3,337 results on '"Liang, Peng"'
Search Results
2. An Exploratory Study on Just-in-Time Multi-Programming-Language Bug Prediction
- Author
-
Li, Zengyang, Ji, Jiabao, Liang, Peng, Mo, Ran, and Liu, Hui
- Subjects
Computer Science - Software Engineering - Abstract
Context: An increasing number of software systems are written in multiple programming languages (PLs), which are called multi-programming-language (MPL) systems. MPL bugs (MPLBs) refers to the bugs whose resolution involves multiple PLs. Despite high complexity of MPLB resolution, there lacks MPLB prediction methods. Objective: This work aims to construct just-in-time (JIT) MPLB prediction models with selected prediction metrics, analyze the significance of the metrics, and then evaluate the performance of cross-project JIT MPLB prediction. Method: We develop JIT MPLB prediction models with the selected metrics using machine learning algorithms and evaluate the models in within-project and cross-project contexts with our constructed dataset based on 18 Apache MPL projects. Results: Random Forest is appropriate for JIT MPLB prediction. Changed LOC of all files, added LOC of all files, and the total number of lines of all files of the project currently are the most crucial metrics in JIT MPLB prediction. The prediction models can be simplified using a few top-ranked metrics. Training on the dataset from multiple projects can yield significantly higher AUC than training on the dataset from a single project for cross-project JIT MPLB prediction. Conclusions: JIT MPLB prediction models can be constructed with the selected set of metrics, which can be reduced to build simplified JIT MPLB prediction models, and cross-project JIT MPLB prediction is feasible., Comment: Preprint accepted for publication in Information and Software Technology, 2024
- Published
- 2024
3. How Do Users Revise Architectural Related Questions on Stack Overflow: An Empirical Study
- Author
-
de Dieu, Musengamana Jean, Liang, Peng, Shahin, Mojtaba, and Khan, Arif Ali
- Subjects
Computer Science - Software Engineering - Abstract
Technical Questions and Answers (Q&A) sites, such as Stack Overflow (SO), accumulate a significant variety of information related to software development in posts from users. To ensure the quality of this information, SO encourages its users to review posts through various mechanisms (e.g., question and answer revision processes). Although Architecture Related Posts (ARPs) communicate architectural information that has a system-wide impact on development, little is known about how SO users revise information shared in ARPs. To fill this gap, we conducted an empirical study to understand how users revise Architecture Related Questions (ARQs) on SO. We manually checked 13,205 ARPs and finally identified 4,114 ARQs that contain revision information. Our main findings are that: (1) The revision of ARQs is not prevalent in SO, and an ARQ revision starts soon after this question is posted (i.e., from 1 minute onward). Moreover, the revision of an ARQ occurs before and after this question receives its first answer/architecture solution, with most revisions beginning before the first architecture solution is posted. Both Question Creators (QCs) and non-QCs actively participate in ARQ revisions, with most revisions being made by QCs. (2) A variety of information (14 categories) is missing and further provided in ARQs after being posted, among which design context, component dependency, and architecture concern are dominant information. (3) Clarify the understanding of architecture under design and improve the readability of architecture problem are the two major purposes of the further provided information in ARQs. (4) The further provided information in ARQs has several impacts on the quality of answers/architecture solutions, including making architecture solution useful, making architecture solution informative, making architecture solution relevant, among others.
- Published
- 2024
4. RAG-Enhanced Commit Message Generation
- Author
-
Zhang, Linghao, Zhang, Hongyi, Wang, Chong, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
Commit message is one of the most important textual information in software development and maintenance. However, it is time-consuming and labor-intensive to write commit messages manually. Commit Message Generation (CMG) has become a research hotspot in automated software engineering. Researchers have proposed several methods for CMG and achieved great results. In recent years, CodeBERT, CodeT5, and other Pre-trained Language Models (PLMs) for code have been proposed. These models can be easily transferred to code-related downstream tasks including CMG with simple fine-tuning and can achieve impressive performance. Moreover, Large Language Models (LLMs) with code capabilities (e.g., ChatGPT, Llama 3, Gemma) can be directly applied to various tasks by designing instruct prompts without training. This brings new possibilities to the CMG task. In this work, we propose REACT, a novel REtrieval-Augmented framework for CommiT message generation, which effectively integrates advanced retrieval techniques with different PLMs and LLMs and can broadly enhance the performance of various models on the CMG task. Specifically, we design and build a hybrid retriever to retrieve the most relevant code diff and commit message pair from the code base as an "exemplar". Then, the retrieved pair is utilized to guide and enhance the generation of commit messages by PLMs and LLMs through fine-tuning and in-context learning. Our approach is evaluated on a widely-used dataset. The experimental results show that REACT significantly enhances the performance of various models on the CMG task, improving the BLEU score of CodeT5 by up to 55%, boosting Llama 3's BLEU score by 102%, and substantially surpassing all baselines, achieving a new SOTA. This demonstrates the effectiveness and broad applicability of our framework that can enhance CMG by a large margin.
- Published
- 2024
5. Experimental Study on Deuterium-Deuterium Thermonuclear Fusion with Interface Confinement
- Author
-
Chen, Darong, Jiang, Liang, Chen, Shuai, Wang, Bao, Li, Dangguo, and Liang, Peng
- Subjects
Nuclear Experiment - Abstract
Nuclear fusion is recognized as the energy of the future, and huge efforts and capitals have been put into the research of controlled nuclear fusion in the past decades. The most challenging thing for controlled nuclear fusion is to generate and keep a super high temperature. Here, a sonication system, combining with micro-scale fluid control techniques, was built to generate cavitation within a limited region. As bubbles being rapidly compressed, high temperature plasma generated interior leads to particle emissions, where a Cs2LiYCl6: Ce3+ (CLYC) scintillator was used to collect the emission events. The pulse shape discrimination methods applied on captured signals revealed that only gamma ray events were observed in sonication with normal water as excepted, while obvious separation of neutron and gamma ray events was surprisingly identified in sonication with deuterated water. This result suggested that neutrons were emitted from the sonicated deuterated water, i.e. deuterium-deuterium thermonuclear fusion was initiated. This study provides an alternative and feasible approach to achieve controllable nuclear fusion and makes great sense for future researches on the application of fusion energy.
