。然而,软件系统的内部结构由于维护活动的延长而恶化。为了在不改变外部行为的情况下增强系统的整体内部结构,重组是这种情况下广泛使用的解决方案。因此,利用基于确定性初始化方法的K-Means(DIM-K-Means)和基于中值绝对偏差的弹性网络正则化神经网络(MAD-ENRNN)分类器,本研究创建了一个称为分布式面向对象(DOO)软件重构模型的框架。制定的框架采取了五个步骤。以源代码和更改历史为中心,最初对类之间的交互进行预处理,检测不同类的依赖关系,并将其公式化为图形结构。然后,从图中提取重要特征。利用基于多变量目标的Aquila优化器,从提取的特征中选择最相关的特征。接下来,为了最大限度地降低复杂性,将选定的特征创建为簇。然后,将形成的聚类提供给名为MAD-ENRNN的分类器。MAD-ENRNN对DOO软件进行了有效的重构。在实验评估中,将所提出的方法的性能与主流系统进行了对比。结果表明,与顶级方法相比,所提出的框架能够重构DOO软件,准确率提高9.94%。
{"title":"DOOSRA—Distributed Object-Oriented Software Restructuring Approach using DIM-K-means and MAD-based ENRNN classifier","authors":"G. Sudhakar,&nbsp;S. Nithiyanandam","doi":"10.1049/sfw2.12076","DOIUrl":"https://doi.org/10.1049/sfw2.12076","url":null,"abstract":"<p>There exists a need to generate well-designed software systems because of the extensive adoption of object-oriented programming in software growth. Thus, the total software maintenance cost is decreased and the component's reusability is augmented. However, the software system's internal structure worsens owing to extended maintenance activities. For enhancing the system's overall internal structure without varying its external behaviour, restructuring is an extensively utilised solution in this circumstance. Thus, utilising the Deterministic Initialisation Method based K-Means (DIM-K-Means) and Median Absolute Deviation-based Elastic Net Regulariser Neural Network (MAD-ENRNN) classifier, a framework called Distributed Object-Oriented (DOO) software restructuring model is created by the study. Five steps are undertaken by the developed framework. Centred on source code along with change history, the interactions amongst the classes are initially pre-processed where the dependencies of disparate classes are detected and formulated into a graphical structure. After that, from the graph, the extraction of significant features is done. Utilising a multi variant objective-based Aquila optimiser, the most pertinent features are selected as of the extracted features. Next, for minimising the complexity, the selected features are created into clusters. Then, the formed clusters are offered to the classifier named MAD-ENRNN. The DOO software is effectively restructured by MAD-ENRNN. The proposed methodology's performance is contrasted with the prevailing systems in an experimental evaluation. The outcomes displayed that the proposed framework is capable of restructuring the DOO software with improved accuracy of 9.94% when analogised to the top-notch methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 1","pages":"23-36"},"PeriodicalIF":1.6,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50139738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realising benefits in public IT projects: A multiple case study 实现公共IT项目的效益:一个多案例研究
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-12-13 DOI: 10.1049/sfw2.12079
Knut Kjetil Holgeid, Magne Jørgensen, Gro Holst Volden, Helene Berg

Information Technology (IT) investments in the public sector are large, and it is essential that they lead to benefits for the organisations themselves and wider society. While there is evidence suggesting a positive connection between the existence of benefits management practices and the realisation of benefits, less is known about how to implement such practices effectively. The aim of this paper is to provide insights into when benefits are most likely to be realised, and how benefits management practices and roles should be implemented, in order to have a positive effect on the success of projects in terms of realising benefits. We collected data relating to 10 public IT projects in Norway. For each project, information on benefits management was collected from project documents by interviewing the project owners and benefits owners and via follow-up surveys. The benefits with the highest degree of realisation were those internal to the organisation, while those with the lowest degree were societal benefits. Projects assessed as having more specific, measurable, accountable, and realistically planned benefits were more successful in terms of realising benefits. Benefit owners were most effective when they were able to attract attention to the benefits to be realised, had a strong mandate, and had the domain expertise.

公共部门的信息技术投资是巨大的,它们必须为组织本身和更广泛的社会带来利益。尽管有证据表明福利管理实践的存在与福利的实现之间存在积极联系,但人们对如何有效实施此类实践知之甚少。本文的目的是深入了解何时最有可能实现效益,以及应如何实施效益管理实践和作用,以便在实现效益方面对项目的成功产生积极影响。我们收集了与挪威10个公共IT项目有关的数据。对于每个项目,通过采访项目所有者和利益所有者以及通过后续调查,从项目文件中收集了有关利益管理的信息。实现程度最高的利益是组织内部的利益,而实现程度最低的利益是社会利益。被评估为具有更具体、可衡量、负责任和现实规划效益的项目在实现效益方面更为成功。当福利所有者能够吸引人们对即将实现的福利的关注,拥有强大的授权,并拥有领域专业知识时,他们的效率最高。
{"title":"Realising benefits in public IT projects: A multiple case study","authors":"Knut Kjetil Holgeid,&nbsp;Magne Jørgensen,&nbsp;Gro Holst Volden,&nbsp;Helene Berg","doi":"10.1049/sfw2.12079","DOIUrl":"https://doi.org/10.1049/sfw2.12079","url":null,"abstract":"<p>Information Technology (IT) investments in the public sector are large, and it is essential that they lead to benefits for the organisations themselves and wider society. While there is evidence suggesting a positive connection between the existence of benefits management practices and the realisation of benefits, less is known about how to implement such practices effectively. The aim of this paper is to provide insights into when benefits are most likely to be realised, and how benefits management practices and roles should be implemented, in order to have a positive effect on the success of projects in terms of realising benefits. We collected data relating to 10 public IT projects in Norway. For each project, information on benefits management was collected from project documents by interviewing the project owners and benefits owners and via follow-up surveys. The benefits with the highest degree of realisation were those internal to the organisation, while those with the lowest degree were societal benefits. Projects assessed as having more specific, measurable, accountable, and realistically planned benefits were more successful in terms of realising benefits. Benefit owners were most effective when they were able to attract attention to the benefits to be realised, had a strong mandate, and had the domain expertise.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 1","pages":"37-54"},"PeriodicalIF":1.6,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12079","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50150281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Software
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1