期刊文献+
共找到90,167篇文章
< 1 2 250 >
每页显示 20 50 100
糜子SBP基因家族鉴定及在籽粒稃壳色形成中的表达分析 被引量:1
1
作者 郝子义 刘天鹏 +6 位作者 何继红 董孔军 任瑞玉 张磊 韦恒 李亚伟 杨天育 《甘肃农业大学学报》 北大核心 2025年第4期65-77,共13页
【目的】了解糜子SBP基因家族及在其籽粒稃壳色形成中的表达特征。【方法】采用生物信息学方法,全基因组鉴定了含有SBP结构域的SBP基因家族成员,并进一步分析了其染色体分布、蛋白理化性质、系统进化关系、基因结构、保守结构域、启动... 【目的】了解糜子SBP基因家族及在其籽粒稃壳色形成中的表达特征。【方法】采用生物信息学方法,全基因组鉴定了含有SBP结构域的SBP基因家族成员,并进一步分析了其染色体分布、蛋白理化性质、系统进化关系、基因结构、保守结构域、启动子区域的顺式作用元件及在糜子白、黄、褐籽粒稃壳色形成中的表达特征。【结果】糜子含有38个SBP基因,不均匀的分布在18条染色体上,PmSBP蛋白的氨基酸序列长度为122-1109aa,等电点为5.49-10.32,家族成员含有1-11个外显子,亚细胞定位于细胞核、叶绿体中。糜子38个SBP基因的蛋白聚类分析显示,该蛋白家族可分为Ⅰ、Ⅱ、Ⅲ、Ⅳ和Ⅴ5个亚家族,亚家族Ⅲ成员具有相对复杂的结构。顺式作用元件分析显示,在糜子SBP家族基因存在共同的顺式作用元件,如光响应、激素响应、分生组织表达和调控种子特异性等。白、黄、褐色籽粒品种晋黍8号、陇糜12号和张778稃壳色形成期转录组及qRT-PCR分析显示,糜子SBP基因家族成员中PmSBP33、PmSBP8、PmSBP17、PmSBP37、PmSBP12、PmSBP14、PmSBP1、PmSBP7、PmSBP23和PmSBP16在3个品种籽粒中的表达量较高,且品种间表达量差异显著。通过与谷子、拟南芥和水稻同源基因比对,推测PmSBP1和PmSBP7与糜子籽粒发育相关。【结论】鉴定出38个糜子SBP基因家族成员,在糜子籽粒稃壳中的表达量差异明显,且PmSBP1和PmSBP7与糜子籽粒形态建成密切相关。 展开更多
关键词 糜子 sbp基因家族 转录因子 生物信息学分析 表达特征
在线阅读 下载PDF
鼓槌石斛SBP基因家族全基因组鉴定与生物信息学分析
2
作者 董蓉娇 李泽生 +4 位作者 姚志军 贾敏 罗凯 高燕 李桂琳 《西南农业学报》 北大核心 2025年第9期1822-1831,共10页
【目的】鉴定和分析鼓槌石斛全基因组中SBP转录因子家族,为后续深入研究SBP转录因子的生物学功能奠定基础。【方法】利用生物信息学方法从鼓槌石斛全基因组中筛选鉴定出SBP基因家族成员,并对其蛋白理化特性、亚细胞定位、蛋白质空间结... 【目的】鉴定和分析鼓槌石斛全基因组中SBP转录因子家族,为后续深入研究SBP转录因子的生物学功能奠定基础。【方法】利用生物信息学方法从鼓槌石斛全基因组中筛选鉴定出SBP基因家族成员,并对其蛋白理化特性、亚细胞定位、蛋白质空间结构、蛋白磷酸化修饰位点、染色体定位、保守结构域与保守基序、系统发育树、启动子顺式作用元件等进行系统分析。【结果】鼓槌石斛基因组中鉴定出15个SBP基因,不均匀分布在10条染色体上,氨基酸数量为219~1086 aa,等电点为5.37~9.63,相对分子质量为24480.53~119978.42 Da,不稳定系数为44.54~74.10,脂肪系数为52.65~81.42,总平均亲水性为-0.787~0.575。亚细胞定位预测结果显示,基因家族成员中3个定位在细胞质上,15个定位在细胞核上;蛋白质二级结构以规则的α-螺旋和松散的无规则卷曲为主要构成,而三级结构整体相似度较低,空间构象更复杂;蛋白磷酸化修饰位点为21~134个;家族成员均具备高度保守的SBP结构域,由2个锌指结构模块和1个核定位信号序列构成;不同SBP基因家族成员之间所含基序(Motif)不同,聚类关系较近基因的基序相似,基序数量为2~7个;鼓槌石斛、拟南芥和水稻51个SBP蛋白被划分为11个亚族,15个鼓槌石斛SBP蛋白分布于8个亚族中;SBP基因启动子区域检测到光响应、激素响应及逆境胁迫响应等22类不同顺式作用元件;SBP基因在鼓槌石斛根和茎中表达量相对较低,在叶片和花中表达量相对较高,同一亚族基因表达模式相似。【结论】SBP基因家族成员理化性质差异较大,划分为8个系统发育亚族,同一亚族结构域和基序保守性极强,启动子区主要包含光响应、激素类响应及逆境胁迫响应等顺式作用元件,SBP基因在不同组织中差异化表达,可能在鼓槌石斛叶片和花器官生长发育方面发挥重要作用。 展开更多
关键词 鼓槌石斛 sbp 基因家族 生物信息学 保守结构域
在线阅读 下载PDF
3种栗属植物SBP基因家族生物信息学与表达分析
3
作者 付丽枝 杨涌 +3 位作者 于克妍 于立洋 王旋 张海娥 《山东农业科学》 北大核心 2025年第5期36-45,共10页
SBP蛋白是一类广泛参与调节生长发育过程的植物特有转录因子。本研究从3种栗属植物中鉴定到58个SBP基因家族成员,并利用生物信息学方法对其染色体定位、蛋白理化性质、共线性关系等方面进行了分析。结果发现,所有栗属植物SBP基因家族成... SBP蛋白是一类广泛参与调节生长发育过程的植物特有转录因子。本研究从3种栗属植物中鉴定到58个SBP基因家族成员,并利用生物信息学方法对其染色体定位、蛋白理化性质、共线性关系等方面进行了分析。结果发现,所有栗属植物SBP基因家族成员在染色体上呈非均匀分布,其中3个SBP基因未被组装到染色体的大片段中。进化树分析发现栗属植物SBP基因家族可以分为7个小组,小组5中发生了基因的丢失和扩增。Motif分析发现所有SBP基因家族成员都包含保守的Motif1或Motif2。共线性基因对的Ka/Ks分析发现,SBP基因家族成员在栗属植物基因组内及组间正在经历纯化选择。转录组数据分析发现CmSBP基因家族在不同时期中国板栗芽与果实中的表达量变化明显。本研究结果可为后续栗属植物SBP基因功能研究提供理论基础。 展开更多
关键词 栗属植物 sbp基因家族 选择压力 生物信息学分析 表达分析
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:1
4
作者 Xiaogang Zhu Wei Zhou +3 位作者 Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
双相介质波动方程系数矩阵对称化及其SBP-SAT差分模拟
5
作者 孙铖 刘泰玉 +2 位作者 蒋关希曦 张剑伟 杨在林 《振动与冲击》 北大核心 2025年第16期108-118,共11页
波动方程系数矩阵对称化是整合不同类别波动方程、降低波传播模拟难度的有效方法,目前已成功应用于声波方程、各向同性与各向异性介质弹性波动方程。该研究将推导出双项介质波动方程的系数矩阵对称式;随后,引入多轴完全匹配层,采用迎风... 波动方程系数矩阵对称化是整合不同类别波动方程、降低波传播模拟难度的有效方法,目前已成功应用于声波方程、各向同性与各向异性介质弹性波动方程。该研究将推导出双项介质波动方程的系数矩阵对称式;随后,引入多轴完全匹配层,采用迎风格式分部求和-一致逼近项(summation by parts-simultaneous approximation terms,SBP-SAT)有限差分方法离散波动方程,并通过能量法进行稳定性评估。通过数值仿真,表明所提出的离散框架具有整合度高,稳定性好和拓展性强等特点。此外,该方法可以稳定模拟曲线域中的波传播并降低其实现成本,表明了波动方程系数矩阵对称化方法及其离散框架在波传播模拟领域具有广泛的应用前景。 展开更多
关键词 双相介质波动方程 系数矩阵对称式 分部求和-一致逼近项(sbp-SAT) 有限差分方法 能量法
在线阅读 下载PDF
Two-Phase Software Fault Localization Based on Relational Graph Convolutional Neural Networks 被引量:1
6
作者 Xin Fan Zhenlei Fu +2 位作者 Jian Shu Zuxiong Shen Yun Ge 《Computers, Materials & Continua》 2025年第2期2583-2607,共25页
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu... Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments. 展开更多