- Published
- 2024
6. Cross-Language Dependencies: An Empirical Study of Kotlin-Java
- Author
-
Feng, Qiong, Ji, Huan, Ma, Xiaotian, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
Background: Since Google introduced Kotlin as an official programming language for developing Android apps in 2017, Kotlin has gained widespread adoption in Android development. The inter-operability of Java and Kotlin's design nature allows them to coexist and interact with each other smoothly within a project. Aims: However, there is limited research on how Java and Kotlin interact with each other in real-world projects and what challenges are faced during these interactions. The answers to these questions are key to understanding these kinds of cross-language software systems. Methods: In this paper, we implemented a tool named DependEx-tractor, which can extract 11 kinds of Kotlin-Java dependencies, and conducted an empirical study of 23 Kotlin-Java real-world projects with 3,227 Java and 8,630 Kotlin source files. Results: Our findings revealed that Java and Kotlin frequently interact with each other in these cross-language projects, with access and call dependency types being the most dominant. Compared to files interacting with other files in the same language, Java/Kotlin source files, which participate in the cross-language interactions, undergo more commits. Additionally, among all Kotlin-Java problematic interactions, we identified seven common mistakes, along with their fixing strategies. Conclusions: The findings of this study can help developers understand and address the challenges in Kotlin-Java projects., Comment: The 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
- Published
- 2024
7. How LLMs Aid in UML Modeling: An Exploratory Study with Novice Analysts
- Author
-
Wang, Beian, Wang, Chong, Liang, Peng, Li, Bing, and Zeng, Cheng
- Subjects
Computer Science - Software Engineering - Abstract
Since the emergence of GPT-3, Large Language Models (LLMs) have caught the eyes of researchers, practitioners, and educators in the field of software engineering. However, there has been relatively little investigation regarding the performance of LLMs in assisting with requirements analysis and UML modeling. This paper explores how LLMs can assist novice analysts in creating three types of typical UML models: use case models, class diagrams, and sequence diagrams. For this purpose, we designed the modeling tasks of these three UML models for 45 undergraduate students who participated in a requirements modeling course, with the help of LLMs. By analyzing their project reports, we found that LLMs can assist undergraduate students as novice analysts in UML modeling tasks, but LLMs also have shortcomings and limitations that should be considered when using them., Comment: The 21st IEEE International Conference on Software Services Engineering (SSE)
- Published
- 2024
8. On Unified Prompt Tuning for Request Quality Assurance in Public Code Review
- Author
-
Chen, Xinyu, Li, Lin, Zhang, Rui, and Liang, Peng
- Subjects
Computer Science - Software Engineering ,Computer Science - Artificial Intelligence - Abstract
Public Code Review (PCR) can be implemented through a Software Question Answering (SQA) community, which facilitates high knowledge dissemination. Current methods mainly focus on the reviewer's perspective, including finding a capable reviewer, predicting comment quality, and recommending/generating review comments. Our intuition is that satisfying review necessity requests can increase their visibility, which in turn is a prerequisite for better review responses. To this end, we propose a unified framework called UniPCR to complete developer-based request quality assurance (i.e., predicting request necessity and recommending tags subtask) under a Masked Language Model (MLM). Specifically, we reformulate both subtasks via 1) text prompt tuning, which converts two subtasks into MLM by constructing prompt templates using hard prompt; 2) code prefix tuning, which optimizes a small segment of generated continuous vectors as the prefix of the code representation using soft prompt. Experimental results on the Public Code Review dataset for the time span 2011-2022 demonstrate that our UniPCR framework adapts to the two subtasks and outperforms comparable accuracy-based results with state-of-the-art methods for request quality assurance. These conclusions highlight the effectiveness of our unified framework from the developer's perspective in public code review., Comment: The 29th International Conference on Database Systems for Advanced Applications (DASFAA)
- Published
- 2024
9. How Do OSS Developers Utilize Architectural Solutions from Q&A Sites: An Empirical Study
- Author
-
de Dieu, Musengamana Jean, Liang, Peng, and Shahin, Mojtaba
- Subjects
Computer Science - Software Engineering - Abstract
Developers utilize programming-related knowledge (e.g., code snippets) on Q&A sites (e.g., Stack Overflow) that functionally matches the programming problems they encounter in their development. Despite extensive research on Q&A sites, being a high-level and important type of development-related knowledge, architectural solutions (e.g., architecture tactics) and their utilization are rarely explored. To fill this gap, we conducted a mixed-methods study that includes a mining study and a survey study. For the mining study, we mined 984 commits and issues (i.e., 821 commits and 163 issues) from 893 Open-Source Software (OSS) projects on GitHub that explicitly referenced architectural solutions from Stack Overflow (SO) and Software Engineering Stack Exchange (SWESE). For the survey study, we identified practitioners involved in the utilization of these architectural solutions and surveyed 227 of them to further understand how practitioners utilize architectural solutions from Q&A sites in their OSS development. Our main findings are that: (1) OSS practitioners use architectural solutions from Q&A sites to solve a large variety (15 categories) of architectural problems, wherein Component design issue, Architectural anti-pattern, and Security issue are dominant; (2) Seven categories of architectural solutions from Q&A sites have been utilized to solve those problems, among which Architectural refactoring, Use of frameworks, and Architectural tactic are the three most utilized architectural solutions; (3) Using architectural solutions from SO comes with a variety of challenges, e.g., OSS practitioners complain that they need to spend significant time to adapt such architectural solutions to address design concerns raised in their OSS development, and it is challenging to use architectural solutions that are not tailored to the design context of their OSS projects.
- Published
- 2024
10. Bug Priority Change: An Empirical Study on Apache Projects
- Author
-
Li, Zengyang, Cai, Guangzong, Yu, Qinyi, Liang, Peng, Mo, Ran, and Liu, Hui
- Subjects
Computer Science - Software Engineering - Abstract
In issue tracking systems, each bug is assigned a priority level (e.g., Blocker, Critical, Major, Minor, or Trivial in JIRA from highest to lowest), which indicates the urgency level of the bug. In this sense, understanding bug priority changes helps to arrange the work schedule of participants reasonably, and facilitates a better analysis and resolution of bugs. According to the data extracted from JIRA deployed by Apache, a proportion of bugs in each project underwent priority changes after such bugs were reported, which brings uncertainty to the bug fixing process. However, there is a lack of indepth investigation on the phenomenon of bug priority changes, which may negatively impact the bug fixing process. Thus, we conducted a quantitative empirical study on bugs with priority changes through analyzing 32 non-trivial Apache open source software projects. The results show that: (1) 8.3% of the bugs in the selected projects underwent priority changes; (2) the median priority change time interval is merely a few days for most (28 out of 32) projects, and half (50. 7%) of bug priority changes occurred before bugs were handled; (3) for all selected projects, 87.9% of the bugs with priority changes underwent only one priority change, most priority changes tend to shift the priority to its adjacent priority, and a higher priority has a greater probability to undergo priority change; (4) bugs that require bug-fixing changes of higher complexity or that have more comments are likely to undergo priority changes; and (5) priorities of bugs reported or allocated by a few specific participants are more likely to be modified, and maximally only one participant in each project tends to modify priorities., Comment: Preprint accepted for publication in Journal of Systems and Software, 2024
- Published
- 2024
11. Containerization in Multi-Cloud Environment: Roles, Strategies, Challenges, and Solutions for Effective Implementation
- Author
-
Waseem, Muhammad, Ahmad, Aakash, Liang, Peng, Akbar, Muhammad Azeem, Khan, Arif Ali, Ahmad, Iftikhar, Setälä, Manu, and Mikkonen, Tommi
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Containerization in a multi-cloud environment facilitates workload portability and optimized resource utilization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of container utilization in multi-cloud environment. We conduct the Systematic Mapping Study (SMS) on the literature published between January 2013 and March 2023. Eighty-six studies were finally selected and the key results are: (1) Four leading themes on cloud computing and network systems research were identified: 'Scalability and High Availability', 'Performance and Optimization', 'Security and Privacy', and 'Multi-Cloud Container Monitoring and Adaptation'. (2) Seventy-four patterns and strategies for containerization in multi-cloud environment were classified across 10 subcategories and 4 categories. (3) Ten quality attributes considered were identified with 47 associated tactics. (4) Four distinct frameworks were introduced based on the analysis of identified challenges and solutions: a security challenge-solution framework, an automation challenge-solution framework, a deployment challenge-solution framework, and a monitoring challenge-solution framework. The results of this SMS will assist researchers and practitioners in pursuing further studies on containerization in multi-cloud environment and developing specialized solutions for challenges related to containerization applications in multi-cloud environment., Comment: 59 pages, 4 images, 16 tables, Manuscript submitted to a Journal (2024)
- Published
- 2024
12. Exploring Data Management Challenges and Solutions in Agile Software Development: A Literature Review and Practitioner Survey
- Author
-
Fawzy, Ahmed, Tahir, Amjed, Galster, Matthias, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
Managing data related to a software product and its development poses significant challenges for software projects and agile development teams. Challenges include integrating data from diverse sources and ensuring data quality in light of continuous change and adaptation. To this end, we aimed to systematically explore data management challenges and potential solutions in agile projects. We employed a mixed-methods approach, utilizing a systematic literature review (SLR) to understand the state-of-research followed by a survey with practitioners to reflect on the state-of-practice. In the SLR, we reviewed 45 studies in which we identified and categorized data management aspects and the associated challenges and solutions. In the practitioner survey, we captured practical experiences and solutions from 32 industry experts to complement the findings from the SLR. Our findings reveal major data management challenges reported in both the SLR and practitioner survey, such as managing data integration processes, capturing diverse data, automating data collection, and meeting real-time analysis requirements. Based on our findings, we present implications for practitioners and researchers, which include the necessity of developing clear data management policies, training on data management tools, and adopting new data management strategies that enhance agility, improve product quality, and facilitate better project outcomes.
