期刊文献+
共找到128,109篇文章
< 1 2 250 >
每页显示 20 50 100
使用DRS origin软件建立HPLC替代对照品法测定防风中升麻素苷、5-O-甲基维斯阿米醇苷、升麻素、亥茅酚苷的含量
1
作者 孔德娟 左甜甜 +5 位作者 盛雪 嵇增云 邹广鑫 田佳勋 王艳楠 闫凤杰 《中国新药杂志》 北大核心 2025年第21期2316-2325,共10页
目的:建立双标多测法(TRSDMC)同时测定防风中升麻素苷、5-O-甲基维斯阿米醇苷、升麻素、亥茅酚苷的含量,节约对照品同时更全面地控制该品种的质量。方法:采用HPLC法测定,使用C 18色谱柱;流动相为乙腈(A)-0.1%甲酸水(B),流速1.0 mL·... 目的:建立双标多测法(TRSDMC)同时测定防风中升麻素苷、5-O-甲基维斯阿米醇苷、升麻素、亥茅酚苷的含量,节约对照品同时更全面地控制该品种的质量。方法:采用HPLC法测定,使用C 18色谱柱;流动相为乙腈(A)-0.1%甲酸水(B),流速1.0 mL·min^(-1),梯度洗脱;柱温35℃;检测波长254 nm;进样体积10μL。以升麻素苷和5-O-甲基维斯阿米醇苷为对照,使用DRS origin软件进行双标线性校正预测特征峰的保留时间,并通过替代对照品法获得相对校正因子,计算结果与外标法进行比较。结果:通过DRS origin软件拟合的标准曲线预测待测化合物准确,并结合校正因子计算所得含量与外标法测定结果比较,绝对偏差均<0.2 mg·g^(-1),准确度均大于95.0%。24批次样品中升麻素苷、升麻素、5-O-甲基维斯阿米醇苷、亥茅酚苷含量范围分别为0.8399~3.7996、0.0206~0.1718、0.6773~2.5099、0.0457~0.2032 mg·g^(-1)。结论:双标线性校正预测保留时间与相对保留时间法相比,前者保留时间预测结果准确度高,色谱柱的适用范围广,为防风多指标含量测定提供了新的思路和方法。 展开更多
关键词 防风 升麻素苷 升麻素 5-O-甲基维斯阿米醇苷 亥茅酚苷 替代对照品法 DRS origin软件
原文传递
基于phyphox和Origin软件的牛顿第二定律实验研究
2
作者 邹兆轩 伏森泉 +4 位作者 丁益民 程文睿 刘沁 苏鹏 陈九江 《物理通报》 2025年第5期90-93,97,共5页
借助phyphox和Origin软件,利用手机或平板这种自带深度传感器的现代技术设备,对牛顿第二定律的实验进行优化与创新,并将实验数值与理论数值进行对比,实验结果准确地验证了牛顿第二定律的准确性.这样的实验方法在提高实验教学的可视化程... 借助phyphox和Origin软件,利用手机或平板这种自带深度传感器的现代技术设备,对牛顿第二定律的实验进行优化与创新,并将实验数值与理论数值进行对比,实验结果准确地验证了牛顿第二定律的准确性.这样的实验方法在提高实验教学的可视化程度和可操作性的同时,还有利于培养学生处理和分析图像的能力,发展学生核心素养. 展开更多
关键词 phyphox origin 牛顿第二定律 中学物理
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:1
3
作者 Xiaogang Zhu Wei Zhou +3 位作者 Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
巧用Origin软件构建种群密度数学模型——以“黑光灯诱捕法调查封闭环境中某种昆虫种群密度实验”为例
4
作者 薛丽华 《中学生物教学》 2025年第9期62-64,共3页
在高中生物学教学中,数学模型的构建可以利用Origin软件来处理数据,得到直观的拟合图像。在“黑光灯诱捕法调查封闭环境中某种昆虫种群密度实验”中,利用Origin软件进行数据的线性拟合,得到了单次捕获数目(y)和累积捕获数目(x)的线性拟... 在高中生物学教学中,数学模型的构建可以利用Origin软件来处理数据,得到直观的拟合图像。在“黑光灯诱捕法调查封闭环境中某种昆虫种群密度实验”中,利用Origin软件进行数据的线性拟合,得到了单次捕获数目(y)和累积捕获数目(x)的线性拟合数学模型,简单明了地推测出种群数量估算值,计算出种群密度。 展开更多
关键词 数学模型 origin软件 线性拟合
在线阅读 下载PDF
An Analysis about the Origin and Essence of Mass Based on Particle-Propagating Model and Wave Equations of Scalar Waves 被引量:1
5
作者 Jiang Jian-zhong Chen Xi-qi 《Journal of Environmental Science and Engineering(B)》 2025年第2期65-75,共11页
If the singularity of the cosmic Big Bang is taken as the origin of the reference coordinate system,the surrounding vacuum in the initial moments of it would exhibit radially-outward right-handed spiral motion at ligh... If the singularity of the cosmic Big Bang is taken as the origin of the reference coordinate system,the surrounding vacuum in the initial moments of it would exhibit radially-outward right-handed spiral motion at light speed.Based on this spatial motion hypothesis,we derive a unified field equation and a set of Maxwell’s equations for vacuum SWs(Scalar Waves)generating a huge spiral force field that drives the energy to spiral inwardly and distort,leading to the formation of mass.Furthermore,they also uncover that mass is fundamentally an ultimate expression of energy,manifesting as the result of spiral motion of space at light speed.And then,we indirectly validate the theory that coherent light waves’collision generate SWs and subsequently mass through the experiment verifying the Breit-Wheeler process.The establishment of our theory offers a new analytical tool for the exploration of mass origin,the cosmic Big Bang,unified field theories. 展开更多
关键词 QED(Quantum Electrodynamics) SW mass origin unified field theories
在线阅读 下载PDF
Two-Phase Software Fault Localization Based on Relational Graph Convolutional Neural Networks 被引量:1
6
作者 Xin Fan Zhenlei Fu +2 位作者 Jian Shu Zuxiong Shen Yun Ge 《Computers, Materials & Continua》 2025年第2期2583-2607,共25页
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu... Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments. 展开更多
关键词 software fault localization graph neural network RankNet inter-class dependency class imbalance
在线阅读 下载PDF
Deciphering origins of hydrocarbon deposits by means of intramolecular carbon isotopes of propane adsorbed on sediments 被引量:1
7
作者 Peng Liu Xiao-Feng Wang +6 位作者 Jie Wang Juske Horita Zhi-Yong Wang Ying Lin Rui-Liang Guo Fu-Qi Li Wen-Hui Liu 《Petroleum Science》 2025年第2期546-556,共11页
