詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "MyBatis"
4件中 1-4の結果を表示しています
  • HanYu ZHANG, Tomoji KISHI
    IEICE Transactions on Information and Systems
    2024年 E107.D 巻 9 号 1140-1150
    発行日: 2024/09/01
    公開日: 2024/09/01
    ジャーナル フリー

    Software refactoring is an important process in software development. During software refactoring, code smell is a popular research topic that refers to design or implementation flaws in the software. Large class is one of the most concerning code smells in software refactoring. Detecting and refactoring such problem has a profound impact on software quality. In past years, software metrics and clustering techniques have commonly been used for the large class detection. However, deep-learning-based approaches have also received considerable attention in recent studies. In this study, we apply graph neural networks (GNNs), an important division of deep learning, to address the problem of large class detection. First, to support the extensive data requirements of the deep learning task, we apply a semiautomatic approach to generate a substantial number of data samples. Next, we design a new type of directed heterogeneous graph (DHG) as an input graph using the methods similarity matrix and software metrics. We construct an input graph for each class sample and make the graph classification with GNNs to identify the smelly classes. In our experiments, we apply three typical GNN model architectures for large class detection and compare the results with those of previous studies. The results show that the proposed approach can achieve more accurate and stable detection performance.

  • HanYu Zhang, Tomoji Kishi
    Journal of Information Processing
    2023年 31 巻 469-477
    発行日: 2023年
    公開日: 2023/08/15
    ジャーナル フリー

    Long Method is a code smell that frequently happens in software development, which refers to the complex method with multiple functions. Detecting and refactoring such problems has been a popular topic in software refactoring, and many detection approaches have been proposed. In past years, the approaches based on metrics or rules have been the leading way in long method detection. However, the approach based on deep learning has also attracted extensive attention in recent studies. In this paper, we propose a graph-based deep learning approach to detect Long Method. The key point of our approach is that we extended the PDG (Program Dependency Graph) into a Directed-Heterogeneous Graph as the input graph and used the GCN (Graph Convolutional Network) to build a graph neural network for Long Method detection. Moreover, to get substantial data samples for the deep learning task, we propose a novel semi-automatic approach to generate a large number of data samples. Finally, to prove the validity of our approach, we compared our approach with the existing approaches based on five groups of datasets manually reviewed. The evaluation result shows that our approach achieved a good performance in Long Method detection.

  • *夏 威夷, 齋藤 豪
    画像電子学会研究会講演予稿
    2023年 22.04 巻 22-04-69
    発行日: 2023年
    公開日: 2024/01/31
    会議録・要旨集 認証あり
    現在のアニメーション制作において、海外では 3DCG によるコンピュータ上で行うフルデジタル制作が主流である一方、日本ではセルアニメ由来の手描きアニメを含む日本独自の制作手法が採られている。そのため、各作業を工程やカットごとに分担し、連携する作業間の伝達におけるデータ管理を円滑に行う意義は大きい。本稿は、日本アニメーション制作過程に適したオンラインデータ伝達と蓄積を行える制作補助システムの取り込みについて報告する。
  • Chao Wang, Jiahan Dong, Guangxin Guo, Bowen Li, Tianyu Ren
    Journal of Advanced Computational Intelligence and Intelligent Informatics
    2024年 28 巻 1 号 141-149
    発行日: 2024/01/20
    公開日: 2024/01/20
    ジャーナル オープンアクセス

    With the rapid development of Internet technology and its application, the existence of network vulnerabilities is very common. Attackers may use the defects of software, hardware, or system security policy in the network system to access or destroy the system without authorization. How to nip in the bud and carry out a safety risk assessment and early warning is an urgent problem to be solved. Based on the overall assessment of the risk factors in the whole network, the more dangerous nodes are found and priority measures are taken. The method proposed in this paper can reflect and predict the actions of attackers, repair, and adjust the previously predicted probability. It is compared with the method that evaluates the uncertainty in the network solely by calculating the static probability. The proposed new ideas and methods better reflect the real-time changes in the actual environment of the Internet, thereby better responding to the actual situation. This method can be well applied to threat detection, threat analysis, and risk assessment of monitoring system networks, enabling monitoring network managers to evaluate and protect the security of real-time power grids. It is of great significance to effectively defend against network attacks, ensure system security, and study the resistance of control systems under network attacks.

feedback
Top