{"title":"The use of the intelligent Bayesian network method combined with blockchain technology in the optimisation of tunnel construction quality control","authors":"Li-xiang Cai, Qiaona Gong, Feng Jiang, Mingzhan Yuan, Zhiyong Xiao, Shuai Zhang, Chengcheng Zheng, Yue Wu","doi":"10.1049/sfw2.12109","DOIUrl":"https://doi.org/10.1049/sfw2.12109","url":null,"abstract":"","PeriodicalId":50378,"journal":{"name":"IET Software","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43960379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retraction: [Liping Cai, Qiaona Gong, Feng Jiang, Mingzhan Yuan, Zhiyong Xiao, Shuai Zhang, Chengcheng Zheng, Yue Wu, The use of the intelligent Bayesian network method combined with blockchain technology in the optimisation of tunnel construction quality control, IET Software 2023 (https://doi.org/10.1049/sfw2.12109)].
The above article from IET Software, published online on 2 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
收回:[蔡丽萍,龚巧娜,冯江,袁明展,肖志勇,张帅,郑诚成,吴岳,智能贝叶斯网络方法与区块链技术相结合在隧道施工质量控制优化中的应用,IET软件2023(https://doi.org/10.1049/sfw2.12109)]。IET Software的上述文章于2023年2月2日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术研究所(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: The use of the intelligent Bayesian network method combined with blockchain technology in the optimisation of tunnel construction quality control","authors":"Liping Cai, Qiaona Gong, Feng Jiang, Mingzhan Yuan, Zhiyong Xiao, Shuai Zhang, Chengcheng Zheng, Yue Wu","doi":"10.1049/sfw2.12109","DOIUrl":"https://doi.org/10.1049/sfw2.12109","url":null,"abstract":"<p>Retraction: [Liping Cai, Qiaona Gong, Feng Jiang, Mingzhan Yuan, Zhiyong Xiao, Shuai Zhang, Chengcheng Zheng, Yue Wu, The use of the intelligent Bayesian network method combined with blockchain technology in the optimisation of tunnel construction quality control, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12109)].</p><p>The above article from <i>IET Software</i>, published online on 2 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"776-786"},"PeriodicalIF":1.6,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50117922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retraction: [Abdulwahid Al Abdulwahid, Software solution for text summarisation using machine learning based Bidirectional Encoder Representations from Transformers algorithm, IET Software 2023 (https://doi.org/10.1049/sfw2.12098)].
The above article from IET Software, published online on 2 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
收回:[Abdulwahid Al-Abdulwahid,使用基于机器学习的双向编码器表示的Transformers算法进行文本汇总的软件解决方案,IET软件2023(https://doi.org/10.1049/sfw2.12098)]来自IET Software的上述文章于2023年2月2日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司之间的协议撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Software solution for text summarisation using machine learning based Bidirectional Encoder Representations from Transformers algorithm","authors":"Abdulwahid Al Abdulwahid","doi":"10.1049/sfw2.12098","DOIUrl":"https://doi.org/10.1049/sfw2.12098","url":null,"abstract":"<p>Retraction: [Abdulwahid Al Abdulwahid, Software solution for text summarisation using machine learning based Bidirectional Encoder Representations from Transformers algorithm, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12098)].</p><p>The above article from <i>IET Software</i>, published online on 2 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"755-764"},"PeriodicalIF":1.6,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50117923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retraction: [Tingting Zheng, Intelligent distribution system of university student dormitory based on data fusion optimisation algorithm, IET Software 2023 (https://doi.org/10.1049/sfw2.12100)].
