Enhancing the Unified Features to Locate Buggy Files by Exploiting

Total Page:16

File Type:pdf, Size:1020Kb

Enhancing the Unified Features to Locate Buggy Files by Exploiting Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17) Enhancing the Unified Features to Locate Buggy Files by Exploiting the Sequential Nature of Source Code∗ Xuan Huo and Ming Li National Key Laboratory for Novel Software Technology, Nanjing University Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 210023, China fhuox, [email protected] Abstract or follow the technical requirements of the system. Bug re- ports are generated by the end-users of the software and then Bug reports provide an effective way for end-users submitted to the software maintenance team. Once a bug re- to disclose potential bugs hidden in a software port is received and verified, the software maintenance team system, while automatically locating the potential would read the textual description of the bug report to locate buggy source files according to a bug report re- the buggy potential source files in the source code, and assign mains a great challenge in software maintenance. appropriate developers to fix the bug accordingly. Unfortu- Many previous approaches represent bug reports nately, for large and evolving software, the maintenance team and source code from lexical and structural in- may receive a large number of bug reports over a period of formation correlated their relevance by measuring time and it is costly to manually locate the buggy potential their similarity, and recently a CNN-based model is source files based on bug reports. proposed to learn the unified features for bug local- Therefore, to alleviate the burden of software maintenance ization, which overcomes the difficulty in model- team, effective models for identifying potentially buggy ing natural and programming languages with differ- source files for a given bug report automatically are highly ent structural semantics. However, previous studies desirable, and it has drawn significant attentions in software fail to capture the sequential nature of source code, engineering community [Gay et al., 2009; Zhou et al., 2012; which carries additional semantics beyond the lex- Ye et al., 2014; Huo et al., 2016]. The key for identify- ical and structural terms and such information is ing buggy source files is to correlate the abnormal program vital in modeling program functionalities and be- behaviors written in natural languages with the source code haviors. In this paper, we propose a novel model written in programming languages that implement the corre- LS-CNN, which enhances the unified features by sponding functionality. Some of the existing methods treat exploiting the sequential nature of source code. LS- the source code as natural language by representing both bug CNN combines CNN and LSTM to extract seman- reports and source files based on bag-of-words feature rep- tic features for automatically identifying potential resentations, and correlate their relevance by measuring sim- buggy source code according to a bug report. Ex- ilarity in the same feature space. For example, [Gay et al., perimental results on widely-used software projects 2009] represented both source code and bug reports using the indicate that LS-CNN significantly outperforms the vector space model (VSM) based on which the similarities state-of-the-art methods in locating buggy files. between the buggy source files and a bug report are com- puted for localizing the corresponding buggy files. [Zhou et al., 2012] proposed a revised vector space model (rVSM), 1 Introduction where similar historical bug reports whose corresponding Software quality assurance is vital to the success of a software buggy files are further exploited to improve the bug local- system. As software systems become larger and more com- ization results obtained by measuring the similarity between plex, it is extremely difficult to identify every software defect bug reports and source files. Recently, Huo et al. [2016] con- before its formal release due to the inadequate software test- sidered that the bug reports in natural language and source ing resources and tight development schedule. Thus, software code in programming language should be processed in differ- systems are often plagued with bugs. ent ways. They employed a particular model based on convo- To facilitate fast and efficient identification and fixing of lutional neural network (CNN) to learn unified features from the bugs in a released software system, developers often allow both bug reports and source code, which are shown effective users to submit bug reports to bug tracking systems, which in modeling source code and improving the performance on are documents written in natural language specifying the sit- locating buggy source files. uations in which the software fails to behave as it is expected Although learning unified features from bug reports and source code by CNN [Huo et al., 2016] is able to ∗This research was supported by NSFC (61422304, 61272217). overcome the difficulty in modeling natural and program- 1909 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17) ming languages with different structural semantics, the 2 Related Work sequential nature of programming language, especially To maintain software quality assurance, many bug localiza- the long-term dependencies between statements, has not tion approaches have been studied in recent years. Bug local- been well-modeled, which causes the loss of semantic ization, which identifies and locates source files potentially information in the source code. The sequence of state- responsible for the bug reported