首页 > 最新文献

IET Software最新文献

英文 中文
Challenges and Solutions for Engineering Applications on Smartphones 智能手机工程应用的挑战与解决方案
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-08-18 DOI: 10.3390/software2030017
Anthony Khoury, Mohamad Abbas Kaddaha, Maya Saade, R. Younes, Rachid Outbib, Pascal Lafon
This paper starts by presenting the concept of a mobile application. A literature review is conducted, which shows that there is still a certain lack with regard to smartphone applications in the domain of engineering as independent simulation applications and not only as extensions of smartphone tools. The challenges behind this lack are then discussed. Subsequently, three case studies of engineering applications for both smartphones and the internet are presented, alongside their solutions to the challenges presented. The first case study concerns an engineering application for systems control. The second case study focuses on an engineering application for composite materials. The third case study focuses on the finite element method and structure generation. The solutions to the presented challenges are then described through their implementation in the applications. The three case studies show a new system of thought concerning the development of engineering smartphone applications.
本文首先介绍了移动应用程序的概念。进行了文献综述,这表明在工程领域的智能手机应用程序作为独立的仿真应用程序,而不仅仅是作为智能手机工具的扩展,仍然存在一定的缺乏。然后讨论了这种缺乏背后的挑战。随后,介绍了智能手机和互联网工程应用的三个案例研究,以及他们对所面临挑战的解决方案。第一个案例研究涉及系统控制的工程应用。第二个案例研究侧重于复合材料的工程应用。第三个案例研究的重点是有限元方法和结构生成。然后通过在应用程序中的实现来描述所提出的挑战的解决方案。这三个案例研究展示了一种关于工程智能手机应用开发的新思路。
{"title":"Challenges and Solutions for Engineering Applications on Smartphones","authors":"Anthony Khoury, Mohamad Abbas Kaddaha, Maya Saade, R. Younes, Rachid Outbib, Pascal Lafon","doi":"10.3390/software2030017","DOIUrl":"https://doi.org/10.3390/software2030017","url":null,"abstract":"This paper starts by presenting the concept of a mobile application. A literature review is conducted, which shows that there is still a certain lack with regard to smartphone applications in the domain of engineering as independent simulation applications and not only as extensions of smartphone tools. The challenges behind this lack are then discussed. Subsequently, three case studies of engineering applications for both smartphones and the internet are presented, alongside their solutions to the challenges presented. The first case study concerns an engineering application for systems control. The second case study focuses on an engineering application for composite materials. The third case study focuses on the finite element method and structure generation. The solutions to the presented challenges are then described through their implementation in the applications. The three case studies show a new system of thought concerning the development of engineering smartphone applications.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"122 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88257718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Synthesis-Based Stateful Approach for Guiding Design Thinking in Embedded System Development 嵌入式系统开发中一种基于综合的有状态方法指导设计思维
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-08-12 DOI: 10.3390/software2030016
Hung-Fu Chang, S. K. Mobasser
Embedded systems have attracted more attention and have become more critical due to the recent computer technology advancements and applications in various areas, such as healthcare, transportation, and manufacturing. Traditional software design approaches and the finite state machine cannot provide sufficient support due to two major reasons: the increasing need for more functions in designing an embedded system and sequential controls in the implementation. This deficiency particularly discourages inexperienced engineers who use conventional methods to design embedded software. Hence, we proposed a design method, the Synthesis-Based Stateful Software Design Approach (SSSDA), which synthesizes two existing methods, the Synthesis-Based Software Design Framework (SSDF) and Process and Artifact State Transition Abstraction (PASTA), to remedy the drawback of conventional methods. To show how to conduct our proposed design approach and investigate how it supports embedded system design, we studied an industrial project developed by a sophomore student team. Our results showed that our proposed approach could significantly help students lay out modules, improve testability, and reduce defects.
