International Journal of Software Engineering and Knowledge Engineering最新文献

筛选
英文 中文
Modeling and Control of Drinking Water Supply Infrastructures Through Multi-Agent Systems for Sustainability 通过多代理系统对饮用水供应基础设施进行建模和控制以实现可持续性
IF 0.9 4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2024-03-19 DOI: 10.1142/s0218194024500025
Carlos Calatayud Asensi, José Vicente Berná Martínez, Lucía Arnau Muñoz, Francisco Maciá Pérez
{"title":"Modeling and Control of Drinking Water Supply Infrastructures Through Multi-Agent Systems for Sustainability","authors":"Carlos Calatayud Asensi, José Vicente Berná Martínez, Lucía Arnau Muñoz, Francisco Maciá Pérez","doi":"10.1142/s0218194024500025","DOIUrl":"https://doi.org/10.1142/s0218194024500025","url":null,"abstract":"<p>Traditionally, drinking water supply infrastructures have been designed to store as much water as possible and to do so during the energy cheap hours. This approach is unsustainable today. The use of digital systems capable of modeling the behavior of infrastructures and the creation of intelligent control systems can help to make drinking water supply systems more efficient and effective, while still meeting minimum service requirements. This work proposes the development of a control system, based on multi-agent systems (MAS), capable of generating an intelligent control over a drinking water infrastructure, based on the use of local interests of the agents and with an emergent behavior coherent with the needs. To validate the proposal, a simulator based on the infrastructures of a medium-sized Spanish city of 5000 inhabitants has been built and the control has been simulated using the MAS. The results show how the system can maintain the objectives set, handling unknown situations, and facilitating the development of future physical systems based on a just-in-time paradigm that guarantees sustainability, as it allows the generation of virtualizations of the infrastructures and their behavior, thus being able to study the best option for an infrastructure to resolve a supply situation.</p>","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"92 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140170468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model MOID:多对一专利图嵌入基础侵权检测模型
IF 0.9 4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-12-28 DOI: 10.1142/s0218194023420019
Weidong Liu, Fei Li, Senjun Pei, Chunming Cheng
{"title":"MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model","authors":"Weidong Liu, Fei Li, Senjun Pei, Chunming Cheng","doi":"10.1142/s0218194023420019","DOIUrl":"https://doi.org/10.1142/s0218194023420019","url":null,"abstract":"<p>With the increasing number of patent applications over the years, instances of patent infringement cases have become more frequent. However, traditional manual patent infringement detection models are no longer suitable for large-scale infringement detection. Existing automated models mainly focus on detecting one-to-one patent infringements, but neglect the many-to-one scenarios. The many-to-one patent infringement detection model faces some major challenges. First, the diversity of patent domains, complexity of content and ambiguity of features make it difficult to extract and represent patent features. Second, patent infringement detection relies on the correlation between patents and the comparison of contextual information as the key factors, but modeling the process and drawing conclusions present challenges. To address these challenges, we propose a many-to-one patent graph (MPG) embedding base infringement detection model. Our model extracts the relationship between keywords and patents, as well as association relation between keywords from many-to-one patent texts (MPTs), to construct a MPG. We obtain patent infringement features through graph embedding of MPG. By using these embedding features as input, the many-to-one infringement detection (MOID) model outputs the conclusion on whether a patent is infringed or not. The comparative experimental results indicate that our model improves accuracy, precision and F-measure by 3.81%, 11.82% and 5.37%, respectively, when compared to the state-of-the-art method.</p>","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"163 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140170226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFSP: an enhanced full scrum process model EFSP:增强型完整 Scrum 流程模型
IF 0.9 4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-12-14 DOI: 10.1142/s0218194023500699
Naglaa A. Eldanasory, Engy Yehia, A. Idrees
{"title":"EFSP: an enhanced full scrum process model","authors":"Naglaa A. Eldanasory, Engy Yehia, A. Idrees","doi":"10.1142/s0218194023500699","DOIUrl":"https://doi.org/10.1142/s0218194023500699","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"15 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138971555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach 探索词汇技术对代码完成的影响:比较法
IF 0.9 4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-12-14 DOI: 10.1142/s0218194023500687
Yasir Hussain, Zhiqiu Huang, Yu Zhou, I. A. Khan
{"title":"Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach","authors":"Yasir Hussain, Zhiqiu Huang, Yu Zhou, I. A. Khan","doi":"10.1142/s0218194023500687","DOIUrl":"https://doi.org/10.1142/s0218194023500687","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"156 20 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138973276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Appling Scrum to knowledge transfer among software developers 将 Scrum 应用于软件开发人员之间的知识转移
IF 0.9 4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-12-01 DOI: 10.1142/s0218194023430015
Fernando Ibarra-Torres, Matias Urbieta, N. Medina-Medina
{"title":"Appling Scrum to knowledge transfer among software developers","authors":"Fernando Ibarra-Torres, Matias Urbieta, N. Medina-Medina","doi":"10.1142/s0218194023430015","DOIUrl":"https://doi.org/10.1142/s0218194023430015","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"78 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138626014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function-Level Code Obfuscation Detection Through Self-Attention Guided Multi-Representation Fusion 基于自注意引导的多表示融合的功能级代码混淆检测
