The existing software bug localization models treat the source file as natural language, which leads to the loss of syntactical and structure information of the source file. A bug localization model based on syntactic...The existing software bug localization models treat the source file as natural language, which leads to the loss of syntactical and structure information of the source file. A bug localization model based on syntactical and semantic information of source code is proposed. Firstly, abstract syntax tree(AST) is divided based on node category to obtain statement sequence. The statement tree is encoded into vectors to capture lexical and syntactical knowledge at the statement level.Secondly, the source code is transformed into vector representation by the sequence naturalness of the statement. Therefore,the problem of gradient vanishing and explosion caused by a large AST size is obviated when using AST to the represent source code. Finally, the correlation between bug reports and source files are comprehensively analyzed from three aspects of syntax, semantics and text to locate the buggy code. Experiments show that compared with other standard models, the proposed model improves the performance of bug localization, and it has good advantages in mean reciprocal rank(MRR), mean average precision(MAP) and Top N Rank.展开更多
In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth...In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth regenerating(MBR) codes, are mainly to repair one single or several failed nodes, unable to meet the repair need of distributed cloud storage systems. In this paper, we present locally minimum storage regenerating(LMSR) codes to recover multiple failed nodes at the same time. Specifically, the nodes in distributed cloud storage systems are divided into multiple local groups, and in each local group(4, 2) or(5, 3) MSR codes are constructed. Moreover, the grouping method of storage nodes and the repairing process of failed nodes in local groups are studied. Theoretical analysis shows that LMSR codes can achieve the same storage overhead as MSR codes. Furthermore, we verify by means of simulation that, compared with MSR codes, LMSR codes can reduce the repair bandwidth and disk I/O overhead effectively.展开更多
In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probab...In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probabilities of successful impersonation and substitution attack under the hypothesis that the cecoding rules are chosen according to a uniform probability distribution.展开更多
A novel coding based method named as local binary orientation code (LBOCode) for palmprint recognition is proposed. The palmprint image is firstly convolved with a bank of Gabor filters, and then the orientation inf...A novel coding based method named as local binary orientation code (LBOCode) for palmprint recognition is proposed. The palmprint image is firstly convolved with a bank of Gabor filters, and then the orientation information is attained with a winner-take-all rule. Subsequently, the resulting orientation mapping array is operated by uniform local binary pattern. Accordingly, LBOCode image is achieved which contains palmprint orientation information in pixel level. Further we divide the LBOCode image into several equal-size and nonoverlapping regions, and extract the statistical code histogram from each region independently, which builds a global description of palmprint in regional level. In matching stage, the matching score between two palmprints is achieved by calculating the two spatial enhanced histograms' dissimilarity, which brings the benefit of computational simplicity. Experimental results demonstrate that the proposed method achieves more promising recognition performance compared with that of several state-of-the-art methods.展开更多
The schemes and effects of electronically jamming GPS’s C/A code receivers are studied by using CW as the narrow band jamming signal and BPSK signal modulated by Gold code which is incoherent to that adopted by GPS ...The schemes and effects of electronically jamming GPS’s C/A code receivers are studied by using CW as the narrow band jamming signal and BPSK signal modulated by Gold code which is incoherent to that adopted by GPS as the wide band one. By simulating with Monte Carlo method and programming in Matlab language, the various jamming results in terms of bit error rate under several jamming scenarios are obtained. Through analyzing the simulation results and quantitative dependences of jamming effects on the distance from jammer to GPS receiver and the jammer’s height over ground, it is concluded that jamming with wide band jammer is much more effective than that with narrow band one.展开更多
A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman'...A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman' s code. Symbolic string matching technique is applied to establish a correspondence between the two consecutive contours. The surface is composed of the pieces reconstructed from the correspondence points. Experimental results show that the proposed method exhibits a good behavior for the quality of surface reconstruction and its time complexity is proportional to mn where m and n are the numbers of vertices of the two consecutive slices, respectively.展开更多
In this article, we focus on cyclic and negacyclic codes of length 2p^s over the ring R = Fp^m + uFp^m, where p is an odd prime. On the basis of the works of Dinh (in J.Algebra 324,940-950,2010), we use the Chinese...In this article, we focus on cyclic and negacyclic codes of length 2p^s over the ring R = Fp^m + uFp^m, where p is an odd prime. On the basis of the works of Dinh (in J.Algebra 324,940-950,2010), we use the Chinese Remainder Theorem to establish the algebraic structure of cyclic and negacyclic codes of length 2p^s over the ring Fp^m + uFp^m in terms of polynomial generators. Furthermore, we obtain the number of codewords in each of those cyclic and negacyclic codes.展开更多
