Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes
Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of d...
Ausführliche Beschreibung
Autor*in: |
Bing Zhang [verfasserIn] Guoyan Huang [verfasserIn] Zhangqi Zheng [verfasserIn] Jiadong Ren [verfasserIn] Changzhen Hu [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2018 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: IEEE Access - IEEE, 2014, 6(2018), Seite 32543-32553 |
---|---|
Übergeordnetes Werk: |
volume:6 ; year:2018 ; pages:32543-32553 |
Links: |
---|
DOI / URN: |
10.1109/ACCESS.2018.2840838 |
---|
Katalog-ID: |
DOAJ056916647 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ056916647 | ||
003 | DE-627 | ||
005 | 20230308204817.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230227s2018 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1109/ACCESS.2018.2840838 |2 doi | |
035 | |a (DE-627)DOAJ056916647 | ||
035 | |a (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK1-9971 | |
100 | 0 | |a Bing Zhang |e verfasserin |4 aut | |
245 | 1 | 0 | |a Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes |
264 | 1 | |c 2018 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. | ||
650 | 4 | |a Software network | |
650 | 4 | |a vital nodes | |
650 | 4 | |a power-law | |
650 | 4 | |a modularity | |
653 | 0 | |a Electrical engineering. Electronics. Nuclear engineering | |
700 | 0 | |a Guoyan Huang |e verfasserin |4 aut | |
700 | 0 | |a Zhangqi Zheng |e verfasserin |4 aut | |
700 | 0 | |a Jiadong Ren |e verfasserin |4 aut | |
700 | 0 | |a Changzhen Hu |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t IEEE Access |d IEEE, 2014 |g 6(2018), Seite 32543-32553 |w (DE-627)728440385 |w (DE-600)2687964-5 |x 21693536 |7 nnns |
773 | 1 | 8 | |g volume:6 |g year:2018 |g pages:32543-32553 |
856 | 4 | 0 | |u https://doi.org/10.1109/ACCESS.2018.2840838 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d |z kostenfrei |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/document/8368231/ |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2169-3536 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 6 |j 2018 |h 32543-32553 |
author_variant |
b z bz g h gh z z zz j r jr c h ch |
---|---|
matchkey_str |
article:21693536:2018----::prahoiehmdlrtosfwrntokaeo |
hierarchy_sort_str |
2018 |
callnumber-subject-code |
TK |
publishDate |
2018 |
allfields |
10.1109/ACCESS.2018.2840838 doi (DE-627)DOAJ056916647 (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d DE-627 ger DE-627 rakwb eng TK1-9971 Bing Zhang verfasserin aut Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. Software network vital nodes power-law modularity Electrical engineering. Electronics. Nuclear engineering Guoyan Huang verfasserin aut Zhangqi Zheng verfasserin aut Jiadong Ren verfasserin aut Changzhen Hu verfasserin aut In IEEE Access IEEE, 2014 6(2018), Seite 32543-32553 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:6 year:2018 pages:32543-32553 https://doi.org/10.1109/ACCESS.2018.2840838 kostenfrei https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d kostenfrei https://ieeexplore.ieee.org/document/8368231/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2018 32543-32553 |
spelling |
10.1109/ACCESS.2018.2840838 doi (DE-627)DOAJ056916647 (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d DE-627 ger DE-627 rakwb eng TK1-9971 Bing Zhang verfasserin aut Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. Software network vital nodes power-law modularity Electrical engineering. Electronics. Nuclear engineering Guoyan Huang verfasserin aut Zhangqi Zheng verfasserin aut Jiadong Ren verfasserin aut Changzhen Hu verfasserin aut In IEEE Access IEEE, 2014 6(2018), Seite 32543-32553 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:6 year:2018 pages:32543-32553 https://doi.org/10.1109/ACCESS.2018.2840838 kostenfrei https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d kostenfrei https://ieeexplore.ieee.org/document/8368231/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2018 32543-32553 |
allfields_unstemmed |
10.1109/ACCESS.2018.2840838 doi (DE-627)DOAJ056916647 (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d DE-627 ger DE-627 rakwb eng TK1-9971 Bing Zhang verfasserin aut Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. Software network vital nodes power-law modularity Electrical engineering. Electronics. Nuclear engineering Guoyan Huang verfasserin aut Zhangqi Zheng verfasserin aut Jiadong Ren verfasserin aut Changzhen Hu verfasserin aut In IEEE Access IEEE, 2014 6(2018), Seite 32543-32553 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:6 year:2018 pages:32543-32553 https://doi.org/10.1109/ACCESS.2018.2840838 kostenfrei https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d kostenfrei https://ieeexplore.ieee.org/document/8368231/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2018 32543-32553 |
allfieldsGer |