关键词 software fault localization graph neural network RankNet inter-class dependency class imbalance
在线阅读 下载PDF
A Survey of Link Failure Detection and Recovery in Software-Defined Networks
7
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期103-137,共35页
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance... Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods. 展开更多
关键词 software defined networking failure detection failure recovery RESTORATION PROTECTION
在线阅读 下载PDF
Review of Techniques for Integrating Security in Software Development Lifecycle
8
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks
9
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期1087-1107,共21页
Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive s... Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries.As SDN adoption grows,ensuring efficient recovery from link failures in the data plane becomes crucial.In particular,data center networks(DCNs)demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements.This paper proposes an efficient Decentralized Failure Recovery(DFR)model for SDNs,meeting recovery time requirements and optimizing switch memory resource consumption.The DFR model enables switches to autonomously reroute traffic upon link failures without involving the controller,achieving fast recovery times while minimizing memory usage.DFR employs the Fast Failover Group in the OpenFlow standard for local recovery without requiring controller communication and utilizes the k-shortest path algorithm to proactively install backup paths,allowing immediate local recovery without controller intervention and enhancing overall network stability and scalability.DFR employs flow entry aggregation techniques to reduce switch memory usage.Instead of matching flow entries to the destination host’s MAC address,DFR matches packets to the destination switch’s MAC address.This reduces the switches’Ternary Content-Addressable Memory(TCAM)consumption.Additionally,DFR modifies Address Resolution Protocol(ARP)replies to provide source hosts with the destination switch’s MAC address,facilitating flow entry aggregation without affecting normal network operations.The performance of DFR is evaluated through the network emulator Mininet 2.3.1 and Ryu 3.1 as SDN controller.For different number of active flows,number of hosts per edge switch,and different network sizes,the proposed model outperformed various failure recovery models:restoration-based,protection by flow entries,protection by group entries and protection by Vlan-tagging model in terms of recovery time,switch memory consumption and controller overhead which represented the number of flow entry updates to recover from the failure.Experimental results demonstrate that DFR achieves recovery times under 20 milliseconds,satisfying carrier-grade requirements for rapid failure recovery.Additionally,DFR reduces switch memory usage by up to 95%compared to traditional protection methods and minimizes controller load by eliminating the need for controller intervention during failure recovery.Theresults underscore the efficiency and scalability of the DFR model,making it a practical solution for enhancing network resilience in SDN environments. 展开更多
关键词 software defined networking failure detection failure recovery RESTORATION protection TCAM size
在线阅读 下载PDF
FURobot:A software control platform for construction robots for large-scale construction
10
作者 LU Ming Philip F.YUAN 《土木与环境工程学报(中英文)》 北大核心 2025年第5期1-11,共11页