由于最近计算机技术的进步和在各个领域的应用,例如医疗保健、运输和制造业,嵌入式系统引起了越来越多的关注,并且变得越来越重要。传统的软件设计方法和有限状态机不能提供足够的支持,主要有两个原因:嵌入式系统设计中越来越多的功能需求和实现中的顺序控制。这一缺陷尤其不利于使用传统方法设计嵌入式软件的缺乏经验的工程师。因此,我们提出了一种设计方法,即基于综合的有状态软件设计方法(SSSDA),它综合了两种现有的方法,即基于综合的软件设计框架(SSDF)和过程与工件状态转换抽象(PASTA),以弥补传统方法的缺点。为了展示如何实施我们提出的设计方法并调查它如何支持嵌入式系统设计,我们研究了一个由大二学生团队开发的工业项目。我们的结果表明,我们提出的方法可以显著地帮助学生布置模块,提高可测试性,并减少缺陷。
{"title":"A Synthesis-Based Stateful Approach for Guiding Design Thinking in Embedded System Development","authors":"Hung-Fu Chang, S. K. Mobasser","doi":"10.3390/software2030016","DOIUrl":"https://doi.org/10.3390/software2030016","url":null,"abstract":"Embedded systems have attracted more attention and have become more critical due to the recent computer technology advancements and applications in various areas, such as healthcare, transportation, and manufacturing. Traditional software design approaches and the finite state machine cannot provide sufficient support due to two major reasons: the increasing need for more functions in designing an embedded system and sequential controls in the implementation. This deficiency particularly discourages inexperienced engineers who use conventional methods to design embedded software. Hence, we proposed a design method, the Synthesis-Based Stateful Software Design Approach (SSSDA), which synthesizes two existing methods, the Synthesis-Based Software Design Framework (SSDF) and Process and Artifact State Transition Abstraction (PASTA), to remedy the drawback of conventional methods. To show how to conduct our proposed design approach and investigate how it supports embedded system design, we studied an industrial project developed by a sophomore student team. Our results showed that our proposed approach could significantly help students lay out modules, improve testability, and reduce defects.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"53 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83720268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Test-driven development, engagement in activity, and maintainability: An empirical study 测试驱动的开发、活动参与和可维护性:一项实证研究
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-27 DOI: 10.1049/sfw2.12135
Wei Ren, Stephen Barrett

The software engineering community aims to achieve and maintain high-efficient software engineering practical activities. One of the techniques used for this purpose is Test-Driven Development (TDD), which is a cyclic and test-centered development method positively related to maintainability, which may vary depending on the context and application. Previous research has indicated that TDD's benefits on maintainability may be due to the improved focus on coding and testing activities. However, limited research has investigated the role of engagement in software quality. Therefore, this study investigates the relationship between TDD methods, engagement level in development activities, and maintainability. The primary research questions addressed in this study are does following TDD methods improve the engagement level in development activities? And does a higher engagement level leads to better maintainability? The study employs a statistical analysis technique, regression analysis to explore the research questions. The results show that TDD behaviours improve the engagement level, and engaging in development activities has a significant positive impact on maintainability. Additionally, the study finds that the positive impact of focussing on testing, such as writing more test cases, is more pronounced compared to coding activities. Our study adds to current software engineering literature that not only personal expertise but the engagement level in the development process are associated with software quality and calls for the emphasis on developer's engagement.

软件工程社区旨在实现和维护高效的软件工程实践活动。用于此目的的技术之一是测试驱动开发(TDD),这是一种循环的、以测试为中心的开发方法,与可维护性呈正相关,可维护性可能因上下文和应用程序而异。先前的研究表明,TDD在可维护性方面的优势可能是由于改进了对编码和测试活动的关注。然而,有限的研究调查了参与在软件质量中的作用。因此,本研究调查了TDD方法、开发活动中的参与水平和可维护性之间的关系。本研究中提出的主要研究问题是,以下TDD方法是否能提高开发活动的参与水平?更高的参与度是否会带来更好的可维护性?本研究采用统计分析技术,回归分析,探讨研究问题。结果表明,TDD行为提高了参与度,参与开发活动对可维护性有显著的积极影响。此外,研究发现,与编码活动相比,专注于测试的积极影响更为明显,比如编写更多的测试用例。我们的研究补充了当前的软件工程文献,即不仅个人专业知识,而且开发过程中的参与程度都与软件质量有关,并呼吁强调开发人员的参与。
{"title":"Test-driven development, engagement in activity, and maintainability: An empirical study","authors":"Wei Ren,&nbsp;Stephen Barrett","doi":"10.1049/sfw2.12135","DOIUrl":"https://doi.org/10.1049/sfw2.12135","url":null,"abstract":"<p>The software engineering community aims to achieve and maintain high-efficient software engineering practical activities. One of the techniques used for this purpose is Test-Driven Development (TDD), which is a cyclic and test-centered development method positively related to maintainability, which may vary depending on the context and application. Previous research has indicated that TDD's benefits on maintainability may be due to the improved focus on coding and testing activities. However, limited research has investigated the role of engagement in software quality. Therefore, this study investigates the relationship between TDD methods, engagement level in development activities, and maintainability. The primary research questions addressed in this study are does following TDD methods improve the engagement level in development activities? And does a higher engagement level leads to better maintainability? The study employs a statistical analysis technique, regression analysis to explore the research questions. The results show that TDD behaviours improve the engagement level, and engaging in development activities has a significant positive impact on maintainability. Additionally, the study finds that the positive impact of focussing on testing, such as writing more test cases, is more pronounced compared to coding activities. Our study adds to current software engineering literature that not only personal expertise but the engagement level in the development process are associated with software quality and calls for the emphasis on developer's engagement.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"509-525"},"PeriodicalIF":1.6,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Measured Agile Software Development Metrics Using an Agile Model-Based Software Engineering Approach versus Scrum Only 比较使用基于敏捷模型的软件工程方法与仅使用Scrum的度量敏捷软件开发指标
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-26 DOI: 10.3390/software2030015
Moe Huss, Daniel R. Herber, J. Borky
This study compares the reliability of estimation, productivity, and defect rate metrics for sprints driven by a specific instance of the agile approach (i.e., scrum) and an agile model-Bbased software engineering (MBSE) approach called the integrated Scrum Model-Based System Architecture Process (sMBSAP) when developing a software system. The quasi-experimental study conducted ten sprints using each approach. The approaches were then evaluated based on their effectiveness in helping the product development team estimate the backlog items that they could build during a time-boxed sprint and deliver more product backlog items (PBI) with fewer defects. The commitment reliability (CR) was calculated to compare the reliability of estimation with a measured average scrum-driven value of 0.81 versus a statistically different average sMBSAP-driven value of 0.94. Similarly, the average sprint velocity (SV) for the scrum-driven sprints was 26.8 versus 31.8 for the MBSAP-driven sprints. The average defect density (DD) for the scrum-driven sprints was 0.91, while that of the sMBSAP-driven sprints was 0.63. The average defect leakage (DL) for the scrum-driven sprints was 0.20, while that of the sMBSAP-driven sprints was 0.15. The t-test analysis concluded that the sMBSAP-driven sprints were associated with a statistically significant larger mean CR, SV, DD, and DL than that of the scrum-driven sprints. The overall results demonstrate formal quantitative benefits of an agile MBSE approach compared to an agile alone, thereby strengthening the case for considering agile MBSE methods within the software development community. Future work might include comparing agile and agile MBSE methods using alternative research designs and further software development objectives, techniques, and metrics.