The above article from IET Software, published online on 1 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
收回:【郑婷婷,基于数据融合优化算法的大学生宿舍智能分配系统,IET软件2023(https://doi.org/10.1049/sfw2.12100)]来自IET Software的上述文章于2023年2月1日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司之间的协议撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Intelligent distribution system of university student dormitory based on data fusion optimisation algorithm","authors":"Tingting Zheng","doi":"10.1049/sfw2.12100","DOIUrl":"https://doi.org/10.1049/sfw2.12100","url":null,"abstract":"<p>Retraction: [Tingting Zheng, Intelligent distribution system of university student dormitory based on data fusion optimisation algorithm, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12100)].</p><p>The above article from <i>IET Software</i>, published online on 1 February 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"765-775"},"PeriodicalIF":1.6,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50115994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deep-Learning-based Fault Localisation (DLFL) leverages deep neural networks to learn the relationship between statement behaviour and program failures, showing promising results. However, since DLFL uses program failures as labels to conduct supervised learning, a labelled dataset is a requisite of applying DLFL. A failure is detected by comparing program output with a test oracle which is the standard answer for the given input. The problem is, test oracles are often difficult, or even impossible to acquire in real life, and that has severely restricted the application of DLFL since we have only unlabelled datasets in most cases. Thus, MetaFL: Metamorphic Fault Localisation Using Weakly Supervised Deep Learning is proposed, to provide a weakly supervised learning solution for DLFL. Instead of using test oracles, MetaFL uses metamorphic relations to prescribe expected behaviour of a program, and defines labels of metamorphic testing groups by verifying integrity in each group of test cases. Hence, a coarse-grained labelled dataset can be built from the originally unlabelled one, with which DLFL can work now, utilising a weakly supervised learning paradigm. The experiments show that MetaFL yields a performance comparable to plain DLFL under ideal condition (i.e. the labels of datasets are available). MetaFL successfully extends the methodology of DLFL from supervised learning to weakly supervised learning, and a fully labelled dataset is no longer mandatory for applying DLFL.
{"title":"MetaFL: Metamorphic fault localisation using weakly supervised deep learning","authors":"Lingfeng Fu, Yan Lei, Meng Yan, Ling Xu, Zhou Xu, Xiaohong Zhang","doi":"10.1049/sfw2.12102","DOIUrl":"https://doi.org/10.1049/sfw2.12102","url":null,"abstract":"<p>Deep-Learning-based Fault Localisation (DLFL) leverages deep neural networks to learn the relationship between statement behaviour and program failures, showing promising results. However, since DLFL uses program failures as labels to conduct supervised learning, a labelled dataset is a requisite of applying DLFL. A failure is detected by comparing program output with a test oracle which is the standard answer for the given input. The problem is, test oracles are often difficult, or even impossible to acquire in real life, and that has severely restricted the application of DLFL since we have only unlabelled datasets in most cases. Thus, MetaFL: Metamorphic Fault Localisation Using Weakly Supervised Deep Learning is proposed, to provide a weakly supervised learning solution for DLFL. Instead of using test oracles, MetaFL uses metamorphic relations to prescribe expected behaviour of a program, and defines labels of metamorphic testing groups by verifying integrity in each group of test cases. Hence, a coarse-grained labelled dataset can be built from the originally unlabelled one, with which DLFL can work now, utilising a weakly supervised learning paradigm. The experiments show that MetaFL yields a performance comparable to plain DLFL under ideal condition (i.e. the labels of datasets are available). MetaFL successfully extends the methodology of DLFL from supervised learning to weakly supervised learning, and a fully labelled dataset is no longer mandatory for applying DLFL.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 2","pages":"137-153"},"PeriodicalIF":1.6,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50116166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inas Ismael Imran, Shymaa Mohammed Jameel, Refed Adnan Jaleel
Retraction: [Inas Ismael Imran, Shymaa Mohammed Jameel, Refed Adnan Jaleel, Smart optimal path with blockchain modelling in internet of things using enhanced K-means clustering and advance encryption standard, IET Software 2023 (https://doi.org/10.1049/sfw2.12095)].
