-
Leveraging LLMs, IDEs, and Semantic Embeddings for Automated Move Method Refactoring
Authors:
Fraol Batole,
Abhiram Bellur,
Malinda Dilhara,
Mohammed Raihan Ullah,
Yaroslav Zharov,
Timofey Bryksin,
Kai Ishikawa,
Haifeng Chen,
Masaharu Morimoto,
Shota Motoura,
Takeo Hosomi,
Tien N. Nguyen,
Hridesh Rajan,
Nikolaos Tsantalis,
Danny Dig
Abstract:
MOVEMETHOD is a hallmark refactoring. Despite a plethora of research tools that recommend which methods to move and where, these recommendations do not align with how expert developers perform MOVEMETHOD. Given the extensive training of Large Language Models and their reliance upon naturalness of code, they should expertly recommend which methods are misplaced in a given class and which classes ar…
▽ More
MOVEMETHOD is a hallmark refactoring. Despite a plethora of research tools that recommend which methods to move and where, these recommendations do not align with how expert developers perform MOVEMETHOD. Given the extensive training of Large Language Models and their reliance upon naturalness of code, they should expertly recommend which methods are misplaced in a given class and which classes are better hosts. Our formative study of 2016 LLM recommendations revealed that LLMs give expert suggestions, yet they are unreliable: up to 80% of the suggestions are hallucinations. We introduce the first LLM fully powered assistant for MOVEMETHOD refactoring that automates its whole end-to-end lifecycle, from recommendation to execution. We designed novel solutions that automatically filter LLM hallucinations using static analysis from IDEs and a novel workflow that requires LLMs to be self-consistent, critique, and rank refactoring suggestions. As MOVEMETHOD refactoring requires global, projectlevel reasoning, we solved the limited context size of LLMs by employing refactoring-aware retrieval augment generation (RAG). Our approach, MM-assist, synergistically combines the strengths of the LLM, IDE, static analysis, and semantic relevance. In our thorough, multi-methodology empirical evaluation, we compare MM-assist with the previous state-of-the-art approaches. MM-assist significantly outperforms them: (i) on a benchmark widely used by other researchers, our Recall@1 and Recall@3 show a 1.7x improvement; (ii) on a corpus of 210 recent refactorings from Open-source software, our Recall rates improve by at least 2.4x. Lastly, we conducted a user study with 30 experienced participants who used MM-assist to refactor their own code for one week. They rated 82.8% of MM-assist recommendations positively. This shows that MM-assist is both effective and useful.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
xNose: A Test Smell Detector for C#
Authors:
Partha P. Paul,
Md Tonoy Akanda,
M. Raihan Ullah,
Dipto Mondal,
Nazia S. Chowdhury,
Fazle M. Tawsif
Abstract:
Test smells, similar to code smells, can negatively impact both the test code and the production code being tested. Despite extensive research on test smells in languages like Java, Scala, and Python, automated tools for detecting test smells in C# are lacking. This paper aims to bridge this gap by extending the study of test smells to C#, and developing a tool (xNose) to identify test smells in t…
▽ More
Test smells, similar to code smells, can negatively impact both the test code and the production code being tested. Despite extensive research on test smells in languages like Java, Scala, and Python, automated tools for detecting test smells in C# are lacking. This paper aims to bridge this gap by extending the study of test smells to C#, and developing a tool (xNose) to identify test smells in this language and analyze their distribution across projects. We identified 16 test smells from prior studies that were language-independent and had equivalent features in C# and evaluated xNose, achieving a precision score of 96.97% and a recall score of 96.03%. In addition, we conducted an empirical study to determine the prevalence of test smells in xUnit-based C# projects. This analysis sheds light on the frequency and distribution of test smells, deepening our understanding of their impact on C# projects and test suites. The development of xNose and our analysis of test smells in C# code aim to assist developers in maintaining code quality by addressing potential issues early in the development process.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
CB-HVTNet: A channel-boosted hybrid vision transformer network for lymphocyte assessment in histopathological images
Authors:
Momina Liaqat Ali,
Zunaira Rauf,
Asifullah Khan,
Anabia Sohail,
Rafi Ullah,
Jeonghwan Gwak
Abstract:
Transformers, due to their ability to learn long range dependencies, have overcome the shortcomings of convolutional neural networks (CNNs) for global perspective learning. Therefore, they have gained the focus of researchers for several vision related tasks including medical diagnosis. However, their multi-head attention module only captures global level feature representations, which is insuffic…
▽ More
Transformers, due to their ability to learn long range dependencies, have overcome the shortcomings of convolutional neural networks (CNNs) for global perspective learning. Therefore, they have gained the focus of researchers for several vision related tasks including medical diagnosis. However, their multi-head attention module only captures global level feature representations, which is insufficient for medical images. To address this issue, we propose a Channel Boosted Hybrid Vision Transformer (CB HVT) that uses transfer learning to generate boosted channels and employs both transformers and CNNs to analyse lymphocytes in histopathological images. The proposed CB HVT comprises five modules, including a channel generation module, channel exploitation module, channel merging module, region-aware module, and a detection and segmentation head, which work together to effectively identify lymphocytes. The channel generation module uses the idea of channel boosting through transfer learning to extract diverse channels from different auxiliary learners. In the CB HVT, these boosted channels are first concatenated and ranked using an attention mechanism in the channel exploitation module. A fusion block is then utilized in the channel merging module for a gradual and systematic merging of the diverse boosted channels to improve the network's learning representations. The CB HVT also employs a proposal network in its region aware module and a head to effectively identify objects, even in overlapping regions and with artifacts. We evaluated the proposed CB HVT on two publicly available datasets for lymphocyte assessment in histopathological images. The results show that CB HVT outperformed other state of the art detection models, and has good generalization ability, demonstrating its value as a tool for pathologists.