- Published
- 2024
13. Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor
- Author
-
Feng, Qiong, Ma, Xiaotian, Ji, Huan, Song, Wei, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
Since Google introduced Kotlin as an official programming language for developing Android apps in 2017, Kotlin has gained widespread adoption in Android development. However, compared to Java, there is limited support for Kotlin code dependency analysis, which is the foundation to software analysis. To bridge this gap, we develop Depends-Kotlin to extract entities and their dependencies in Kotlin source code. Not only does Depends-Kotlin support extracting entities' dependencies in Kotlin code, but it can also extract dependency relations between Kotlin and Java. Using three open-source Kotlin-Java mixing projects as our subjects, Depends-Kotlin demonstrates high accuracy and performance in resolving Kotlin-Kotlin and Kotlin-Java dependencies relations. The source code of Depends-Kotlin and the dataset used have been made available at https: //github.com/XYZboom/depends-kotlin. We also provide a screen-cast presenting Depends-Kotlin at https://youtu.be/ZPq8SRhgXzM., Comment: The 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), Tool Demonstrations Track
- Published
- 2024
14. Security Code Review by Large Language Models
- Author
-
Yu, Jiaxin, Liang, Peng, Fu, Yujia, Tahir, Amjed, Shahin, Mojtaba, Wang, Chong, and Cai, Yangxiao
- Subjects
Computer Science - Software Engineering ,Computer Science - Artificial Intelligence - Abstract
Security code review, as a time-consuming and labour-intensive process, typically requires integration with automated security defect detection tools to ensure code security. Despite the emergence of numerous security analysis tools, those tools face challenges in terms of their poor generalization, high false positive rates, and coarse detection granularity. A recent development with Large Language Models (LLMs) has made them a promising candidate to support security code review. To this end, we conducted the first empirical study to understand the capabilities of LLMs in security code review, delving into the performance, quality problems, and influential factors of LLMs to detect security defects in code reviews. Specifically, we compared the performance of 6 LLMs under five different prompts with the state-of-the-art static analysis tools to detect and analyze security defects. For the best-performing LLM, we conducted a linguistic analysis to explore quality problems in its responses, as well as a regression analysis to investigate the factors influencing its performance. The results are that: (1) existing pre-trained LLMs have limited capability in detecting security defects during code review but significantly outperform the state-of-the-art static analysis tools. (2) GPT-4 performs best among all LLMs when provided with a CWE list for reference. (3) GPT-4 makes few factual errors but frequently generates unnecessary content or responses that are not compliant with the task requirements given in the prompts. (4) GPT-4 is more adept at identifying security defects in code files with fewer tokens, containing functional logic and written by developers with less involvement in the project.
- Published
- 2024
15. Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using Copilot
- Author
-
Zhang, Beiqi, Liang, Peng, Feng, Qiong, Fu, Yujia, and Li, Zengyang
- Subjects
Computer Science - Software Engineering ,Computer Science - Artificial Intelligence - Abstract
As one of the most popular dynamic languages, Python experiences a decrease in readability and maintainability when code smells are present. Recent advancements in Large Language Models have sparked growing interest in AI-enabled tools for both code generation and refactoring. GitHub Copilot is one such tool that has gained widespread usage. Copilot Chat, released in September 2023, functions as an interactive tool aimed at facilitating natural language-powered coding. However, limited attention has been given to understanding code smells in Copilot-generated Python code and Copilot Chat's ability to fix the code smells. To this end, we built a dataset comprising 102 code smells in Copilot-generated Python code. Our aim is to first explore the occurrence of code smells in Copilot-generated Python code and then evaluate the effectiveness of Copilot Chat in fixing these code smells employing different prompts. The results show that 8 out of 10 types of code smells can be detected in Copilot-generated Python code, among which Multiply-Nested Container is the most common one. For these code smells, Copilot Chat achieves a highest fixing rate of 87.1%, showing promise in fixing Python code smells generated by Copilot itself. In addition, the effectiveness of Copilot Chat in fixing these smells can be improved by providing more detailed prompts., Comment: The 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), NIER Track
- Published
- 2024
16. Code Reviewer Recommendation Based on a Hypergraph with Multiplex Relationships
- Author
-
Qiao, Yu, Wang, Jian, Cheng, Can, Tang, Wei, Liang, Peng, Zhao, Yuqi, and Li, Bing
- Subjects
Computer Science - Software Engineering - Abstract
Code review is an essential component of software development, playing a vital role in ensuring a comprehensive check of code changes. However, the continuous influx of pull requests and the limited pool of available reviewer candidates pose a significant challenge to the review process, making the task of assigning suitable reviewers to each review request increasingly difficult. To tackle this issue, we present MIRRec, a novel code reviewer recommendation method that leverages a hypergraph with multiplex relationships. MIRRec encodes high-order correlations that go beyond traditional pairwise connections using degree-free hyperedges among pull requests and developers. This way, it can capture high-order implicit connectivity and identify potential reviewers. To validate the effectiveness of MIRRec, we conducted experiments using a dataset comprising 48,374 pull requests from ten popular open-source software projects hosted on GitHub. The experiment results demonstrate that MIRRec, especially without PR-Review Commenters relationship, outperforms existing stateof-the-art code reviewer recommendation methods in terms of ACC and MRR, highlighting its significance in improving the code review process., Comment: The 31st IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)
- Published
- 2024
17. Fairness Concerns in App Reviews: A Study on AI-based Mobile Apps
- Author
-
Nasab, Ali Rezaei, Dashti, Maedeh, Shahin, Mojtaba, Zahedi, Mansooreh, Khalajzadeh, Hourieh, Arora, Chetan, and Liang, Peng
- Subjects
Computer Science - Software Engineering ,Computer Science - Artificial Intelligence ,Computer Science - Computers and Society - Abstract
Fairness is one of the socio-technical concerns that must be addressed in software systems. Considering the popularity of mobile software applications (apps) among a wide range of individuals worldwide, mobile apps with unfair behaviors and outcomes can affect a significant proportion of the global population, potentially more than any other type of software system. Users express a wide range of socio-technical concerns in mobile app reviews. This research aims to investigate fairness concerns raised in mobile app reviews. Our research focuses on AI-based mobile app reviews as the chance of unfair behaviors and outcomes in AI-based mobile apps may be higher than in non-AI-based apps. To this end, we first manually constructed a ground-truth dataset, including 1,132 fairness and 1,473 non-fairness reviews. Leveraging the ground-truth dataset, we developed and evaluated a set of machine learning and deep learning models that distinguish fairness reviews from non-fairness reviews. Our experiments show that our best-performing model can detect fairness reviews with a precision of 94%. We then applied the best-performing model on approximately 9.5M reviews collected from 108 AI-based apps and identified around 92K fairness reviews. Next, applying the K-means clustering technique to the 92K fairness reviews, followed by manual analysis, led to the identification of six distinct types of fairness concerns (e.g., 'receiving different quality of features and services in different platforms and devices' and 'lack of transparency and fairness in dealing with user-generated content'). Finally, the manual analysis of 2,248 app owners' responses to the fairness reviews identified six root causes (e.g., 'copyright issues') that app owners report to justify fairness concerns., Comment: Preprint accepted for publication in ACM Transactions on Software Engineering and Methodology (TOSEM), 2024
- Published
- 2024
18. Using Large Language Models for Commit Message Generation: A Preliminary Study
- Author
-
Zhang, Linghao, Zhao, Jingshu, Wang, Chong, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
A commit message is a textual description of the code changes in a commit, which is a key part of the Git version control system (VCS). It captures the essence of software updating. Therefore, it can help developers understand code evolution and facilitate efficient collaboration between developers. However, it is time-consuming and labor-intensive to write good and valuable commit messages. Some researchers have conducted extensive studies on the automatic generation of commit messages and proposed several methods for this purpose, such as generationbased and retrieval-based models. However, seldom studies explored whether large language models (LLMs) can be used to generate commit messages automatically and effectively. To this end, this paper designed and conducted a series of experiments to comprehensively evaluate the performance of popular open-source and closed-source LLMs, i.e., Llama 2 and ChatGPT, in commit message generation. The results indicate that considering the BLEU and Rouge-L metrics, LLMs surpass the existing methods in certain indicators but lag behind in others. After human evaluations, however, LLMs show a distinct advantage over all these existing methods. Especially, in 78% of the 366 samples, the commit messages generated by LLMs were evaluated by humans as the best. This work not only reveals the promising potential of using LLMs to generate commit messages, but also explores the limitations of commonly used metrics in evaluating the quality of auto-generated commit messages., Comment: The 31st IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)
