Carlos Pulido, Ignacio García, Ma Ángeles Moraga, Félix García, Coral Calero
{"title":"Pypen: Code instrumentation tool for dynamic analysis and energy efficiency evaluation","authors":"Carlos Pulido, Ignacio García, Ma Ángeles Moraga, Félix García, Coral Calero","doi":"10.1016/j.csi.2025.104000","DOIUrl":"10.1016/j.csi.2025.104000","url":null,"abstract":"<div><div>Given the large environmental impact that software can generate, the environmental sustainability of software is increasingly a major concern for developers today. Thus, it is important to provide them with the means and tools to understand the impact of their decisions on the energy consumption of software. To achieve this, more accurate information must be made available to better guide optimization efforts, in particular by identifying the specific sections of the software where the highest energy consumption occurs.</div><div>This paper presents Pypen, a profiler that uses instrumentation to collect detailed execution data about the software execution. Through its integration with the ecosystem of tools of the technological component of the FEETINGS framework, Pypen is able to identify “hot” methods where the highest energy consumption occurs, allowing developers to focus on improving the energy efficiency of specific software sections.</div><div>To evaluate and demonstrate the effectiveness of our tool, a sample study was conducted aimed at identifying areas of the software with higher energy consumption, providing opportunities to better focus improvement efforts.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104000"},"PeriodicalIF":4.1,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143684749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haifa Alshammare , Mohammad Alshayeb , Malak Baslyman
{"title":"Revealing the mobile UX horizon: Exploring user experience aspects, attributes, and measurement methods - A systematic mapping study","authors":"Haifa Alshammare , Mohammad Alshayeb , Malak Baslyman","doi":"10.1016/j.csi.2025.103999","DOIUrl":"10.1016/j.csi.2025.103999","url":null,"abstract":"<div><h3>Context</h3><div>The exponential growth of mobile internet usage underscores the critical importance of investigating mobile app enhancements across various domains. User Experience (UX) emerges as a pivotal quality factor, encompassing emotional, sensory, and contextual dimensions, significantly influencing user behavior and retention.</div></div><div><h3>Objective</h3><div>This systematic mapping study investigates research efforts on mobile application UX to discern domains where UX has been explored, identifying UX aspects, attributes, and assessment methods.</div></div><div><h3>Method</h3><div>Through a standard systematic mapping procedure, 189 primary studies were identified from 9107 reviewed articles across five digital libraries.</div></div><div><h3>Results</h3><div>100 distinct UX aspects and 166 attributes were identified and categorized into App, User, and Context aspects. These aspects were distributed among 14 domains, with healthcare being extensively researched. The usability aspect is prominent in 54.5 % of studies. Efficiency, satisfaction, effectiveness, learnability, memorability, attractiveness, errors, and ease of use emerged as the most commonly utilized attributes—notably, these attributes are considered usability attributes among several standards. Additionally, 38 and 22 evaluation methods were identified for aspects and attributes, grouped into self-reported, physiological, observational, and expert evaluation categories. Questionnaires were predominantly utilized.</div></div><div><h3>Conclusion</h3><div>This review summarizes the mobile application UX landscape, highlighting key aspects, attributes, and evaluation methods across domains. Future research should leverage these insights to advance UX design and evaluation practices, fostering innovation in software engineering and human-computer interaction.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103999"},"PeriodicalIF":4.1,"publicationDate":"2025-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143684750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zinuo Zhang , Wei Ren , Xianchao Zhang , Yani Sun , Tianqing Zhu , Kim-Kwang Raymond Choo