In this paper a label-based simultaneous localization and mapping( SLAM) system is proposed to provide localization to indoor autonomous robots. In the system quick response( QR) codes encoded with serial numbers ...In this paper a label-based simultaneous localization and mapping( SLAM) system is proposed to provide localization to indoor autonomous robots. In the system quick response( QR) codes encoded with serial numbers are utilized as labels. These labels are captured by two webcams,then the distances and angles between the labels and webcams are computed. Motion estimated from the two rear wheel encoders is adjusted by observing QR codes. Our system uses the extended Kalman filter( EKF) for the back-end state estimation. The number of deployed labels controls the state estimation dimension. The label-based EKF-SLAM system eliminates complicated processes,such as data association and loop closure detection in traditional feature-based visual SLAM systems. Our experiments include software-simulation and robot-platform test in a real environment. Results demonstrate that the system has the capability of correcting accumulated errors of dead reckoning and therefore has the advantage of superior precision.展开更多
Despite advances in the management of patients with locally advanced, non-metastatic rectal adenocarcinoma (LARC), prognosis remains largely unsatisfactory due to a high rate of distant relapse. In fact, currently ava...Despite advances in the management of patients with locally advanced, non-metastatic rectal adenocarcinoma (LARC), prognosis remains largely unsatisfactory due to a high rate of distant relapse. In fact, currently available neoadjuvant protocols, represented by fluoropyrimidine-based chemo-radiotherapy (CT-RT) or short-course RT, together with improved surgical techniques, have largely reduced the risk of local relapse, with limited impact on distant recurrence. Available results of phase III trials with additional cytotoxic agents combined with standard CT-RT are disappointing, as no significant reduction in the risk of recurrence has been demonstrated. In order to improve the control of micrometastatic disease, integrating targeted agents into neoadjuvant treatment protocols thus offers a rational approach. In particular, the antiangiogenic agent bevacizumab has demonstrated synergistic activity with both CT and RT in pre-clinical and clinical models, and thus may represent a suitable companion in the neoadjuvant treatment of LARC. Preliminary results of phase I-II clinical studies are promising and suggest potential clinical parameters and molecular predictive biomarkers useful for patient selection: treatment personalization is indeed the key in order to maximize the benefit while reducing the risk of more complex neoadjuvant treatment schedules.展开更多
A new code concept is used for the L1 civil(L1C) signal of the global positioning system(GPS).The generation of L1C codes is quite different from the generation of traditional ranging codes.Thus,it is necessary to...A new code concept is used for the L1 civil(L1C) signal of the global positioning system(GPS).The generation of L1C codes is quite different from the generation of traditional ranging codes.Thus,it is necessary to find a method for the correct generation to pave the way for future research.L1C codes are based on only one Legendre sequence which consists of Legendre symbols.To calculate these Legendre symbols,the Euler criterion is always used to evaluate quadratic residues.However,due to the great length of L1C codes,this procedure causes overflow problems.Therefore,the quadratic reciprocity law,some related theorems and properties are introduced to solve the problems.Moreover,if the quadratic reciprocity law,some related theorems and properties are used to calculate different Legendre symbols,the combination modes may vary,which causes a complex generation process.The proposed generation method deals with this complex generation process effectively.In addition,through simulations,it is found that the autocorrelation features of obtained Legendre sequences and L1C codes are in accordance with theoretical results,which proves the correctness of the proposed method.展开更多
基金supported by the National Key R&D Program of China (2018YFB1702700)。
文摘The existing software bug localization models treat the source file as natural language, which leads to the loss of syntactical and structure information of the source file. A bug localization model based on syntactical and semantic information of source code is proposed. Firstly, abstract syntax tree(AST) is divided based on node category to obtain statement sequence. The statement tree is encoded into vectors to capture lexical and syntactical knowledge at the statement level.Secondly, the source code is transformed into vector representation by the sequence naturalness of the statement. Therefore,the problem of gradient vanishing and explosion caused by a large AST size is obviated when using AST to the represent source code. Finally, the correlation between bug reports and source files are comprehensively analyzed from three aspects of syntax, semantics and text to locate the buggy code. Experiments show that compared with other standard models, the proposed model improves the performance of bug localization, and it has good advantages in mean reciprocal rank(MRR), mean average precision(MAP) and Top N Rank.