in bug reports, is an ex- ments in source code specifies how statements interact with tremely vital but costly task in software maintenance. Most previous ones along the execution path and data stream existing approaches treat the source code as documents and transmission, and hence provides additional semantics to formalize the bug localization problem as a document re- program functionality aside from lexical and structural trieval problem, which calculate the relevancy between a bug terms. An example will make it more concrete: assume report and a source file to identify buggy source code [Poshy- path that a private string type variable is initialized with a vanyk et al., 2007; Lukins et al., 2008]. For example, Gay DEFAULT PATH if default value , and the following code “ et al. [2009] employed Vector Space Model (VSM) based on path==DEAFULT PATH fpath=getNewPath();g concept localization to represent bug reports and source code File f=File.open(path) ” may result in different as feature vectors, which are used to measure the similarity behaviors if the previous default value has not been well between bug reports and source files. Zhou et al. [2012] also [ et considered. Although the CNN model proposed in Huo proposed BugLocator approach using revised Vector Space al. ] , 2016 employs filters sliding over statements along the Model, which is based on document length and similar bugs execution path is able to reflect the sequential nature in the that have been solved before as new features. Recently, more adjacent statements, it is also very important to consider the information and features from bug reports and source code sequential nature of statements with long-term dependencies have been investigated for identifying bugs. Saha et al. [2013] in order to better represent the program functionality and utilized structured information from source code, such as behaviors. class and method to enable more accurate bug localization. In this paper, we propose a novel unified framework based Wang et al. [2014] proposed AmaLgam that combines ver- on deep neural network called LS-CNN (Long Short-term sion history, similar report and structure to further improve memory based on Convolutional Neural Network) to exploit bug localization performance. the sequential nature of source code to enhance the unified Recently, deep learning models are very popular and have features for bug localization. Such a method combines the achieved enormous success in many natural language pro- LSTM and CNN models to enhance the unified features by cessing tasks. For example, Johnson and Zhang [2015] uti- exploiting the sequential nature of source code, such that the lized convolutional neural network (CNN) to provide an alter- functional semantics of the program and correlations between native mechanism for effective use of word order for text cat- bug reports and source code for identifying buggy files are egorization through direct embedding of small text regions. carefully embedded. The key part of LS-CNN is the intra- To overcome the difficulty in learning long term dynamics of language feature extraction network that combines LSTM Recurrent Neural Networks (RNNs) [Mikolov et al., 2010] and CNN for source code processing, where LSTM is de- for text processing, [Sepp and Juergen, 1977; Graves, 2012; signed to extract semantic features reflecting sequential na- Donahue et al., 2015] proposed long short-term memory ture from source code and handle long-term dependency be- (LSTM) by incorporating memory cells to learn when to for- tween statements and CNN is designed to capture the local get previous states and when to update current states given and structure information within statements. Experimental new information. Furthermore, several studies have tried results on widely-used software projects indicate that exploit- deep learning models on software engineering research re- ing sequential features is beneficial for bug localization
Recommended publications
  • German Digital Kinderuniversity Faculty Nature Lecture River Width
    German Digital Kinderuniversity Faculty Nature Lecture River Width PROFESSOR EINSTEIN: Hello, students. I’d like to welcome you all to the big state vocabulary exam. Have you learned all the words we introduced to you? MS. SCHLAU: Hold on, Professor. We have to delay the exam. PROFESSOR EINSTEIN: What?! Why? MS. SCHLAU: JOWO accidentally discovered a cheat sheet earlier. Apparently someone wants to cheat! PROFESSOR EINSTEIN: Really? MS. SCHLAU: JOWO, show us an example. The triangle ruler was prepared with a piece of white paper. On the back are vocabulary words, but when you put the triangle ruler on a sheet of white paper, you can’t tell that it was modified. PROFESSOR EINSTEIN: That is… That’s brilliant. I think whoever makes such a great cheat sheet should receive the best grade on the exam. MS. SCHLAU: What? No! We’re going to cancel the exam and schedule a replacement lecture. PROFESSOR EINSTEIN: What? Well, whatever you think. But please not something boring. MS. SCHLAU: Let’s call field researcher Christoph. PROFESSOR EINSTEIN: JOWO, please bring Christoph into the lecture hall. MS. SCHLAU: Hello, Christoph… CHRISTOPH: Oh, hello Ms. Schlau, hello Professor Einstein. What can I do for you? PROFESSOR EINSTEIN: We need an interesting lecture, and quick! Would you happen to have an idea? CHRISTOPH: Of course, we were just researching how you can measure the width of a river. PROFESSOR EINSTEIN: Without a cheat sheet? CHRISTOPH: Mhm, yes! PROFESSOR EINSTEIN: Oh, that is wonderful. Then let’s play the film. MS. SCHLAU: Oh, what a beautiful little river (FLUSS) Christoph discovered while hiking.