{"title":"A blockchain and signature based scheme for cross-domain authentication with decentralized identity","authors":"Zinuo Zhang , Wei Ren , Xianchao Zhang , Yani Sun , Tianqing Zhu , Kim-Kwang Raymond Choo","doi":"10.1016/j.csi.2025.103994","DOIUrl":"10.1016/j.csi.2025.103994","url":null,"abstract":"<div><div>Currently, users access various network services without a unified identity authentication among domains, which not only obliges users to numerous network accounts, but also creates significant inconvenience for cross-domain authentication. Most existing schemes rely on the Public Key Infrastructure (PKI) system, which depends on the trustworthiness of Certificate Authorities (CAs). However, this poses challenges to maintaining user identity privacy. Addressing this issue, this paper proposes a blockchain-based cross-domain identity authentication scheme utilizing decentralized identity management, where users only need to register an account within one domain and can access services in other domains through verifiable credentials (VC). The scheme designs two types of VC, namely, directional VCs and general VCs. General VCs use threshold signatures allowing access to a larger number of domains. It also introduces proxy signatures to design a method for credential borrowing, further enhancing user convenience. Logical analysis using the Subject–Verb–Object (SVO) structure confirms the scheme’s viability, while security analysis indicates its resilience against various attacks, including replay, impersonation, and internal threats. Moreover, the scheme provides substantial benefits for safeguarding user privacy and data security.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103994"},"PeriodicalIF":4.1,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143628548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yinqing Wang , Xiangchun Li , Chunli Yang , Tao Yang , Fengchun Lan , Xin Tian
{"title":"A dynamic Bayesian network risk assessment model for coal-fired power plants based on grey correlation and triangular fuzzy theory","authors":"Yinqing Wang , Xiangchun Li , Chunli Yang , Tao Yang , Fengchun Lan , Xin Tian","doi":"10.1016/j.csi.2025.104001","DOIUrl":"10.1016/j.csi.2025.104001","url":null,"abstract":"<div><div>This article adopts analysis methods such as Bayesian network model, grey correlation analysis, analytic hierarchy process, and three-level fuzzy method to establish a risk assessment index system and dynamic risk assessment model for coal-fired power plants. The results show that starting from the perspective of \"human machine environment management\",relatively complete risk assessment index system for coal-fired power plants has been determined using the grey correlation analysis method, with a total of 4 first level indicators, 15 second level indicators, and 63 third level indicators; Using Analytic Hierarchy Process to determine the weights of indicators at all levels, the calculation results are incorporated into subsequent Bayesian network models, transforming the Bayesian model from a static model to a dynamic model; Then bring the calculated results into NETICA software for calculation, obtain the original Bayesian network model, and perform reverse inference analysis and sensitivity analysis; Through comparative analysis, B1 (management personnel), B8 (equipment and facility management), B10 (work environment hazards), B14 (dual prevention mechanism management), X4 (personnel \"three violations\" situation), X20 (equipment change management), and X43 (vibration hazards) have significant changes. Therefore, management should be strengthened in practical operations, providing a theoretical basis for the actual production management of power plants.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104001"},"PeriodicalIF":4.1,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143684748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Ou, Yueming Chen, Buyao Xiong, Zhaokun Wang, Wenhong Tian
{"title":"Accelerating Mixture-of-Experts language model inference via plug-and-play lookahead gate on a single GPU","authors":"Jie Ou, Yueming Chen, Buyao Xiong, Zhaokun Wang, Wenhong Tian","doi":"10.1016/j.csi.2025.103996","DOIUrl":"10.1016/j.csi.2025.103996","url":null,"abstract":"<div><div>The widespread adoption of large language models (LLMs) has encouraged researchers to explore strategies for running these models more efficiently, such as the mixture of experts (MoE) method, which aims to increase the knowledge capacity of the model without substantially increasing its computational costs, as only a fraction of the model components are active for each token. However, this approach also increases the size of the model, which makes it challenging to run these models even on high-end GPUs. Quantization and offloading strategies have been used to enable the execution of MoE in resource-constrained environments, however, the time overhead introduced by offloading remains a bottleneck. In this paper, we propose a plug-and-play lookahead gate that predicts in advance the experts to be used in the next few layers. Furthermore, to mitigate the misalignment problem arising from cross-layer prediction, we introduce an alignment training method, layer-wise gate alignment, enhancing the prediction hit rate while maintaining low resource requirements. Moreover, we present a speculative expert scheduling strategy to accelerate the end-to-end inference process of MoE models. To validate our approach, we established an inference framework for quantized MoE and conducted extensive experiments. The results demonstrate the effectiveness of our proposed methods, with throughput improvements of 57.72%, 60.00%, and 62.26% under 4, 3, and 2-bit quantization conditions for experts, respectively, compared with the Mixtral-offloading method.