Hydrocarbons are one of the important fluids within the Earth's crust,and different biotic and abitoic processes can generate hydrocarbon during geological periods.Tracing the sources and sinks of hydrocarbons can... Hydrocarbons are one of the important fluids within the Earth's crust,and different biotic and abitoic processes can generate hydrocarbon during geological periods.Tracing the sources and sinks of hydrocarbons can help us better understand the carbon cycle of the earth.In this study,an improved approach of adsorbed hydrocarbons extraction from sediments was established.The improved thermal desorption approach,compound-specific isotope analysis and position-specific isotope analysis were integrated to investigate the molecular and intramolecular isotope fractionation between trace hydrocarbon gases within sediments and geological hydrocarbon deposits.The isotopic compositions of the terminal position carbon of propane(δ^(13)C_(terminal))serves as a correlation indicator between trace hydrocarbon gases within sediments and geological hydrocarbon deposits.The tight sandstone gas from the Turpan-Hami Basin is a first case study for the application of this novel method to trace hydrocarbon origins.The results showed that the hydrocarbons in the tight sandstone gases in the study area most likely originated from humic organic matter(typeⅢkerogen)at an early mature stage.δ^(13)C_(terminal)values of the thermally desorbed propane gases from different source rocks were distinguishable and the values of the tight sandstone gases significantly overlap with those of the Lower Jurassic Sangonghe source rocks,suggesting their genetic relationship.Overall,the results provided novel position-specific carbon isotopic constraints on origins of hydrocarbons. 展开更多
关键词 Hydrocarbon origins Intramolecular isotope distributions Position-specific isotope analysis(PSIA) PROPANE
原文传递
A Survey of Link Failure Detection and Recovery in Software-Defined Networks
8
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期103-137,共35页
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance... Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods. 展开更多
关键词 software defined networking failure detection failure recovery RESTORATION PROTECTION
在线阅读 下载PDF
Review of Techniques for Integrating Security in Software Development Lifecycle
9
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks
10
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期1087-1107,共21页
Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive s... Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries.As SDN adoption grows,ensuring efficient recovery from link failures in the data plane becomes crucial.In particular,data center networks(DCNs)demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements.This paper proposes an efficient Decentralized Failure Recovery(DFR)model for SDNs,meeting recovery time requirements and optimizing switch memory resource consumption.The DFR model enables switches to autonomously reroute traffic upon link failures without involving the controller,achieving fast recovery times while minimizing memory usage.DFR employs the Fast Failover Group in the OpenFlow standard for local recovery without requiring controller communication and utilizes the k-shortest path algorithm to proactively install backup paths,allowing immediate local recovery without controller intervention and enhancing overall network stability and scalability.DFR employs flow entry aggregation techniques to reduce switch memory usage.Instead of matching flow entries to the destination host’s MAC address,DFR matches packets to the destination switch’s MAC address.This reduces the switches’Ternary Content-Addressable Memory(TCAM)consumption.Additionally,DFR modifies Address Resolution Protocol(ARP)replies to provide source hosts with the destination switch’s MAC address,facilitating flow entry aggregation without affecting normal network operations.The performance of DFR is evaluated through the network emulator Mininet 2.3.1 and Ryu 3.1 as SDN controller.For different number of active flows,number of hosts per edge switch,and different network sizes,the proposed model outperformed various failure recovery models:restoration-based,protection by