基金supported in part by the National Natural Science Foundation of China (61640006, 61572188)the Natural Science Foundation of Shaanxi Province, China (2015JM6307, 2016JQ6011)the project of science and technology of Xi’an City (2017088CG/RC051(CADX002))
文摘In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth regenerating(MBR) codes, are mainly to repair one single or several failed nodes, unable to meet the repair need of distributed cloud storage systems. In this paper, we present locally minimum storage regenerating(LMSR) codes to recover multiple failed nodes at the same time. Specifically, the nodes in distributed cloud storage systems are divided into multiple local groups, and in each local group(4, 2) or(5, 3) MSR codes are constructed. Moreover, the grouping method of storage nodes and the repairing process of failed nodes in local groups are studied. Theoretical analysis shows that LMSR codes can achieve the same storage overhead as MSR codes. Furthermore, we verify by means of simulation that, compared with MSR codes, LMSR codes can reduce the repair bandwidth and disk I/O overhead effectively.
基金Foundation item:The Key Project(03060)of Chinese Ministry of Education.
文摘In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probabilities of successful impersonation and substitution attack under the hypothesis that the cecoding rules are chosen according to a uniform probability distribution.
基金supported partly by the National Grand Fundamental Research 973 Program of China under Grant No. 2004CB318005the Doctoral Candidate Outstanding Innovation Foundation under Grant No.141092522the Fundamental Research Funds under Grant No.2009YJS025
文摘A novel coding based method named as local binary orientation code (LBOCode) for palmprint recognition is proposed. The palmprint image is firstly convolved with a bank of Gabor filters, and then the orientation information is attained with a winner-take-all rule. Subsequently, the resulting orientation mapping array is operated by uniform local binary pattern. Accordingly, LBOCode image is achieved which contains palmprint orientation information in pixel level. Further we divide the LBOCode image into several equal-size and nonoverlapping regions, and extract the statistical code histogram from each region independently, which builds a global description of palmprint in regional level. In matching stage, the matching score between two palmprints is achieved by calculating the two spatial enhanced histograms' dissimilarity, which brings the benefit of computational simplicity. Experimental results demonstrate that the proposed method achieves more promising recognition performance compared with that of several state-of-the-art methods.
文摘The schemes and effects of electronically jamming GPS’s C/A code receivers are studied by using CW as the narrow band jamming signal and BPSK signal modulated by Gold code which is incoherent to that adopted by GPS as the wide band one. By simulating with Monte Carlo method and programming in Matlab language, the various jamming results in terms of bit error rate under several jamming scenarios are obtained. Through analyzing the simulation results and quantitative dependences of jamming effects on the distance from jammer to GPS receiver and the jammer’s height over ground, it is concluded that jamming with wide band jammer is much more effective than that with narrow band one.