10.1109/ACCESS.2018.2840838 doi (DE-627)DOAJ056916647 (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d DE-627 ger DE-627 rakwb eng TK1-9971 Bing Zhang verfasserin aut Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. Software network vital nodes power-law modularity Electrical engineering. Electronics. Nuclear engineering Guoyan Huang verfasserin aut Zhangqi Zheng verfasserin aut Jiadong Ren verfasserin aut Changzhen Hu verfasserin aut In IEEE Access IEEE, 2014 6(2018), Seite 32543-32553 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:6 year:2018 pages:32543-32553 https://doi.org/10.1109/ACCESS.2018.2840838 kostenfrei https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d kostenfrei https://ieeexplore.ieee.org/document/8368231/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2018 32543-32553 |
allfieldsSound |
10.1109/ACCESS.2018.2840838 doi (DE-627)DOAJ056916647 (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d DE-627 ger DE-627 rakwb eng TK1-9971 Bing Zhang verfasserin aut Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. Software network vital nodes power-law modularity Electrical engineering. Electronics. Nuclear engineering Guoyan Huang verfasserin aut Zhangqi Zheng verfasserin aut Jiadong Ren verfasserin aut Changzhen Hu verfasserin aut In IEEE Access IEEE, 2014 6(2018), Seite 32543-32553 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:6 year:2018 pages:32543-32553 https://doi.org/10.1109/ACCESS.2018.2840838 kostenfrei https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d kostenfrei https://ieeexplore.ieee.org/document/8368231/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2018 32543-32553 |
language |
English |
source |
In IEEE Access 6(2018), Seite 32543-32553 volume:6 year:2018 pages:32543-32553 |
sourceStr |
In IEEE Access 6(2018), Seite 32543-32553 volume:6 year:2018 pages:32543-32553 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Software network vital nodes power-law modularity Electrical engineering. Electronics. Nuclear engineering |
isfreeaccess_bool |
true |
container_title |
IEEE Access |
authorswithroles_txt_mv |
Bing Zhang @@aut@@ Guoyan Huang @@aut@@ Zhangqi Zheng @@aut@@ Jiadong Ren @@aut@@ Changzhen Hu @@aut@@ |
publishDateDaySort_date |
2018-01-01T00:00:00Z |
hierarchy_top_id |
728440385 |
id |
DOAJ056916647 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ056916647</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308204817.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/ACCESS.2018.2840838</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ056916647</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Bing Zhang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software network</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">vital nodes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">power-law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">modularity</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electrical engineering. Electronics. Nuclear engineering</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Guoyan Huang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Zhangqi Zheng</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Jiadong Ren</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Changzhen Hu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Access</subfield><subfield code="d">IEEE, 2014</subfield><subfield code="g">6(2018), Seite 32543-32553</subfield><subfield code="w">(DE-627)728440385</subfield><subfield code="w">(DE-600)2687964-5</subfield><subfield code="x">21693536</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:6</subfield><subfield code="g">year:2018</subfield><subfield code="g">pages:32543-32553</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/ACCESS.2018.2840838</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/8368231/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2169-3536</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">6</subfield><subfield code="j">2018</subfield><subfield code="h">32543-32553</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Bing Zhang |
spellingShingle |
Bing Zhang misc TK1-9971 misc Software network misc vital nodes misc power-law misc modularity misc Electrical engineering. Electronics. Nuclear engineering Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes |
authorStr |
Bing Zhang |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)728440385 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TK1-9971 |
illustrated |
Not Illustrated |
issn |
21693536 |
topic_title |
TK1-9971 Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes Software network vital nodes power-law modularity |
topic |
misc TK1-9971 misc Software network misc vital nodes misc power-law misc modularity misc Electrical engineering. Electronics. Nuclear engineering |
topic_unstemmed |
misc TK1-9971 misc Software network misc vital nodes misc power-law misc modularity misc Electrical engineering. Electronics. Nuclear engineering |
topic_browse |
misc TK1-9971 misc Software network misc vital nodes misc power-law misc modularity misc Electrical engineering. Electronics. Nuclear engineering |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
