The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re...The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.展开更多
Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured...Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured feedback.The key challenge lies in transforming abstract user needs into specific ones,requiring integration and analysis.Therefore,we propose a topic mining-based approach to categorize,summarize,and rank product requirements from user stories.Specifically,after determining the number of story categories based on py LDAvis,we initially classify“I want to”phrases within user stories.Subsequently,classic topic models are applied to each category to generate their names,defining each post-classification user story category as a requirement.Furthermore,a weighted ranking function is devised to calculate the importance of each requirement.Finally,we validate the effectiveness and feasibility of the proposed method using 2966 crowd-sourced user stories related to smart home systems.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
BACKGROUND Autoimmunity has emerged as a probable disease modifier in patients with clinically diagnosed type 2 diabetes mellitus(T2DM),that is,patients who have insulin resistance,obesity,and other cardiovascular ris...BACKGROUND Autoimmunity has emerged as a probable disease modifier in patients with clinically diagnosed type 2 diabetes mellitus(T2DM),that is,patients who have insulin resistance,obesity,and other cardiovascular risk factors,suggesting that the presence of glutamic acid decarboxylase(anti-GAD65),islet antigen 2(anti-IA2),and zinc transporter 8(anti-Zn8T)antibodies could have deleterious effects on beta cell function,causing failure and earlier requirement for insulin treatment.AIM To evaluate anti-GAD65,anti-IA2 and anti-Zn8T as predictors of early insulin requirement in adolescents with a clinical diagnosis of T2DM.METHODS This was a case–control study in patients with clinically diagnosed with T2DM(68 cases and 64 controls with and without early insulin dependence respectively),male and female,aged 12–18 years.Somatometry,blood pressure,glucose,insulin,C-peptide,glycated hemoglobin A1c,and lipid profiles were assessed.ELISA was used to measure anti-GAD65,anti-IA2,and anti-Zn8T antibodies.Descriptive statistics,Pearson'sχ2 test,Student's t test,and logistic regression was performed.P<0.05 was considered statistically significant.RESULTS There were 132 patients(53.8%female),with a mean age was 15.9±1.3 years,and there was a disease evolution time of 4.49±0.88 years.The presence of anti-GAD65,anti-IA2,and anti-Zn8T positivity was found in 29.5%,18.2%,and 15.9%,respectively.Dividing the groups by early or no insulin dependence showed that the group with insulin had a higher frequency of antibody positivity:anti-GAD65 odds ratio(OR):2.42(1.112–5.303,P=0.026);anti-IA2:OR:1.55(0.859–2.818,P=0.105);and anti-Zn8T:OR:7.32(2.039–26.279,P=0.002).CONCLUSION Anti-GAD65 positivity was high in our study.Anti-GAD65 and anti-Zn8T positivity showed a significantly depleted beta cell reserve phenotype,leading to an increased risk of early insulin dependence.展开更多
Carp is a temperate freshwater fish native to Asia,distributed in all regions of the world except Australia and South America.With the improvement of comprehensive and healthy breeding technology of carp,the unit yiel...Carp is a temperate freshwater fish native to Asia,distributed in all regions of the world except Australia and South America.With the improvement of comprehensive and healthy breeding technology of carp,the unit yield has been greatly increased mainly due to the exten-sive use of compound feed.In this study,the nutritional requirements of carp were summarized from the aspects of protein,amino acids,fat,carbohydrate,calcium and phosphorus,vitamins and taurine.This study provides a certain theoretical reference for scientific formula of carp feed.展开更多
The purpose of this study is to coordinate the alignment between the nursing curriculum and hospital clinical competencies,identify the reasons for the gaps,evaluate the impact of these gaps on the nursing profession,...The purpose of this study is to coordinate the alignment between the nursing curriculum and hospital clinical competencies,identify the reasons for the gaps,evaluate the impact of these gaps on the nursing profession,and propose strategies to bridge these gaps.This study will help strengthen nursing education,improve nursing students’skills,and help students adapt to complex clinical environments.展开更多
While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic...While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic wormhole would need to maintain sufficiently low radial tidal forces. It is proposed in this paper that the assumption of zero tidal forces, i.e., the limiting case, is sufficient for overcoming the restrictions from quantum field theory. The feasibility of this approach is subsequently discussed by 1) introducing the additional conditions needed to ensure that the radial tidal forces can indeed be sufficiently low and 2) by viewing traversable wormholes as emergent phenomena, thereby increasing the likelihood of their existence.展开更多