4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-11-10 DOI: 10.1142/s0218194023500663
Zhenzhou Tian, Ruikang He, Hongliang Zhao, Lingwei Chen
{"title":"Function-Level Code Obfuscation Detection Through Self-Attention Guided Multi-Representation Fusion","authors":"Zhenzhou Tian, Ruikang He, Hongliang Zhao, Lingwei Chen","doi":"10.1142/s0218194023500663","DOIUrl":"https://doi.org/10.1142/s0218194023500663","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135191278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCR-LIBM: A Correctly Rounded Elementary Function Library in Double-Precision SCR-LIBM:一个双精度的正确舍入初等函数库
4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-11-10 DOI: 10.1142/s0218194023500675
Yang Qu, Jinchen Xu, Bei Zhou, Jiangwei Hao, Fei Li, Zuoyan Zhang
{"title":"SCR-LIBM: A Correctly Rounded Elementary Function Library in Double-Precision","authors":"Yang Qu, Jinchen Xu, Bei Zhou, Jiangwei Hao, Fei Li, Zuoyan Zhang","doi":"10.1142/s0218194023500675","DOIUrl":"https://doi.org/10.1142/s0218194023500675","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135191284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Allocation Scheme of Software Development Budget with Minimal Conflict Attributes 具有最小冲突属性的软件开发预算分配方案
4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-11-08 DOI: 10.1142/s0218194023500596
Yanfang Ma, Wei Zhou
{"title":"The Allocation Scheme of Software Development Budget with Minimal Conflict Attributes","authors":"Yanfang Ma, Wei Zhou","doi":"10.1142/s0218194023500596","DOIUrl":"https://doi.org/10.1142/s0218194023500596","url":null,"abstract":"During the process of software development, a significant challenge revolves around accurately estimating the associated costs. The primary goal of project managers is to ensure the delivery of a highly trustworthiness product that aligns with the designated budgetary constraints. Nonetheless, the trustworthiness of software hinges upon a range of distinct attributes. When implementing a budget allocation scheme to enhance these attributes, conflicts among them may arise. Thus, it becomes imperative to select an appropriate allocation scheme that effectively mitigates conflict-associated costs. In this paper, we will define the conflict costs and establish costs estimation models. The difficulty coefficient constraint for improving attributes is established. Subsequently, we will analyze the relative importance weights of these attributes. Drawing upon the conflict costs, importance weights, and difficulty coefficient constraint, we present an algorithm to determine an appropriate budget allocation scheme, which can minimize conflict-associated costs. Finally, we provide an illustrative example that demonstrates the practicability of our proposed algorithm. This research offers valuable insights to software managers, aiding them in the reasonable allocation of budgetary resources, thereby maximizing overall benefits.","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135293547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction 基于源代码的缺陷预测模型不可知技术的实证研究
4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-11-04 DOI: 10.1142/s0218194023500572
Yi Zhu, Yuxiang Gao, Yu Qiao
{"title":"An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction","authors":"Yi Zhu, Yuxiang Gao, Yu Qiao","doi":"10.1142/s0218194023500572","DOIUrl":"https://doi.org/10.1142/s0218194023500572","url":null,"abstract":"Interpretation is important for adopting software defect prediction in practice. Model-agnostic techniques such as Local Interpretable Model-agnostic Explanation (LIME) can help practitioners understand the factors which contribute to the prediction. They are effective and useful for models constructed on tabular data with traditional features. However, when they are applied on source code-based models, they cannot differentiate the contribution of code tokens in different locations for deep learning-based models with Bag-of-Word features. Besides, only using limited features as explanation may result in information loss about actual riskiness. Such limitations may lead to inaccurate explanation for source code-based models, and make model-agnostic techniques not useful and helpful as expected. Thus, we apply a perturbation-based approach Randomized Input Sampling Explanation (RISE) for source code-based defect prediction. Besides, to fill the gap that there lacks a systematical evaluation on model-agnostic techniques on source code-based defect models, we also conduct an extensive case study on the model-agnostic techniques on both token frequency-based and deep learning-based models. We find that (1) model-agnostic techniques are effective to identify the most important code tokens for an individual prediction and predict defective lines based on the importance scores, (2) using limited features (code tokens) for explanation may result in information loss about actual riskiness, and (3) RISE is more effective than others as it can generate more accurate explanation, achieve better cost-effectiveness for line-level prediction, and result in less information loss about actual riskiness. Based on such findings, we suggest that model-agnostic techniques can be a supplement to file-level source code-based defect models, while such explanations should be used with caution as actual risky tokens may be ignored. Also, compared with LIME, we would recommend RISE for a more effective explanation.","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"15 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135728296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influential spreaders identification by fusing network topology 融合网络拓扑的影响传播者识别
4区 计算机科学
International Journal of Software Engineering and Knowledge Engineering Pub Date : 2023-11-03 DOI: 10.1142/s0218194023410097
Ziyi Zhang, Rong Yan, Wei Yuan, Lintao Zhang
{"title":"Influential spreaders identification by fusing network topology","authors":"Ziyi Zhang, Rong Yan, Wei Yuan, Lintao Zhang","doi":"10.1142/s0218194023410097","DOIUrl":"https://doi.org/10.1142/s0218194023410097","url":null,"abstract":"","PeriodicalId":50288,"journal":{"name":"International Journal of Software Engineering and Knowledge Engineering","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135869140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信