- Published
- 2024
19. An Exploratory Study on Automatic Identification of Assumptions in the Development of Deep Learning Frameworks
- Author
-
Yang, Chen, Liang, Peng, and Ma, Zinan
- Subjects
Computer Science - Software Engineering ,Computer Science - Machine Learning - Abstract
Stakeholders constantly make assumptions in the development of deep learning (DL) frameworks. These assumptions are related to various types of software artifacts (e.g., requirements, design decisions, and technical debt) and can turn out to be invalid, leading to system failures. Existing approaches and tools for assumption management usually depend on manual identification of assumptions. However, assumptions are scattered in various sources (e.g., code comments, commits, and issues) of DL framework development, and manually identifying assumptions has high costs (e.g., time and resources). The objective of the study is to evaluate different classification models for the purpose of identification with respect to assumptions from the point of view of developers and users in the context of DL framework projects (i.e., issues, pull requests, and commits) on GitHub. We constructed a new and largest dataset (i.e., AssuEval) of assumptions collected from the TensorFlow and Keras repositories on GitHub; explored the performance of seven non-transformers based models (e.g., Support Vector Machine, Classification and Regression Trees), the ALBERT model, and three large language models (i.e., ChatGPT, Claude, and Gemini) for identifying assumptions on the AssuEval dataset. The study results show that ALBERT achieves the best performance (f1-score: 0.9584) for identifying assumptions on the AssuEval dataset, which is much better than the other models (the 2nd best f1-score is 0.8858, achieved by the Claude 3.5 Sonnet model). Though ChatGPT, Claude, and Gemini are popular large language models, we do not recommend using them to identify assumptions in DL framework development because of their low performance. This study provides researchers with the largest dataset of assumptions for further research and helps practitioners better understand assumptions and how to manage them in their projects., Comment: 32 pages, 15 images, 13 tables, Manuscript revision submitted to a journal (2024)
- Published
- 2024
20. Does digital transformation promote the green innovation of China’s listed companies?
- Author
-
Liang, Peng and Sun, Xinhui
- Published
- 2024
- Full Text
- View/download PDF
21. Does artificial intelligence technology enhance green transformation of enterprises: based on green innovation perspective
- Author
-
Liang, Peng, Sun, Xinhui, and Qi, Luzhuang
- Published
- 2024
- Full Text
- View/download PDF
22. Architecture Decisions in Quantum Software Systems: An Empirical Study on Stack Exchange and GitHub
- Author
-
Aktar, Mst Shamima, Liang, Peng, Waseem, Muhammad, Tahir, Amjed, Ahmad, Aakash, Zhang, Beiqi, and Li, Zengyang
- Subjects
Computer Science - Software Engineering - Abstract
Quantum computing provides a new dimension in computation, utilizing the principles of quantum mechanics to potentially solve complex problems that are currently intractable for classical computers. However, little research has been conducted about the architecture decisions made in quantum software development, which have a significant influence on the functionality, performance, scalability, and reliability of these systems. The study aims to empirically investigate and analyze architecture decisions made during the development of quantum software systems, identifying prevalent challenges and limitations by using the posts and issues from Stack Exchange and GitHub. We used a qualitative approach to analyze the obtained data from Stack Exchange Sites and GitHub projects. Specifically, we collected data from 385 issues (from 87 GitHub projects) and 70 posts (from three Stack Exchange sites) related to architecture decisions in quantum software development. The results show that in quantum software development (1) architecture decisions are articulated in six linguistic patterns, the most common of which are Solution Proposal and Information Giving, (2) the two major categories of architectural decisions are Implementation Decision and Technology Decision, (3) Softwar Development Tools are the most common application domain among the twenty application domains identified, (4) Maintainability is the most frequently considered quality attribute, and (5) Design Issues and High Error Rates are the major limitations and challenges that practitioners face when making architecture decisions in quantum software development. Our results show that the limitations and challenges encountered in architecture decision-making during the development of quantum software systems are strongly linked to the particular features (e.g., quantum entanglement, superposition, and decoherence) of those systems., Comment: Preprint accepted for publication in Information and Software Technology, 2024
- Published
- 2023
23. Exploring Multi-Programming-Language Commits and Their Impacts on Software Quality: An Empirical Study on Apache Projects
- Author
-
Li, Zengyang, Qi, Xiaoxiao, Yu, Qinyi, Liang, Peng, Mo, Ran, and Yang, Chen
- Subjects
Computer Science - Software Engineering - Abstract
Context: Modern software systems (e.g., Apache Spark) are usually written in multiple programming languages (PLs). There is little understanding on the phenomenon of multi-programming-language commits (MPLCs), which involve modified source files written in multiple PLs. Objective: This work aims to explore MPLCs and their impacts on development difficulty and software quality. Methods: We performed an empirical study on eighteen non-trivial Apache projects with 197,566 commits. Results: (1) the most commonly used PL combination consists of all the four PLs, i.e., C/C++, Java, JavaScript, and Python; (2) 9% of the commits from all the projects are MPLCs, and the proportion of MPLCs in 83% of the projects goes to a relatively stable level; (3) more than 90% of the MPLCs from all the projects involve source files in two PLs; (4) the change complexity of MPLCs is significantly higher than that of non-MPLCs; (5) issues fixed in MPLCs take significantly longer to be resolved than issues fixed in non-MPLCs in 89% of the projects; (6) MPLCs do not show significant effects on issue reopen; (7) source files undergoing MPLCs tend to be more bug-prone; and (8) MPLCs introduce more bugs than non-MPLCs. Conclusions: MPLCs are related to increased development difficulty and decreased software quality., Comment: Preprint accepted for publication in Journal of Systems and Software, 2022. arXiv admin note: substantial text overlap with arXiv:2103.11691
- Published
- 2023
24. Exploring the Problems, their Causes and Solutions of AI Pair Programming: A Study on GitHub and Stack Overflow
- Author
-
Zhou, Xiyu, Liang, Peng, Zhang, Beiqi, Li, Zengyang, Ahmad, Aakash, Shahin, Mojtaba, and Waseem, Muhammad
- Subjects
Computer Science - Software Engineering - Abstract
With the recent advancement of Artificial Intelligence (AI) and Large Language Models (LLMs), AI-based code generation tools become a practical solution for software development. GitHub Copilot, the AI pair programmer, utilizes machine learning models trained on a large corpus of code snippets to generate code suggestions using natural language processing. Despite its popularity in software development, there is limited empirical evidence on the actual experiences of practitioners who work with Copilot. To this end, we conducted an empirical study to understand the problems that practitioners face when using Copilot, as well as their underlying causes and potential solutions. We collected data from 473 GitHub issues, 706 GitHub discussions, and 142 Stack Overflow posts. Our results reveal that (1) Operation Issue and Compatibility Issue are the most common problems faced by Copilot users, (2) Copilot Internal Error, Network Connection Error, and Editor/IDE Compatibility Issue are identified as the most frequent causes, and (3) Bug Fixed by Copilot, Modify Configuration/Setting, and Use Suitable Version are the predominant solutions. Based on the results, we discuss the potential areas of Copilot for enhancement, and provide the implications for the Copilot users, the Copilot team, and researchers., Comment: Preprint accepted for publication in Journal of Systems and Software, 2024
- Published
- 2023
25. Issues and Their Causes in WebAssembly Applications: An Empirical Study
- Author
-
Waseem, Muhammad, Das, Teerath, Ahmad, Aakash, Liang, Peng, and Mikkonen, Tommi
- Subjects
Computer Science - Software Engineering - Abstract
