After describing the characteristics of programming paradigm, this paper introduces the approach of code component composition reuse in detail, proposes and discusses viewpoint that code component composition reuse is...After describing the characteristics of programming paradigm, this paper introduces the approach of code component composition reuse in detail, proposes and discusses viewpoint that code component composition reuse is a kind of new programming paradigm. This paper also specifies the characteristics of this new programming paradigm in detail, and points out some issues that must be resolved for using this new programming paradigm.展开更多
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of...The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates.展开更多
Code defects can lead to software vulnerability and even produce vulnerability risks.Existing research shows that the code detection technology with text analysis can judge whether object-oriented code files are defec...Code defects can lead to software vulnerability and even produce vulnerability risks.Existing research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to some extent.However,these detection techniques are mainly based on text features and have weak detection capabilities across programs.Compared with the uncertainty of the code and text caused by the developer’s personalization,the programming language has a stricter logical specification,which reflects the rules and requirements of the language itself and the developer’s potential way of thinking.This article replaces text analysis with programming logic modeling,breaks through the limitation of code text analysis solely relying on the probability of sentence/word occurrence in the code,and proposes an object-oriented language programming logic construction method based on method constraint relationships,selecting features through hypothesis testing ideas,and construct support vector machine classifier to detect class files with defects and reduce the impact of personalized programming on detection methods.In the experiment,some representative Android applications were selected to test and compare the proposed methods.In terms of the accuracy of code defect detection,through cross validation,the proposed method and the existing leading methods all reach an average of more than 90%.In the aspect of cross program detection,the method proposed in this paper is superior to the other two leading methods in accuracy,recall and F1 value.展开更多
In order to make most software engineers and managers pay more attention to software quality at source level, two confusing terms-coding standard and programming style-were reviewed and compared. An evolutionary model...In order to make most software engineers and managers pay more attention to software quality at source level, two confusing terms-coding standard and programming style-were reviewed and compared. An evolutionary model of quality assurance at source code level was proposed, which implies that coding standard should be better accepted and more emphasized than programming style. Our current researches on evaluating the compliance with coding standards will likely make the strategy of quality assurance at source code level more operable.展开更多
Water quality models are important tools to support the optimization of aquatic ecosystem rehabilitation programs and assess their efficiency. Basing on the flow conditions of the Daqinghe River Mouth of the Dianchi L...Water quality models are important tools to support the optimization of aquatic ecosystem rehabilitation programs and assess their efficiency. Basing on the flow conditions of the Daqinghe River Mouth of the Dianchi Lake, China, a two-dimensional water quality model was developed in the research. The hydrodynamics module was numerically solved by the alternating direction iteration (ADI) method. The parameters of the water quality module were obtained through the in situ experiments and the laboratory analyses that were conducted from 2006 to 2007. The model was calibrated and verified by the observation data in 2007. Among the four modelled key variables, i.e., water level, COD (in CODcr), NH4+-N and PO43-P the minimum value of the coefficient of determination (COD) was 0.69, indicating the model performed reasonably well. The developed model was then applied to simulate the water quality changes at a downstream cross-section assuming that the designed restoration programs were implemented. According to the simulated results, the restoration programs could cut down the loads of COD and PO43-P about 15%. Such a load reduction, unfortunately, would have very little effect on the NH4^+-N removal. Moreover, the water quality at the outlet cross-section would be still in class V (3838-02), indicating more measures should be taken to further reduce the loads. The study demonstrated the capability of water quality models to support aquatic ecosystem restorations.展开更多
Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λ...Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined.展开更多
Based on the semidefinite programming relaxation of the CDMA maximum likelihood multiuser detection problem, a detection strategy by the successive quadratic programming algorithm is presented. Coupled with the random...Based on the semidefinite programming relaxation of the CDMA maximum likelihood multiuser detection problem, a detection strategy by the successive quadratic programming algorithm is presented. Coupled with the randomized cut generation scheme, the suboptimal solution of the multiuser detection problem in obtained. Compared to the interior point methods previously reported based on semidefmite programming, simulations demonstrate that the successive quadratic programming algorithm often yields the similar BER performances of the multiuser detection problem. But the average CPU time of this approach is significantly reduced.展开更多