本研究在开发软件系统时,比较了由敏捷方法(即scrum)的特定实例和敏捷基于模型的软件工程(MBSE)方法(称为集成的scrum基于模型的系统架构过程(sMBSAP))驱动的sprint的评估可靠性、生产力和缺陷率指标。准实验研究使用每种方法进行了10次冲刺。然后根据这些方法在帮助产品开发团队评估他们可以在时间限定的冲刺期间构建的待办事项项以及交付更多具有更少缺陷的产品待办事项项(PBI)方面的有效性来评估这些方法。通过计算承诺信度(CR)来比较估算信度与测量的平均scrum驱动值(0.81)和统计上不同的平均smbsap驱动值(0.94)。类似地,scrum驱动的sprint的平均冲刺速度(SV)是26.8,而mbsap驱动的sprint是31.8。scrum驱动的sprint的平均缺陷密度(DD)是0.91,而smbsap驱动的sprint的平均缺陷密度是0.63。scrum驱动的sprint的平均缺陷泄漏(DL)是0.20,而smbsap驱动的sprint的平均缺陷泄漏(DL)是0.15。t检验分析得出结论,smbsap驱动的sprint与统计上显著大于scrum驱动的sprint的平均CR、SV、DD和DL相关。总体结果证明了与单独的敏捷方法相比,敏捷MBSE方法的正式量化好处,从而加强了在软件开发社区中考虑敏捷MBSE方法的案例。未来的工作可能包括使用替代研究设计和进一步的软件开发目标、技术和度量来比较敏捷和敏捷MBSE方法。
{"title":"Comparing Measured Agile Software Development Metrics Using an Agile Model-Based Software Engineering Approach versus Scrum Only","authors":"Moe Huss, Daniel R. Herber, J. Borky","doi":"10.3390/software2030015","DOIUrl":"https://doi.org/10.3390/software2030015","url":null,"abstract":"This study compares the reliability of estimation, productivity, and defect rate metrics for sprints driven by a specific instance of the agile approach (i.e., scrum) and an agile model-Bbased software engineering (MBSE) approach called the integrated Scrum Model-Based System Architecture Process (sMBSAP) when developing a software system. The quasi-experimental study conducted ten sprints using each approach. The approaches were then evaluated based on their effectiveness in helping the product development team estimate the backlog items that they could build during a time-boxed sprint and deliver more product backlog items (PBI) with fewer defects. The commitment reliability (CR) was calculated to compare the reliability of estimation with a measured average scrum-driven value of 0.81 versus a statistically different average sMBSAP-driven value of 0.94. Similarly, the average sprint velocity (SV) for the scrum-driven sprints was 26.8 versus 31.8 for the MBSAP-driven sprints. The average defect density (DD) for the scrum-driven sprints was 0.91, while that of the sMBSAP-driven sprints was 0.63. The average defect leakage (DL) for the scrum-driven sprints was 0.20, while that of the sMBSAP-driven sprints was 0.15. The t-test analysis concluded that the sMBSAP-driven sprints were associated with a statistically significant larger mean CR, SV, DD, and DL than that of the scrum-driven sprints. The overall results demonstrate formal quantitative benefits of an agile MBSE approach compared to an agile alone, thereby strengthening the case for considering agile MBSE methods within the software development community. Future work might include comparing agile and agile MBSE methods using alternative research designs and further software development objectives, techniques, and metrics.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78344153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry 重温DevOps时代的安全:基于证据的DevSecOps行业调查
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-26 DOI: 10.1049/sfw2.12132
Xin Zhou, Runfeng Mao, He Zhang, Qiming Dai, Huang Huang, Haifeng Shen, Jingyue Li, Guoping Rong

By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. DevSecOps promotes security as a shared responsibility integrated into the DevOps process that seamlessly intertwines development, operations, and security from the start throughout to the end of cycles. While some companies have already begun to embrace this new strategy, both industry and academia are still seeking a common understanding of the DevSecOps movement. The goal of this study is to report the state-of-the-practice of DevSecOps, including the impact of DevOps on security, practitioners' understanding of DevSecOps, and the practices associated with DevSecOps as well as the challenges of implementing DevSecOps. The authors used a mixed-methods approach for this research. The authors carried out a grey literature review on DevSecOps, and surveyed the practitioners of DevSecOps in industry of China. The status quo of DevSecOps in industry is summarized. Three major software security risks are identified with DevOps, where the establishment of DevOps pipeline provides opportunities for security-related activities. The authors classify the interpretations of DevSecOps into three core aspects of DevSecOps capabilities, cultural enablers, and technological enablers. To materialise the interpretations into daily software production activities, the recommended DevSecOps practices from three perspectives—people, process, and technology. Although a preliminary consensus is that DevSecOps is regarded as an extension of DevOps, there is a debate on whether DevSecOps is a superfluous term. While DevSecOps is attracting an increasing attention by industry, it is still in its infancy and more effort needs to be invested to promote it in both research and industry communities.