To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred ...To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred information form to evaluate the importance of each customer requirement.Secondly,a transfer function is employed to unify various forms of preference information into a fuzzy complementary judgment matrix.The ranking vector is then calculated using row and normalization methods,and the initial importance of customer requirements is obtained by aggregating the weights of decision members.Finally,the correction coefficients of initial importance and each demand are synthesized,and the importance of customer requirements is determined through normalization.The development example of the PE jaw crusher demonstrates the effectiveness and feasibility of the proposed method.展开更多
In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge grap...In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge graphs, quality assessment is particularly important. As an important thing of quality assessment, completeness assessment generally refers to the ratio of the current data volume to the total data volume.When evaluating the completeness of a knowledge graph, it is often necessary to refine the completeness dimension by setting different completeness metrics to produce more complete and understandable evaluation results for the knowledge graph.However, lack of awareness of requirements is the most problematic quality issue. In the actual evaluation process, the existing completeness metrics need to consider the actual application. Therefore, to accurately recommend suitable knowledge graphs to many users, it is particularly important to develop relevant measurement metrics and formulate measurement schemes for completeness. In this paper, we will first clarify the concept of completeness, establish each metric of completeness, and finally design a measurement proposal for the completeness of knowledge graphs.展开更多
The weapon and equipment operational requirement analysis(WEORA) is a necessary condition to win a future war,among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challen...The weapon and equipment operational requirement analysis(WEORA) is a necessary condition to win a future war,among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering(QA) of weapons and equipment knowledge graph(WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA.展开更多
The paper presents a new approach to managing software requirement elicitation techniques with a high level of analyses based on domain ontology techniques, where we established a mapping between user scenario, struct...The paper presents a new approach to managing software requirement elicitation techniques with a high level of analyses based on domain ontology techniques, where we established a mapping between user scenario, structured requirement, and domain ontology techniques to improve many attributes such as requirement consistency, completeness and eliminating duplicate requirements to reduce risk of overrun time and budgets. One of the main targets of requirement engineering is to develop a requirement document with high quality. So, we proposed a user interface to collect all vital information about the project directly from the regular user and requirement engineering;After that, the proposal will generate an ontology based on semantic relations and rules. Requirements Engineering tries to keep requirements throughout a project’s life cycle consistent necessities clear, and up to date. This prototype allows mapping requirement scenarios into ontology elements for semantically interrupted. The general points of our prototype are to guarantee the identification requirements and improved nature of the Software Requirements Specification (SRS) by solving incomplete and conflicting information in the requirements specification.展开更多
Generative AI is rapidly employed by software developers to generate code or other software artifacts.However,the analysis and assessment of generative AI with respect to requirements analysis and modeling tasks,espec...Generative AI is rapidly employed by software developers to generate code or other software artifacts.However,the analysis and assessment of generative AI with respect to requirements analysis and modeling tasks,especially with UML,has received little attention.This paper investigates the capabilities of generative AI to aid in the creation of three types of UML models:UML use case models,class diagrams,and sequence diagrams.For this purpose,we designed an AI-aided UML modeling task in our course on software requirements modeling.50 undergraduates who majored in Software Engineering at Wuhan University completed the modeling task and the corresponding online survey.Our findings show that generative AI can help create these three types of UML models,but its performance is limited to identifying essential modeling elements of these UML models.展开更多