△ Less
Submitted 19 July, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
EcoFed: Efficient Communication for DNN Partitioning-based Federated Learning
Authors:
Di Wu,
Rehmat Ullah,
Philip Rodgers,
Peter Kilpatrick,
Ivor Spence,
Blesson Varghese
Abstract:
Efficiently running federated learning (FL) on resource-constrained devices is challenging since they are required to train computationally intensive deep neural networks (DNN) independently. DNN partitioning-based FL (DPFL) has been proposed as one mechanism to accelerate training where the layers of a DNN (or computation) are offloaded from the device to the server. However, this creates signifi…
▽ More
Efficiently running federated learning (FL) on resource-constrained devices is challenging since they are required to train computationally intensive deep neural networks (DNN) independently. DNN partitioning-based FL (DPFL) has been proposed as one mechanism to accelerate training where the layers of a DNN (or computation) are offloaded from the device to the server. However, this creates significant communication overheads since the intermediate activation and gradient need to be transferred between the device and the server during training. While current research reduces the communication introduced by DNN partitioning using local loss-based methods, we demonstrate that these methods are ineffective in improving the overall efficiency (communication overhead and training speed) of a DPFL system. This is because they suffer from accuracy degradation and ignore the communication costs incurred when transferring the activation from the device to the server. This article proposes EcoFed - a communication efficient framework for DPFL systems. EcoFed eliminates the transmission of the gradient by developing pre-trained initialization of the DNN model on the device for the first time. This reduces the accuracy degradation seen in local loss-based methods. In addition, EcoFed proposes a novel replay buffer mechanism and implements a quantization-based compression technique to reduce the transmission of the activation. It is experimentally demonstrated that EcoFed can reduce the communication cost by up to 133x and accelerate training by up to 21x when compared to classic FL. Compared to vanilla DPFL, EcoFed achieves a 16x communication reduction and 2.86x training time speed-up. EcoFed is available from https://github.com/blessonvar/EcoFed.
△ Less
Submitted 3 January, 2024; v1 submitted 11 April, 2023;
originally announced April 2023.