WebAssembly (Wasm) is a binary instruction format designed for secure and efficient execution within sandboxed environments -- predominantly web apps and browsers -- to facilitate performance, security, and flexibility of web programming languages. In recent years, Wasm has gained significant attention from the academic research community and industrial development projects to engineer high-performance web applications. Despite the offered benefits, developers encounter a multitude of issues rooted in Wasm (e.g., faults, errors, failures) and are often unaware of their root causes that impact the development of web applications. To this end, we conducted an empirical study that mines and documents practitioners' knowledge expressed as 385 issues from 12 open-source Wasm projects deployed on GitHub and 354 question-answer posts via Stack Overflow. Overall, we identified 120 types of issues, which were categorized into 19 subcategories and 9 categories to create a taxonomical classification of issues encountered in Wasm-based applications. Furthermore, root cause analysis of the issues helped us identify 278 types of causes, which have been categorized into 29 subcategories and 10 categories as a taxonomy of causes. Our study led to first-of-its-kind taxonomies of the issues faced by developers and their underlying causes in Wasm-based applications. The issue-cause taxonomies -- identified from GitHub and SO, offering empirically derived guidelines -- can guide researchers and practitioners to design, develop, and refactor Wasm-based applications., Comment: The 28th International Conference on Evaluation and Assessment in Software Engineering (EASE)
- Published
- 2023
26. ChatGPT as a Software Development Bot: A Project-based Study
- Author
-
Waseem, Muhammad, Das, Teerath, Ahmad, Aakash, Liang, Peng, Fehmideh, Mahdi, and Mikkonen, Tommi
- Subjects
Computer Science - Software Engineering - Abstract
Artificial Intelligence has demonstrated its significance in software engineering through notable improvements in productivity, accuracy, collaboration, and learning outcomes. This study examines the impact of generative AI tools, specifically ChatGPT, on the software development experiences of undergraduate students. Over a three-month project with seven students, ChatGPT was used as a support tool. The research focused on assessing ChatGPT's effectiveness, benefits, limitations, and its influence on learning. Results showed that ChatGPT significantly addresses skill gaps in software development education, enhancing efficiency, accuracy, and collaboration. It also improved participants' fundamental understanding and soft skills. The study highlights the importance of incorporating AI tools like ChatGPT in education to bridge skill gaps and increase productivity, but stresses the need for a balanced approach to technology use. Future research should focus on optimizing ChatGPT's application in various development contexts to maximize learning and address specific challenges., Comment: The 19th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE)
- Published
- 2023
27. Security Weaknesses of Copilot Generated Code in GitHub
- Author
-
Fu, Yujia, Liang, Peng, Tahir, Amjed, Li, Zengyang, Shahin, Mojtaba, Yu, Jiaxin, and Chen, Jinfu
- Subjects
Computer Science - Software Engineering ,Computer Science - Cryptography and Security - Abstract
Modern code generation tools, utilizing AI models like Large Language Models (LLMs), have gained popularity for producing functional code. However, their usage presents security challenges, often resulting in insecure code merging into the code base. Evaluating the quality of generated code, especially its security, is crucial. While prior research explored various aspects of code generation, the focus on security has been limited, mostly examining code produced in controlled environments rather than real-world scenarios. To address this gap, we conducted an empirical study, analyzing code snippets generated by GitHub Copilot from GitHub projects. Our analysis identified 452 snippets generated by Copilot, revealing a high likelihood of security issues, with 32.8% of Python and 24.5% of JavaScript snippets affected. These issues span 38 different Common Weakness Enumeration (CWE) categories, including significant ones like CWE-330: Use of Insufficiently Random Values, CWE-78: OS Command Injection, and CWE-94: Improper Control of Generation of Code. Notably, eight CWEs are among the 2023 CWE Top-25, highlighting their severity. Our findings confirm that developers should be careful when adding code generated by Copilot and should also run appropriate security checks as they accept the suggested code. It also shows that practitioners should cultivate corresponding security awareness and skills.
- Published
- 2023
28. Demystifying Practices, Challenges and Expected Features of Using GitHub Copilot
- Author
-
Zhang, Beiqi, Liang, Peng, Zhou, Xiyu, Ahmad, Aakash, and Waseem, Muhammad
- Subjects
Computer Science - Software Engineering - Abstract
With the advances in machine learning, there is a growing interest in AI-enabled tools for autocompleting source code. GitHub Copilot has been trained on billions of lines of open source GitHub code, and is one of such tools that has been increasingly used since its launch in June 2021. However, little effort has been devoted to understanding the practices, challenges, and expected features of using Copilot in programming for auto-completed source code from the point of view of practitioners. To this end, we conducted an empirical study by collecting and analyzing the data from Stack Overflow (SO) and GitHub Discussions. We searched and manually collected 303 SO posts and 927 GitHub discussions related to the usage of Copilot. We identified the programming languages, Integrated Development Environments (IDEs), technologies used with Copilot, functions implemented, benefits, limitations, and challenges when using Copilot. The results show that when practitioners use Copilot: (1) The major programming languages used with Copilot are JavaScript and Python, (2) the main IDE used with Copilot is Visual Studio Code, (3) the most common used technology with Copilot is Node.js, (4) the leading function implemented by Copilot is data processing, (5) the main purpose of users using Copilot is to help generate code, (6) the significant benefit of using Copilot is useful code generation, (7) the main limitation encountered by practitioners when using Copilot is difficulty of integration, and (8) the most common expected feature is that Copilot can be integrated with more IDEs. Our results suggest that using Copilot is like a double-edged sword, which requires developers to carefully consider various aspects when deciding whether or not to use it. Our study provides empirically grounded foundations that could inform developers and practitioners, as well as provide a basis for future investigations., Comment: Preprint accepted for publication in International Journal of Software Engineering and Knowledge Engineering, 2023. arXiv admin note: substantial text overlap with arXiv:2303.08733
- Published
- 2023
29. Demystifying Code Snippets in Code Reviews: A Study of the OpenStack and Qt Communities and A Practitioner Survey
- Author
-
Zhang, Beiqi, Fu, Liming, Liang, Peng, Yu, Jiaxin, and Wang, Chong
- Subjects
Computer Science - Software Engineering - Abstract
Code review is widely known as one of the best practices for software quality assurance in software development. In a typical code review process, reviewers check the code committed by developers to ensure the quality of the code, during which reviewers and developers would communicate with each other in review comments to exchange necessary information. As a result, understanding the information in review comments is a prerequisite for reviewers and developers to conduct an effective code review. Code snippet, as a special form of code, can be used to convey necessary information in code reviews. For example, reviewers can use code snippets to make suggestions or elaborate their ideas to meet developers' information needs in code reviews. However, little research has focused on the practices of providing code snippets in code reviews. To bridge this gap, we conduct a mixed-methods study to mine information and knowledge related to code snippets in code reviews, which can help practitioners and researchers get a better understanding about using code snippets in code review. Specifically, our study includes two phases: mining code review data and conducting practitioners' survey. The study results highlight that reviewers can provide code snippets in appropriate scenarios to meet developers' specific information needs in code reviews, which will facilitate and accelerate the code review process., Comment: Preprint accepted for publication in Empirical Software Engineering, 2024
- Published
- 2023
30. Rechargeable Li/Cl$_2$ battery down to -80 {\deg}C
- Author
-
Liang, Peng, Zhu, Guanzhou, Huang, Cheng-Liang, Li, Yuan-Yao, Sun, Hao, Yuan, Bin, Wu, Shu-Chi, Li, Jiachen, Wang, Feifei, Hwang, Bing-Joe, and Dai, Hongjie
- Subjects
Physics - Applied Physics - Abstract
Low temperature rechargeable batteries are important to life in cold climates, polar/deep-sea expeditions and space explorations. Here, we report ~ 3.5 - 4 V rechargeable lithium/chlorine (Li/Cl2) batteries operating down to -80 {\deg}C, employing Li metal negative electrode, a novel CO2 activated porous carbon (KJCO2) as the positive electrode, and a high ionic conductivity (~ 5 to 20 mS cm-1 from -80 {\deg}C to 25 {\deg}C) electrolyte comprised of 1 M aluminum chloride (AlCl3), 0.95 M lithium chloride (LiCl), and 0.05 M lithium bis(fluorosulfonyl)imide (LiFSI) in low melting point (-104.5 {\deg}C) thionyl chloride (SOCl2). Between room-temperature and -80 {\deg}C, the Li/Cl2 battery delivered up to ~ 30,000 - 4,500 mAh g-1 first discharge capacity and a 1,200 - 5,000 mAh g-1 reversible capacity (discharge voltages in ~ 3.5 to 3.1 V) over up to 130 charge-discharge cycles. Mass spectrometry and X-ray photoelectron spectroscopy (XPS) probed Cl2 trapped in the porous carbon upon LiCl electro-oxidation during charging. At lower temperature down to -80 {\deg}C, SCl2/S2Cl2 and Cl2 generated by electro-oxidation in the charging step were trapped in porous KJCO2 carbon, allowing for reversible reduction to afford a high discharge voltage plateau near ~ 4 V with up to ~ 1000 mAh g-1 capacity for SCl2/S2Cl2 reduction and up to ~ 4000 mAh g-1 capacity at ~ 3.1 V plateau for Cl2 reduction. Towards practical use, we made CR2032 Li/Cl2 battery cells to drive digital watches at -40 {\deg}C and light emitting diode at -80 {\deg}C, opening Li/Cl2 secondary batteries for ultra-cold conditions.