flow entries,protection by group entries and protection by Vlan-tagging model in terms of recovery time,switch memory consumption and controller overhead which represented the number of flow entry updates to recover from the failure.Experimental results demonstrate that DFR achieves recovery times under 20 milliseconds,satisfying carrier-grade requirements for rapid failure recovery.Additionally,DFR reduces switch memory usage by up to 95%compared to traditional protection methods and minimizes controller load by eliminating the need for controller intervention during failure recovery.Theresults underscore the efficiency and scalability of the DFR model,making it a practical solution for enhancing network resilience in SDN environments. 展开更多
关键词 software defined networking failure detection failure recovery RESTORATION protection TCAM size
在线阅读 下载PDF
FURobot:A software control platform for construction robots for large-scale construction
11
作者 LU Ming Philip F.YUAN 《土木与环境工程学报(中英文)》 北大核心 2025年第5期1-11,共11页
The advent of parametric design has resulted in a marked increase in the complexity of building.Unfortunately,traditional construction methods make it difficult to meet the needs.Therefore,construction robots have bec... The advent of parametric design has resulted in a marked increase in the complexity of building.Unfortunately,traditional construction methods make it difficult to meet the needs.Therefore,construction robots have become a pivotal production tool in this context.Since the arm span of a single robot usually does not exceed 3 meters,it is not competent for producing large-scale building components.Accordingly,the extension of the robot,s working range is often achieved by external axes.Nevertheless,the coupling control of external axes and robots and their kinematic solution have become key challenges.The primary technical difficulties include customized construction robots,automatic solutions for external axes,fixed axis joints,and specific motion mode control.This paper proposes solutions to these difficulties,introduces the relevant basic concepts and algorithms in detail,and encapsulates these robotics principles and algorithm processes into the Grasshopper plug-in commonly used by architects to form the FURobot software platform.This platform effectively solves the above problems,lowers the threshold for architects,and improves production efficiency.The effectiveness of the algorithm and software in this paper is verified through simulation experiments. 展开更多
关键词 construction robots CUSTOMIZATION CONSTRUCTION ROBOTICS KINEMATICS software
在线阅读 下载PDF
Origin软件在物理化学实验中的应用
12
作者 龚书生 余丽丽 +1 位作者 吴菊 杨梅 《山东化工》 2025年第12期162-165,共4页
在物理化学实验中数据处理是实验的重要体现,而数据处理有多种方式,其中Origin作为一个科学绘图、数据分析软件,能够快速准确地处理实验数据,得到所需要的实验结果。以几个物理化学实验的为例,将Origin软件的数据处理后的结果与其他几... 在物理化学实验中数据处理是实验的重要体现,而数据处理有多种方式,其中Origin作为一个科学绘图、数据分析软件,能够快速准确地处理实验数据,得到所需要的实验结果。以几个物理化学实验的为例,将Origin软件的数据处理后的结果与其他几种数据处理方式得到结果进行对比,发现Origin软件在数据绘图、拟合等方面具有优势。 展开更多
关键词 origin软件 物理化学实验 数据处理
在线阅读 下载PDF
Parallel Implementation of Radiation Hydrodynamics Coupled with Particle Transport on Software Infrastructure JASMIN
13
作者 REN Jian WEI Junxia CAO Xiaolin 《计算物理》 北大核心 2025年第5期608-618,共11页
In this work,we present a parallel implementation of radiation hydrodynamics coupled with particle transport,utilizing software infrastructure JASMIN(J Adaptive Structured Meshes applications INfrastructure)which enca... In this work,we present a parallel implementation of radiation hydrodynamics coupled with particle transport,utilizing software infrastructure JASMIN(J Adaptive Structured Meshes applications INfrastructure)which encapsulates high-performance technology for the numerical simulation of complex applications.Two serial codes,radiation hydrodynamics RH2D and particle transport Sn2D,have been integrated into RHSn2D on JASMIN infrastructure,which can efficiently use thousands of processors to simulate the complex multi-physics phenomena.Moreover,the non-conforming processors strategy has ensured RHSn2D against the serious load imbalance between radiation hydrodynamics and particle transport for large scale parallel simulations.Numerical results show that RHSn2D achieves a parallel efficiency of 17.1%using 90720 cells on 8192 processors compared with 256 processors in the same problem. 展开更多