通过采用敏捷和精益实践,DevOps旨在通过加快开发和部署周期来实现快速价值交付,但这会导致更多的安全问题,只有在开发的最后阶段,孤立的安全角色才能完全解决这些问题。DevSecOps将安全作为一种共享责任加以促进,并将其集成到DevOps流程中,该流程将开发、运营和安全从开始到结束无缝地交织在一起。虽然一些公司已经开始接受这一新战略,但工业界和学术界仍在寻求对DevSecOps运动的共同理解。本研究的目的是报告DevSecOps的实践状况,包括DevOps对安全的影响、从业者对DevSecOps的理解、与DevSecOps相关的实践以及实施DevSecOpss的挑战。作者在这项研究中采用了混合方法。作者对DevSecOps进行了灰色文献综述,并对中国工业界DevSecOps的从业者进行了调查。概述了DevSecOps在行业中的现状。DevOps确定了三大软件安全风险,其中DevOps管道的建立为安全相关活动提供了机会。作者将DevSecOps的解释分为三个核心方面:DevSecOpss能力、文化使能因素和技术使能因素。为了将解释具体化到日常软件生产活动中,建议从三个角度——人员、过程和技术——进行DevSecOps实践。尽管初步的共识是DevSecOps被视为DevOps的延伸,但关于DevSecOps是否是一个多余的术语仍存在争议。虽然DevSecOps正吸引着业界越来越多的关注,但它仍处于起步阶段,需要投入更多的精力在研究和行业社区推广。
{"title":"Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry","authors":"Xin Zhou,&nbsp;Runfeng Mao,&nbsp;He Zhang,&nbsp;Qiming Dai,&nbsp;Huang Huang,&nbsp;Haifeng Shen,&nbsp;Jingyue Li,&nbsp;Guoping Rong","doi":"10.1049/sfw2.12132","DOIUrl":"https://doi.org/10.1049/sfw2.12132","url":null,"abstract":"<p>By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. <i>DevSecOps</i> promotes security as a shared responsibility integrated into the DevOps process that seamlessly intertwines development, operations, and security from the start throughout to the end of cycles. While some companies have already begun to embrace this new strategy, both industry and academia are still seeking a common understanding of the DevSecOps movement. The goal of this study is to report the state-of-the-practice of DevSecOps, including the impact of DevOps on security, practitioners' understanding of DevSecOps, and the practices associated with DevSecOps as well as the challenges of implementing DevSecOps. The authors used a mixed-methods approach for this research. The authors carried out a grey literature review on DevSecOps, and surveyed the practitioners of DevSecOps in industry of China. The status quo of DevSecOps in industry is summarized. Three major software security risks are identified with DevOps, where the establishment of DevOps pipeline provides opportunities for security-related activities. The authors classify the interpretations of DevSecOps into three core aspects of DevSecOps capabilities, cultural enablers, and technological enablers. To materialise the interpretations into daily software production activities, the recommended DevSecOps practices from three perspectives—people, process, and technology. Although a preliminary consensus is that DevSecOps is regarded as an extension of DevOps, there is a debate on whether DevSecOps is a superfluous term. While DevSecOps is attracting an increasing attention by industry, it is still in its infancy and more effort needs to be invested to promote it in both research and industry communities.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"435-454"},"PeriodicalIF":1.6,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50144606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editorial: Machine learning applied to quality and security in software systems 嘉宾评论:机器学习应用于软件系统的质量和安全
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-25 DOI: 10.1049/sfw2.12141
Honghao Gao, Walayat Hussain, Ramón J. Durán Barroso, Junaid Arshad, Yuyu Yin
<p>During the development of software systems, even with advanced planning, problems with quality and security occur. These defects may result in threats to program development and maintenance. Therefore, to control and minimise these defects, machine learning can be used to improve the quality and security of software systems. This special issue focuses on recent advances in architecture, algorithms, optimisation, and models for machine learning applied to quality and security in software systems. After a rigorous review according to relevance, originality, technical novelties, and presentation quality, we selected 4 manuscripts. A summary of these accepted papers is outlined below.</p><p>In the first paper entitled “Robust Malware Identification via Deep Temporal Convolutional Network with Symmetric Cross Entropy Learning” by Sun et al., the authors propose a robust Malware identification method using the temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface (API) function names in many cases. Here, considering the numerous unlabelled samples in practical intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, <i>word</i>2<i>vec</i>. In the experiments, the proposed method is compared to several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of the proposed method, that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.