To relax convexity assumptions imposed on the functions in theorems on sufficient conditions and duality,new concepts of generalized dI-G-type Ⅰ invexity were introduced for nondifferentiable multiobjective programmi...To relax convexity assumptions imposed on the functions in theorems on sufficient conditions and duality,new concepts of generalized dI-G-type Ⅰ invexity were introduced for nondifferentiable multiobjective programming problems.Based upon these generalized invexity,G-Fritz-John (G-F-J) and G-Karnsh-Kuhn-Tucker (G-K-K-T) types sufficient optimality conditions were established for a feasible solution to be an efficient solution.Moreover,weak and strict duality results were derived for a G-Mond-Weir type dual under various types of generalized dI-G-type Ⅰ invexity assumptions.展开更多
为探索出适用于一流本科课程教学的实践方式,文章针对"微机原理"实验课程,提出基于Visual Studio Code的实验教学模式。新模式弥补了传统实验教学的不足,能有效增强学生编写代码的兴趣,满足个性化需求,提高编程效率,提升教学...为探索出适用于一流本科课程教学的实践方式,文章针对"微机原理"实验课程,提出基于Visual Studio Code的实验教学模式。新模式弥补了传统实验教学的不足,能有效增强学生编写代码的兴趣,满足个性化需求,提高编程效率,提升教学质量。文章从实验项目安排、编程软件安装和实验操作等方面多角度介绍新模式对实验教学的支撑作用,为软件编程方面的实验教学工作提供新思路,进一步推进先进信息技术与实验教学的深度融合。展开更多
近几年来二维条形码已成为最流行的技术之一,而 QR Code 又是其中应用最广泛的一种码型。然而,目前针对 QR Code 的应用大多使用的是承载信息量不太多的中低版本,而级别20以上的承载信息量较多的 QR Code 的研究和应用却很少见。笔...近几年来二维条形码已成为最流行的技术之一,而 QR Code 又是其中应用最广泛的一种码型。然而,目前针对 QR Code 的应用大多使用的是承载信息量不太多的中低版本,而级别20以上的承载信息量较多的 QR Code 的研究和应用却很少见。笔者针对程序设计语言及算法课程的教学,提出使用高版本 QR Code 图像对一定字符量的程序和算法代码进行编码存储并印刷在讲义或教材上,使学生在学习过程中可以使用智能手机拍摄和解析出 QR Code 图像中的算法代码,再以专用的代码展示和编辑软件进行彩色、高亮和结构化的演示,并可在浏览器中运行以查看动态的运行过程和结果。这种方式较传统的教材模式给学生学习带来了极大的方便,动态的运行也极大地提高了学习效率,增强了学习效果。展开更多
Decoding by alternating direction method of multipliers(ADMM) is a promising linear programming decoder for low-density parity-check(LDPC) codes. In this paper, we propose a two-step scheme to lower the error floor of...Decoding by alternating direction method of multipliers(ADMM) is a promising linear programming decoder for low-density parity-check(LDPC) codes. In this paper, we propose a two-step scheme to lower the error floor of LDPC codes with ADMM penalized decoder.For the undetected errors that cannot be avoided at the decoder side, we modify the code structure slightly to eliminate low-weight code words. For the detected errors induced by small error-prone structures, we propose a post-processing method for the ADMM penalized decoder. Simulation results show that the error floor can be reduced significantly over three illustrated LDPC codes by the proposed two-step scheme.展开更多
文摘After describing the characteristics of programming paradigm, this paper introduces the approach of code component composition reuse in detail, proposes and discusses viewpoint that code component composition reuse is a kind of new programming paradigm. This paper also specifies the characteristics of this new programming paradigm in detail, and points out some issues that must be resolved for using this new programming paradigm.
基金Supported by the National Science and Technology Support Program(Y2140161A5)the National High Technology Research and Development Program of China(863Program)(O812041A04)
文摘The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates.
基金This work was supported by National Key RD Program of China under Grant 2017YFB0802901.
文摘Code defects can lead to software vulnerability and even produce vulnerability risks.Existing research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to some extent.However,these detection techniques are mainly based on text features and have weak detection capabilities across programs.Compared with the uncertainty of the code and text caused by the developer’s personalization,the programming language has a stricter logical specification,which reflects the rules and requirements of the language itself and the developer’s potential way of thinking.This article replaces text analysis with programming logic modeling,breaks through the limitation of code text analysis solely relying on the probability of sentence/word occurrence in the code,and proposes an object-oriented language programming logic construction method based on method constraint relationships,selecting features through hypothesis testing ideas,and construct support vector machine classifier to detect class files with defects and reduce the impact of personalized programming on detection methods.In the experiment,some representative Android applications were selected to test and compare the proposed methods.In terms of the accuracy of code defect detection,through cross validation,the proposed method and the existing leading methods all reach an average of more than 90%.In the aspect of cross program detection,the method proposed in this paper is superior to the other two leading methods in accuracy,recall and F1 value.
文摘In order to make most software engineers and managers pay more attention to software quality at source level, two confusing terms-coding standard and programming style-were reviewed and compared. An evolutionary model of quality assurance at source code level was proposed, which implies that coding standard should be better accepted and more emphasized than programming style. Our current researches on evaluating the compliance with coding standards will likely make the strategy of quality assurance at source code level more operable.
