Architectural Smells Detected by Tools: a Catalogue ProposalUmbertoAzadi
Architectural smells can negatively impact on different software qualities and can represent a relevant source of architectural debt. Several architectural smells have been defined by different researchers. Moreover, both academia and industry proposed several tools for software quality analysis, but it is not always clear to understand which tools provide also support for architectural smells detection and if the tools developed for this specific purpose are effectively available or not.
In this paper we propose a catalogue of architectural smells for which, at least one tool able to detect the smell exists. We outline the main differences in the detection techniques exploited by the tools and we propose a classification of these architectural smells according to the violation of three design principles.
Critical analysis of radar data signal de noising by implementation of haar w...eSAT Journals
Abstract Data signal de-noising is a crucial part of every transaction which involves capturing waves and processing them into understandable format. Most essentially, this process of data signal de-noising is important in the field of military and defence. Because of the rapid development in military communication systems, a limitation arises in the systems. The limitation being - quantity of signals profoundly increases along with noise and other disturbances’ presence in the signal. In order to overcome this drawback, batch de-noising techniques are implemented on the systems to produce clean signals. In this paper, the critical analysis case of RADAR [RAdio Detection And Ranging] data de-noising by implementation of Haar Wavelet Transformation is considered. A signal set simulation containing four signals procured from RADAR data is taken into consideration. The signals are then subjected to de-noising in MATLAB and indigenously developed python tool using Haar Wavelet Transformations. The ensuing results pertaining to accuracy and efficiency of output signals are then compared. Keywords: RADAR data, MATLAB tool, Python, De-noising techniques, Haar Wavelet Transformation, Signal Simulation.
COLOR AUTHENTICATION AND FAULT DETECTION USING EMBEDDED SYSTEMmlnptl
1.project is based on the embedded system.
2.In the early years the only way to communicate.
3.that is operate on simple power supply using the 12v adapter.
Architectural Smells Detected by Tools: a Catalogue ProposalUmbertoAzadi
Architectural smells can negatively impact on different software qualities and can represent a relevant source of architectural debt. Several architectural smells have been defined by different researchers. Moreover, both academia and industry proposed several tools for software quality analysis, but it is not always clear to understand which tools provide also support for architectural smells detection and if the tools developed for this specific purpose are effectively available or not.
In this paper we propose a catalogue of architectural smells for which, at least one tool able to detect the smell exists. We outline the main differences in the detection techniques exploited by the tools and we propose a classification of these architectural smells according to the violation of three design principles.
Critical analysis of radar data signal de noising by implementation of haar w...eSAT Journals
Abstract Data signal de-noising is a crucial part of every transaction which involves capturing waves and processing them into understandable format. Most essentially, this process of data signal de-noising is important in the field of military and defence. Because of the rapid development in military communication systems, a limitation arises in the systems. The limitation being - quantity of signals profoundly increases along with noise and other disturbances’ presence in the signal. In order to overcome this drawback, batch de-noising techniques are implemented on the systems to produce clean signals. In this paper, the critical analysis case of RADAR [RAdio Detection And Ranging] data de-noising by implementation of Haar Wavelet Transformation is considered. A signal set simulation containing four signals procured from RADAR data is taken into consideration. The signals are then subjected to de-noising in MATLAB and indigenously developed python tool using Haar Wavelet Transformations. The ensuing results pertaining to accuracy and efficiency of output signals are then compared. Keywords: RADAR data, MATLAB tool, Python, De-noising techniques, Haar Wavelet Transformation, Signal Simulation.
COLOR AUTHENTICATION AND FAULT DETECTION USING EMBEDDED SYSTEMmlnptl
1.project is based on the embedded system.
2.In the early years the only way to communicate.
3.that is operate on simple power supply using the 12v adapter.