-
Impact of Combining Syntactic and Semantic Similarities on Patch Prioritization while using the Insertion Mutation Operators
Authors:
Mohammed Raihan Ullah,
Nazia Sultana Chowdhury,
Fazle Mohammed Tawsif
Abstract:
Patch prioritization ranks candidate patches based on their likelihood of being correct. The fixing ingredients that are more likely to be the fix for a bug, share a high contextual similarity. A recent study shows that combining both syntactic and semantic similarity for capturing the contextual similarity, can do better in prioritizing patches. In this study, we evaluate the impact of combining…
▽ More
Patch prioritization ranks candidate patches based on their likelihood of being correct. The fixing ingredients that are more likely to be the fix for a bug, share a high contextual similarity. A recent study shows that combining both syntactic and semantic similarity for capturing the contextual similarity, can do better in prioritizing patches. In this study, we evaluate the impact of combining the syntactic and semantic features on patch prioritization using the Insertion mutation operators. This study inspects the result of different combinations of syntactic and semantic features on patch prioritization. As a pilot study, the approach uses genealogical similarity to measure the semantic similarity and normalized longest common subsequence, normalized edit distance, cosine similarity, and Jaccard similarity index to capture the syntactic similarity. It also considers Anti-Pattern to filter out the incorrect plausible patches. The combination of both syntactic and semantic similarity can reduce the search space to a great extent. Also, the approach generates fixes for the bugs before the incorrect plausible one. We evaluate the techniques on the IntroClassJava benchmark using Insertion mutation operators and successfully generate fixes for 6 bugs before the incorrect plausible one. So, considering the previous study, the approach of combining syntactic and semantic similarity can able to solve a total number of 25 bugs from the benchmark, and to the best of our knowledge, it is the highest number of bugs solved than any other approach. The correctness of the generated fixes are further checked using the publicly available results of CapGen and thus for the generated fixes, the approach achieves a precision of 100%
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
Simultaneous Transmitting and Reflecting-Reconfigurable Intelligent Surface in 6G: Design Guidelines and Future Perspectives
Authors:
Waqas Khalid,
Zeeshan Kaleem,
Rehmat Ullah,
Trinh Van Chien,
Song Noh,
Heejung Yu
Abstract:
Reconfigurable intelligent surfaces (RISs) have been considered as a promising technology for the sixth-generation (6G) wireless networks that can control wireless channels in a desirable way and significantly enhance the network performance. Simultaneous transmitting and reflecting-RISs (STAR-RISs) can overcome limitation of reflecting-only RISs by leveraging the higher design flexibility and ful…
▽ More
Reconfigurable intelligent surfaces (RISs) have been considered as a promising technology for the sixth-generation (6G) wireless networks that can control wireless channels in a desirable way and significantly enhance the network performance. Simultaneous transmitting and reflecting-RISs (STAR-RISs) can overcome limitation of reflecting-only RISs by leveraging the higher design flexibility and full-space coverage. Despite the benefits, the modeling and analysis of STAR-RISs are complicated because of various control parameters for both transmission and reflection links. In this article, a general framework to facilitate the design and implementation of STAR-RISs in 6G scenarios and network topologies is presented. We provide a systematic introduction to the STAR-RIS operating protocols for different communication modes and discuss recent efforts to identify the research progress and combination solutions. Finally, we provide the design concepts, research challenges, potential solutions, and future directions related to the channel modeling, channel estimation, hardware implementations, modeling and limitations, and optimization.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
FedComm: Understanding Communication Protocols for Edge-based Federated Learning
Authors:
Gary Cleland,
Di Wu,
Rehmat Ullah,
Blesson Varghese
Abstract:
Federated learning (FL) trains machine learning (ML) models on devices using locally generated data and exchanges models without transferring raw data to a distant server. This exchange incurs a communication overhead and impacts the performance of FL training. There is limited understanding of how communication protocols specifically contribute to the performance of FL. Such an understanding is e…
▽ More
Federated learning (FL) trains machine learning (ML) models on devices using locally generated data and exchanges models without transferring raw data to a distant server. This exchange incurs a communication overhead and impacts the performance of FL training. There is limited understanding of how communication protocols specifically contribute to the performance of FL. Such an understanding is essential for selecting the right communication protocol when designing an FL system. This paper presents FedComm, a benchmarking methodology to quantify the impact of optimized application layer protocols, namely Message Queue Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and ZeroMQ Message Transport Protocol (ZMTP), and non-optimized application layer protocols, namely as TCP and UDP, on the performance of FL. FedComm measures the overall performance of FL in terms of communication time and accuracy under varying computational and network stress and packet loss rates. Experiments on a lab-based testbed demonstrate that TCP outperforms UDP as a non-optimized application layer protocol with higher accuracy and shorter communication times for 4G and Wi-Fi networks. Optimized application layer protocols such as AMQP, MQTT, and ZMTP outperformed non-optimized application layer protocols in most network conditions, resulting in a 2.5x reduction in communication time compared to TCP while maintaining accuracy. The experimental results enable us to highlight a number of open research issues for further investigation. FedComm is available for download from https://github.com/qub-blesson/FedComm.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
FedFly: Towards Migration in Edge-based Distributed Federated Learning
Authors:
Rehmat Ullah,
Di Wu,
Paul Harvey,
Peter Kilpatrick,
Ivor Spence,
Blesson Varghese
Abstract:
Federated learning (FL) is a privacy-preserving distributed machine learning technique that trains models while keeping all the original data generated on devices locally. Since devices may be resource constrained, offloading can be used to improve FL performance by transferring computational workload from devices to edge servers. However, due to mobility, devices participating in FL may leave the…
▽ More
Federated learning (FL) is a privacy-preserving distributed machine learning technique that trains models while keeping all the original data generated on devices locally. Since devices may be resource constrained, offloading can be used to improve FL performance by transferring computational workload from devices to edge servers. However, due to mobility, devices participating in FL may leave the network during training and need to connect to a different edge server. This is challenging because the offloaded computations from edge server need to be migrated. In line with this assertion, we present FedFly, which is, to the best of our knowledge, the first work to migrate a deep neural network (DNN) when devices move between edge servers during FL training. Our empirical results on the CIFAR10 dataset, with both balanced and imbalanced data distribution, support our claims that FedFly can reduce training time by up to 33% when a device moves after 50% of the training is completed, and by up to 45% when 90% of the training is completed when compared to state-of-the-art offloading approach in FL. FedFly has negligible overhead of up to two seconds and does not compromise accuracy. Finally, we highlight a number of open research issues for further investigation. FedFly can be downloaded from https://github.com/qub-blesson/FedFly.