The above article from IET Software, published online on 28 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
撤回:[Inas Ismael Imran,Shymaa Mohammed Jameel,Refed Adnan Jaleel,物联网中使用增强K-means聚类和高级加密标准的区块链建模的智能最优路径,IET软件2023(https://doi.org/10.1049/sfw2.12095)]上述来自IET Software的文章于2023年1月28日在线发表在威利在线图书馆(wileyonlinelibrary.com),经主编Hana Chockler、工程与技术学会(IET)和John Wiley and Sons有限公司同意撤回。本文作为客座编辑特刊的一部分发表。经过调查,IET和该杂志确定,这篇文章没有按照该杂志的同行评审标准进行评审,有证据表明该特刊的同行评审过程受到了系统的操纵。因此,我们不能保证内容的完整性或可靠性。因此,我们决定收回这篇文章。提交人已被告知撤回的决定。
{"title":"Retracted: Smart optimal path with blockchain modelling in internet of things using enhanced K-means clustering and advance encryption standard","authors":"Inas Ismael Imran, Shymaa Mohammed Jameel, Refed Adnan Jaleel","doi":"10.1049/sfw2.12095","DOIUrl":"https://doi.org/10.1049/sfw2.12095","url":null,"abstract":"<p>Retraction: [Inas Ismael Imran, Shymaa Mohammed Jameel, Refed Adnan Jaleel, Smart optimal path with blockchain modelling in internet of things using enhanced K-means clustering and advance encryption standard, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12095)].</p><p>The above article from <i>IET Software</i>, published online on 28 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"729-741"},"PeriodicalIF":1.6,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inas Ismael Imran, Shymaa Mohammed Jameel, Refed Adnan Jaleel
{"title":"Smart optimal path with blockchain modelling in internet of things using enhanced K‐means clustering and advance encryption standard","authors":"Inas Ismael Imran, Shymaa Mohammed Jameel, Refed Adnan Jaleel","doi":"10.1049/sfw2.12095","DOIUrl":"https://doi.org/10.1049/sfw2.12095","url":null,"abstract":"","PeriodicalId":50378,"journal":{"name":"IET Software","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45751215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrea Zasada, M. Hashmi, M. Fellmann, David Knuplesch
Compliance in business processes has become a fundamental requirement given the constant rise in regulatory requirements and competitive pressures that have emerged in recent decades. While in other areas of business process modelling and execution, considerable progress towards automation has been made (e.g., process discovery, executable process models), the interpretation and implementation of compliance requirements is still a highly complex task requiring human effort and time. To increase the level of “mechanization” when implementing regulations in business processes, compliance research seeks to formalize compliance requirements. Formal representations of compliance requirements should, then, be leveraged to design correct process models and, ideally, would also serve for the automated detection of violations. To formally specify compliance requirements, however, multiple process perspectives, such as control flow, data, time and resources, have to be considered. This leads to the challenge of representing such complex constraints which affect different process perspectives. To this end, current approaches in business process compliance make use of a varied set of languages. However, every approach has been devised based on different assumptions and motivating scenarios. In addition, these languages and their presentation usually abstract from real-world requirements which often would imply introducing a substantial amount of domain knowledge and interpretation, thus hampering the evaluation of their expressiveness. This is a serious problem, since comparisons of different formal languages based on real-world compliance requirements are lacking, meaning that users of such languages are not able to make informed decisions about which language to choose. To close this gap and to establish a uniform evaluation basis, we introduce a running example for evaluating the expressiveness and complexity of compliance rule languages. For language selection, we conducted a literature review. Next, we briefly introduce and demonstrate the languages’ grammars and vocabularies based on the representation of a number of legal requirements. In doing so, we pay attention to semantic subtleties which we evaluate by adopting a normative classification framework which differentiates between different deontic assignments. Finally, on top of that, we apply Halstead’s well-known metrics for calculating the relevant characteristics of the different languages in our comparison, such as the volume, difficulty and effort for each language. With this, we are finally able to better understand the lexical complexity of the languages in relation to their expressiveness. In sum, we provide a systematic comparison of different compliance rule languages based on real-world compliance requirements which may inform future users and developers of these languages. Finally, we advocate for a more user-aware development of compliance languages which should consider a trade off be