Energy conservation is the effort to reduce the overconsumption of energy by the usage of less energy services.Energy conservation could be user oriented or industry sector oriented.One of these sectors is the streetl...Energy conservation is the effort to reduce the overconsumption of energy by the usage of less energy services.Energy conservation could be user oriented or industry sector oriented.One of these sectors is the streetlighting-major energy consumer in the town-forming nearly 30%of each country’s consumption.Intelligent designed management of streetlighting not only reduces the energy consumption of the town,but also increases the public safety and the wellbeing.The article focuses the management of IoT for streetlighting in smart city.This is the first stage of project“Service management for IoT in streetlighting”.While the basic management principles are efficiency and fairness,the requirements of all actors must be defined.On the base of requirements,the authors synthesize the management functions with selected granularity.The chosen methodology is unified modelling language(UML):use case diagrams.The models are intended to business developers,university professors,and students.展开更多
This paper presents a model specifying requirements of real-time systems. Different from existing researches, this model mainly uses rules and templates to represent hierarchical FSMs (Finite State Machine). In this m...This paper presents a model specifying requirements of real-time systems. Different from existing researches, this model mainly uses rules and templates to represent hierarchical FSMs (Finite State Machine). In this model, one rule corresponds to one state transition of FSM and one template corresponds to one FSM. Rules and information with respect to a FSM can be written in a template. So templates include not only state diagrams, but also information that can not be described by FSM, such as performance requirements. The specification using this model consists of a collection of templates and it is easy for users to understand and to review. After introduced the related researches and principles of the model, this paper specifies requirements of a real-time system with this model, and discusses characters of this model in the end.展开更多
A comparative slaughter trial was conducted to determine the net mineral requirements for maintenance and growth of Dorper crossbred female lambs raised from 20 to 35 kg of body weight(BW).Thirty-five Dorper×th...A comparative slaughter trial was conducted to determine the net mineral requirements for maintenance and growth of Dorper crossbred female lambs raised from 20 to 35 kg of body weight(BW).Thirty-five Dorper×thin-tailed Han crossbred female lambs of(20.3±1.14) kg BW were used: 7 lambs were randomly chosen and slaughtered at the beginning of the experiment as the baseline group for measuring the initial body composition; another 7 lambs were randomly chosen and offered a pelleted mixed diet ad libitum and slaughtered at(27.0±0.73) kg BW; the remaining 21 lambs were randomly divided into 3 groups of 7 animals each and subjected to the same diet either ad l ibitum or at 70 or 40% of ad libitum intake.The 21 lambs were fed in 7 slaughter groups, with each group consisting of one lamb from each treatment(ad libitum, 70 or 40% of ad libitum intake).The 3 groups were slaughtered when the sheep fed ad libitum attained(33.8±0.52) kg of BW.The body composition of five minerals(Ca, P, Na, K, and Mg) was determined.The net mineral requirements for maintenance were 35.01, 25.18, 9.30, 31.35, and 2.03 mg kg–1 empty BW(EBW) for Ca, P, Na, K, and Mg, respectively, and the net growth requirement per kg of EBW gain ranged from 9.73 to 8.87 g of Ca, 5.83 to 5.27 g of P, 1.73 to 1.63 g of Na, 3.73 to 4.08 g of K, and 0.26 to 0.25 g of Mg for Dorper crossbred lambs in China, respectively.The estimates of mineral requirements with Dorper crossbred lambs in the current study were not consistent with the recommendations from previous studies.展开更多
Software testing is an important and cost intensive activity in software development.The major contribution in cost is due to test case generations.Requirement-based testing is an approach in which test cases are deri...Software testing is an important and cost intensive activity in software development.The major contribution in cost is due to test case generations.Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure.Requirement-based testing includes functional and nonfunctional requirements.The objective of this study is to explore the approaches that generate test cases from requirements.A systematic literature review based on two research questions and extensive quality assessment criteria includes studies.The study identies 30 primary studies from 410 studies spanned from 2000 to 2018.The review’s nding shows that 53%of journal papers,42%of conference papers,and 5%of book chapters’address requirementsbased testing.Most of the studies use UML,activity,and use case diagrams for test case generation from requirements.One of the signicant lessons learned is that most software testing errors are traced back to errors in natural language requirements.A substantial amount of work focuses on UML diagrams for test case generations,which cannot capture all the system’s developed attributes.Furthermore,there is a lack of UML-based models that can generate test cases from natural language requirements by rening them in context.Coverage criteria indicate how efciently the testing has been performed 12.37%of studies use requirements coverage,20%of studies cover path coverage,and 17%study basic coverage.展开更多