- Published
- 2023
31. Security Defect Detection via Code Review: A Study of the OpenStack and Qt Communities
- Author
-
Yu, Jiaxin, Fu, Liming, Liang, Peng, Tahir, Amjed, and Shahin, Mojtaba
- Subjects
Computer Science - Software Engineering - Abstract
Background: Despite the widespread use of automated security defect detection tools, software projects still contain many security defects that could result in serious damage. Such tools are largely context-insensitive and may not cover all possible scenarios in testing potential issues, which makes them susceptible to missing complex security defects. Hence, thorough detection entails a synergistic cooperation between these tools and human-intensive detection techniques, including code review. Code review is widely recognized as a crucial and effective practice for identifying security defects. Aim: This work aims to empirically investigate security defect detection through code review. Method: To this end, we conducted an empirical study by analyzing code review comments derived from four projects in the OpenStack and Qt communities. Through manually checking 20,995 review comments obtained by keyword-based search, we identified 614 comments as security-related. Results: Our results show that (1) security defects are not prevalently discussed in code review, (2) more than half of the reviewers provided explicit fixing strategies/solutions to help developers fix security defects, (3) developers tend to follow reviewers' suggestions and action the changes, (4) Not worth fixing the defect now and Disagreement between the developer and the reviewer are the main causes for not resolving security defects. Conclusions: Our research results demonstrate that (1) software security practices should combine manual code review with automated detection tools, achieving a more comprehensive coverage to identifying and addressing security defects, and (2) promoting appropriate standardization of practitioners' behaviors during code review remains necessary for enhancing software security., Comment: The 17th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
- Published
- 2023
32. Understanding Resolution of Multi-Language Bugs: An Empirical Study on Apache Projects
- Author
-
Li, Zengyang, Wang, Wenshuo, Wang, Sicheng, Liang, Peng, and Mo, Ran
- Subjects
Computer Science - Software Engineering - Abstract
Background: In modern software systems, more and more systems are written in multiple programming languages (PLs). There is no comprehensive investigation on the phenomenon of multi-programming-language (MPL) bugs, which resolution involves source files written in multiple PLs. Aim: This work investigated the characteristics of bug resolution in MPL software systems and explored the reasons why bug resolution involves multiple PLs. Method: We conducted an empirical study on 54 MPL projects selected from 655 Apache OSS projects, of which 66,932 bugs were analyzed. Results: (1) the percentage of MPL bugs (MPLBs) in the selected projects ranges from 0.17% to 42.26%, and the percentage of MPLBs for all projects as a whole is 10.01%; (2) 95.0% and 4.5% of all the MPLBs involve source files written in 2 and 3 PLs, respectively; (3) the change complexity resolution characteristics of MPLBs tend to be higher than those of single-programming-language bugs (SPLBs); (4) the open time for MPLBs is 19.52% to 529.57% significantly longer than SPLBs regarding 9 PL combinations; (5) the reopen rate of bugs involving the PL combination of JavaScript and Python reaches 20.66%; (6) we found 6 causes why the bug resolution involves multiple PLs and identified 5 cross-language calling mechanisms. Conclusion: MPLBs are related to increased development difficulty., Comment: The 17th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
- Published
- 2023
33. Mining architectural information: A systematic mapping study
- Author
-
Jean de Dieu, Musengamana, Liang, Peng, Shahin, Mojtaba, Yang, Chen, and Li, Zengyang
- Published
- 2024
- Full Text
- View/download PDF
34. Demystifying code snippets in code reviews: a study of the OpenStack and Qt communities and a practitioner survey
- Author
-
Zhang, Beiqi, Fu, Liming, Liang, Peng, Yu, Jiaxin, and Wang, Chong
- Published
- 2024
- Full Text
- View/download PDF
35. Comprehensive analysis identifies ubiquitin ligase FBXO42 as a tumor-promoting factor in neuroblastoma
- Author
-
Jianwu Zhou, Qijun Li, Xiaobin Deng, Liang Peng, Jian Sun, Yao Zhang, and Yifei Du
- Subjects
Neuroblastoma ,Bioinformatics ,FBXO42 ,TP53 ,Proliferation ,Medicine ,Science - Abstract
Abstract Neuroblastoma, the deadliest solid tumor in children, exhibits alarming mortality rates, particularly among high-risk cases. To enhance survival rates, a more precise risk stratification for patients is imperative. Utilizing proteomic data from 34 cases with or without N-Myc amplification, we identified 28 differentially expressed ubiquitination-related proteins (URGs). From these, a prognostic signature comprising 6 URGs was constructed. A nomogram incorporating clinical-pathological parameters yielded impressive AUC values of 0.88, 0.93, and 0.95 at 1, 3, and 5 years, respectively. Functional experiments targeting the E3 ubiquitin ligase FBXO42, a component of the prognostic signature, revealed its TP53-dependent promotion of neuroblastoma cell proliferation. In conclusion, our ubiquitination-related prognostic model robustly predicts patient outcomes, guiding clinical decisions. Additionally, the newfound pro-proliferative role of FBXO42 offers a novel foundation for understanding the molecular mechanisms of neuroblastoma.
- Published
- 2024
- Full Text
- View/download PDF
36. Ultrastrong, flexible thermogalvanic armor with a Carnot-relative efficiency over 8%
- Author
-
Jinpei Wang, Yuxin Song, Fanfei Yu, Yijun Zeng, Chenyang Wu, Xuezhi Qin, Liang Peng, Yitan Li, Yongsen Zhou, Ran Tao, Hangchen Liu, Hong Zhu, Ming Sun, Wanghuai Xu, Chao Zhang, and Zuankai Wang
- Subjects
Science - Abstract
Abstract Body heat, a clean and ubiquitous energy source, is promising as a renewable resource to supply wearable electronics. Emerging tough thermogalvanic device could be a sustainable platform to convert body heat energy into electricity for powering wearable electronics if its Carnot-relative efficiency (η r ) reaches ~5%. However, maximizing both the η r and mechanical strength of the device are mutually exclusive. Here, we develop a rational strategy to construct a flexible thermogalvanic armor (FTGA) with a η r over 8% near room temperature, yet preserving mechanical robustness. The key to our design lies in simultaneously realizing the thermosensitive-crystallization and salting-out effect in the elaborately designed ion-transport highway to boost η r and improve mechanical strength. The FTGA achieves an ultrahigh η r of 8.53%, coupling with impressive mechanical toughness of 70.65 MJ m−3 and substantial elongation (~900%) together. Our strategy holds sustainable potential for harvesting body heat and powering wearable electronics without recharging.
