77,687 research outputs found

    Software Defect Association Mining and Defect Correction Effort Prediction

    Get PDF
    Much current software defect prediction work concentrates on the number of defects remaining in software system. In this paper, we present association rule mining based methods to predict defect associations and defect-correction effort. This is to help developers detect software defects and assist project managers in allocating testing resources more effectively. We applied the proposed methods to the SEL defect data consisting of more than 200 projects over more than 15 years. The results show that for the defect association prediction, the accuracy is very high and the false negative rate is very low. Likewise for the defect-correction effort prediction, the accuracy for both defect isolation effort prediction and defect correction effort prediction are also high. We compared the defect-correction effort prediction method with other types of methods: PART, C4.5, and Na¨ıve Bayes and show that accuracy has been improved by at least 23%. We also evaluated the impact of support and confidence levels on prediction accuracy, false negative rate, false positive rate, and the number of rules. We found that higher support and confidence levels may not result in higher prediction accuracy, and a sufficient number of rules is a precondition for high prediction accuracy

    A framework for interrogating social media images to reveal an emergent archive of war

    Get PDF
    The visual image has long been central to how war is seen, contested and legitimised, remembered and forgotten. Archives are pivotal to these ends as is their ownership and access, from state and other official repositories through to the countless photographs scattered and hidden from a collective understanding of what war looks like in individual collections and dusty attics. With the advent and rapid development of social media, however, the amateur and the professional, the illicit and the sanctioned, the personal and the official, and the past and the present, all seem to inhabit the same connected and chaotic space.However, to even begin to render intelligible the complexity, scale and volume of what war looks like in social media archives is a considerable task, given the limitations of any traditional human-based method of collection and analysis. We thus propose the production of a series of ‘snapshots’, using computer-aided extraction and identification techniques to try to offer an experimental way in to conceiving a new imaginary of war. We were particularly interested in testing to see if twentieth century wars, obviously initially captured via pre-digital means, had become more ‘settled’ over time in terms of their remediated presence today through their visual representations and connections on social media, compared with wars fought in digital media ecologies (i.e. those fought and initially represented amidst the volume and pervasiveness of social media images).To this end, we developed a framework for automatically extracting and analysing war images that appear in social media, using both the features of the images themselves, and the text and metadata associated with each image. The framework utilises a workflow comprising four core stages: (1) information retrieval, (2) data pre-processing, (3) feature extraction, and (4) machine learning. Our corpus was drawn from the social media platforms Facebook and Flickr

    TLAD 2010 Proceedings:8th international workshop on teaching, learning and assesment of databases (TLAD)

    Get PDF
    This is the eighth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2010), which once again is held as a workshop of BNCOD 2010 - the 27th International Information Systems Conference. TLAD 2010 is held on the 28th June at the beautiful Dudhope Castle at the Abertay University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.This year, the workshop includes an invited talk given by Richard Cooper (of the University of Glasgow) who will present a discussion and some results from the Database Disciplinary Commons which was held in the UK over the academic year. Due to the healthy number of high quality submissions this year, the workshop will also present seven peer reviewed papers, and six refereed poster papers. Of the seven presented papers, three will be presented as full papers and four as short papers. These papers and posters cover a number of themes, including: approaches to teaching databases, e.g. group centered and problem based learning; use of novel case studies, e.g. forensics and XML data; techniques and approaches for improving teaching and student learning processes; assessment techniques, e.g. peer review; methods for improving students abilities to develop database queries and develop E-R diagrams; and e-learning platforms for supporting teaching and learning

    TLAD 2010 Proceedings:8th international workshop on teaching, learning and assesment of databases (TLAD)

    Get PDF
    This is the eighth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2010), which once again is held as a workshop of BNCOD 2010 - the 27th International Information Systems Conference. TLAD 2010 is held on the 28th June at the beautiful Dudhope Castle at the Abertay University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.This year, the workshop includes an invited talk given by Richard Cooper (of the University of Glasgow) who will present a discussion and some results from the Database Disciplinary Commons which was held in the UK over the academic year. Due to the healthy number of high quality submissions this year, the workshop will also present seven peer reviewed papers, and six refereed poster papers. Of the seven presented papers, three will be presented as full papers and four as short papers. These papers and posters cover a number of themes, including: approaches to teaching databases, e.g. group centered and problem based learning; use of novel case studies, e.g. forensics and XML data; techniques and approaches for improving teaching and student learning processes; assessment techniques, e.g. peer review; methods for improving students abilities to develop database queries and develop E-R diagrams; and e-learning platforms for supporting teaching and learning