Requirements engineering(RE)is among the most valuable and critical processes in software development.The quality of this process significantly affects the success of a software project.An important step in RE is requ...Requirements engineering(RE)is among the most valuable and critical processes in software development.The quality of this process significantly affects the success of a software project.An important step in RE is requirements elicitation,which involves collecting project-related requirements from different sources.Repositories of reusable requirements are typically important sources of an increasing number of reusable software requirements.However,the process of searching such repositories to collect valuable project-related requirements is time-consuming and difficult to perform accurately.Recommender systems have been widely recognized as an effective solution to such problem.Accordingly,this study proposes an effective hybrid content-based collaborative filtering recommendation approach.The proposed approach will support project stake-holders in mitigating the risk of missing requirements during requirements elicitation by identifying related requirements from software requirement repositories.The experimental results on the RALIC dataset demonstrate that the proposed approach considerably outperforms baseline collaborative filtering-based recom-mendation methods in terms of prediction accuracy and coverage in addition to mitigating the data sparsity and cold-start item problems.展开更多
The goal of this paper is to take a further step towards an ontological approach for representing requirements information. The motivation for ontologies was discussed. The definitions of ontology and requirements ont...The goal of this paper is to take a further step towards an ontological approach for representing requirements information. The motivation for ontologies was discussed. The definitions of ontology and requirements ontology were given. Then, it presented a collection of informal terms, including four subject areas. It also discussed the formalization process of ontology. The underlying meta-ontology was determined, and the formalized requirements ontology was analyzed. This formal ontology is built to serve as a basis for requirements model. Finally, the implementation of software system was given.展开更多
Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements.This phase is cost-and time-intensive,and...Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements.This phase is cost-and time-intensive,and a project may fail if there are excessive costs and schedule overruns.COVID-19 has affected the software industry by reducing interactions between developers and customers.Such a lack of interaction is a key reason for the failure of software projects.Projects can also fail when customers do not know precisely what they want.Furthermore,selecting the unsuitable elicitation technique can also cause project failure.The present study,therefore,aimed to identify which requirements elicitation technique is the most cost-effective for large-scale projects when time to market is a critical issue or when the customer is not available.To that end,we conducted a systematic literature review on requirements elicitation techniques.Most primary studies identified introspection as the best technique,followed by survey and brainstorming.This finding suggests that introspection should be the first choice of elicitation technique,especially when the customer is not available or the project has strict time and cost constraints.Moreover,introspection should also be used as the starting point in the elicitation process of a large-scale project,and all known requirements should be elicited using this technique.展开更多
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金This work is supported by EIAS(Emerging Intelligent Autonomous Systems)Data Science Lab,Prince Sultan University,Kingdom of Saudi Arabia,by paying the APC.
文摘The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.
基金supported by the National Natural Science Foundation of China(71690233,71901214)。
文摘Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured feedback.The key challenge lies in transforming abstract user needs into specific ones,requiring integration and analysis.Therefore,we propose a topic mining-based approach to categorize,summarize,and rank product requirements from user stories.Specifically,after determining the number of story categories based on py LDAvis,we initially classify“I want to”phrases within user stories.Subsequently,classic topic models are applied to each category to generate their names,defining each post-classification user story category as a requirement.Furthermore,a weighted ranking function is devised to calculate the importance of each requirement.Finally,we validate the effectiveness and feasibility of the proposed method using 2966 crowd-sourced user stories related to smart home systems.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
基金Supported by Mexican Federal Funds HIM,No.2018/068 SSA152.