DETECTION AND REFACTORING OF BAD SMELL CAUSED BY LARGE SCALEijseajournal
Bad smells are signs of potential problems in code. Detecting bad smells, however, remains time
consuming for software engineers despite proposals on bad smell detection and refactoring tools. Large
Class is a kind of bad smells caused by large scale, and the detection is hard to achieve automatically. In
this paper, a Large Class bad smell detection approach based on class length distribution model and
cohesion metrics is proposed. In programs, the lengths of classes are confirmed according to the certain
distributions. The class length distribution model is generalized to detect programs after grouping.
Meanwhile, cohesion metrics are analyzed for bad smell detection. The bad smell detection experiments of
open source programs show that Large Class bad smell can be detected effectively and accurately with this
approach, and refactoring scheme can be proposed for design quality improvements of programs.
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...IJNSA Journal
Malicious software is constantly being developed and improved, so detection and classification of malwareis an ever-evolving problem. Since traditional malware detection techniques fail to detect new/unknown malware, machine learning algorithms have been used to overcome this disadvantage. We present a Convolutional Neural Network (CNN) for malware type classification based on the API (Application Program Interface) calls. This research uses a database of 7107 instances of API call streams and 8 different malware types:Adware, Backdoor, Downloader, Dropper, Spyware, Trojan, Virus,Worm. We used a 1-Dimensional CNN by mapping API calls as categorical and term frequency-inverse document frequency (TF-IDF) vectors and compared the results to other classification techniques.The proposed 1-D CNN outperformed other classification techniques with 91% overall accuracy for both categorical and TF-IDF vectors.
Towards a Principle-based Classification of Structural Design SmellsTushar Sharma
This is our paper published in JOT (Journal of Object Technology) based on our initial work. In this paper, we present our (early) catalog, classification, and naming scheme for design smells and also highlight several interesting observations and insights that result from our work.
Slides of session I presensented to my folks at University of Calgary on research paper on Mudflow and Flowdroid.
Links given below:
https://www.st.cs.uni-saarland.de/appmining/mudflow/
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwik583ola7XAhUX6WMKHQYXCnoQFggoMAA&url=https%3A%2F%2Fblogs.uni-paderborn.de%2Fsse%2Ftools%2Fflowdroid%2F&usg=AOvVaw1t13BQnA07LA9FA3O5wNvN
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Temperature Monitoring and Forecast System in Remote Areas with 4.0G LTE Mobi...TELKOMNIKA JOURNAL
The need to monitor areas of high risk in terms of temperature indexes has included two important elements for its compliance: monitoring and forecast of records in an environment. Performing this procedure manually is inefficient as it provides a flat perspective and can’t predict the state of the environment with rigor. Software systems are contemporary elements in constant refinement, which satisfy emerging needs of a context, so that, in relation to monitoring and forecast an environment, it allows a sophisticated automation of the process, and that tends to lead to a better supervision of the risks in the environment. This article presents a proposal for the supervision of high-risk areas, through temperature registers, manageable through the design of a software system with the implementation of mobile 4.0G LTE technologies, aimed at efficiency and effectiveness in the notification of environmental status. Finally, I conclude with a remote temperature monitoring and forecast system, using mobile technologies, with a fuzzy logic prediction system with a quadratic error not greater than 2.6%, that is, on a fuzzy algebra system whose Numerical calculation does not exceed this error value in comparison with actual values; At the same time that the future works are presented from the approach of the research that is postulated, according to the emergence of new perspectives related to this developing software system.
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...Tom Mens
These are the slides of my ICSME 2016 keynote, presented on 5 October 2016 in Raleigh, North Carolina. I focus on the difficulties of maintaining and evolving software ecosystems, large collections of interacting software components that are maintained by a large and active community of contributors and that evolve together in the same environment. Software ecosystems are becoming ubiquitous due to the omnipresence of open source software. I present several problems that arise during maintenance and evolution of software ecosystems, and I argue how some of these challenges should be addressed by adopting a socio-technical view and by relying on a multidisciplinary and mixed methods research approach. I illustrate this with examples of social network analysis, complex systems research, ecological biodiversity, and survival analysis.
