Reusing code fragments by copying and pasting them with or without minor adaptation is a common activity in software development.As a result,software systems often contain sections of code that are very similar,called...Reusing code fragments by copying and pasting them with or without minor adaptation is a common activity in software development.As a result,software systems often contain sections of code that are very similar,called code clones.Code clones are beneficial in reducing software development costs and development risks.However,recent studies have indicated some negative impacts as a result.In order to effectively manage and utilize the clones,we design an approach for recommending refactoring clones based on a Bayesian network.Firstly,clone codes are detected from the source code.Secondly,the clones that need to be refactored are identified,and the static and evolutions features are extracted to build the feature database.Finally,the Bayesian network classifier is used for training and evaluating the classification results.Based on more than 640 refactor examples of five open source software developed in C,we observe a considerable enhancement.The results show that the accuracy of the approach is larger than 90%.We believe our approach will provide a more accurate and reasonable code refactoring and maintenance advice for software developers.展开更多
With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the us...With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user.However,the attackers also target this height of OSN utilization,explicitly creating the clones of the user’s account.Various clone detection mechanisms are designed based on social-network activities.For instance,monitoring the occur-rence of clone edges is done to restrict the generation of clone activities.However,this assumption is unsuitable for a real-time environment and works optimally during the simulation process.This research concentrates on modeling and effi-cient clone prediction and avoidance methods to help the social network activists and the victims enhance the clone prediction accuracy.This model does not rely on assumptions.Here,an ensemble Adaptive Random Subspace is used for clas-sifying the clone victims with k-Nearest Neighbour(k-NN)as a base classifier.The weighted clone nodes are analysed using the weighted graph theory concept based on the classified results.When the weighted node’s threshold value is high-er,the trust establishment is terminated,and the clones are ranked and sorted in the higher place for termination.Thus,the victims are alert to the clone propaga-tion over the online social networking end,and the validation is done using the MATLAB 2020a simulation environment.The model shows a better trade-off than existing approaches like Random Forest(RF),Naïve Bayes(NB),and the standard graph model.Various performance metrics like True Positive Rate(TPR),False Alarm Rate(FAR),Recall,Precision,F-measure,and ROC and run time analysis are evaluated to show the significance of the model.展开更多
Two quantum logic networks are proposed to simulate a cloning machine that copies the states near a given one. Probabilistie cloning based on the first network is realized and the cloning probability of success based ...Two quantum logic networks are proposed to simulate a cloning machine that copies the states near a given one. Probabilistie cloning based on the first network is realized and the cloning probability of success based on the second network is lOOe/0. Therefore, the second network is more motivative than the first one.展开更多
Establishing entanglement is an essential task of quantum communication technology.Beyond entanglement,quantum discord,as a measure of quantum correlation,is a necessary prerequisite to the success of entanglement dis...Establishing entanglement is an essential task of quantum communication technology.Beyond entanglement,quantum discord,as a measure of quantum correlation,is a necessary prerequisite to the success of entanglement distribution.To realize efficient quantum communication based on quantum discord,in this paper,we consider the practical advantages of continuous variables and propose a feasible continuous-variable quantum network coding scheme based on quantum discord.By means of entanglement distribution by separable states,it can achieve quantum entanglement distribution from sources to targets in a butterfly network.Compared with the representative discrete-variable quantum network coding schemes,the proposed continuous-variable quantum network coding scheme has a higher probability of entanglement distribution and defends against eavesdropping and forgery attacks.Particularly,the deduced relationship indicates that the increase in entanglement is less than or equal to quantum discord.展开更多
This paper presents a quantum network to implement the optimal 1→2 quantum cloning in 2 dimensions, including the optimal asymmetric universal, the optimal symmetric phase-covariant, and the asymmetric real state clo...This paper presents a quantum network to implement the optimal 1→2 quantum cloning in 2 dimensions, including the optimal asymmetric universal, the optimal symmetric phase-covariant, and the asymmetric real state cloning. By only choosing different angles of the single-qubit rotations, the quantum network can implement three optimal quantum cloning.展开更多
We construct efficient quantum logic network for probabilistic cloning the quantum states used in imple mented tasks for which cloning provides some enhancement in performance.