</p><p>In the second paper entitled “Just-In-Time Defect Prediction Enhanced by the Joint Method of Line Label Fusion and File Filtering” by Zhang et al., the authors propose a Just-in-Time defect prediction model enhanced by the joint method of line label Fusion and file Filtering (JIT-FF). First, to distinguish added and removed lines while preserving the original software changes information, the authors represent the code changes as original, added, and removed codes according to line labels. Second, to obtain semantics-enhanced code representation, the authors propose a cross-attention-based line label fusion method to perform complementary feature enhancement. Third, to generate code changes containing fewer defect-irrelevant files, the authors formalise the file filtering as a sequential decision problem and propose a reinforcement learning-based file filtering method. Finally, based on generated code changes, CodeBERT-based commit representation and multi-layer perceptron-based defect prediction are performed to identify the defective software changes. The experiments demonstrate that JIT-FF predicts defective software changes more effectively.</p><p>In the third paper entitled “Android Malwar
在软件系统的开发过程中,即使有先进的计划,也会出现质量和安全问题。这些缺陷可能会对程序开发和维护造成威胁。因此,为了控制和最小化这些缺陷,机器学习可以用来提高软件系统的质量和安全性。本期特刊重点介绍了应用于软件系统质量和安全的机器学习的体系结构、算法、优化和模型的最新进展。在经过相关性、原创性、技术新颖性和表达质量的严格审查后,我们选择了4篇稿件。下面概述了这些被接受的论文的摘要。在Sun等人发表的第一篇题为“基于对称交叉熵学习的深度时间卷积网络的鲁棒恶意软件识别”的论文中,作者提出了一种使用时间卷积网络(TCN)的鲁棒恶意软件识别方法。此外,在许多情况下,词嵌入技术通常用于理解输入操作码(opcode)和应用程序编程接口(API)函数名之间的上下文关系。在这里,考虑到实际智能环境中大量的未标记样本,作者使用一种词嵌入方法,即word2vec,在一个未标记的集合上预训练TCN模型。在一个合成的恶意软件数据集和一个真实的数据集上,将该方法与几种传统的统计方法和最新的神经网络进行了比较。性能比较表明,该方法具有较好的性能和噪声鲁棒性,在实际场景中,该方法的识别准确率达到了98.75%。在Zhang等人的第二篇文章《线标签融合和文件过滤联合方法增强的即时缺陷预测》中,作者提出了一种线标签融合和文件过滤联合方法增强的即时缺陷预测模型(JIT-FF)。首先,为了在保留原始软件变更信息的同时区分添加和删除的行,作者根据行标签将代码变更表示为原始、添加和删除的代码。其次,为了获得语义增强的代码表示,作者提出了一种基于交叉注意的线标签融合方法来进行互补特征增强。第三,为了生成包含较少缺陷无关文件的代码更改,作者将文件过滤形式化为顺序决策问题,并提出了一种基于强化学习的文件过滤方法。最后,基于生成的代码变更,采用基于codebert的提交表示和基于多层感知器的缺陷预测来识别有缺陷的软件变更。实验表明,JIT-FF能更有效地预测软件缺陷变更。在Wang等人的第三篇论文《通过高效API调用序列提取和机器学习分类器检测Android恶意软件》中,作者提出了一种新的Android恶意软件检测框架,其中作者提供了一种高效的API调用序列提取算法和对不同类型分类器的研究。在API调用序列提取中,作者提出了一种将函数调用图从多图转换为有向简单图的算法,成功地避免了不必要的重复路径搜索。作者还提出了一种修剪搜索,这进一步减少了要搜索的路径数量。该算法大大降低了时间复杂度。作者生成转移矩阵作为分类特征,并研究了三种类型的机器学习分类器来完成恶意软件检测任务。在实际的apk上进行了实验,结果表明,该方法减少了运行时间,具有较高的检测精度。在第四篇论文“通过混合区块链可靠性预测选择可靠的区块链节点”中,作者郑等人提出了混合区块链可靠性预测模型H-BRP,提取区块链可靠性因素,然后对每个用户进行个性化预测。连接到不可靠的区块链节点容易造成资源浪费,甚至由于重复交易而丢失加密货币。提出的模型主要旨在选择可靠的区块链节点,并评估和预测它们的可靠性。在100个区块链请求者和200个区块链对等体上进行的综合实验证明了所提出的H-BRP模型的有效性。此外,还发布了200万个测试用例的实现和数据集。特邀编辑谨向所有贡献宝贵意见的作者和众多高素质的匿名审稿人表示衷心的感谢。 我们认为所选的贡献代表了该领域的最新技术,将引起社区的极大兴趣。我们也要感谢IET软件出版工作人员一直以来的支持和奉献。我们特别感谢IET Software总编辑Hana Chockler教授给予我们的支持和鼓励。
{"title":"Guest Editorial: Machine learning applied to quality and security in software systems","authors":"Honghao Gao,&nbsp;Walayat Hussain,&nbsp;Ramón J. Durán Barroso,&nbsp;Junaid Arshad,&nbsp;Yuyu Yin","doi":"10.1049/sfw2.12141","DOIUrl":"10.1049/sfw2.12141","url":null,"abstract":"&lt;p&gt;During the development of software systems, even with advanced planning, problems with quality and security occur. These defects may result in threats to program development and maintenance. Therefore, to control and minimise these defects, machine learning can be used to improve the quality and security of software systems. This special issue focuses on recent advances in architecture, algorithms, optimisation, and models for machine learning applied to quality and security in software systems. After a rigorous review according to relevance, originality, technical novelties, and presentation quality, we selected 4 manuscripts. A summary of these accepted papers is outlined below.&lt;/p&gt;&lt;p&gt;In the first paper entitled “Robust Malware Identification via Deep Temporal Convolutional Network with Symmetric Cross Entropy Learning” by Sun et al., the authors propose a robust Malware identification method using the temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface (API) function names in many cases. Here, considering the numerous unlabelled samples in practical intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, &lt;i&gt;word&lt;/i&gt;2&lt;i&gt;vec&lt;/i&gt;. In the experiments, the proposed method is compared to several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of the proposed method, that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.&lt;/p&gt;&lt;p&gt;In the second paper entitled “Just-In-Time Defect Prediction Enhanced by the Joint Method of Line Label Fusion and File Filtering” by Zhang et al., the authors propose a Just-in-Time defect prediction model enhanced by the joint method of line label Fusion and file Filtering (JIT-FF). First, to distinguish added and removed lines while preserving the original software changes information, the authors represent the code changes as original, added, and removed codes according to line labels. Second, to obtain semantics-enhanced code representation, the authors propose a cross-attention-based line label fusion method to perform complementary feature enhancement. Third, to generate code changes containing fewer defect-irrelevant files, the authors formalise the file filtering as a sequential decision problem and propose a reinforcement learning-based file filtering method. Finally, based on generated code changes, CodeBERT-based commit representation and multi-layer perceptron-based defect prediction are performed to identify the defective software changes. The experiments demonstrate that JIT-FF predicts defective software changes more effectively.&lt;/p&gt;&lt;p&gt;In the third paper entitled “Android Malwar","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"345-347"},"PeriodicalIF":1.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44482903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structuring meaningful bug-fixing patches to fix software defect 构建有意义的bug修复补丁来修复软件缺陷