- Published
- 2024
- Full Text
- View/download PDF
37. Cystic Fibrosis: Understanding Cystic Fibrosis Transmembrane Regulator Mutation Classification and Modulator Therapies
- Author
-
Saba Anwar, Jin-Liang Peng, Kashif Rafiq Zahid, Yu-Ming Zhou, Qurban Ali, and Chong-Rong Qiu
- Subjects
cystic fibrosis ,fibrosis transmembrane regulator ,targeted mutation ,pathophysiology ,modulators ,Diseases of the respiratory system ,RC705-779 ,Medicine (General) ,R5-920 - Abstract
A common life-threatening hereditary disease, Cystic Fibrosis (CF), affects primarily Caucasian infants. High sweat-salt levels are observed as a result of a single autosomal mutation in chromosome 7 that affects the critical function of the cystic fibrosis transmembrane regulator (CFTR). For establishing tailored treatment strategies, it is important to understand the broad range of CFTR mutations and their impacts on disease pathophysiology. This study thoroughly investigates the six main classes of classification of CFTR mutations based on their functional effects. Each class is distinguished by distinct molecular flaws, such as poor protein synthesis, misfolding, gating defects, conduction defects, and decreased CFTR expression at the apical membrane. Furthermore, this paper focuses on the emerging field of CFTR modulators, which intend to restore CFTR function or mitigate its consequences. These modulators, which are characterized by the mode of action and targeted mutation class, have the potential to provide personalized therapy regimens in CF patients. This review provides valuable insights into the genetic basis of CF pathology, and highlights the potential for precision medicine methods in CF therapy by thoroughly investigating CFTR mutation classification and related modulators.
- Published
- 2024
- Full Text
- View/download PDF
38. Constructed Mott–Schottky Heterostructure Catalyst to Trigger Interface Disturbance and Manipulate Redox Kinetics in Li-O2 Battery
- Author
-
Yongji Xia, Le Wang, Guiyang Gao, Tianle Mao, Zhenjia Wang, Xuefeng Jin, Zheyu Hong, Jiajia Han, Dong-Liang Peng, and Guanghui Yue
- Subjects
Mott–Schottky heterostructure ,Lithium-oxygen batteries ,Electrocatalysts ,Electrodeposition ,Technology - Abstract
Highlights A carbon free self supported Mott-Schottky heterostructure was constructed as an efficient cathode catalyst for lithium oxygen batteries, achieving homogeneous contact between the two materials for strong interfacial interactions. The heterostructure triggered interfacial perturbations and band structure changes, which accelerated oxygen reduction reaction (ORR) and oxygen evolution reaction (OER) kinetics, resulting in an extremely long cycle life of 800 cycles and an extremely low overpotential of 0.73 V. Combined with advanced characterization techniques and density functional theory calculations, the underlying mechanism behind the boosted ORR/OER activities and the electrocatalytic mechanism were revealed.
- Published
- 2024
- Full Text
- View/download PDF
39. Unraveling the phosphorylation landscape: a leap forward in understanding the rice blast fungus pathogenicity
- Author
-
Vijai Bhadauria and You-Liang Peng
- Subjects
Infection-related fungal development ,Phosphorylation atlas ,Mitogen-activated protein kinases ,Pmk1 ,Vts1 ,Plant culture ,SB1-1110 - Abstract
Abstract The rice blast fungus Magnaporthe oryzae stands as a formidable adversary to one of the world’s most important crops, rice, which feeds over half of the global population. Its ability to rapidly evolve and adapt underscores the urgent need for a comprehensive understanding of its infection strategies. In a large-scale study published in Cell, Cruz-Mireles et al. (Cell 187:2557-73, 2024) utilized phosphoproteomics to globally map the phosphorylation landscape during the infection-related development by M. oryzae, identifying 2062 activated phosphoproteins carrying 8005 phosphosites. A subset of these phosphosites were conserved in the proteins of diverse fungal pathogens and appeared to be associated with biotrophic and hemibiotrophic infection. Thirty-two of these phosphoproteins are regulated by pathogenicity mitogen-activated kinase 1 (Pmk1), a central component of the MAPK signaling pathway, including VTi 1–2 suppressor, whose regulation by Pmk1 is essential for rice blast disease. Together, this global phosphorylation atlas offers a rich tapestry of potential therapeutic targets for developing green agrochemicals to control fungal diseases of plants.
- Published
- 2024
- Full Text
- View/download PDF
40. Tape‐casting electrode architecture permits low‐temperature manufacturing of all‐solid‐state thin‐film microbatteries
- Author
-
Bingyuan Ke, Congcong Zhang, Shoulin Cheng, Wangyang Li, Renming Deng, Hong Zhang, Jie Lin, Qingshui Xie, Baihua Qu, Dong‐Liang Peng, and Xinghui Wang
- Subjects
all‐solid‐state batteries ,lithium phosphorus oxynitride ,on‐chip integration ,silicon anodes ,tape‐casting electrodes ,Materials of engineering and construction. Mechanics of materials ,TA401-492 - Abstract
Abstract Along with the constantly evolving functional microsystems toward more diversification, the more rigorous design deliberation of pursuing higher mass‐loading of electrode materials and low‐temperature fabrication compatibility have imposed unprecedented demand on integrable all‐solid‐state thin‐film microbatteries. While the classic thin‐film intercalation cathode prepared by vacuum‐based techniques inevitably encountered a post‐annealing process, tape‐casting technologies hold great merits both in terms of high‐mass loading and low‐temperature processing. In this work, a novel microbattery configuration is developed by the combination of traditional tape‐casting thick electrodes and sputtered inorganic thin‐film solid electrolytes (~3 μm lithium phosphorus oxynitride). Enabled by physically pressed or vapor‐deposited Li as an anode, solid‐state batteries with tape‐casted LiFePO4 electrodes exhibit outstanding cyclability and stability. To meet integration requirements, LiFePO4/LiPON/Si microbatteries were successfully fabricated at low temperatures and found to achieve a wide operating temperature range. This novel configuration has good prospects in promoting the thin‐film microbattery enabling a paradigm shift and satisfying diversified requirements.