关键词 processors strategy parallel performance radiation hydrodynamics particle transport multi-physics models software infrastructure
原文传递
Origin拟合方法在课程教学中的研究和应用
14
作者 胡吉玉 姚昌明 +1 位作者 訾振发 刘超成 《广州化工》 2025年第6期204-206,共3页
为了提升数据处理方法对于课程教学的影响,加深学生对于课程教学中所遇到的理论知识概念有更深刻地研究和掌握,最后能够将理论知识和数据处理应用在一起,最终实现学以致用,既理论与实践相结合、互相促进的教学方法和学习方式。在本论文... 为了提升数据处理方法对于课程教学的影响,加深学生对于课程教学中所遇到的理论知识概念有更深刻地研究和掌握,最后能够将理论知识和数据处理应用在一起,最终实现学以致用,既理论与实践相结合、互相促进的教学方法和学习方式。在本论文中以Origin拟合数据为例,处理在课程教学和学习中遇到的知识点和概念性结论,使得学生的学习更加直观、逻辑更加清晰,与此同时,也能够锻炼学生将理论转为实际的学习和操作能力,达到提升教学效果的目的。 展开更多
关键词 origin 拟合方法 课程教学
在线阅读 下载PDF
A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering
15
作者 Dae-Kyoo Kim 《Computers, Materials & Continua》 2025年第8期2549-2572,共24页
Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints... Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints,notably the no-cloning theorem,which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography,secure communication,and error correction.While existing quantum circuit representations implicitly honor such constraints,they lack formal mechanisms for early-stage verification in software design.Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software.This paper presents a formal metamodeling framework using UML-style notation and and Object Constraint Language(OCL)to systematically capture and enforce the no-cloning theorem within quantum software models.The proposed metamodel formalizes key quantum concepts—such as entanglement and teleportation—and encodes enforceable invariants that reflect core quantum mechanical laws.The framework’s effectiveness is validated by analyzing two critical edge cases—conditional copying with CNOT gates and quantum teleportation—through instance model evaluations.These cases demonstrate that the metamodel can capture nuanced scenarios that are often mistaken as violations of the no-cloning theorem but are proven compliant under formal analysis.Thus,these serve as constructive validations that demonstrate the metamodel’s expressiveness and correctness in representing operations that may appear to challenge the no-cloning theorem but,upon rigorous analysis,are shown to comply with it.The approach supports early detection of conceptual design errors,promoting correctness prior to implementation.The framework’s extensibility is also demonstrated by modeling projective measurement,further reinforcing its applicability to broader quantum software engineering tasks.By integrating the rigor of metamodeling with fundamental quantum mechanical principles,this work provides a structured,model-driven approach that enables traditional software engineers to address quantum computing challenges.It offers practical insights into embedding quantum correctness at the modeling level and advances the development of reliable,error-resilient quantum software systems. 展开更多
关键词 METAMODELING no-cloning theorem quantum software software engineering
在线阅读 下载PDF
Software Defect Prediction Based on Semantic Views of Metrics:Clustering Analysis and Model Performance Analysis
16
作者 Baishun Zhou Haijiao Zhao +4 位作者 Yuxin Wen Gangyi Ding Ying Xing Xinyang Lin Lei Xiao 《Computers, Materials & Continua》 2025年第9期5201-5221,共21页
In recent years,with the rapid development of software systems,the continuous expansion of software scale and the increasing complexity of systems have led to the emergence of a growing number of software metrics.Defe... In recent years,with the rapid development of software systems,the continuous expansion of software scale and the increasing complexity of systems have led to the emergence of a growing number of software metrics.Defect prediction methods based on software metric elements highly rely on software metric data.However,redundant software metric data is not conducive to efficient defect prediction,posing severe challenges to current software defect prediction tasks.To address these issues,this paper focuses on the rational clustering of software metric data.Firstly,multiple software projects are evaluated to determine