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103996"},"PeriodicalIF":4.1,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143611213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifiable and auditable multi-authority attribute-based encryption","authors":"Xingwang Wang, Peng Zeng, Jiaying Luo","doi":"10.1016/j.csi.2025.103991","DOIUrl":"10.1016/j.csi.2025.103991","url":null,"abstract":"<div><div>Attribute-based encryption (ABE) is crucial for cloud computing security as it enables fine-grained non-interactive access control and allows efficient and secure data sharing without relying on trusted third parties. Multi-authority ABE (MABE) is an improvement to traditional single-authority ABE because the former can remove the key escrow problem existed in the latter and thus is more appropriate for access control of some special applications. Recently, Zhou et al. proposed an auditable MABE (A-MABE) scheme in which the authorities are categorized into a trusted authority and several attribute authorities. For the confirmation and protection of data ownership, we propose verifiable A-MABE (VA-MABE) schemes in this paper. The additional feature of verifiability is achieved by our newly proposed zero-knowledge proof protocol which enables a data sender (i.e. data owner) to prove the ownership of the encrypted data without leaking sensitive information. Our proposed VA-MABE schemes also afford authorities the flexibility to join or exit the system with a minimal cost. Addressing concerns about centralized audit power, we incorporate technologies that decentralize this role, thereby enhancing the system’s resilience.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103991"},"PeriodicalIF":4.1,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143592208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of retrieval-augmented generation for interactive industrial knowledge management via a large language model","authors":"Lun-Chi Chen , Mayuresh Sunil Pardeshi , Yi-Xiang Liao , Kai-Chih Pai","doi":"10.1016/j.csi.2025.103995","DOIUrl":"10.1016/j.csi.2025.103995","url":null,"abstract":"<div><div>Industrial data processing and retrieval are necessary for adoption in Industry 5.0. Large Language Model (LLMs) revolutionize natural language process (NLP) but face challenges in domain-specific applications due to specialized terminology and context. Artificial Intelligence (AI) assistants for industrial-related work enquiry and customer support services are necessary for increasing demand and quality of service (QoS). Our research aims to design a novel customized model with a retrieval-augmented generation (RAG)-based LLM as a sustainable solution for industrial integration with AI. The goal is to provide an interactive industrial knowledge management (IIKM) system that can be applied to technical services: assisting technicians in the search for precise technical repair details and company internal regulation searches: personnel can easily inquire about regulations, such as business trips and leave requirements. The IIKM model architecture consists of BM25 and embedding sequence processing in the chroma database, where the top k-chunks are selected by the BAAI ranker to respond effectively to the queries. A group of documents of 234 MB size and pdf, pptx, docx, csv and txt formats are used for the experimental analysis. The designed interactive knowledge management system has a mean reciprocal rank (MRR) of 88 %, a recall of 85 % and a mean average precision (mAP) of 75 % in technical service. The internal regulatory documents have a generation-based retrieval evaluation prediction of recall of 91.62 %, MRR of 97.97 % and mAP of 91.12 %. We conclude with insights gained and experiences shared from IIKM deployment with Sakura incorporation, highlighting the importance of the hybrid approach integrating RAG-based generative pretrained transformer (GPT) models for customized solutions.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103995"},"PeriodicalIF":4.1,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143549225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ronghao Pan, José Antonio García-Díaz, Rafael Valencia-García
