361 research outputs found

    Achieving Efficient Teacher Talk: A Reflective Analysis of Teacher-student Class Communication

    Get PDF
    In recent years, there has been an increase in the number of studies on “teacher talk” used in TCSL classrooms. Many of these studies are focused on language interactions between the teacher and the students as well as on the individual functions of “the teachers’ classroom talk.” This article examines the current status of, and problems associated with, teachers’ instructional language, i.e., teacher talk. Based on transcripts of audio recordings of teachers’ instructional language, this study analyzes problems ranging from inaccurate to excessive words in the instructional language and the causes of these problems. This article also validates the study findings by analyzing textual data on teachers’ reflections, and also proposes specific solutions such as simplifying vocabulary and grammar of the instructional language, using auxiliary methods, establishing typical linguistic contexts, and implementing graphics and charts to organize thoughts. Finally, fundamental strategies to achieve “efficient instruction” are made that teachers intentionally enhance their Chinese language competence and teaching abilities, and educational institutions place sufficient emphasis on teacher training and instructional guidance and implement best practices

    Design, simulation and experiment of particle dampers attached to a precision instrument in spacecraft

    Get PDF
    Aiming at attenuating the vibration of a precision instrument in spacecraft, multiple particle dampers are designed and their damping performances are evaluated. Firstly, the vibrating table test for the primary system under sin-swept excitation is conducted to acquire the vibration characteristic. Then enclosures attached to the installing bracket are designed and fabricated elaborately. Using discrete element-finite element (DE-FE) coupling algorithm, the effects of some system parameters (such as: mass ratio, particle material, numbers of dampers and cavity depth) are investigated to optimize the damping capacity of particle dampers. Furthermore, a series of experiments are conducted to verify the performance of particle dampers under dynamic load. The results indicate that the transfer functions of acceleration in Y and Z direction decrease at 22.58 % and 77.38 % respectively, while only 3.1 % mass of the primary system is attached

    Matching dependence-related queries in the system dependence graph.

    Get PDF
    In software maintenance and evolution, it is common that develop-ers want to apply a change to a number of similar places. Due to the size and complexity of the code base, it is challenging for develop-ers to locate all the places that need the change. A main challenge in locating the places that need the change is that, these places share certain common dependence conditions but existing code searching techniques can hardly handle dependence relations satisfactorily. In this paper, we propose a technique that enables developers to make queries involving dependence conditions and textual condi-tions on the system dependence graph of the program. We carried out an empirical evaluation on four searching tasks taken from the development history of two real-world projects. The results of our evaluation indicate that, compared with code-clone detection, our technique is able to locate many required code elements that code-clone detection cannot locate, and compared with text search, our technique is able to effectively reduce false positives without losing any required code elements

    Multi-task learning for aspect level semantic classification combining complex aspect target semantic enhancement and adaptive local focus

    Get PDF
    Aspect-based sentiment analysis (ABSA) is a fine-grained and diverse task in natural language processing. Existing deep learning models for ABSA face the challenge of balancing the demand for finer granularity in sentiment analysis with the scarcity of training corpora for such granularity. To address this issue, we propose an enhanced BERT-based model for multi-dimensional aspect target semantic learning. Our model leverages BERT's pre-training and fine-tuning mechanisms, enabling it to capture rich semantic feature parameters. In addition, we propose a complex semantic enhancement mechanism for aspect targets to enrich and optimize fine-grained training corpora. Third, we combine the aspect recognition enhancement mechanism with a CRF model to achieve more robust and accurate entity recognition for aspect targets. Furthermore, we propose an adaptive local attention mechanism learning model to focus on sentiment elements around rich aspect target semantics. Finally, to address the varying contributions of each task in the joint training mechanism, we carefully optimize this training approach, allowing for a mutually beneficial training of multiple tasks. Experimental results on four Chinese and five English datasets demonstrate that our proposed mechanisms and methods effectively improve ABSA models, surpassing some of the latest models in multi-task and single-task scenarios

    Identifying Bug Signatures Using Discriminative Graph Mining

    Get PDF
    Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single state-ment or function call which is very likely to contain bugs. Although such methods could be very accurate, it is usually very hard for developers to understand the context of the bug, given each bug location in isolation. In this study, we propose to model software executions with graphs at two levels of granularity: methods and basic blocks. An indi-vidual node represents a method or basic block and an edge represents a method call, method return or transition (at the method or basic block granularity). Given a set of graphs of correct and faulty executions, we propose to extract the most discriminative subgraphs which contrast the program flow of correct and faulty executions. The extracted sub

    Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpus

    Get PDF
    In this paper, we study the problem of extracting technical paraphrases from a parallel software corpus, namely, a collection of duplicate bug reports. Paraphrase acquisition is a fundamental task in the emerging area of text mining for software engineering. Existing paraphrase extraction methods are not entirely suitable here due to the noisy nature of bug reports. We propose a number of techniques to address the noisy data problem. The empirical evaluation shows that our method significantly improves an existing method by up to 58%.

    Can i clone this piece of code here

    Get PDF
    ABSTRACT While code cloning is a convenient way for developers to reuse existing code, it may potentially lead to negative impacts, such as degrading code quality or increasing maintenance costs. Actually, some cloned code pieces are viewed as harmless since they evolve independently, while some other cloned code pieces are viewed as harmful since they need to be changed consistently, thus incurring extra maintenance costs. Recent studies demonstrate that neither the percentage of harmful code clones nor that of harmless code clones is negligible. To assist developers in leveraging the benefits of harmless code cloning and/or in avoiding the negative impacts of harmful code cloning, we propose a novel approach that automatically predicts the harmfulness of a code cloning operation at the point of performing copy-and-paste. Our insight is that the potential harmfulness of a code cloning operation may relate to some characteristics of the code to be cloned and the characteristics of its context. Based on a number of features extracted from the cloned code and the context of the code cloning operation, we use Bayesian Networks, a machine-learning technique, to predict the harmfulness of an intended code cloning operation. We evaluated our approach on two large-scale industrial software projects under two usage scenarios: 1) approving only cloning operations predicted to be very likely of no harm, and 2) blocking only cloning operations predicted to be very likely of harm. In the first scenario, our approach is able to approve more than 50% cloning operations with a precision higher than 94.9% in both subjects. In the second scenario, our approach is able to avoid more than 48% of the harmful cloning operations by blocking only 15% of the cloning operations for the first subject, and avoid more than 67% of the cloning operations by blocking only 34% of the cloning operations for the second subject
    • …
    corecore