the preset number of clusters for software metrics,and various clustering methods are employed to cluster the metric elements.Subsequently,a co-occurrence matrix is designed to comprehensively quantify the number of times that metrics appear in the same category.Based on the comprehensive results,the software metric data are divided into two semantic views containing different metrics,thereby analyzing the semantic information behind the software metrics.On this basis,this paper also conducts an in-depth analysis of the impact of different semantic view of metrics on defect prediction results,as well as the performance of various classification models under these semantic views.Experiments show that the joint use of the two semantic views can significantly improve the performance of models in software defect prediction,providing a new understanding and approach at the semantic view level for defect prediction research based on software metrics. 展开更多
关键词 software defect prediction software engineering semantic views CLUSTERING INTERPRETABILITY
在线阅读 下载PDF
Large Language Models in Software Engineering Education: A Preliminary Study on Software Requirements Engineering Courses
17
作者 Feng Chen Shaomin Zhu +1 位作者 Xin Liu Ying Qian 《计算机教育》 2025年第3期24-33,共10页
The advent of large language models(LLMs)has made knowledge acquisition and content creation increasingly easier and cheaper,which in turn redefines learning and urges transformation in software engineering education.... The advent of large language models(LLMs)has made knowledge acquisition and content creation increasingly easier and cheaper,which in turn redefines learning and urges transformation in software engineering education.To do so,there is a need to understand the impact of LLMs on software engineering education.In this paper,we conducted a preliminary case study on three software requirements engineering classes where students are allowed to use LLMs to assist in their projects.Based on the students’experience,performance,and feedback from a survey conducted at the end of the courses,we characterized the challenges and benefits of applying LLMs in software engineering education.This research contributes to the ongoing discourse on the integration of LLMs in education,emphasizing both their prominent potential and the need for balanced,mindful usage. 展开更多
关键词 Large language models software engineering software requirements engineering EDUCATION
在线阅读 下载PDF
Portable Software Environment for Ultrahigh-Resolution ELM Development on GPUs
18
作者 Dali Wang Peter Schwartz +5 位作者 Fengming Yuan Franklin Eaglebarge Danial Riccuito Peter Thornton Chris Layton Qinglei Cao 《Journal of Computer and Communications》 2025年第2期28-36,共9页
This paper presents our endeavors in developing the large-scale, ultra-high-resolution E3SM Land Model (uELM), specifically designed for exascale computers furnished with accelerators such as Nvidia GPUs. The uELM is ... This paper presents our endeavors in developing the large-scale, ultra-high-resolution E3SM Land Model (uELM), specifically designed for exascale computers furnished with accelerators such as Nvidia GPUs. The uELM is a sophisticated code that substantially relies on High-Performance Computing (HPC) environments, necessitating particular machine and software configurations. To facilitate community-based uELM developments employing GPUs, we have created a portable, standalone software environment preconfigured with uELM input datasets, simulation cases, and source code. This environment, utilizing Docker, encompasses all essential code, libraries, and system software for uELM development on GPUs. It also features a functional unit test framework and an offline model testbed for comprehensive numerical experiments. From a technical perspective, the paper discusses GPU-ready container generations, uELM code management, and input data distribution across computational platforms. Lastly, the paper demonstrates the use of environment for functional unit testing, end-to-end simulation on CPUs and GPUs, and collaborative code development. 展开更多
关键词 E3SM Land Model Ultrahigh-Resolution ELM Portable software Environment GPU-Ready Environment