    Organizing the Technical Debt Landscape

    Get PDF
    To date, several methods and tools for detecting source code and design anomalies have been developed. While each method focuses on identifying certain classes of source code anomalies that potentially relate to technical debt (TD), the overlaps and gaps among these classes and TD have not been rigorously demonstrated. We propose to construct a seminal technical debt landscape as a way to visualize and organize research on the subjec

    Achieving Gender Justice in Indonesia's Forest and Land Governance Sector: How Civil Society Organizations Can Respond to Mining and Plantation Industry Impacts

    Get PDF
    Land based industries, most significantly palm oil plantations, timber concessions and mining operations, are expanding quickly in Indonesia. With approximately 840,000 ha of forest loss per year (Margono et al 2014), Indonesia suffers the world's highest rate of deforestation. As civil society organizations (CSOs) implement forest conservation strategies and programs to respond to the issue of forest loss, there is a growing concern that they lack the ability to address gender justice, or more specifically, Gender, Environment and Development, one field of Gender and Development. 1 This weakness may undermine CSO's ability to ameliorate the gendered injustices that limit women and marginalized communities' participation in forest governance. It also limits CSO's ability to build grassroots constituencies, which are crucial for driving reform. Drawing on the Gender, Environment and Development literature, and a gender assessment of selected Indonesian environmental CSOs, this paper provides a brief overview of the major gender issues relevant to forest and land governance, and makes six recommendations to help CSOs develop more gender sensitive advocacy and programming. The paper aims to contribute to the overall objective of improving gender justice (including women's participation) in forest governance

    Drivers of change or cut-throat competitors? Challenging Cultures of Innovation of Chinese and Nigerian migrant entrepreneurs in West Africa

    Get PDF
    The remarkable influx of Chinese migrant entrepreneurs in different West African countries in recent years has been met with growing resistance by established local entrepreneurs. Whether the former have a competitive edge over the latter because of distinctive socio-cultural traits, or whether the Chinese supposed effectiveness is just a characteristic feature of any trading Diaspora, is open to question. This exploratory study of Chinese and Nigerian entrepreneurial migrants in Ghana and Benin tries to answer this question. Apparently, the cultural motive powers of migrant drivers of change are not restricted to inherited value systems or religions like a protestant ethic or Confucianism, but they are permanently adapted and invented anew by transnational networks of migration in a globalized world. There is no evidence for a supposed superiority of Chinese versus African innovative cultures of entrepreneurial migrants. Rather there exists an enhanced innovative capacity of a trading Diaspora in general vis-à-vis local entrepreneurs, regardless of the background national culture in which it is embedded. In addition, the rivalry of Chinese and Nigerian migrant entrepreneurs in African markets does not necessarily lead to the often suspected cut-throat competition under the impact of globalization. Often both groups act rather complementary. This contributes under certain conditions even to poverty alleviation in the host country.trading diasporas; international migration; entrepreneurs; culture; innovation; SME; Africa; China; Nigeria; Cotonou; Accra;

    Are the Chinese in Africa More Innovative than the Africans? Comparing Chinese and Nigerian Entrepreneurial Migrants’ Cultures of Innovation

    Get PDF
    The remarkable influx of Chinese migrant entrepreneurs in West Africa has been met with growing resistance from established African entrepreneurs. Whether the former have a competitive edge over the latter because of distinctive sociocultural traits or whether the Chinese's supposed effectiveness is just a characteristic feature of any trading diaspora is open to question. This comparative exploratory study of Chinese and Nigerian entrepreneurial migrants in Ghana and Benin provides initial answers to these questions. Apparently, the cultural stimuli for migrant drivers of change are not restricted to inherited value systems or religions, such as a Protestant ethic or Confucianism; rather, they are continually adapted and invented anew by transnational migration networks in a globalized world. There is no evidence of the supposed superiority of the innovative culture of Chinese entrepreneurial migrants versus that of African entrepreneurial migrants. Rather, there exist trading diasporas which have a generally enhanced innovative capacity vis-àvis local entrepreneurs, regardless of the national culture in which they are embedded. In addition, the rivalry of Chinese and Nigerian migrant entrepreneurs in African markets does not necessarily lead to the often suspected cut-throat competition. Often the actions of each group are complementary to those of the other. Under certain conditions they even contribute to poverty alleviation in the host country.trading diasporas, international migration, entrepreneurs, culture, innovation, SMEs, Africa, China, Nigeria, Cotonou, Accra
    corecore