IEEE Access |
hierarchy_parent_id |
728440385 |
hierarchy_top_title |
IEEE Access |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)728440385 (DE-600)2687964-5 |
title |
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes |
ctrlnum |
(DE-627)DOAJ056916647 (DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d |
title_full |
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes |
author_sort |
Bing Zhang |
journal |
IEEE Access |
journalStr |
IEEE Access |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2018 |
contenttype_str_mv |
txt |
container_start_page |
32543 |
author_browse |
Bing Zhang Guoyan Huang Zhangqi Zheng Jiadong Ren Changzhen Hu |
container_volume |
6 |
class |
TK1-9971 |
format_se |
Elektronische Aufsätze |
author-letter |
Bing Zhang |
doi_str_mv |
10.1109/ACCESS.2018.2840838 |
author2-role |
verfasserin |
title_sort |
approach to mine the modularity of software network based on the most vital nodes |
callnumber |
TK1-9971 |
title_auth |
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes |
abstract |
Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. |
abstractGer |
Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. |
abstract_unstemmed |
Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
title_short |
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes |
url |
https://doi.org/10.1109/ACCESS.2018.2840838 https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d https://ieeexplore.ieee.org/document/8368231/ https://doaj.org/toc/2169-3536 |
remote_bool |
true |
author2 |
Guoyan Huang Zhangqi Zheng Jiadong Ren Changzhen Hu |
author2Str |
Guoyan Huang Zhangqi Zheng Jiadong Ren Changzhen Hu |
ppnlink |
728440385 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1109/ACCESS.2018.2840838 |
callnumber-a |
TK1-9971 |
up_date |
2024-07-03T23:30:31.682Z |
_version_ |
1803602552880627712 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ056916647</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308204817.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/ACCESS.2018.2840838</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ056916647</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ1fe52ec1daec44e7ae029df2dad1519d</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Bing Zhang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness. This paper intends to propose a method based on the most vital nodes to analyze the modularity of software of different versions. To this end, it first tracked software dynamic execution traces to build a dynamic software network model, and then it mapped these traces to a complex network of a dynamic invoke software network. Second, it identified the most vital nodes in two steps, namely the calInitialWeightForNode and calFinalWeightForNode in order to compute the initial weights and the final weights of nodes iteratively. Third, it mined top-k nodes as the original communities to create a framework for detecting new community, and expanded these nodes to the community by the algorithm expandTheCommunity and evaluated the results with criterion Q. Finally, it calculated the modularity of software of different versions. Experimental results show that the most vital nodes are reasonable to be taken in comparison with other ranking measures, and that the analysis approach to the modularity of software network is effective in evaluating software community structure, and can help assist the developer to refactor the software and improve the software quality.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software network</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">vital nodes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">power-law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">modularity</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electrical engineering. Electronics. Nuclear engineering</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Guoyan Huang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Zhangqi Zheng</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Jiadong Ren</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Changzhen Hu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Access</subfield><subfield code="d">IEEE, 2014</subfield><subfield code="g">6(2018), Seite 32543-32553</subfield><subfield code="w">(DE-627)728440385</subfield><subfield code="w">(DE-600)2687964-5</subfield><subfield code="x">21693536</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:6</subfield><subfield code="g">year:2018</subfield><subfield code="g">pages:32543-32553</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/ACCESS.2018.2840838</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/1fe52ec1daec44e7ae029df2dad1519d</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/8368231/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2169-3536</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">6</subfield><subfield code="j">2018</subfield><subfield code="h">32543-32553</subfield></datafield></record></collection>
|
score |
7.3981085 |