The advent of parametric design has resulted in a marked increase in the complexity of building.Unfortunately,traditional construction methods make it difficult to meet the needs.Therefore,construction robots have bec... The advent of parametric design has resulted in a marked increase in the complexity of building.Unfortunately,traditional construction methods make it difficult to meet the needs.Therefore,construction robots have become a pivotal production tool in this context.Since the arm span of a single robot usually does not exceed 3 meters,it is not competent for producing large-scale building components.Accordingly,the extension of the robot,s working range is often achieved by external axes.Nevertheless,the coupling control of external axes and robots and their kinematic solution have become key challenges.The primary technical difficulties include customized construction robots,automatic solutions for external axes,fixed axis joints,and specific motion mode control.This paper proposes solutions to these difficulties,introduces the relevant basic concepts and algorithms in detail,and encapsulates these robotics principles and algorithm processes into the Grasshopper plug-in commonly used by architects to form the FURobot software platform.This platform effectively solves the above problems,lowers the threshold for architects,and improves production efficiency.The effectiveness of the algorithm and software in this paper is verified through simulation experiments. 展开更多
关键词 construction robots CUSTOMIZATION CONSTRUCTION ROBOTICS KINEMATICS software
在线阅读 下载PDF
Parallel Implementation of Radiation Hydrodynamics Coupled with Particle Transport on Software Infrastructure JASMIN
11
作者 REN Jian WEI Junxia CAO Xiaolin 《计算物理》 北大核心 2025年第5期608-618,共11页
In this work,we present a parallel implementation of radiation hydrodynamics coupled with particle transport,utilizing software infrastructure JASMIN(J Adaptive Structured Meshes applications INfrastructure)which enca... In this work,we present a parallel implementation of radiation hydrodynamics coupled with particle transport,utilizing software infrastructure JASMIN(J Adaptive Structured Meshes applications INfrastructure)which encapsulates high-performance technology for the numerical simulation of complex applications.Two serial codes,radiation hydrodynamics RH2D and particle transport Sn2D,have been integrated into RHSn2D on JASMIN infrastructure,which can efficiently use thousands of processors to simulate the complex multi-physics phenomena.Moreover,the non-conforming processors strategy has ensured RHSn2D against the serious load imbalance between radiation hydrodynamics and particle transport for large scale parallel simulations.Numerical results show that RHSn2D achieves a parallel efficiency of 17.1%using 90720 cells on 8192 processors compared with 256 processors in the same problem. 展开更多
关键词 processors strategy parallel performance radiation hydrodynamics particle transport multi-physics models software infrastructure
原文传递
A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering
12
作者 Dae-Kyoo Kim 《Computers, Materials & Continua》 2025年第8期2549-2572,共24页
Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints... Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints,notably the no-cloning theorem,which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography,secure communication,and error correction.While existing quantum circuit representations implicitly honor such constraints,they lack formal mechanisms for early-stage verification in software design.Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software.This paper presents a formal metamodeling framework using UML-style notation and and Object Constraint Language(OCL)to systematically capture and enforce the no-cloning theorem within quantum software models.The proposed metamodel formalizes key quantum concepts—such as entanglement and teleportation—and encodes enforceable invariants that reflect core quantum mechanical laws.The framework’s effectiveness is validated by analyzing two critical edge cases—conditional copying with CNOT gates and quantum teleportation—through instance model evaluations.These cases demonstrate that the metamodel can capture nuanced scenarios that are often mistaken as violations of the no-cloning theorem but are proven compliant under formal analysis.Thus,these serve as constructive validations that demonstrate the metamodel’s expressiveness and correctness in representing operations that may appear to challenge the no-cloning theorem but,upon rigorous analysis,are shown to comply with it.The approach supports early detection of conceptual design errors,promoting correctness prior to implementation.The framework’s extensibility is also demonstrated by modeling projective measurement,further reinforcing its applicability to broader quantum software engineering tasks.By integrating the rigor of metamodeling with fundamental quantum mechanical principles,this work provides a structured,model-driven approach that enables traditional software engineers to address quantum computing challenges.It offers practical insights into embedding quantum correctness at the modeling level and advances the development of reliable,error-resilient quantum software systems. 展开更多
关键词 METAMODELING no-cloning theorem quantum software software engineering
在线阅读 下载PDF
Software Defect Prediction Based on Semantic Views of Metrics:Clustering Analysis and Model Performance Analysis
13
作者 Baishun Zhou Haijiao Zhao +4 位作者 Yuxin Wen Gangyi Ding Ying Xing Xinyang Lin Lei Xiao 《Computers, Materials & Continua》 2025年第9期5201-5221,共21页
In recent years,with the rapid development of software systems,the continuous expansion of software scale and the increasing complexity of systems have led to the emergence of a growing number of software metrics.Defe... In recent years,with the rapid development of software systems,the continuous expansion of software scale and the increasing complexity of systems have led to the emergence of a growing number of software metrics.Defect prediction methods based on software metric elements highly rely on software metric data.However,redundant software metric data is not conducive to efficient defect prediction,posing severe challenges to current software defect prediction tasks.To address these issues,this paper focuses on the rational clustering of software metric data.Firstly,multiple software projects are evaluated to determine the preset number of clusters for software metrics,and various clustering methods are employed to cluster the metric elements.Subsequently,a co-occurrence matrix is designed to comprehensively quantify the number of times that metrics appear in the same category.Based on the comprehensive results,the software metric data are divided into two semantic views containing different metrics,thereby analyzing the semantic information behind the software metrics.On this basis,this paper also conducts an in-depth analysis of the impact of different semantic view of metrics on defect prediction results,as well as the performance of various classification models under these semantic views.Experiments show that the joint use of the two semantic views can significantly improve the performance of models in software defect prediction,providing a new understanding and approach at the semantic view level for defect prediction research based on software metrics. 展开更多
关键词 software defect prediction software engineering semantic views CLUSTERING INTERPRETABILITY
在线阅读 下载PDF
Large Language Models in Software Engineering Education: A Preliminary Study on Software Requirements Engineering Courses
14
作者 Feng Chen Shaomin Zhu +1 位作者 Xin Liu Ying Qian 《计算机教育》 2025年第3期24-33,共10页