    [Show full text]
  • New Mexico Study Abroad Program
    New Mexico Study Abroad Program Instituto Cervantes of Albuquerque Spanish Linguistic and Cultural Immersion Tourism for junior high and high school students Come visit the only State in America where Spanish is an official language! Instituto Cervantes is a non-profit organization created by the Spanish government in 1991. Its mission is to promote the Spanish language and to contribute to the advancement of the cultures of all Spanish speaking countries and communities. With over 200,000 students per year, Instituto Cervantes is the largest institution in the world dedicated to teaching Spanish. The Instituto Cervantes of Albuquerque offers a variety of Spanish courses for individuals and groups and organizes many exciting cultural events throughout the year. Instituto Cervantes Albuquerque has designed a very unique immersion program that includes historical, cultural and linguistic aspects that not only challenge the student but create skills for personal growth in a real Spanish social context. Instituto Cervantes in Albuquerque, NM, is the only Cervantes center in the world that is located in an area where Spanish is an official language - along with English. Your students will have the unique opportunity to experience New Mexican and Spanish culture, within the US, in an intensive and rich Spanish immersion program. Program details: Academic and Cultural Activities: Weekdays Mornings (9.00 am – 12.00 pm) - Option 1: Spanish Language & Culture immersion classes (from A1 to C2 levels) designed according to the needs, linguistic competence and curriculum of each group. Instituto Cervantes Educational Facilities - Option 2: Spanish Language Arts Modules (Literature, History, Culture, Social Studies, Arts, Linguistics, Native-American Studies) designed according to the needs, linguistic competence and curriculum of each group.
    [Show full text]
  • Protecting 30% of the Planet for Nature: Costs, Benefits and Economic Implications
    Protecting 30% of the planet for nature: costs, benefits and economic implications Working paper analysing the economic implications of the proposed 30% target for areal protection in the draft post-2020 Global Biodiversity Framework Anthony Waldron1; Vanessa Adams2; James Allan3; Andy Arnell4; Greg Asner5; Scott Atkinson6; Alessandro Baccini7; Jonathan EM Baillie8; Andrew Balmford1; J Austin Beau9; Luke Brander10; Eduardo Brondizio11; Aaron Bruner12; Neil Burgess4; K Burkart13; Stuart Butchart14; Rio Button15; Roman Carrasco16; William Cheung17; Villy Christensen18; Andy Clements19; Marta Coll20; Moreno di Marco21; Marine Deguignet4; Eric Dinerstein22; Erle Ellis23; Florian Eppink24; Jamison Ervin25; Anita Escobedo26; John Fa27; Alvaro Fernandes-Llamazares28; Sanjiv Fernando22; Shinichiro Fujimori29; Beth Fulton30; Stephen Garnett31; James Gerber32; David Gill33; Trisha Gopalakrishna34; Nathan Hahn22; Ben Halpern35; Tomoko Hasegawa36; Petr Havlik37; Vuokko Heikinheimo28; Ryan Heneghan38; Ella Henry39; Florian Humpenoder40; Harry Jonas41; Kendall Jones42; Lucas Joppa43; A.R. Joshi44; Martin Jung37; Naomi Kingston4; Carissa Klein45; Tamas Krisztin37; Vicky Lam46; David Leclere39; Peter Lindsey47; Harvey Locke48; TE Lovejoy49; Philip Madgwick50; Yadvinder Malhi34; Pernilla Malmer51; Martine Maron52; Juan Mayorga53; Hans van Meijl54; Dan Miller55; Zsolt Molnar56; Nathaniel Mueller57; Nibedita Mukherjee1; Robin Naidoo58; Katia Nakamura59; Prakash Nepal60; RF Noss61; Beth O’Leary62; D Olson63; Juliano Palcios Abrantes64; Midori Paxton65; Alexander
    [Show full text]
  • Motor Vehicle Division Prestige License Plate Application
    For State or County use only: Denied Refund Form MV-9B (Rev. 08-2017) Web and MV Manual Georgia Department of Revenue - Motor Vehicle Division Prestige License Plate Application ______________________________________________________________________________________ Purpose of this Form: This form is to be used by a vehicle owner to request the manufacture of a Special Prestige (Personalized) License Plate. This form should not be used to record a change of ownership, change of address, or change of license plate classification. How to submit this form: After reviewing the MV-9B form instructions, this fully completed form must be submitted to your local County tag office. Please refer to our website at https://mvd.dor.ga.gov/motor/tagoffices/SelectTagOffice.aspx to locate the address(es) for your specific