- Published
- 2024
- Full Text
- View/download PDF
41. An Empirical Study of Untangling Patterns of Two-Class Dependency Cycles
- Author
-
Feng, Qiong, Liu, Shuwen, Ji, Huan, Ma, Xiaotian, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
Dependency cycles pose a significant challenge to software quality and maintainability. However, there is limited understanding of how practitioners resolve dependency cycles in real-world scenarios. This paper presents an empirical study investigating the recurring patterns employed by software developers to resolve dependency cycles between two classes in practice. We analyzed the data from 38 open-source projects across different domains and manually inspected hundreds of cycle untangling cases. Our findings reveal that developers tend to employ five recurring patterns to address dependency cycles. The chosen patterns are not only determined by dependency relations between cyclic classes, but also highly related to their design context, i.e., how cyclic classes depend on or are depended by their neighbor classes. Through this empirical study, we also discovered three common counterintuitive solutions developers usually adopted during cycles' handling. These recurring patterns and common counterintuitive solutions observed in dependency cycles' practice can serve as a taxonomy to improve developers' awareness and also be used as learning materials for students in software engineering and inexperienced developers. Our results also suggest that, in addition to considering the internal structure of dependency cycles, automatic tools need to consider the design context of cycles to provide better support for refactoring dependency cycles., Comment: Preprint accepted for publication in Empirical Software Engineering, 2023
- Published
- 2023
42. Towards Automated Identification of Violation Symptoms of Architecture Erosion
- Author
-
Li, Ruiyin, Liang, Peng, and Avgeriou, Paris
- Subjects
Computer Science - Software Engineering - Abstract
Architecture erosion has a detrimental effect on maintenance and evolution, as the implementation drifts away from the intended architecture. To prevent this, development teams need to understand early enough the symptoms of erosion, and particularly violations of the intended architecture. One way to achieve this, is through the automated identification of architecture violations from textual artifacts, and particularly code reviews. In this paper, we developed 15 machine learning-based and 4 deep learning-based classifiers with three pre-trained word embeddings to identify violation symptoms of architecture erosion from developer discussions in code reviews. Specifically, we looked at code review comments from four large open-source projects from the OpenStack (Nova and Neutron) and Qt (Qt Base and Qt Creator) communities. We then conducted a survey and semi-structured interviews to acquire feedback from the involved participants who discussed architecture violations in code reviews, to validate the usefulness of our trained classifiers. The results show that the SVM classifier based on word2vec pre-trained word embedding performs the best with an F1-score of 0.779. In most cases, classifiers with the fastText pre-trained word embedding model can achieve relatively good performance. Furthermore, 200-dimensional pre-trained word embedding models outperform classifiers that use 100 and 300-dimensional models. In addition, an ensemble classifier based on the majority voting strategy can further enhance the classifier and outperforms the individual classifiers. Finally, the findings derived from the online survey and interviews conducted with the involved developers reveal that the violation symptoms identified by our approaches have practical value and can provide early warnings for impending architecture erosion., Comment: 21 pages, 4 images, 7 tables, Revision submitted to TSE (2024)
- Published
- 2023
43. Ethical Aspects of ChatGPT in Software Engineering Research
- Author
-
Akbar, Muhammad Azeem, Khan, Arif Ali, and Liang, Peng
- Subjects
Computer Science - Software Engineering - Abstract
ChatGPT can improve Software Engineering (SE) research practices by offering efficient, accessible information analysis and synthesis based on natural language interactions. However, ChatGPT could bring ethical challenges, encompassing plagiarism, privacy, data security, and the risk of generating biased or potentially detrimental data. This research aims to fill the given gap by elaborating on the key elements: motivators, demotivators, and ethical principles of using ChatGPT in SE research. To achieve this objective, we conducted a literature survey, identified the mentioned elements, and presented their relationships by developing a taxonomy. Further, the identified literature-based elements (motivators, demotivators, and ethical principles) were empirically evaluated by conducting a comprehensive questionnaire-based survey involving SE researchers. Additionally, we employed Interpretive Structure Modeling (ISM) approach to analyze the relationships between the ethical principles of using ChatGPT in SE research and develop a level based decision model. We further conducted a Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) analysis to create a cluster-based decision model. These models aim to help SE researchers devise effective strategies for ethically integrating ChatGPT into SE research by following the identified principles through adopting the motivators and addressing the demotivators. The findings of this study will establish a benchmark for incorporating ChatGPT services in SE research with an emphasis on ethical considerations., Comment: Preprint accepted for publication in IEEE Transactions on Artificial Intelligence, 2023
- Published
- 2023
44. Stark tuning of telecom single-photon emitters based on a single Er$^{3+}$
- Author
-
Huang, Jian-Yin, Liang, Peng-Jun, Zheng, Liang, Li, Pei-Yun, Ma, You-Zhi, Liu, Duan-Chen, Zhou, Zong-Quan, Li, Chuan-Feng, and Guo, Guang-Can
- Subjects
Quantum Physics - Abstract
The implementation of scalable quantum networks requires photons at the telecom band and long-lived spin coherence. The single Er$^{3+}$ in solid-state hosts is an important candidate that fulfills these critical requirements simultaneously. However, to entangle distant Er$^{3+}$ ions through photonic connections, the emission frequency of individual Er$^{3+}$ in solid-state matrix must be the same, which is challenging because the emission frequency of Er$^{3+}$ depends on its local environment. Herein, we propose and experimentally demonstrate the Stark tuning of the emission frequency of a single Er$^{3+}$ in a Y$_2$SiO$_5$ crystal by employing electrodes interfaced with a silicon photonic crystal cavity. We obtain a Stark shift of 182.9 $\pm$ 0.8 MHz which is approximately 27 times of the optical emission linewidth, demonstrating the promising applications in tuning the emission frequency of independent Er$^{3+}$ into the same spectral channels. Our results provide a useful solution for construction of scalable quantum networks based on single Er$^{3+}$ and a universal tool for tuning emission of individual rare-earth ions.
- Published
- 2023
- Full Text
- View/download PDF
45. Image Blind Denoising Using Dual Convolutional Neural Network with Skip Connection
- Author
-
Wu, Wencong, Liao, Shicheng, Lv, Guannan, Liang, Peng, and Zhang, Yungang
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
In recent years, deep convolutional neural networks have shown fascinating performance in the field of image denoising. However, deeper network architectures are often accompanied with large numbers of model parameters, leading to high training cost and long inference time, which limits their application in practical denoising tasks. In this paper, we propose a novel dual convolutional blind denoising network with skip connection (DCBDNet), which is able to achieve a desirable balance between the denoising effect and network complexity. The proposed DCBDNet consists of a noise estimation network and a dual convolutional neural network (CNN). The noise estimation network is used to estimate the noise level map, which improves the flexibility of the proposed model. The dual CNN contains two branches: a u-shaped sub-network is designed for the upper branch, and the lower branch is composed of the dilated convolution layers. Skip connections between layers are utilized in both the upper and lower branches. The proposed DCBDNet was evaluated on several synthetic and real-world image denoising benchmark datasets. Experimental results have demonstrated that the proposed DCBDNet can effectively remove gaussian noise in a wide range of levels, spatially variant noise and real noise. With a simple model structure, our proposed DCBDNet still can obtain competitive denoising performance compared to the state-of-the-art image denoising models containing complex architectures. Namely, a favorable trade-off between denoising performance and model complexity is achieved. Codes are available at https://github.com/WenCongWu/DCBDNet.
- Published
- 2023
46. DCANet: Dual Convolutional Neural Network with Attention for Image Blind Denoising
- Author
-
Wu, Wencong, Lv, Guannan, Duan, Yingying, Liang, Peng, Zhang, Yungang, and Xia, Yuelong
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
Noise removal of images is an essential preprocessing procedure for many computer vision tasks. Currently, many denoising models based on deep neural networks can perform well in removing the noise with known distributions (i.e. the additive Gaussian white noise). However eliminating real noise is still a very challenging task, since real-world noise often does not simply follow one single type of distribution, and the noise may spatially vary. In this paper, we present a new dual convolutional neural network (CNN) with attention for image blind denoising, named as the DCANet. To the best of our knowledge, the proposed DCANet is the first work that integrates both the dual CNN and attention mechanism for image denoising. The DCANet is composed of a noise estimation network, a spatial and channel attention module (SCAM), and a CNN with a dual structure. The noise estimation network is utilized to estimate the spatial distribution and the noise level in an image. The noisy image and its estimated noise are combined as the input of the SCAM, and a dual CNN contains two different branches is designed to learn the complementary features to obtain the denoised image. The experimental results have verified that the proposed DCANet can suppress both synthetic and real noise effectively. The code of DCANet is available at https://github.com/WenCongWu/DCANet.
- Published
- 2023
47. The role of visual organs in the locomotor behavior of Bactrocera minax (Diptera: Tephritidae)
- Author
-
Liang, Peng, He, Zhangzhang, Yang, Xuan, and Gui, Lianyou
- Published
- 2023
48. Silibinins and curcumin as promising ligands against mutant cystic fibrosis transmembrane regulator protein
- Author
-
Akram, Areeba, Sakhawat, Azra, Ghani, Muhammad Usman, Khan, Muhammad Umer, Rehman, Raima, Ali, Qurban, Jin-liang, Peng, and Ali, Daoud
- Published
- 2024
- Full Text
- View/download PDF
49. The prevalence and correlates of unintended pregnancy among female sex workers in South China: a cross-sectional study
- Author
-
Liang, Peng, Zhao, Peizhen, Shi, Yijia, Huang, Shujie, and Wang, Cheng
- Published
- 2024
- Full Text
- View/download PDF
50. Influence of radiotherapy interruption on esophageal cancer with intensity-modulated radiotherapy: a retrospective study
- Author
-
Mou, Yanhong, Liang, Peng, Cheng, Xun, He, Xin, Zhang, Jun, Liu, Liangzhong, and Liu, Qiang
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.