There are many projects made by government under the smart cities and it is necessary that these systems which conflicts the smart-cities garbage systems have to be smarter. With the help of these smart cities systems, it is necessary thatpeople need easy accessibility to the garbage disposing methods as well as the collection process. It should be efficient in terms of time and fuel cost. In our propose system we are going to check garbage fill status of the dustbin by using different types of Sensor to check the status and send the message to cloud. This research paper represents to segregate Dry and Wet garbage more efficient and reliable to certain extents.
Big data analytics for smart and sustainable city galwayLaura Po
Talk at Institute meeting NUI Galway
Laura Po - Associate Professor @ University of Modena and Reggio Emilia - laura.po@unimore.it
Federica Rollo - PhD Student @ University of Modena and Reggio Emilia - federica.rollo@unimore.it
Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...SEAA 2022
Felix Rinker 1,2
Kristof Meixner 1,2
Sebastian Kropatschek 3
Elmar Kiesling 4
Stefan Biffl 1,3
1 ISE TU Wien
2 CDL SQI TU Wien
3 CDP Wien
4 IDPKM WU Wien
5 OvGU Magdeburg
DETECTION AND REFACTORING OF BAD SMELL CAUSED BY LARGE SCALEijseajournal
Bad smells are signs of potential problems in code. Detecting bad smells, however, remains time
consuming for software engineers despite proposals on bad smell detection and refactoring tools. Large
Class is a kind of bad smells caused by large scale, and the detection is hard to achieve automatically. In
this paper, a Large Class bad smell detection approach based on class length distribution model and
cohesion metrics is proposed. In programs, the lengths of classes are confirmed according to the certain
distributions. The class length distribution model is generalized to detect programs after grouping.
Meanwhile, cohesion metrics are analyzed for bad smell detection. The bad smell detection experiments of
open source programs show that Large Class bad smell can be detected effectively and accurately with this
approach, and refactoring scheme can be proposed for design quality improvements of programs.
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...IJNSA Journal
Malicious software is constantly being developed and improved, so detection and classification of malwareis an ever-evolving problem. Since traditional malware detection techniques fail to detect new/unknown malware, machine learning algorithms have been used to overcome this disadvantage. We present a Convolutional Neural Network (CNN) for malware type classification based on the API (Application Program Interface) calls. This research uses a database of 7107 instances of API call streams and 8 different malware types:Adware, Backdoor, Downloader, Dropper, Spyware, Trojan, Virus,Worm. We used a 1-Dimensional CNN by mapping API calls as categorical and term frequency-inverse document frequency (TF-IDF) vectors and compared the results to other classification techniques.The proposed 1-D CNN outperformed other classification techniques with 91% overall accuracy for both categorical and TF-IDF vectors.
Towards a Principle-based Classification of Structural Design SmellsTushar Sharma
This is our paper published in JOT (Journal of Object Technology) based on our initial work. In this paper, we present our (early) catalog, classification, and naming scheme for design smells and also highlight several interesting observations and insights that result from our work.
Slides of session I presensented to my folks at University of Calgary on research paper on Mudflow and Flowdroid.
Links given below:
https://www.st.cs.uni-saarland.de/appmining/mudflow/
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwik583ola7XAhUX6WMKHQYXCnoQFggoMAA&url=https%3A%2F%2Fblogs.uni-paderborn.de%2Fsse%2Ftools%2Fflowdroid%2F&usg=AOvVaw1t13BQnA07LA9FA3O5wNvN
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Temperature Monitoring and Forecast System in Remote Areas with 4.0G LTE Mobi...TELKOMNIKA JOURNAL
The need to monitor areas of high risk in terms of temperature indexes has included two important elements for its compliance: monitoring and forecast of records in an environment. Performing this procedure manually is inefficient as it provides a flat perspective and can’t predict the state of the environment with rigor. Software systems are contemporary elements in constant refinement, which satisfy emerging needs of a context, so that, in relation to monitoring and forecast an environment, it allows a sophisticated automation of the process, and that tends to lead to a better supervision of the risks in the environment. This article presents a proposal for the supervision of high-risk areas, through temperature registers, manageable through the design of a software system with the implementation of mobile 4.0G LTE technologies, aimed at efficiency and effectiveness in the notification of environmental status. Finally, I conclude with a remote temperature monitoring and forecast system, using mobile technologies, with a fuzzy logic prediction system with a quadratic error not greater than 2.6%, that is, on a fuzzy algebra system whose Numerical calculation does not exceed this error value in comparison with actual values; At the same time that the future works are presented from the approach of the research that is postulated, according to the emergence of new perspectives related to this developing software system.