基金supported by the National Hi-Tech Research and Development Program (863) of China (No.2007AA06A405, 2005AA6010100401)
文摘Water quality models are important tools to support the optimization of aquatic ecosystem rehabilitation programs and assess their efficiency. Basing on the flow conditions of the Daqinghe River Mouth of the Dianchi Lake, China, a two-dimensional water quality model was developed in the research. The hydrodynamics module was numerically solved by the alternating direction iteration (ADI) method. The parameters of the water quality module were obtained through the in situ experiments and the laboratory analyses that were conducted from 2006 to 2007. The model was calibrated and verified by the observation data in 2007. Among the four modelled key variables, i.e., water level, COD (in CODcr), NH4+-N and PO43-P the minimum value of the coefficient of determination (COD) was 0.69, indicating the model performed reasonably well. The developed model was then applied to simulate the water quality changes at a downstream cross-section assuming that the designed restoration programs were implemented. According to the simulated results, the restoration programs could cut down the loads of COD and PO43-P about 15%. Such a load reduction, unfortunately, would have very little effect on the NH4^+-N removal. Moreover, the water quality at the outlet cross-section would be still in class V (3838-02), indicating more measures should be taken to further reduce the loads. The study demonstrated the capability of water quality models to support aquatic ecosystem restorations.
基金Supported by the National Natural Science Foundation of China(61071221,10831002)
文摘Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined.
文摘Based on the semidefinite programming relaxation of the CDMA maximum likelihood multiuser detection problem, a detection strategy by the successive quadratic programming algorithm is presented. Coupled with the randomized cut generation scheme, the suboptimal solution of the multiuser detection problem in obtained. Compared to the interior point methods previously reported based on semidefmite programming, simulations demonstrate that the successive quadratic programming algorithm often yields the similar BER performances of the multiuser detection problem. But the average CPU time of this approach is significantly reduced.
基金National Natural Science Foundation of China(No.11071110)
文摘To relax convexity assumptions imposed on the functions in theorems on sufficient conditions and duality,new concepts of generalized dI-G-type Ⅰ invexity were introduced for nondifferentiable multiobjective programming problems.Based upon these generalized invexity,G-Fritz-John (G-F-J) and G-Karnsh-Kuhn-Tucker (G-K-K-T) types sufficient optimality conditions were established for a feasible solution to be an efficient solution.Moreover,weak and strict duality results were derived for a G-Mond-Weir type dual under various types of generalized dI-G-type Ⅰ invexity assumptions.
文摘为探索出适用于一流本科课程教学的实践方式,文章针对"微机原理"实验课程,提出基于Visual Studio Code的实验教学模式。新模式弥补了传统实验教学的不足,能有效增强学生编写代码的兴趣,满足个性化需求,提高编程效率,提升教学质量。文章从实验项目安排、编程软件安装和实验操作等方面多角度介绍新模式对实验教学的支撑作用,为软件编程方面的实验教学工作提供新思路,进一步推进先进信息技术与实验教学的深度融合。
文摘近几年来二维条形码已成为最流行的技术之一,而 QR Code 又是其中应用最广泛的一种码型。然而,目前针对 QR Code 的应用大多使用的是承载信息量不太多的中低版本,而级别20以上的承载信息量较多的 QR Code 的研究和应用却很少见。笔者针对程序设计语言及算法课程的教学,提出使用高版本 QR Code 图像对一定字符量的程序和算法代码进行编码存储并印刷在讲义或教材上,使学生在学习过程中可以使用智能手机拍摄和解析出 QR Code 图像中的算法代码,再以专用的代码展示和编辑软件进行彩色、高亮和结构化的演示,并可在浏览器中运行以查看动态的运行过程和结果。这种方式较传统的教材模式给学生学习带来了极大的方便,动态的运行也极大地提高了学习效率,增强了学习效果。
基金supported in part by National Nature Science Foundation of China under Grant No.61471286,No.61271004the Fundamental Research Funds for the Central Universitiesthe open research fund of Key Laboratory of Information Coding and Transmission,Southwest Jiaotong University(No.2010-03)
文摘Decoding by alternating direction method of multipliers(ADMM) is a promising linear programming decoder for low-density parity-check(LDPC) codes. In this paper, we propose a two-step scheme to lower the error floor of LDPC codes with ADMM penalized decoder.For the undetected errors that cannot be avoided at the decoder side, we modify the code structure slightly to eliminate low-weight code words. For the detected errors induced by small error-prone structures, we propose a post-processing method for the ADMM penalized decoder. Simulation results show that the error floor can be reduced significantly over three illustrated LDPC codes by the proposed two-step scheme.