在线阅读 下载PDF
Identification indexes and diagrams for natural gas origin:Connotation,significance and application
19
作者 PENG Ping'an HOU Dujie +8 位作者 TENGER NI Yunyan GONG Deyu WU Xiaoqi FENG Ziqi HU Guoyi HUANG Shipeng YU Cong LIAO Fengrong 《Petroleum Exploration and Development》 2025年第3期573-586,共14页
Accurate identification of natural gas origin is fundamental to the theoretical research on natural gas geosciences and the exploration deployment and resource potential assessment of oil and gas.Since the 1970s,Acade... Accurate identification of natural gas origin is fundamental to the theoretical research on natural gas geosciences and the exploration deployment and resource potential assessment of oil and gas.Since the 1970s,Academician Dai Jinxing has developed a comprehensive system for natural gas origin determination,grounded in geochemical theory and practice,and based on the integrated analysis of stable isotopic compositions,molecular composition,light hydrocarbon fingerprints,and geological context.This paper systematically reviews the core framework established by him and his team according to related references and application results,focusing on the conceptual design and technical pathways of key diagnostic diagrams such asδ^(13)C_(1)-C_(1)/(C_(2)+C_(3)),δ^(13)C_(1)-δ^(13)C_(2)-δ^(13)C_(3),δ^(13)CCO_(2)versus CO_(2)content,and the C7light hydrocarbon ternary plot.We evaluate the applicability and innovation of these tools in distinguishing between oil-type gas,coal-derived gas,microbial gas,and abiogenic gas,as well as in identifying mixed-source gases and multi-stage charging systems.The findings suggest that this identification system has significantly advanced natural gas geochemical interpretation in China,shifting from single-indicator analyses to multi-parameter integration and from qualitative assessments to systematic graphical identification,and has also exerted considerable influence on international research in natural gas geochemistry.The structured overview of the development trajectory of natural gas origin discrimination methodologies provides a technical support for natural gas geological theory and practice and offers a scientific foundation for the academic evaluation and application of related achievements. 展开更多
关键词 natural gas natural gas geochemistry origin identification identification index identification diagram coal-derivedgas inorganic origin
在线阅读 下载PDF
Interdisciplinary Education Paradigm:Exploration and Practice of the“Software Engineering+”Innovative Talent Cultivation Model
20
作者 Mingzheng Hou Binyu Yan +2 位作者 Mei Hong Yi Zhang Mao Li 《计算机教育》 2025年第3期62-70,共9页
To address the severe challenges posed by the international situation and meet the needs of the national major development strategies,the traditional software engineering talent cultivation model lacks interdisciplina... To address the severe challenges posed by the international situation and meet the needs of the national major development strategies,the traditional software engineering talent cultivation model lacks interdisciplinary education focused on specific fields,making it difficult to cultivate engineering leaders with multidisciplinary backgrounds who are capable of solving complex real-world problems.To solve this problem,based on the decade-long interdisciplinary talent cultivation achievements of the College of Software Engineering at Sichuan University,this article proposes the“Software Engineering+”innovative talent cultivation paradigm.It provides an analysis through professional construction of interdisciplinary talents,the design of talent cultivation frameworks,the formulation of cultivation plans,the establishment of interdisciplinary curriculum systems,the reform of teaching modes,and the improvement of institutional systems.Scientific solutions are proposed,and five project models implemented and operated by the College of Software Engineering at Sichuan University are listed as practical examples,offering significant reference value. 展开更多
关键词 software Engineering+ INTERDISCIPLINARY Talent cultivation Curriculum system
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部