△ Less
Submitted 14 July, 2022; v1 submitted 2 November, 2021;
originally announced November 2021.
-
A Survey of COVID-19 Misinformation: Datasets, Detection Techniques and Open Issues
Authors:
A. R. Sana Ullah,
Anupam Das,
Anik Das,
Muhammad Ashad Kabir,
Kai Shu
Abstract:
Misinformation during pandemic situations like COVID-19 is growing rapidly on social media and other platforms. This expeditious growth of misinformation creates adverse effects on the people living in the society. Researchers are trying their best to mitigate this problem using different approaches based on Machine Learning (ML), Deep Learning (DL), and Natural Language Processing (NLP). This sur…
▽ More
Misinformation during pandemic situations like COVID-19 is growing rapidly on social media and other platforms. This expeditious growth of misinformation creates adverse effects on the people living in the society. Researchers are trying their best to mitigate this problem using different approaches based on Machine Learning (ML), Deep Learning (DL), and Natural Language Processing (NLP). This survey aims to study different approaches of misinformation detection on COVID-19 in recent literature to help the researchers in this domain. More specifically, we review the different methods used for COVID-19 misinformation detection in their research with an overview of data pre-processing and feature extraction methods to get a better understanding of their work. We also summarize the existing datasets which can be used for further research. Finally, we discuss the limitations of the existing methods and highlight some potential future research directions along this dimension to combat the spreading of misinformation during a pandemic.
△ Less
Submitted 24 October, 2021; v1 submitted 2 October, 2021;
originally announced October 2021.
-
FedAdapt: Adaptive Offloading for IoT Devices in Federated Learning
Authors:
Di Wu,
Rehmat Ullah,
Paul Harvey,
Peter Kilpatrick,
Ivor Spence,
Blesson Varghese
Abstract:
Applying Federated Learning (FL) on Internet-of-Things devices is necessitated by the large volumes of data they produce and growing concerns of data privacy. However, there are three challenges that need to be addressed to make FL efficient: (i) execution on devices with limited computational capabilities, (ii) accounting for stragglers due to computational heterogeneity of devices, and (iii) ada…
▽ More
Applying Federated Learning (FL) on Internet-of-Things devices is necessitated by the large volumes of data they produce and growing concerns of data privacy. However, there are three challenges that need to be addressed to make FL efficient: (i) execution on devices with limited computational capabilities, (ii) accounting for stragglers due to computational heterogeneity of devices, and (iii) adaptation to the changing network bandwidths. This paper presents FedAdapt, an adaptive offloading FL framework to mitigate the aforementioned challenges. FedAdapt accelerates local training in computationally constrained devices by leveraging layer offloading of deep neural networks (DNNs) to servers. Further, FedAdapt adopts reinforcement learning based optimization and clustering to adaptively identify which layers of the DNN should be offloaded for each individual device on to a server to tackle the challenges of computational heterogeneity and changing network bandwidth. Experimental studies are carried out on a lab-based testbed and it is demonstrated that by offloading a DNN from the device to the server FedAdapt reduces the training time of a typical IoT device by over half compared to classic FL. The training time of extreme stragglers and the overall training time can be reduced by up to 57%. Furthermore, with changing network bandwidth, FedAdapt is demonstrated to reduce the training time by up to 40% when compared to classic FL, without sacrificing accuracy.
△ Less
Submitted 18 May, 2022; v1 submitted 9 July, 2021;
originally announced July 2021.
