Learn More
When implementing new features into a software system, developers may duplicate several lines of code to reuse some existing code segments. This action creates code clones in the software system. The literature has documented different types of code clone (e.g., Type-1, Type-2, and Type-3). Once created, code clones evolve as they are modified during both(More)
Hardware implementation of human detection is a challenging task for embedded designs. This paper presents a real-time image-based field-programmable gate array (FPGA) implementation of human detection. Our implementation is based on the histograms of oriented gradients (HOG) feature and linear support vector machine (SVM) classifier. The novelty of this(More)
Copy and paste activities create clone groups in software systems. The evolution of a clone group across the history of a software system is termed as clone genealogy. During the evolution of a clone group, developers may change the location of the code fragments in the clone group. The type of the clone group may also change (e.g., from Type-1 to Type-2).(More)
Inflammatory bowel disease (IBD) is a chronic intestinal inflammatory condition. Psychological stress has been postulated to affect the clinical symptoms and recurrence of IBD. The exact molecular mechanisms are not fully understood. In the present study, we demonstrate that psychological stress promotes neutrophil infiltration into colon tissues in dextran(More)
One fundamental constraint of wireless sensor network (WSN) is the ratio of the power consumption to the energy supply. Recent studies have shown that building WSN nodes with solar-energy harvesting capability is an effective approach to lengthening the lifetime of node. Meanwhile, the partial dynamic reconfiguration (PDR) is a productive approach in(More)
Duplications and changes made on code segments by developers form code clones. Cloned code segments are exactly the same or have a particular similarity. A set of cloned code segments that have the same similarity with each other become a clone group. A clone genealogy contains several clone groups in different revisions and time periods. Based on different(More)
Up to now, the “4+1” View model, which has been approbated widely, has become an authoritative method to depict the architecture of software. In pragmatic application, however, this comprehensive description has not been applied well and the relevant research about it has ceased for long time. In this paper, we analyze the core(More)