The advent of large language models(LLMs)has made knowledge acquisition and content creation increasingly easier and cheaper,which in turn redefines learning and urges transformation in software engineering education.... The advent of large language models(LLMs)has made knowledge acquisition and content creation increasingly easier and cheaper,which in turn redefines learning and urges transformation in software engineering education.To do so,there is a need to understand the impact of LLMs on software engineering education.In this paper,we conducted a preliminary case study on three software requirements engineering classes where students are allowed to use LLMs to assist in their projects.Based on the students’experience,performance,and feedback from a survey conducted at the end of the courses,we characterized the challenges and benefits of applying LLMs in software engineering education.This research contributes to the ongoing discourse on the integration of LLMs in education,emphasizing both their prominent potential and the need for balanced,mindful usage. 展开更多
关键词 Large language models software engineering software requirements engineering EDUCATION
在线阅读 下载PDF
Portable Software Environment for Ultrahigh-Resolution ELM Development on GPUs
15
作者 Dali Wang Peter Schwartz +5 位作者 Fengming Yuan Franklin Eaglebarge Danial Riccuito Peter Thornton Chris Layton Qinglei Cao 《Journal of Computer and Communications》 2025年第2期28-36,共9页
This paper presents our endeavors in developing the large-scale, ultra-high-resolution E3SM Land Model (uELM), specifically designed for exascale computers furnished with accelerators such as Nvidia GPUs. The uELM is ... This paper presents our endeavors in developing the large-scale, ultra-high-resolution E3SM Land Model (uELM), specifically designed for exascale computers furnished with accelerators such as Nvidia GPUs. The uELM is a sophisticated code that substantially relies on High-Performance Computing (HPC) environments, necessitating particular machine and software configurations. To facilitate community-based uELM developments employing GPUs, we have created a portable, standalone software environment preconfigured with uELM input datasets, simulation cases, and source code. This environment, utilizing Docker, encompasses all essential code, libraries, and system software for uELM development on GPUs. It also features a functional unit test framework and an offline model testbed for comprehensive numerical experiments. From a technical perspective, the paper discusses GPU-ready container generations, uELM code management, and input data distribution across computational platforms. Lastly, the paper demonstrates the use of environment for functional unit testing, end-to-end simulation on CPUs and GPUs, and collaborative code development. 展开更多
关键词 E3SM Land Model Ultrahigh-Resolution ELM Portable software Environment GPU-Ready Environment
在线阅读 下载PDF
Interdisciplinary Education Paradigm:Exploration and Practice of the“Software Engineering+”Innovative Talent Cultivation Model
16
作者 Mingzheng Hou Binyu Yan +2 位作者 Mei Hong Yi Zhang Mao Li 《计算机教育》 2025年第3期62-70,共9页
To address the severe challenges posed by the international situation and meet the needs of the national major development strategies,the traditional software engineering talent cultivation model lacks interdisciplina... To address the severe challenges posed by the international situation and meet the needs of the national major development strategies,the traditional software engineering talent cultivation model lacks interdisciplinary education focused on specific fields,making it difficult to cultivate engineering leaders with multidisciplinary backgrounds