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-12 DOI: 10.1049/sfw2.12140
Hui Li, Yong Liu, Xuexin Qi, Xi Yu, Shikai Guo

Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code defects. However, this process decreases the efficiency of software development and leads to a significant waste of workforce and resources. To address this challenge, researchers developed various solutions utilising deep neural networks. However, these solutions are frequently challenged by issues, such as a vast vocabulary, network training difficulties and elongated training processes resulting from the handling of redundant information. To overcome these limitations, the authors proposed a new neural network-based model named HopFix, designed to detect software defects that may be introduced during the coding process. HopFix consists of four parts: data preprocessing, encoder, decoder and code generation components, which were used for preprocessing data, extracting information about software defects, analysing defect information, generating software patches and controlling the generation process of software patches, respectively. Experimental studies on Bug-Fix Pairs (BFP) show that HopFix correctly fixed 47.2% (BFPsmall datasets) and 25.7% (BFPmedium datasets) of software defects.

目前,软件项目需要投入大量的时间、精力和其他资源进行软件测试,以减少代码缺陷的数量。然而,这个过程降低了软件开发的效率,并导致劳动力和资源的严重浪费。为了应对这一挑战,研究人员利用深度神经网络开发了各种解决方案。然而,这些解决方案经常受到问题的挑战,例如庞大的词汇表、网络训练困难以及由于处理冗余信息而导致的训练过程延长。为了克服这些限制,作者提出了一种新的基于神经网络的模型,名为HopFix,旨在检测编码过程中可能引入的软件缺陷。HopFix由四个部分组成:数据预处理、编码器、解码器和代码生成组件,分别用于数据预处理,提取软件缺陷信息,分析缺陷信息,生成软件补丁和控制软件补丁的生成过程。对错误修复对(BFP)的实验研究表明,HopFix正确修复了47.2%(BFPsmall数据集)和25.7%(BFPmedium数据集)的软件缺陷。
{"title":"Structuring meaningful bug-fixing patches to fix software defect","authors":"Hui Li,&nbsp;Yong Liu,&nbsp;Xuexin Qi,&nbsp;Xi Yu,&nbsp;Shikai Guo","doi":"10.1049/sfw2.12140","DOIUrl":"https://doi.org/10.1049/sfw2.12140","url":null,"abstract":"<p>Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code defects. However, this process decreases the efficiency of software development and leads to a significant waste of workforce and resources. To address this challenge, researchers developed various solutions utilising deep neural networks. However, these solutions are frequently challenged by issues, such as a vast vocabulary, network training difficulties and elongated training processes resulting from the handling of redundant information. To overcome these limitations, the authors proposed a new neural network-based model named HopFix, designed to detect software defects that may be introduced during the coding process. HopFix consists of four parts: data preprocessing, encoder, decoder and code generation components, which were used for preprocessing data, extracting information about software defects, analysing defect information, generating software patches and controlling the generation process of software patches, respectively. Experimental studies on Bug-Fix Pairs (BFP) show that HopFix correctly fixed 47.2% (<i>BFP</i><sub><i>small</i></sub> datasets) and 25.7% (<i>BFP</i><sub><i>medium</i></sub> datasets) of software defects.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"566-581"},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A memetic algorithm for high-strength covering array generation 高强度覆盖阵列生成的模因算法
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-12 DOI: 10.1049/sfw2.12138
Xu Guo, Xiaoyu Song, Jian-tao Zhou, Feiyu Wang, Kecheng Tang, Zhuowei Wang

Covering array generation (CAG) is the key research problem in combinatorial testing and is an NP-complete problem. With the increasing complexity of software under test and the need for higher interaction covering strength t, the techniques for constructing high-strength covering arrays are expected. This paper presents a hybrid heuristic memetic algorithm named QSSMA for high-strength CAG problem. The sub-optimal solution acceptance rate is introduced to generate multiple test cases after each iteration to improve the efficiency of constructing high-covering strength test suites. The QSSMA method could successfully build high-strength test suites for some instances where t up to 15 within one day cutoff time and report five new best test suite size records. Extensive experiments demonstrate that QSSMA is a competitive method compared to state-of-the-art methods.