基金This work was supported by the National Natural Science Foundation(61363017)of China.The author is Liu,D.S.and the website is https://isisn.nsfc.gov.cn.
文摘Reusing code fragments by copying and pasting them with or without minor adaptation is a common activity in software development.As a result,software systems often contain sections of code that are very similar,called code clones.Code clones are beneficial in reducing software development costs and development risks.However,recent studies have indicated some negative impacts as a result.In order to effectively manage and utilize the clones,we design an approach for recommending refactoring clones based on a Bayesian network.Firstly,clone codes are detected from the source code.Secondly,the clones that need to be refactored are identified,and the static and evolutions features are extracted to build the feature database.Finally,the Bayesian network classifier is used for training and evaluating the classification results.Based on more than 640 refactor examples of five open source software developed in C,we observe a considerable enhancement.The results show that the accuracy of the approach is larger than 90%.We believe our approach will provide a more accurate and reasonable code refactoring and maintenance advice for software developers.
文摘With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user.However,the attackers also target this height of OSN utilization,explicitly creating the clones of the user’s account.Various clone detection mechanisms are designed based on social-network activities.For instance,monitoring the occur-rence of clone edges is done to restrict the generation of clone activities.However,this assumption is unsuitable for a real-time environment and works optimally during the simulation process.This research concentrates on modeling and effi-cient clone prediction and avoidance methods to help the social network activists and the victims enhance the clone prediction accuracy.This model does not rely on assumptions.Here,an ensemble Adaptive Random Subspace is used for clas-sifying the clone victims with k-Nearest Neighbour(k-NN)as a base classifier.The weighted clone nodes are analysed using the weighted graph theory concept based on the classified results.When the weighted node’s threshold value is high-er,the trust establishment is terminated,and the clones are ranked and sorted in the higher place for termination.Thus,the victims are alert to the clone propaga-tion over the online social networking end,and the validation is done using the MATLAB 2020a simulation environment.The model shows a better trade-off than existing approaches like Random Forest(RF),Naïve Bayes(NB),and the standard graph model.Various performance metrics like True Positive Rate(TPR),False Alarm Rate(FAR),Recall,Precision,F-measure,and ROC and run time analysis are evaluated to show the significance of the model.
文摘Two quantum logic networks are proposed to simulate a cloning machine that copies the states near a given one. Probabilistie cloning based on the first network is realized and the cloning probability of success based on the second network is lOOe/0. Therefore, the second network is more motivative than the first one.
基金This project is supported by the National Natural Science Foundation of China(No.61571024,No.61971021)Aeronautical Science Foundation of China(No.2018ZC51016)the National Key Research and Development Program of China(No.2016YFC1000307)for valuable helps.
文摘Establishing entanglement is an essential task of quantum communication technology.Beyond entanglement,quantum discord,as a measure of quantum correlation,is a necessary prerequisite to the success of entanglement distribution.To realize efficient quantum communication based on quantum discord,in this paper,we consider the practical advantages of continuous variables and propose a feasible continuous-variable quantum network coding scheme based on quantum discord.By means of entanglement distribution by separable states,it can achieve quantum entanglement distribution from sources to targets in a butterfly network.Compared with the representative discrete-variable quantum network coding schemes,the proposed continuous-variable quantum network coding scheme has a higher probability of entanglement distribution and defends against eavesdropping and forgery attacks.Particularly,the deduced relationship indicates that the increase in entanglement is less than or equal to quantum discord.
基金supported by the National Natural Science Foundation of China (Grant No 10674001)also by the Program of the Education Department of Anhui Province (Grant No KJ2007A002)
文摘This paper presents a quantum network to implement the optimal 1→2 quantum cloning in 2 dimensions, including the optimal asymmetric universal, the optimal symmetric phase-covariant, and the asymmetric real state cloning. By only choosing different angles of the single-qubit rotations, the quantum network can implement three optimal quantum cloning.
文摘We construct efficient quantum logic network for probabilistic cloning the quantum states used in imple mented tasks for which cloning provides some enhancement in performance.