{"title":"Spanish MTLHateCorpus 2023: Multi-task learning for hate speech detection to identify speech type, target, target group and intensity","authors":"Ronghao Pan, José Antonio García-Díaz, Rafael Valencia-García","doi":"10.1016/j.csi.2025.103990","DOIUrl":"10.1016/j.csi.2025.103990","url":null,"abstract":"<div><div>The rise of digital communication has exacerbated the challenge of tackling harmful speech online, particularly hate speech, which dehumanises individuals or groups on the basis of traits such as race, gender or ethnicity. This study highlights the urgent need for fine-grained detection methods that take into account several subtasks of hate speech detection, including its intensity, determining the groups to which hate speech is directed, and whether the target is an individual or a group. Furthermore, there is a gap in comprehensive Spanish language corpora that cover these subtasks of hate speech detection. Therefore, we created a novel corpus entitled Spanish MTLHateCorpus 2023 to facilitate the analysis of hate speech in these subtasks and evaluated the effectiveness of the multi-task learning strategy evaluating mBART and T5, comparing its results with other Large Language Models using Zero-Shot Learning as a lower bound and an ensemble based on the mode of several Fine-Tuning as an upper bound. The results achieved by the Multi-Task Learning strategy demonstrated its potential to increase model versatility, allowing a single model to effectively tackle multiple tasks while achieving competitive results, particularly in target group recognition. However, the ensemble learning slightly outperforms the Multi-Task Learning strategy.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103990"},"PeriodicalIF":4.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huali Ren , Anli Yan , Lang Li , Zhenxin Zhang , Ning Li , Chong-zhi Gao
{"title":"Are you copying my prompt? Protecting the copyright of vision prompt for VPaaS via watermarking","authors":"Huali Ren , Anli Yan , Lang Li , Zhenxin Zhang , Ning Li , Chong-zhi Gao","doi":"10.1016/j.csi.2025.103992","DOIUrl":"10.1016/j.csi.2025.103992","url":null,"abstract":"<div><div>Visual Prompt Learning (VPL) reduces resource consumption by avoiding updates to pre-trained model parameters and instead learns input perturbations, a visual prompts, added to downstream task data for predictions. Designing high-quality prompts requires significant expertise and time-consuming optimization, leading to the emergence of Visual Prompts as a Service (VPaaS), where developers monetize well-crafted prompts by providing them to authorized customers.However, in cloud computing environments, prompts can be easily copied and redistributed, posing serious risks to the intellectual property (IP) of VPaaS developers.</div><div>To address this, we propose WVPrompt, the first method for protecting visual prompts via watermarking in a black-box setting. WVPrompt consists of two components: prompt watermarking and prompt verification. Specifically, it utilizes a poison-only backdoor attack method to embed a watermark into the prompt, and then employs a hypothesis-testing approach for remote verification of prompt ownership. Extensive experiments were conducted on three well-known benchmark datasets and three popular pre-trained models: RN50, BiT-M, and Instagram. The experimental results demonstrate that WVPrompt is efficient, harmless, and robust to various adversarial operations, making it a reliable solution for securing visual prompts in cloud-based applications.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103992"},"PeriodicalIF":4.1,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools","authors":"Madhavi Kumari , Rohit Chauhan , Prabha Garg","doi":"10.1016/j.csi.2025.103997","DOIUrl":"10.1016/j.csi.2025.103997","url":null,"abstract":"<div><div>The exponential growth of chemical literature necessitates advanced tools for efficient data extraction and utilization. This study investigates the performance of Large Language Models (LLMs) in Chemical Named Entity Recognition (CNER), comparing them against traditional domain-specific tools. We fine-tuned the LLaMA-2 model using the NLM-Chem corpus and integrated a Retrieval-Augmented Generation (RAG) pipeline to enhance performance. The results revealed that fine-tuned LLaMA-2 models, particularly those incorporating RAG, achieved an F1 score of 0.82, surpassing the score of traditional CNER tools. Furthermore, LLMs demonstrated superior generalizability across different datasets. The study also explores the dependency of LLMs size for CNER tasks. A practical case study highlighting the application of these models in chemical entity extraction from pharmaceutical literature, achieving high accuracy in identifying drug and their interactions. These findings establish LLMs as a robust and adaptable alternative to traditional CNER tools, paving the way for transformative applications in chemoinformatics.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103997"},"PeriodicalIF":4.1,"publicationDate":"2025-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143549224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}