-
Information-Centric Networking in Wireless Environments: Security Risks and Challenges
Authors:
Boubakr Nour,
Spyridon Mastorakis,
Rehmat Ullah,
Nicholas Stergiou
Abstract:
Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this paper, we present the security issues that may a…
▽ More
Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this paper, we present the security issues that may arise and the attacks that may occur from different points of view when ICN is deployed in wireless environments. The discussed attacks may target both applications and the ICN network itself by exploiting elements of the ICN architecture, such as content names and in-network content caches. Furthermore, we discuss potential solutions to the presented issues and countermeasures to the presented attacks. Finally, we identify future research opportunities and directions.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Authors:
Andrew Churcher,
Rehmat Ullah,
Jawad Ahmad,
Sadaqat ur Rehman,
Fawad Masood,
Mandar Gogate,
Fehaid Alqahtani,
Boubakr Nour,
William J. Buchanan
Abstract:
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As…
▽ More
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.
△ Less
Submitted 10 January, 2021;
originally announced January 2021.
-
CCIC-WSN: An Architecture for Single Channel Cluster-based Information-Centric Wireless Sensor Networks
Authors:
Muhammad Atif Ur Rehman,
Rehmat Ullah,
Byung-Seo Kim,
Boubakr Nour,
Spyridon Mastorakis
Abstract:
The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to…
▽ More
The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to be explored. In this paper, we present single-Channel Cluster-based Information-Centric WSN (CCIC-WSN), an NDN/ICN-based framework to fulfill the requirements of cluster-based WSNs, such as communication between child nodes and cluster heads, association of new child nodes with cluster heads, discovery of the namespace of newly associated nodes, and child node mobility. Through an extensive simulation study, we demonstrate that CCIC-WSN achieves 71-90% lower energy consumption and 74-96% lower data retrieval delays than recently proposed frameworks for NDN/ICN-based WSNs under various evaluation settings.
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Comparison of Radio Propagation Models for Long Term Evolution (LTE) Network
Authors:
Noman Shabbir,
Muhammad T. Sadiq,
Hasnain Kashif,
Rizwan Ullah
Abstract:
This paper concerns about the radio propagation models used for the upcoming 4th Generation (4G) of cellular networks known as Long Term Evolution (LTE). The radio wave propagation model or path loss model plays a very significant role in planning of any wireless communication systems. In this paper, a comparison is made between different proposed radio propagation models that would be used for LT…
▽ More
This paper concerns about the radio propagation models used for the upcoming 4th Generation (4G) of cellular networks known as Long Term Evolution (LTE). The radio wave propagation model or path loss model plays a very significant role in planning of any wireless communication systems. In this paper, a comparison is made between different proposed radio propagation models that would be used for LTE, like Stanford University Interim (SUI) model, Okumura model, Hata COST 231 model, COST Walfisch-Ikegami & Ericsson 9999 model. The comparison is made using different terrains e.g. urban, suburban and rural area.SUI model shows the lowest path lost in all the terrains while COST 231 Hata model illustrates highest path loss in urban area and COST Walfisch-Ikegami model has highest path loss for suburban and rural environments.
△ Less
Submitted 7 October, 2011;
originally announced October 2011.
-
A Step towards an Easy Interconversion of Various Number Systems
Authors:
Shahid Latif,
Rahat Ullah,
Hamid Jan
Abstract:
Any system that is used for naming or representing numbers is a number system, also known as numeral system. The modern civilization is familiar with decimal number system using ten digits. However digital devices and computers use binary number system instead of decimal number system, using only two digits namely, 0 and 1 based on the fundamental concept of the decimal number system. Various othe…
▽ More
Any system that is used for naming or representing numbers is a number system, also known as numeral system. The modern civilization is familiar with decimal number system using ten digits. However digital devices and computers use binary number system instead of decimal number system, using only two digits namely, 0 and 1 based on the fundamental concept of the decimal number system. Various other number systems also used this fundamental concept of decimal number system, for example octal system and hexadecimal number systems using eight and sixteen digits respectively. The knowledge of number systems and their inter conversion is essential for understanding of computers. More over, successful programming for digital devices requires a precise understanding of data formats, number systems and their inter conversion. The inter conversion (a process in which things are each converted into the other) of number system requires allot of time and techniques to expertise. In this paper the interconversion of four most common number systems is taken under the consideration in tabulated form. It is a step towards the easy interconversion of theses number systems to understand as well as memorise it. The four number systems are binary, octal, decimal and hexadecimal.
△ Less
Submitted 8 July, 2011;
originally announced July 2011.