覆盖阵列生成(CAG)是组合测试中的关键研究问题,是一个NP完全问题。随着被测软件的复杂性不断增加,以及对更高交互覆盖强度t的需求,构建高强度覆盖阵列的技术成为可能。针对高强度CAG问题,提出了一种混合启发式模因算法QSSMA。引入次优解接受率,在每次迭代后生成多个测试用例,以提高构建高覆盖强度测试套件的效率。QSSMA方法可以在一天的截止时间内成功构建高强度测试套件,并报告五个新的最佳测试套件大小记录。大量实验表明,与最先进的方法相比,QSSMA是一种具有竞争力的方法。
{"title":"A memetic algorithm for high-strength covering array generation","authors":"Xu Guo,&nbsp;Xiaoyu Song,&nbsp;Jian-tao Zhou,&nbsp;Feiyu Wang,&nbsp;Kecheng Tang,&nbsp;Zhuowei Wang","doi":"10.1049/sfw2.12138","DOIUrl":"https://doi.org/10.1049/sfw2.12138","url":null,"abstract":"<p>Covering array generation (CAG) is the key research problem in combinatorial testing and is an NP-complete problem. With the increasing complexity of software under test and the need for higher interaction covering strength <i>t</i>, the techniques for constructing high-strength covering arrays are expected. This paper presents a hybrid heuristic memetic algorithm named QSSMA for high-strength CAG problem. The sub-optimal solution acceptance rate is introduced to generate multiple test cases after each iteration to improve the efficiency of constructing high-covering strength test suites. The QSSMA method could successfully build high-strength test suites for some instances where <i>t</i> up to 15 within one day cutoff time and report five new best test suite size records. Extensive experiments demonstrate that QSSMA is a competitive method compared to state-of-the-art methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"538-553"},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gravitational search algorithm-extreme learning machine for COVID-19 active cases forecasting 新冠肺炎活跃病例预测的引力搜索算法极限学习机
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-11 DOI: 10.1049/sfw2.12139
Boyu Huang, Youyi Song, Zhihan Cui, Haowen Dou, Dazhi Jiang, Teng Zhou, Jing Qin

Corona Virus disease 2019 (COVID-19) has shattered people's daily lives and is spreading rapidly across the globe. Existing non-pharmaceutical intervention solutions often require timely and precise selection of small areas of people for containment or even isolation. Although such containment has been successful in stopping or mitigating the spread of COVID-19 in some countries, it has been criticized as inefficient or ineffective, because of the time-delayed and sophisticated nature of the statistics on determining cases. To address these concerns, we propose a GSA-ELM model based on a gravitational search algorithm to forecast the global number of active cases of COVID-19. The model employs the gravitational search algorithm, which utilises the gravitational law between two particles to guide the motion of each particle to optimise the search for the global optimal solution, and utilises an extreme learning machine to address the effects of nonlinearity in the number of active cases. Extensive experiments are conducted on the statistical COVID-19 dataset from Johns Hopkins University, the MAPE of the authors’ model is 7.79%, which corroborates the superiority of the model to state-of-the-art methods.