ICSME 2016 keynote: An ecosystemic and socio-technical view on software maint...Tom Mens
These are the slides of my ICSME 2016 keynote, presented on 5 October 2016 in Raleigh, North Carolina. I focus on the difficulties of maintaining and evolving software ecosystems, large collections of interacting software components that are maintained by a large and active community of contributors and that evolve together in the same environment. Software ecosystems are becoming ubiquitous due to the omnipresence of open source software. I present several problems that arise during maintenance and evolution of software ecosystems, and I argue how some of these challenges should be addressed by adopting a socio-technical view and by relying on a multidisciplinary and mixed methods research approach. I illustrate this with examples of social network analysis, complex systems research, ecological biodiversity, and survival analysis.
There are many projects made by government under the smart cities and it is necessary that these systems which conflicts the smart-cities garbage systems have to be smarter. With the help of these smart cities systems, it is necessary thatpeople need easy accessibility to the garbage disposing methods as well as the collection process. It should be efficient in terms of time and fuel cost. In our propose system we are going to check garbage fill status of the dustbin by using different types of Sensor to check the status and send the message to cloud. This research paper represents to segregate Dry and Wet garbage more efficient and reliable to certain extents.
Big data analytics for smart and sustainable city galwayLaura Po
Talk at Institute meeting NUI Galway
Laura Po - Associate Professor @ University of Modena and Reggio Emilia - laura.po@unimore.it
Federica Rollo - PhD Student @ University of Modena and Reggio Emilia - federica.rollo@unimore.it
Similar to Exploiting dynamic analysis for architectural smell detection: a preliminary study (20)
Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...SEAA 2022
Felix Rinker 1,2
Kristof Meixner 1,2
Sebastian Kropatschek 3
Elmar Kiesling 4
Stefan Biffl 1,3
1 ISE TU Wien
2 CDL SQI TU Wien
3 CDP Wien
4 IDPKM WU Wien
5 OvGU Magdeburg
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...SEAA 2022
Hamdy Michael Ayas | Hartmut Fischer | Philipp Leitner | Francisco Gomes de Oliveira Neto Department of Computer Science | Interaction Design & Software Engineering
Service Classification through Machine Learning: Aiding in the Efficient Ide...SEAA 2022
Zakieh Alizadehsani
David Berrocal
Daniel Feitosa
Alfonso González Briones
Theodoros Maikantis
Juan M. Corchado
Apostolos Ampatzoglou
Marcio Mateus
Alexander Chatzigeorgiou
Johannes Groenewold
Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...SEAA 2022
Niels van Harten Radboud University Nijmegen Nijmegen, The Netherlands
CDN (Diego) Damasceno Radboud University Nijmegen Nijmegen, The Netherlands
Daniel Strüber
Chalmers | University of Gothenburg (SE) Radboud University Nijmegen (NL)
An Industrial Experience Report about Challenges from Continuous Monitoring, ...SEAA 2022
Ali Nouri
Volvo Cars Gothenburg, Sweden
Christian Berger
University of Gothenburg, Sweden Department of Computer Science and Engineering
Fredrik Törner
Volvo Cars Gothenburg, Sweden
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
A brief information about the SCOP protein database used in bioinformatics.