文摘BACKGROUND Autoimmunity has emerged as a probable disease modifier in patients with clinically diagnosed type 2 diabetes mellitus(T2DM),that is,patients who have insulin resistance,obesity,and other cardiovascular risk factors,suggesting that the presence of glutamic acid decarboxylase(anti-GAD65),islet antigen 2(anti-IA2),and zinc transporter 8(anti-Zn8T)antibodies could have deleterious effects on beta cell function,causing failure and earlier requirement for insulin treatment.AIM To evaluate anti-GAD65,anti-IA2 and anti-Zn8T as predictors of early insulin requirement in adolescents with a clinical diagnosis of T2DM.METHODS This was a case–control study in patients with clinically diagnosed with T2DM(68 cases and 64 controls with and without early insulin dependence respectively),male and female,aged 12–18 years.Somatometry,blood pressure,glucose,insulin,C-peptide,glycated hemoglobin A1c,and lipid profiles were assessed.ELISA was used to measure anti-GAD65,anti-IA2,and anti-Zn8T antibodies.Descriptive statistics,Pearson'sχ2 test,Student's t test,and logistic regression was performed.P<0.05 was considered statistically significant.RESULTS There were 132 patients(53.8%female),with a mean age was 15.9±1.3 years,and there was a disease evolution time of 4.49±0.88 years.The presence of anti-GAD65,anti-IA2,and anti-Zn8T positivity was found in 29.5%,18.2%,and 15.9%,respectively.Dividing the groups by early or no insulin dependence showed that the group with insulin had a higher frequency of antibody positivity:anti-GAD65 odds ratio(OR):2.42(1.112–5.303,P=0.026);anti-IA2:OR:1.55(0.859–2.818,P=0.105);and anti-Zn8T:OR:7.32(2.039–26.279,P=0.002).CONCLUSION Anti-GAD65 positivity was high in our study.Anti-GAD65 and anti-Zn8T positivity showed a significantly depleted beta cell reserve phenotype,leading to an increased risk of early insulin dependence.
文摘Carp is a temperate freshwater fish native to Asia,distributed in all regions of the world except Australia and South America.With the improvement of comprehensive and healthy breeding technology of carp,the unit yield has been greatly increased mainly due to the exten-sive use of compound feed.In this study,the nutritional requirements of carp were summarized from the aspects of protein,amino acids,fat,carbohydrate,calcium and phosphorus,vitamins and taurine.This study provides a certain theoretical reference for scientific formula of carp feed.
文摘The purpose of this study is to coordinate the alignment between the nursing curriculum and hospital clinical competencies,identify the reasons for the gaps,evaluate the impact of these gaps on the nursing profession,and propose strategies to bridge these gaps.This study will help strengthen nursing education,improve nursing students’skills,and help students adapt to complex clinical environments.
文摘While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic wormhole would need to maintain sufficiently low radial tidal forces. It is proposed in this paper that the assumption of zero tidal forces, i.e., the limiting case, is sufficient for overcoming the restrictions from quantum field theory. The feasibility of this approach is subsequently discussed by 1) introducing the additional conditions needed to ensure that the radial tidal forces can indeed be sufficiently low and 2) by viewing traversable wormholes as emergent phenomena, thereby increasing the likelihood of their existence.
文摘To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred information form to evaluate the importance of each customer requirement.Secondly,a transfer function is employed to unify various forms of preference information into a fuzzy complementary judgment matrix.The ranking vector is then calculated using row and normalization methods,and the initial importance of customer requirements is obtained by aggregating the weights of decision members.Finally,the correction coefficients of initial importance and each demand are synthesized,and the importance of customer requirements is determined through normalization.The development example of the PE jaw crusher demonstrates the effectiveness and feasibility of the proposed method.
基金supported by the National Key Laboratory for Comp lex Systems Simulation Foundation (6142006190301)。
文摘In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge graphs, quality assessment is particularly important. As an important thing of quality assessment, completeness assessment generally refers to the ratio of the current data volume to the total data volume.When evaluating the completeness of a knowledge graph, it is often necessary to refine the completeness dimension by setting different completeness metrics to produce more complete and understandable evaluation results for the knowledge graph.However, lack of awareness of requirements is the most problematic quality issue. In the actual evaluation process, the existing completeness metrics need to consider the actual application. Therefore, to accurately recommend suitable knowledge graphs to many users, it is particularly important to develop relevant measurement metrics and formulate measurement schemes for completeness. In this paper, we will first clarify the concept of completeness, establish each metric of completeness, and finally design a measurement proposal for the completeness of knowledge graphs.