文摘A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman' s code. Symbolic string matching technique is applied to establish a correspondence between the two consecutive contours. The surface is composed of the pieces reconstructed from the correspondence points. Experimental results show that the proposed method exhibits a good behavior for the quality of surface reconstruction and its time complexity is proportional to mn where m and n are the numbers of vertices of the two consecutive slices, respectively.
基金supported by the Natural ScienceFoundation of Hubei Province(D2014401)the Natural Science Foundation of Hubei Polytechnic University(12xjz14A)
文摘In this article, we focus on cyclic and negacyclic codes of length 2p^s over the ring R = Fp^m + uFp^m, where p is an odd prime. On the basis of the works of Dinh (in J.Algebra 324,940-950,2010), we use the Chinese Remainder Theorem to establish the algebraic structure of cyclic and negacyclic codes of length 2p^s over the ring Fp^m + uFp^m in terms of polynomial generators. Furthermore, we obtain the number of codewords in each of those cyclic and negacyclic codes.
基金Supported by Program for Changjiang Scholars and Innovative Research Team in University,National Science Foundation of China(61105092)the National Natural Science Foundation of China(61473042)
文摘In this paper a label-based simultaneous localization and mapping( SLAM) system is proposed to provide localization to indoor autonomous robots. In the system quick response( QR) codes encoded with serial numbers are utilized as labels. These labels are captured by two webcams,then the distances and angles between the labels and webcams are computed. Motion estimated from the two rear wheel encoders is adjusted by observing QR codes. Our system uses the extended Kalman filter( EKF) for the back-end state estimation. The number of deployed labels controls the state estimation dimension. The label-based EKF-SLAM system eliminates complicated processes,such as data association and loop closure detection in traditional feature-based visual SLAM systems. Our experiments include software-simulation and robot-platform test in a real environment. Results demonstrate that the system has the capability of correcting accumulated errors of dead reckoning and therefore has the advantage of superior precision.
文摘Despite advances in the management of patients with locally advanced, non-metastatic rectal adenocarcinoma (LARC), prognosis remains largely unsatisfactory due to a high rate of distant relapse. In fact, currently available neoadjuvant protocols, represented by fluoropyrimidine-based chemo-radiotherapy (CT-RT) or short-course RT, together with improved surgical techniques, have largely reduced the risk of local relapse, with limited impact on distant recurrence. Available results of phase III trials with additional cytotoxic agents combined with standard CT-RT are disappointing, as no significant reduction in the risk of recurrence has been demonstrated. In order to improve the control of micrometastatic disease, integrating targeted agents into neoadjuvant treatment protocols thus offers a rational approach. In particular, the antiangiogenic agent bevacizumab has demonstrated synergistic activity with both CT and RT in pre-clinical and clinical models, and thus may represent a suitable companion in the neoadjuvant treatment of LARC. Preliminary results of phase I-II clinical studies are promising and suggest potential clinical parameters and molecular predictive biomarkers useful for patient selection: treatment personalization is indeed the key in order to maximize the benefit while reducing the risk of more complex neoadjuvant treatment schedules.
基金supported by the National High Technology Research and Development Program of China(863Program)(2011AA110101)the National Basic Research Program of China(973Program)(2009CB724002)
文摘A new code concept is used for the L1 civil(L1C) signal of the global positioning system(GPS).The generation of L1C codes is quite different from the generation of traditional ranging codes.Thus,it is necessary to find a method for the correct generation to pave the way for future research.L1C codes are based on only one Legendre sequence which consists of Legendre symbols.To calculate these Legendre symbols,the Euler criterion is always used to evaluate quadratic residues.However,due to the great length of L1C codes,this procedure causes overflow problems.Therefore,the quadratic reciprocity law,some related theorems and properties are introduced to solve the problems.Moreover,if the quadratic reciprocity law,some related theorems and properties are used to calculate different Legendre symbols,the combination modes may vary,which causes a complex generation process.The proposed generation method deals with this complex generation process effectively.In addition,through simulations,it is found that the autocorrelation features of obtained Legendre sequences and L1C codes are in accordance with theoretical results,which proves the correctness of the proposed method.