The cenospheres/AZ91D composites were fabricated by melt stir method. The phases, microstructure and tensile fracture morphology of the composites were analyzed using XRD, Olympus metallurgical microscopy and SEM meth...The cenospheres/AZ91D composites were fabricated by melt stir method. The phases, microstructure and tensile fracture morphology of the composites were analyzed using XRD, Olympus metallurgical microscopy and SEM methods. The thermal expansion coefficient(CTE) and tensile properties were measured. The results showed that the cenospheres distribute uniformly in the Mg alloy matrix and refine the matrix microstructure. Mg2 Si and MgO were found in addition to α-Mg and β-Mg17Al12 phases using XRD. The CTE of the composites reduced after the cenospheres are added. The yield strength of the composites increases significantly with an increase in the mass fraction and a decrease in the size of the cenospheres. The tensile strength of the composites achieves maximum when the mass fraction of cenospheres is 9wt.% and the size of cenospheres is 80 μm. The fracture mechanism of the composites is cleavage fracture.展开更多
Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approac...Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approach for the detection of implicit information leaks in business process execution language(BPEL)based on information flow analysis.We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation and analysis.Building on the concept of Petri net place-based noninterference,the core contribution of this paper is the application of a Petri net reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in web service composition.In addition,a case study illustrates the application of the approach on a concrete workflow in BPEL notation.展开更多
Application programming interface(API)libraries are extensively used by developers.To correctly program with APIs and avoid bugs,developers shall pay attention to API directives,which illustrate the constraints of API...Application programming interface(API)libraries are extensively used by developers.To correctly program with APIs and avoid bugs,developers shall pay attention to API directives,which illustrate the constraints of APIs.Unfortunately,API directives usually have diverse morphologies,making it time-consuming and error-prone for developers to discover all the relevant API directives.In this paper,we propose an approach leveraging text classification to discover API directives from API specifications.Specifically,given a set of training sentences in API specifications,our approach first characterizes each sentence by three groups of features.Then,to deal with the unequal distribution between API directives and non-directives,our approach employs an under-sampling strategy to split the imbalanced training set into several subsets and trains several classifiers.Given a new sentence in an API specification,our approach synthesizes the trained classifiers to predict whether it is an API directive.We have evaluated our approach over a publicly available annotated API directive corpus.The experimental results reveal that our approach achieves an F-measure value of up to 82.08%.In addition,our approach statistically outperforms the state-of-the-art approach by up to 29.67%in terms of F-measure.展开更多
Traceability link recovery(TLR)is an important and costly software task that requires humans establish relationships between source and target artifact sets within the same project.Previous research has proposed to es...Traceability link recovery(TLR)is an important and costly software task that requires humans establish relationships between source and target artifact sets within the same project.Previous research has proposed to establish traceability links by machine learning approaches.However,current machine learning approaches cannot be well applied to projects without traceability information(links),because training an effective predictive model requires humans label too many traceability links.To save manpower,we propose a new TLR approach based on active learning(AL),which is called the AL-based approach.We evaluate the AL-based approach on seven commonly used traceability datasets and compare it with an information retrieval based approach and a state-ofthe-art machine learning approach.The results indicate that the AL-based approach outperforms the other two approaches in terms of F-score.展开更多
基金financially supported by the Natural Science Funds of Heilongjiang Province(No.E201467)Project for Science and Technology of Jiamusi University(No.Ljz2012-04)Project for Science and Technology of Education Department of Heilongjiang Province(No.12511535)
文摘The cenospheres/AZ91D composites were fabricated by melt stir method. The phases, microstructure and tensile fracture morphology of the composites were analyzed using XRD, Olympus metallurgical microscopy and SEM methods. The thermal expansion coefficient(CTE) and tensile properties were measured. The results showed that the cenospheres distribute uniformly in the Mg alloy matrix and refine the matrix microstructure. Mg2 Si and MgO were found in addition to α-Mg and β-Mg17Al12 phases using XRD. The CTE of the composites reduced after the cenospheres are added. The yield strength of the composites increases significantly with an increase in the mass fraction and a decrease in the size of the cenospheres. The tensile strength of the composites achieves maximum when the mass fraction of cenospheres is 9wt.% and the size of cenospheres is 80 μm. The fracture mechanism of the composites is cleavage fracture.
基金Project supported by the National High-Tech R&D Program(863)of China(No.2015AA015303)the National Natural Science Foundation of China(No.61272083)
文摘Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approach for the detection of implicit information leaks in business process execution language(BPEL)based on information flow analysis.We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation and analysis.Building on the concept of Petri net place-based noninterference,the core contribution of this paper is the application of a Petri net reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in web service composition.In addition,a case study illustrates the application of the approach on a concrete workflow in BPEL notation.
基金Project supported by the National Natural Science Foundation of China(Nos.61562087 and 61772270)the National High-Tech R&D Program(863)of China(No.2015AA015303)+2 种基金the Natural Science Foundation of Jiangsu Province,China(No.BK20130735)the Universities Natural Science Foundation of Jiangsu Province,China(No.13KJB520011)the Science Foundation of Nanjing Institute of Technology,China(No.YKJ201420)
基金the National Key Research and Development Plan of China under Grant No.2018YFB1003900the National Natural Science Foundation of China under Grant No.61902181,the China Postdoctoral Science Foundation under Grant No.2020M671489the CCF-Tencent Open Research Fund under Grant No.RAGR20200106.
文摘Application programming interface(API)libraries are extensively used by developers.To correctly program with APIs and avoid bugs,developers shall pay attention to API directives,which illustrate the constraints of APIs.Unfortunately,API directives usually have diverse morphologies,making it time-consuming and error-prone for developers to discover all the relevant API directives.In this paper,we propose an approach leveraging text classification to discover API directives from API specifications.Specifically,given a set of training sentences in API specifications,our approach first characterizes each sentence by three groups of features.Then,to deal with the unequal distribution between API directives and non-directives,our approach employs an under-sampling strategy to split the imbalanced training set into several subsets and trains several classifiers.Given a new sentence in an API specification,our approach synthesizes the trained classifiers to predict whether it is an API directive.We have evaluated our approach over a publicly available annotated API directive corpus.The experimental results reveal that our approach achieves an F-measure value of up to 82.08%.In addition,our approach statistically outperforms the state-of-the-art approach by up to 29.67%in terms of F-measure.
基金the National Natural Science Foundation of China(No.61772270)the National Key Research and Development Project of China(Nos.2016YFB1000802 and2018YFB1003902)the Funding of the Key Laboratory of Safety-Critical Software,China(No.1015-XCA1816403)。
文摘Traceability link recovery(TLR)is an important and costly software task that requires humans establish relationships between source and target artifact sets within the same project.Previous research has proposed to establish traceability links by machine learning approaches.However,current machine learning approaches cannot be well applied to projects without traceability information(links),because training an effective predictive model requires humans label too many traceability links.To save manpower,we propose a new TLR approach based on active learning(AL),which is called the AL-based approach.We evaluate the AL-based approach on seven commonly used traceability datasets and compare it with an information retrieval based approach and a state-ofthe-art machine learning approach.The results indicate that the AL-based approach outperforms the other two approaches in terms of F-score.