文摘The weapon and equipment operational requirement analysis(WEORA) is a necessary condition to win a future war,among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering(QA) of weapons and equipment knowledge graph(WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA.
文摘The paper presents a new approach to managing software requirement elicitation techniques with a high level of analyses based on domain ontology techniques, where we established a mapping between user scenario, structured requirement, and domain ontology techniques to improve many attributes such as requirement consistency, completeness and eliminating duplicate requirements to reduce risk of overrun time and budgets. One of the main targets of requirement engineering is to develop a requirement document with high quality. So, we proposed a user interface to collect all vital information about the project directly from the regular user and requirement engineering;After that, the proposal will generate an ontology based on semantic relations and rules. Requirements Engineering tries to keep requirements throughout a project’s life cycle consistent necessities clear, and up to date. This prototype allows mapping requirement scenarios into ontology elements for semantically interrupted. The general points of our prototype are to guarantee the identification requirements and improved nature of the Software Requirements Specification (SRS) by solving incomplete and conflicting information in the requirements specification.
文摘Generative AI is rapidly employed by software developers to generate code or other software artifacts.However,the analysis and assessment of generative AI with respect to requirements analysis and modeling tasks,especially with UML,has received little attention.This paper investigates the capabilities of generative AI to aid in the creation of three types of UML models:UML use case models,class diagrams,and sequence diagrams.For this purpose,we designed an AI-aided UML modeling task in our course on software requirements modeling.50 undergraduates who majored in Software Engineering at Wuhan University completed the modeling task and the corresponding online survey.Our findings show that generative AI can help create these three types of UML models,but its performance is limited to identifying essential modeling elements of these UML models.
文摘Energy conservation is the effort to reduce the overconsumption of energy by the usage of less energy services.Energy conservation could be user oriented or industry sector oriented.One of these sectors is the streetlighting-major energy consumer in the town-forming nearly 30%of each country’s consumption.Intelligent designed management of streetlighting not only reduces the energy consumption of the town,but also increases the public safety and the wellbeing.The article focuses the management of IoT for streetlighting in smart city.This is the first stage of project“Service management for IoT in streetlighting”.While the basic management principles are efficiency and fairness,the requirements of all actors must be defined.On the base of requirements,the authors synthesize the management functions with selected granularity.The chosen methodology is unified modelling language(UML):use case diagrams.The models are intended to business developers,university professors,and students.
基金Supported by the National Natural Science F oundation of China(6 98730 35 ) and the Research Fund for the Doctoral Program of Hi
文摘This paper presents a model specifying requirements of real-time systems. Different from existing researches, this model mainly uses rules and templates to represent hierarchical FSMs (Finite State Machine). In this model, one rule corresponds to one state transition of FSM and one template corresponds to one FSM. Rules and information with respect to a FSM can be written in a template. So templates include not only state diagrams, but also information that can not be described by FSM, such as performance requirements. The specification using this model consists of a collection of templates and it is easy for users to understand and to review. After introduced the related researches and principles of the model, this paper specifies requirements of a real-time system with this model, and discusses characters of this model in the end.
基金supported by the earmarked fund for the Modern Agro-Industry Technology Research System,China(CARS-39,200903006)
文摘A comparative slaughter trial was conducted to determine the net mineral requirements for maintenance and growth of Dorper crossbred female lambs raised from 20 to 35 kg of body weight(BW).Thirty-five Dorper×thin-tailed Han crossbred female lambs of(20.3±1.14) kg BW were used: 7 lambs were randomly chosen and slaughtered at the beginning of the experiment as the baseline group for measuring the initial body composition; another 7 lambs were randomly chosen and offered a pelleted mixed diet ad libitum and slaughtered at(27.0±0.73) kg BW; the remaining 21 lambs were randomly divided into 3 groups of 7 animals each and subjected to the same diet either ad l ibitum or at 70 or 40% of ad libitum intake.The 21 lambs were fed in 7 slaughter groups, with each group consisting of one lamb from each treatment(ad libitum, 70 or 40% of ad libitum intake).The 3 groups were slaughtered when the sheep fed ad libitum attained(33.8±0.52) kg of BW.The body composition of five minerals(Ca, P, Na, K, and Mg) was determined.The net mineral requirements for maintenance were 35.01, 25.18, 9.30, 31.35, and 2.03 mg kg–1 empty BW(EBW) for Ca, P, Na, K, and Mg, respectively, and the net growth requirement per kg of EBW gain ranged from 9.73 to 8.87 g of Ca, 5.83 to 5.27 g of P, 1.73 to 1.63 g of Na, 3.73 to 4.08 g of K, and 0.26 to 0.25 g of Mg for Dorper crossbred lambs in China, respectively.The estimates of mineral requirements with Dorper crossbred lambs in the current study were not consistent with the recommendations from previous studies.
