Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from l...Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from low to high. So how people can evaluate OSS and ensta-e that it is reliable for use becomes necessary. This paper proposes a set of reliability evaluation metrics considering the states of OSS selected in the early stage. Understandability, Fault tolerance & Recoverability and Community Matmrity as sub-attributes of reliability are defined, and then several evaluation criteria for each of them are identified. A process of reliability evaluation in our study is proposed. For application, we select four OSS projects and evaluate them with our metrics. As a result of compadrison with other evaluation model for OSS, our research presents an easy, effective and trustworthy way for selecting a reliable OSS.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
Objective:The aim of our study was to investigate the lymph node metastasis of mesorectum and ischiorectal foss in ultra-low rectal cancer and its influence on the surgical procedure selection.Methods:Large slices and...Objective:The aim of our study was to investigate the lymph node metastasis of mesorectum and ischiorectal foss in ultra-low rectal cancer and its influence on the surgical procedure selection.Methods:Large slices and tissue microarray technology were used to detect metastasis lymph nodes from 23 dissected specimens of ultra-low rectal cancer.Results:415 lymph nodes were detected in the 23 specimens.169 and 59 lymph nodes were metastasis and micrometastasis, respectively.Twelve specimens were diagnosed with lymph node metastasis, while other 4 specimens were with lymph node micro-metastasis.There were 29.0% (49/169) and 17.2% (29/169) metastatic lymph nodes located in the outer and anterior region of mesorectum.There were 2 cases with ischiorectal fossa lymph node metastasis and 1 case with micrometastasis.The 3 metastatic cases were only 13% (13/23) of all the 23 cases.Conclusion:There is regional lymph node metastasis existing in ultra-low rectal cancer.The metastatic incidences in distal mesorectum and ischiorectal fossa are relatively low.Considering Miles operation as the standard surgical procedure for ultra-low rectal cancer should be evaluated renewedly.展开更多
Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require fur...Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require further attention. In this study, we explored the utility of network measures in high severity faultproneness prediction. We constructed software source code networks for four open-source projects by extracting the dependencies between modules. We then used univariate logistic regression to investigate the associations between each network measure and fault-proneness at a high severity level. We built multivariate prediction models to examine their explanatory ability for fault-proneness, as well as evaluated their predictive effectiveness compared to code metrics under forward-release and cross-project predictions. The results revealed the following:(1) most network measures are significantly related to high severity fault-proneness;(2) network measures generally have comparable explanatory abilities and predictive powers to those of code metrics; and(3) network measures are very unstable for cross-project predictions. These results indicate that network measures are of practical value in high severity fault-proneness prediction.展开更多
文摘Recently, Open Source Software (OSS) is so widely used not only by companies for development but also by common users instead of commercial software. However, the number of OSS is vast, and its quality varies from low to high. So how people can evaluate OSS and ensta-e that it is reliable for use becomes necessary. This paper proposes a set of reliability evaluation metrics considering the states of OSS selected in the early stage. Understandability, Fault tolerance & Recoverability and Community Matmrity as sub-attributes of reliability are defined, and then several evaluation criteria for each of them are identified. A process of reliability evaluation in our study is proposed. For application, we select four OSS projects and evaluate them with our metrics. As a result of compadrison with other evaluation model for OSS, our research presents an easy, effective and trustworthy way for selecting a reliable OSS.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
文摘Objective:The aim of our study was to investigate the lymph node metastasis of mesorectum and ischiorectal foss in ultra-low rectal cancer and its influence on the surgical procedure selection.Methods:Large slices and tissue microarray technology were used to detect metastasis lymph nodes from 23 dissected specimens of ultra-low rectal cancer.Results:415 lymph nodes were detected in the 23 specimens.169 and 59 lymph nodes were metastasis and micrometastasis, respectively.Twelve specimens were diagnosed with lymph node metastasis, while other 4 specimens were with lymph node micro-metastasis.There were 29.0% (49/169) and 17.2% (29/169) metastatic lymph nodes located in the outer and anterior region of mesorectum.There were 2 cases with ischiorectal fossa lymph node metastasis and 1 case with micrometastasis.The 3 metastatic cases were only 13% (13/23) of all the 23 cases.Conclusion:There is regional lymph node metastasis existing in ultra-low rectal cancer.The metastatic incidences in distal mesorectum and ischiorectal fossa are relatively low.Considering Miles operation as the standard surgical procedure for ultra-low rectal cancer should be evaluated renewedly.
基金supported by National Natural Science Foundation of China (Grant Nos. 61472175, 61472178, 61272082, 61272080, 91418202)Natural Science Foundation of Jiangsu Province (Grant No. BK20130014)Natural Science Foundation of Colleges in Jiangsu Province (Grant No. 13KJB520018)
文摘Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require further attention. In this study, we explored the utility of network measures in high severity faultproneness prediction. We constructed software source code networks for four open-source projects by extracting the dependencies between modules. We then used univariate logistic regression to investigate the associations between each network measure and fault-proneness at a high severity level. We built multivariate prediction models to examine their explanatory ability for fault-proneness, as well as evaluated their predictive effectiveness compared to code metrics under forward-release and cross-project predictions. The results revealed the following:(1) most network measures are significantly related to high severity fault-proneness;(2) network measures generally have comparable explanatory abilities and predictive powers to those of code metrics; and(3) network measures are very unstable for cross-project predictions. These results indicate that network measures are of practical value in high severity fault-proneness prediction.