who are capable of solving complex real-world problems.To solve this problem,based on the decade-long interdisciplinary talent cultivation achievements of the College of Software Engineering at Sichuan University,this article proposes the“Software Engineering+”innovative talent cultivation paradigm.It provides an analysis through professional construction of interdisciplinary talents,the design of talent cultivation frameworks,the formulation of cultivation plans,the establishment of interdisciplinary curriculum systems,the reform of teaching modes,and the improvement of institutional systems.Scientific solutions are proposed,and five project models implemented and operated by the College of Software Engineering at Sichuan University are listed as practical examples,offering significant reference value. 展开更多
关键词 software Engineering+ INTERDISCIPLINARY Talent cultivation Curriculum system
在线阅读 下载PDF
Exploration and Application of“Micro-practices”in Software Engineering Education
17
作者 Ben Wang Yimeng Wang +1 位作者 Chunyan Ma Jiangbin Zheng 《计算机教育》 2025年第3期103-110,共8页
With the rapid development of software engineering,traditional teaching methods are confronted with the challenges of short knowledge update cycles and the rapid emergence of new technologies.By analyzing the current ... With the rapid development of software engineering,traditional teaching methods are confronted with the challenges of short knowledge update cycles and the rapid emergence of new technologies.By analyzing the current situation of the mismatch between educational practices and industrial change,this study proposes an innovative teaching model—“Micro-practices”.This model integrates new knowledge and new technologies into the teaching process quickly and flexibly through practical teaching projects with“short class time,small capacity,and cloud environment”to meet the different educational needs of students,teachers,and enterprises.The aim is to train innovative software engineering talents who can meet the challenges of the future. 展开更多
关键词 Micro-practices software engineering Cloud environment Practical teaching
在线阅读 下载PDF
CAUM:A software for calculating and assessing chemical ages of uranium minerals
18
作者 Hao Song Tao Xiao +3 位作者 Guoxiang Chi Zexin Wang Zhengqi Xu Mingcai Hou 《Geoscience Frontiers》 2025年第3期183-192,共10页
It has been shown that the age of minerals in which U±Th are a major(e.g.,uraninite,pitchblende and thorite)or minor(e.g.,monazite,xenotime)component can be calculated from the concentrations of U±Th and Pb ... It has been shown that the age of minerals in which U±Th are a major(e.g.,uraninite,pitchblende and thorite)or minor(e.g.,monazite,xenotime)component can be calculated from the concentrations of U±Th and Pb rather than their isotopes,and such ages are referred to as chemical ages.Although equations for calculating the chemical ages have been well established and various computation programs have been reported,there is a lack of software that can not only calculate the chemical ages of individual analytical points but also provide an evaluation of the errors of individual ages as well as the whole dataset.In this paper,we develop a software for calculating and assessing the chemical ages of uranium minerals(CAUM),an open-source Python-based program with a friendly Graphical User Interface(GUI).Electron probe microanalysis(EPMA)data of uranium minerals are first imported from Excel files and used to calculate the chemical ages and associated errors of individual analytical points.The age data are then visualized to aid evaluating if the dataset comprises one or multiple populations and whether or not there are meaningful correlations between the chemical ages and impurities.Actions can then be taken to evaluate the errors within individual populations and the significance of the correlations.The use of the software is demonstrated with examples from published data. 展开更多