文摘Software testing is an important and cost intensive activity in software development.The major contribution in cost is due to test case generations.Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure.Requirement-based testing includes functional and nonfunctional requirements.The objective of this study is to explore the approaches that generate test cases from requirements.A systematic literature review based on two research questions and extensive quality assessment criteria includes studies.The study identies 30 primary studies from 410 studies spanned from 2000 to 2018.The review’s nding shows that 53%of journal papers,42%of conference papers,and 5%of book chapters’address requirementsbased testing.Most of the studies use UML,activity,and use case diagrams for test case generation from requirements.One of the signicant lessons learned is that most software testing errors are traced back to errors in natural language requirements.A substantial amount of work focuses on UML diagrams for test case generations,which cannot capture all the system’s developed attributes.Furthermore,there is a lack of UML-based models that can generate test cases from natural language requirements by rening them in context.Coverage criteria indicate how efciently the testing has been performed 12.37%of studies use requirements coverage,20%of studies cover path coverage,and 17%study basic coverage.
文摘Requirements engineering(RE)is among the most valuable and critical processes in software development.The quality of this process significantly affects the success of a software project.An important step in RE is requirements elicitation,which involves collecting project-related requirements from different sources.Repositories of reusable requirements are typically important sources of an increasing number of reusable software requirements.However,the process of searching such repositories to collect valuable project-related requirements is time-consuming and difficult to perform accurately.Recommender systems have been widely recognized as an effective solution to such problem.Accordingly,this study proposes an effective hybrid content-based collaborative filtering recommendation approach.The proposed approach will support project stake-holders in mitigating the risk of missing requirements during requirements elicitation by identifying related requirements from software requirement repositories.The experimental results on the RALIC dataset demonstrate that the proposed approach considerably outperforms baseline collaborative filtering-based recom-mendation methods in terms of prediction accuracy and coverage in addition to mitigating the data sparsity and cold-start item problems.
基金HighTechnologyResearch andDevelopment Program"863" (No.2 0 0 2 AA4114 2 0 )National NaturalScienceFoundation of China (No.60 3 740 71)
文摘The goal of this paper is to take a further step towards an ontological approach for representing requirements information. The motivation for ontologies was discussed. The definitions of ontology and requirements ontology were given. Then, it presented a collection of informal terms, including four subject areas. It also discussed the formalization process of ontology. The underlying meta-ontology was determined, and the formalized requirements ontology was analyzed. This formal ontology is built to serve as a basis for requirements model. Finally, the implementation of software system was given.
基金funding this work through research group no.RG-1441-490.
文摘Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements.This phase is cost-and time-intensive,and a project may fail if there are excessive costs and schedule overruns.COVID-19 has affected the software industry by reducing interactions between developers and customers.Such a lack of interaction is a key reason for the failure of software projects.Projects can also fail when customers do not know precisely what they want.Furthermore,selecting the unsuitable elicitation technique can also cause project failure.The present study,therefore,aimed to identify which requirements elicitation technique is the most cost-effective for large-scale projects when time to market is a critical issue or when the customer is not available.To that end,we conducted a systematic literature review on requirements elicitation techniques.Most primary studies identified introspection as the best technique,followed by survey and brainstorming.This finding suggests that introspection should be the first choice of elicitation technique,especially when the customer is not available or the project has strict time and cost constraints.Moreover,introspection should also be used as the starting point in the elicitation process of a large-scale project,and all known requirements should be elicited using this technique.