{"title":"Evaluation of Compliance Rule Languages for Modelling Regulatory Compliance Requirements","authors":"Andrea Zasada, M. Hashmi, M. Fellmann, David Knuplesch","doi":"10.3390/software2010004","DOIUrl":"https://doi.org/10.3390/software2010004","url":null,"abstract":"Compliance in business processes has become a fundamental requirement given the constant rise in regulatory requirements and competitive pressures that have emerged in recent decades. While in other areas of business process modelling and execution, considerable progress towards automation has been made (e.g., process discovery, executable process models), the interpretation and implementation of compliance requirements is still a highly complex task requiring human effort and time. To increase the level of “mechanization” when implementing regulations in business processes, compliance research seeks to formalize compliance requirements. Formal representations of compliance requirements should, then, be leveraged to design correct process models and, ideally, would also serve for the automated detection of violations. To formally specify compliance requirements, however, multiple process perspectives, such as control flow, data, time and resources, have to be considered. This leads to the challenge of representing such complex constraints which affect different process perspectives. To this end, current approaches in business process compliance make use of a varied set of languages. However, every approach has been devised based on different assumptions and motivating scenarios. In addition, these languages and their presentation usually abstract from real-world requirements which often would imply introducing a substantial amount of domain knowledge and interpretation, thus hampering the evaluation of their expressiveness. This is a serious problem, since comparisons of different formal languages based on real-world compliance requirements are lacking, meaning that users of such languages are not able to make informed decisions about which language to choose. To close this gap and to establish a uniform evaluation basis, we introduce a running example for evaluating the expressiveness and complexity of compliance rule languages. For language selection, we conducted a literature review. Next, we briefly introduce and demonstrate the languages’ grammars and vocabularies based on the representation of a number of legal requirements. In doing so, we pay attention to semantic subtleties which we evaluate by adopting a normative classification framework which differentiates between different deontic assignments. Finally, on top of that, we apply Halstead’s well-known metrics for calculating the relevant characteristics of the different languages in our comparison, such as the volume, difficulty and effort for each language. With this, we are finally able to better understand the lexical complexity of the languages in relation to their expressiveness. In sum, we provide a systematic comparison of different compliance rule languages based on real-world compliance requirements which may inform future users and developers of these languages. Finally, we advocate for a more user-aware development of compliance languages which should consider a trade off be","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"38 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82781217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aryan Marwaha, Rami Qays Malik, Shehab Mohamed Beram, Ali Rizwan, Kakarla Hari Kishore, Deepak Thakur, Tanya Gera, Mohammad Shabaz
Retraction: [Aryan Marwaha, Rami Qays Malik, Shehab Mohamed Beram, Ali Rizwan, Hari Kishore Kakarla, Deepak Thakur, Tanya Gera, Mohammad Shabaz, Visualisation-based binary classification of android malware using vgg16, IET Software 2023 (https://doi.org/10.1049/sfw2.12094)].
The above article from IET Software, published online on 23 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.