关键词 Chemical ages Uranium minerals EPMAU-Th-Pb geochronology software Python
在线阅读 下载PDF
SESDP:A Sentiment Analysis-Driven Approach for Enhancing Software Product Security by Identifying Defects through Social Media Reviews
19
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 2025年第4期1327-1345,共19页
Software defect prediction is a critical component in maintaining software quality,enabling early identification and resolution of issues that could lead to system failures and significant financial losses.With the in... Software defect prediction is a critical component in maintaining software quality,enabling early identification and resolution of issues that could lead to system failures and significant financial losses.With the increasing reliance on user-generated content,social media reviews have emerged as a valuable source of real-time feedback,offering insights into potential software defects that traditional testing methods may overlook.However,existing models face challenges like handling imbalanced data,high computational complexity,and insufficient inte-gration of contextual information from these reviews.To overcome these limitations,this paper introduces the SESDP(Sentiment Analysis-Based Early Software Defect Prediction)model.SESDP employs a Transformer-Based Multi-Task Learning approach using Robustly Optimized Bidirectional Encoder Representations from Transformers Approach(RoBERTa)to simultaneously perform sentiment analysis and defect prediction.By integrating text embedding extraction,sentiment score computation,and feature fusion,the model effectively captures both the contextual nuances and sentiment expressed in user reviews.Experimental results show that SESDP achieves superior performance with an accuracy of 96.37%,precision of 94.7%,and recall of 95.4%,particularly excelling in handling imbalanced datasets compared to baseline models.This approach offers a scalable and efficient solution for early software defect detection,enhancing proactive software quality assurance. 展开更多
关键词 software defect data balancing feature extraction RoBERTa transformer
在线阅读 下载PDF
Research on Visual Teaching of Analytic Geometry Based on GeoGebra Software
20
作者 Lianxia Jiang 《Journal of Contemporary Educational Research》 2025年第5期173-180,共8页
This paper delves into the visual teaching of analytic geometry facilitated by GeoGebra software.Through a meticulous analysis of the current landscape of analytic geometry instruction and the distinct advantages of G... This paper delves into the visual teaching of analytic geometry facilitated by GeoGebra software.Through a meticulous analysis of the current landscape of analytic geometry instruction and the distinct advantages of GeoGebra software,it expounds upon the imperative and feasibility of its application within the realm of analytic geometry teaching.Furthermore,it presents a detailed account of the teaching practice process grounded in this software,encompassing teaching design and the demonstration of teaching cases,and conducts an in-depth investigation and analysis of the teaching outcomes.The research findings indicate that the GeoGebra software can effectively elevate the level of visualization in analytic geometry teaching,thereby augmenting students’learning enthusiasm and comprehension capabilities.It thus offers novel perspectives and methodologies for the pedagogical reform of analytic geometry. 展开更多
关键词 GeoGebra software Analytic geometry Visual teaching
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部