2019冠状病毒病(新冠肺炎)破坏了人们的日常生活,并在全球迅速传播。现有的非药物干预解决方案通常需要及时准确地选择小范围的人群进行控制甚至隔离。尽管这种遏制措施在一些国家成功地阻止或减缓了新冠肺炎的传播,但由于确定病例的统计数据具有时间延迟和复杂的性质,它被批评为效率低下或无效。为了解决这些问题,我们提出了一个基于引力搜索算法的GSA-ELM模型,以预测全球新冠肺炎活跃病例数。该模型采用引力搜索算法,该算法利用两个粒子之间的引力定律来引导每个粒子的运动,以优化全局最优解的搜索,并利用极限学习机来解决活跃情况下非线性的影响。在约翰·霍普金斯大学的新冠肺炎统计数据集上进行了广泛的实验,作者模型的MAPE为7.79%,这证实了该模型优于最先进的方法。
{"title":"Gravitational search algorithm-extreme learning machine for COVID-19 active cases forecasting","authors":"Boyu Huang,&nbsp;Youyi Song,&nbsp;Zhihan Cui,&nbsp;Haowen Dou,&nbsp;Dazhi Jiang,&nbsp;Teng Zhou,&nbsp;Jing Qin","doi":"10.1049/sfw2.12139","DOIUrl":"https://doi.org/10.1049/sfw2.12139","url":null,"abstract":"<p>Corona Virus disease 2019 (COVID-19) has shattered people's daily lives and is spreading rapidly across the globe. Existing non-pharmaceutical intervention solutions often require timely and precise selection of small areas of people for containment or even isolation. Although such containment has been successful in stopping or mitigating the spread of COVID-19 in some countries, it has been criticized as inefficient or ineffective, because of the time-delayed and sophisticated nature of the statistics on determining cases. To address these concerns, we propose a GSA-ELM model based on a gravitational search algorithm to forecast the global number of active cases of COVID-19. The model employs the gravitational search algorithm, which utilises the gravitational law between two particles to guide the motion of each particle to optimise the search for the global optimal solution, and utilises an extreme learning machine to address the effects of nonlinearity in the number of active cases. Extensive experiments are conducted on the statistical COVID-19 dataset from Johns Hopkins University, the MAPE of the authors’ model is 7.79%, which corroborates the superiority of the model to state-of-the-art methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"554-565"},"PeriodicalIF":1.6,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A case study of environmental considerations and opportunities in cyber physical systems 网络物理系统中环境因素和机遇的案例研究
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-07-08 DOI: 10.1049/sfw2.12130
Mario Cortes-Cornax, Paula Lago, Claudia Roncancio

Cyber Physical Systems (CPS) are becoming more ubiquitous, complex and powerful as well as more and more present in our daily life. The inherent benefit and comfort come with an environmental impact at every step of their life-cycle. This impact is significant and unfortunately often ignored today. As cyber-physical systems tend to be ‘invisible’, there is a need for awareness of the underlying infrastructure and required resources, early in the design phases. In this article, the environmental impact considerations in the early stages of the implementation and opportunities to improve design choices with a people-planet-system perspective are discussed. The authors discuss the aspects related to system configuration, data management and the overall goal and functionalities supported by the CPS. Through a specific smart home case, the potential of considering life-cycle assessment of both the devices and data management is illustrated. By explicitly considering different configurations, it will be possible to analyse the environmental impacts of the design decisions. Our research in progress targets a design approach to converge into an equilibrium between utility, performance, and minor environmental impact of smart systems.

网络物理系统(CPS)正变得越来越普遍、复杂和强大,并且越来越多地出现在我们的日常生活中。固有的好处和舒适感在其生命周期的每一步都会对环境产生影响。这种影响是重大的,不幸的是,今天经常被忽视。由于网络物理系统往往是“看不见的”,因此在设计阶段的早期就需要了解底层基础设施和所需资源。在这篇文章中,讨论了实施初期的环境影响考虑因素,以及从人-地球系统的角度改进设计选择的机会。作者讨论了与系统配置、数据管理以及CPS支持的总体目标和功能相关的方面。通过一个具体的智能家居案例,说明了考虑设备生命周期评估和数据管理的潜力。通过明确考虑不同的配置,可以分析设计决策对环境的影响。我们正在进行的研究旨在采用一种设计方法,在智能系统的效用、性能和轻微环境影响之间达成平衡。
{"title":"A case study of environmental considerations and opportunities in cyber physical systems","authors":"Mario Cortes-Cornax,&nbsp;Paula Lago,&nbsp;Claudia Roncancio","doi":"10.1049/sfw2.12130","DOIUrl":"https://doi.org/10.1049/sfw2.12130","url":null,"abstract":"<p>Cyber Physical Systems (CPS) are becoming more ubiquitous, complex and powerful as well as more and more present in our daily life. The inherent benefit and comfort come with an environmental impact at every step of their life-cycle. This impact is significant and unfortunately often ignored today. As cyber-physical systems tend to be ‘invisible’, there is a need for awareness of the underlying infrastructure and required resources, early in the design phases. In this article, the environmental impact considerations in the early stages of the implementation and opportunities to improve design choices with a people-planet-system perspective are discussed. The authors discuss the aspects related to system configuration, data management and the overall goal and functionalities supported by the CPS. Through a specific smart home case, the potential of considering life-cycle assessment of both the devices and data management is illustrated. By explicitly considering different configurations, it will be possible to analyse the environmental impacts of the design decisions. Our research in progress targets a design approach to converge into an equilibrium between utility, performance, and minor environmental impact of smart systems.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"424-434"},"PeriodicalIF":1.6,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50125208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IET Software
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1