The Structural Classification of Proteins (SCOP) database is a comprehensive and authoritative resource for the structural and evolutionary relationships of proteins. It provides a detailed and curated classification of protein structures, grouping them into families, superfamilies, and folds based on their structural and sequence similarities.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
5. Many tools leverage static analysis to detect architectural smells.
Exploiting dynamic analysis for architectural smell detection: a preliminary study
5
Tool Supported Languages Detected Architectural Smells
AI Reviewer C, C++
Cyclic Dependency, Hub-Like
Dependency, Cyclic Hierarchy, God
Component, Ambiguous Interface,
Unutilized Abstraction
ARCADE Java
Cyclic Dependency, Hub-Like
Dependency, Implicit Cross-module
Dependency
Arcan Java
Cyclic Dependency, Hub-Like
Dependency, Unstable Dependency,
Scattered Functionality, God Component,
Implicit Cross-module Dependency,
Architecture Violation
Designite C#
Cyclic Dependency, Hub-Like
Dependency, Unstable Dependency,
Cyclic Hierarchy, Scattered Functionality,
God Component, Multipath Hierarchy,
Ambiguous Interface, Unutilized
Abstraction, many others
Hotspot Detector Java
Cyclic Dependency, Unstable
Dependency, Cyclic Hierarchy,
Abstraction without Decoupling, Implicit
Cross-module Dependency
Massey Architecture Explorer Java
Cyclic Dependency, Cyclic Hierarchy,
Abstraction without Decoupling, Multipath
Hierarchy
Sonargraph Java, C#, C, C++ Cyclic Dependency, Architecture Violation
STAN Java Cyclic Dependency
Structure 101 Java, C#, C, C++, many other Cyclic Dependency, Architecture Violation
6. Hub-Like Dependency (HLD) a.k.a. Hub-like Modularization and Link Overload.
What does it? It occurs when an abstraction or a concrete class has (out-going and
in-going) dependencies with many
ot
her abstractions or concrete classes. It violates
Modularity and Healthy Dependency Structure.
How to detect it? The dependencies can be computed using several metri
cs
(e.g.,
Fan-In and Fan-Out for in-going and out-going dependencies). It requires selecting a
threshold. The detection results largely vary across tools.
Exploiting dynamic analysis for architectural smell detection: a preliminary study
6
Most Wanted #1: Hub-Like Dependency
7. Exploiting dynamic analysis for architectural smell detection: a preliminary study
7
Cyclic Dependency (CD) a.k.a. Tangle, Cross-Module Cycle, Cross-Package
Cycle, Cycle of classes, and Cyclically-dependent Modularization.
What does it? It arises when several architectural components depend on each
ot
her
directly or indirectly. It violates Modularity and Healthy Dependency Structure.
How to detect it? Most tools detect this smell only at the class level, then analyze it at
the package level by generalizing the dependency graph obtained at the class level.
Most Wanted #2: Cyclic Dependency
15. Exploiting dynamic analysis for architectural smell detection: a preliminary study
ARCAN: ARChitecture ANalyzer - https://essere.disco.unimib.it/wiki/arcan/
Detection Strategy for Hub-Like Dependency 12
Hub-Like Dependency (HLD) a.k.a. Hub-like Modularization and Link Overload.
What does it? It occurs when an abstraction or a concrete class has (out-going
and in-going) dependencies with many
ot
her abstractions or concrete classes. It
violates Modularity and Healthy Dependency Structure.
How to detect it? The dependencies can be computed using several metri
cs
(e.g., Fan-In and Fan-Out for in-going and out-going dependencies). It requires
selecting a threshold. The detection results largely vary across tools.
Metric Collection
Threshold Derivation via Static Analysis:
the median number of in-going and out-
going dependencies for each class.
Threshold Re
fi
nement: the maximum values of the two sets of thresholds.
If the “static” threshold equals zero, the re
fi
ned threshold is set to zero to decrease the
number of false positives.
Threshold Derivation via Dynamic Analysis:
the median number of in-going and out-
going dependencies for each class.