{"title":"Retracted: Visualisation-based binary classification of android malware using vgg16","authors":"Aryan Marwaha, Rami Qays Malik, Shehab Mohamed Beram, Ali Rizwan, Kakarla Hari Kishore, Deepak Thakur, Tanya Gera, Mohammad Shabaz","doi":"10.1049/sfw2.12094","DOIUrl":"https://doi.org/10.1049/sfw2.12094","url":null,"abstract":"<p>Retraction: [Aryan Marwaha, Rami Qays Malik, Shehab Mohamed Beram, Ali Rizwan, Hari Kishore Kakarla, Deepak Thakur, Tanya Gera, Mohammad Shabaz, Visualisation-based binary classification of android malware using vgg16, <i>IET Software</i> 2023 (https://doi.org/10.1049/sfw2.12094)].</p><p>The above article from <i>IET Software</i>, published online on 23 January 2023 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the Editor-in-Chief, Hana Chockler, the Institution of Engineering and Technology (the IET) and John Wiley and Sons Ltd. This article was published as part of a Guest Edited special issue. Following an investigation, the IET and the journal have determined that the article was not reviewed in line with the journal’s peer review standards and there is evidence that the peer review process of the special issue underwent systematic manipulation. Accordingly, we cannot vouch for the integrity or reliability of the content. As such we have taken the decision to retract the article. The authors have been informed of the decision to retract.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"717-728"},"PeriodicalIF":1.6,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50141809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shikai Guo, Mengxuan Li, Xin Ge, Hui Li, Rong Chen, Tingting Li
The rapid development of Open-Source Software (OSS) has resulted in a significant demand for code changes to maintain OSS. Symptoms of poor design and implementation choices in code changes often occur, thus heavily hindering code reviewers to verify correctness and soundness of code changes. Researchers have investigated how to learn meaningful code changes to assist developers in anticipating changes that code reviewers may suggest for the submitted code. However, there are two main limitations to be addressed, including the limitation of long-range dependencies of the source code and the missing syntactic structural information of the source code. To solve these limitations, a novel method is proposed, named Graph Transformer for learning meaningful Code Transformations (GTCT), to provide developers with preliminary and quick feedback when developers submit code changes, which can improve the quality of code changes and improve the efficiency of code review. GTCT comprises two components: code graph embedding and code transformation learning. To address the missing syntactic structural information of the source code limitation, the code graph embedding component captures the types and patterns of code changes by encoding the source code into a code graph structure from the lexical and syntactic representations of the source code. Subsequently, the code transformation learning component uses the multi-head attention mechanism and positional encoding mechanism to address the long-range dependencies limitation. Extensive experiments are conducted to evaluate the performance of GTCT by both quantitative and qualitative analyses. For the quantitative analysis, GTCT relatively outperforms the baseline on six datasets by 210%, 342.86%, 135%, 29.41%, 109.09%, and 91.67% in terms of perfect prediction. Meanwhile, the qualitative analysis shows that each type of code change by GTCT outperforms that of the baseline method in terms of bug fixed, refactoring code and others' taxonomy of code changes.
{"title":"Constructing meaningful code changes via graph transformer","authors":"Shikai Guo, Mengxuan Li, Xin Ge, Hui Li, Rong Chen, Tingting Li","doi":"10.1049/sfw2.12097","DOIUrl":"https://doi.org/10.1049/sfw2.12097","url":null,"abstract":"<p>The rapid development of Open-Source Software (OSS) has resulted in a significant demand for code changes to maintain OSS. Symptoms of poor design and implementation choices in code changes often occur, thus heavily hindering code reviewers to verify correctness and soundness of code changes. Researchers have investigated how to learn meaningful code changes to assist developers in anticipating changes that code reviewers may suggest for the submitted code. However, there are two main limitations to be addressed, including the limitation of long-range dependencies of the source code and the missing syntactic structural information of the source code. To solve these limitations, a novel method is proposed, named Graph Transformer for learning meaningful Code Transformations (GTCT), to provide developers with preliminary and quick feedback when developers submit code changes, which can improve the quality of code changes and improve the efficiency of code review. GTCT comprises two components: code graph embedding and code transformation learning. To address the missing syntactic structural information of the source code limitation, the code graph embedding component captures the types and patterns of code changes by encoding the source code into a code graph structure from the lexical and syntactic representations of the source code. Subsequently, the code transformation learning component uses the multi-head attention mechanism and positional encoding mechanism to address the long-range dependencies limitation. Extensive experiments are conducted to evaluate the performance of GTCT by both quantitative and qualitative analyses. For the quantitative analysis, GTCT relatively outperforms the baseline on six datasets by 210%, 342.86%, 135%, 29.41%, 109.09%, and 91.67% in terms of perfect prediction. Meanwhile, the qualitative analysis shows that each type of code change by GTCT outperforms that of the baseline method in terms of bug fixed, refactoring code and others' taxonomy of code changes.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 2","pages":"154-167"},"PeriodicalIF":1.6,"publicationDate":"2023-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50140087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}