Architectural Smell Detection: evaluation of all components against the thresholds.
The classes whose metric values are higher than the thresholds are marked as smelly.
17. Exploiting dynamic analysis for architectural smell detection: a preliminary study
More about the Experimental Design
14
Project Version # Classes LOC % Coverage
JGraphT 0.8.1 38 11,931 73.8
JFreeChart 1.5.0 652 92,938 71.7
Apache Sling 1.6.17 83 10,312 65.8
Spring PetClinic 4.2.6 42 10,343 83.1
Lecousin.net 0.8.4 73 6,115 87.2
SimpleMathBackEnd 0.0.1 17 671 89.0
Zxing 3.4.1 499 43,623 98.0
Oryx 1.0.1 431 20,173 100.0
Ambari 1.2.3 711 70,621 100.0
HandleBar 4.2.0 391 24,770 78.0
The
fi
rst two authors of the paper validated each instance of
detected smell into True Positives and False Positives.
The validation was conducted in isolation to avoid bias.
We executed Arcan featuring (i) only static analysis and
(ii) both static and dynamic analysis
to detect Hub-Like Dependencies and Cyclic Dependencies.
21. Exploiting dynamic analysis for architectural smell detection: a preliminary study
Results for Hub-Like Dependency
18
A GUI Listener was detected as a Hub-Like Dependency.
Project
Static Analysis
(precision)
Static and Dynamic
Analysis
(precision)
# Matches
JFreeChart 2 (1.00) 14 (0.92) 2 (14%)
Apache Sling 3 (1.00) 5 (0.80) 3 (60%)
Spring PetClinic 0 (-) 1 (0.00) -
Lecousin.net 1 (1.00) 1 (1.00) 1 (100%)
HandleBar 2 (1.00) 7 (1.00) 1 (14%)
A Façade was detected as a Hub-Like Dependency.
The tests were not complete enough.
22. Exploiting dynamic analysis for architectural smell detection: a preliminary study
Results for Hub-Like Dependency
18
A GUI Listener was detected as a Hub-Like Dependency.
Project
Static Analysis
(precision)
Static and Dynamic
Analysis
(precision)
# Matches
JFreeChart 2 (1.00) 14 (0.92) 2 (14%)
Apache Sling 3 (1.00) 5 (0.80) 3 (60%)
Spring PetClinic 0 (-) 1 (0.00) -
Lecousin.net 1 (1.00) 1 (1.00) 1 (100%)
HandleBar 2 (1.00) 7 (1.00) 1 (14%)
A Façade was detected as a Hub-Like Dependency.
The tests were not complete enough.
Reminder 1. Utility classes may be naturally born
Hub-Like Dependencies.
23. Exploiting dynamic analysis for architectural smell detection: a preliminary study
Results for Hub-Like Dependency
18
A GUI Listener was detected as a Hub-Like Dependency.
Project
Static Analysis
(precision)
Static and Dynamic
Analysis
(precision)
# Matches
JFreeChart 2 (1.00) 14 (0.92) 2 (14%)
Apache Sling 3 (1.00) 5 (0.80) 3 (60%)
Spring PetClinic 0 (-) 1 (0.00) -
Lecousin.net 1 (1.00) 1 (1.00) 1 (100%)
HandleBar 2 (1.00) 7 (1.00) 1 (14%)
A Façade was detected as a Hub-Like Dependency.
The tests were not complete enough.
Reminder 1. Utility classes may be naturally born
Hub-Like Dependencies.
Reminder 2. Some Architectural Smells are related
to design patterns.
30. Exploiting dynamic analysis for architectural smell detection: a preliminary study
Limitations and Future Work
21
An excessive number of tests leads to very long execution traces, which are complex and costly to analyze.
What about the automated selection and generation of tests for dynamic analysis?
What about using execution traces from production (e.g., in a DevOps lifecycle)?
We considered only two architectural smells.
What about other architectural smells affecting other violations?
We relied on Java Call Tracer.
What about a dedicated monitoring component?