County. OWNER INFORMATION First Name Middle Initial Last Name Suffix Owners’ Full Legal Name: Mailing Address: City: State: Zip: Telephone Number: Owner(s)’ Full Legal Name: First Name Middle Initial Last Name Suffix If secondary Owner(s) are listed Mailing Address: City: State: Zip: Telephone Number: VEHICLE INFORMATION Vehicle Identification Number (VIN): Year: Make: Model: LICENSE PLATE COMBINATION Private Passenger Vehicle (Includes Motor Home and Non-Commercial Trailer) Note: Private passenger vehicles cannot exceed seven (7) letters and/or numbers including spaces. Meaning: ___________________________ Meaning: ___________________________ Meaning: ___________________________ (Required) (Required) (Required) Motorcycle Note: Motorcycles cannot exceed six (6) letters and/or numbers including spaces. Meaning: ___________________________ Meaning: ___________________________ Meaning: ___________________________ (Required) (Required) (Required) Note: No punctuation or symbols are allowed on a license plate. Only letters, numbers, and spaces are allowed. I request that a personal prestige license plate be manufactured.
    [Show full text]
  • EARLY FIELD EXPERIENCE in AGRICULTURAL EDUCATION: a NATIONAL DESCRIPTIVE STUDY Michael S. Retallick, Assistant Professor Greg M
    Journal of Agricultural Education Volume 48, Number 1, pp. 127 – 138 DOI: 10.5032/jae.2007.01127 EARLY FIELD EXPERIENCE IN AGRICULTURAL EDUCATION: A NATIONAL DESCRIPTIVE STUDY Michael S. Retallick, Assistant Professor Greg Miller, Professor Iowa State University Abstract The purpose of this study was to describe the nature of early field experience (EFE) in agricultural teacher education programs nationally. A descriptive census survey of all active agricultural teacher education programs in the country was used for this study. The fact that nearly all agricultural teacher education programs require EFE indicates that EFE is valued as an important component of teacher education programs. It was discovered that multiple early field experiences are required at multiple classification levels. The primary responsibility for EFE and the associated administrative tasks are placed on faculty within the agricultural teacher education program. Similarities regarding EFE requirements seem to end at broad, categorical levels. Most programs report having requirements; however, the means by which each program fulfills the requirements are considerably different. Teacher licensure, as well as state and national teacher education accreditation, influences procedural and minimum EFE requirements. This study provides the foundation for further research. Additional research is needed to identify the purposes and outcomes of EFE and determine the extent to which student learning occurs. Introduction and Theoretical Framework school-based opportunities, which could include observing, assisting the cooperating Early field experience is “an integral teacher, tutoring students, teaching lessons, program component” for initial and and conducting applied research (NCATE). advanced teacher preparation (National EFE provides the student with the Council for Accreditation of Teacher opportunity to start thinking like a teacher, Education [NCATE], 2002, p.
    [Show full text]
  • Efe, Opinion Imposing Sanctions, 19PDJ058, 09-17-20.Pdf
    People v. Anselm Andrew Efe. 19PDJ058. September 17, 2020. A hearing board suspended Anselm Andrew Efe (attorney registration number 38357) for one year and one day. The suspension, which runs concurrent to Efe’s suspension in case number 18DJ041, took effect on October 28, 2020. To be reinstated, Efe must prove by clear and convincing evidence that he has been rehabilitated, has complied with disciplinary orders and rules, and is fit to practice law. In a child support modification matter, Efe did not competently or diligently represent his client. He ignored disclosure and discovery requirements, and he failed to advise his client about the client’s obligations to produce complete and timely financial information. Later, when opposing counsel filed a motion to compel discovery, Efe failed to protect his client’s interests, resulting in an award of attorney’s fees and costs against the client. Efe also knowingly declined to respond to demands for information during the disciplinary investigation of this case. Efe’s conduct violated Colo. RPC 1.1 (a lawyer shall provide competent representation to a client); Colo. RPC 1.3 (a lawyer shall act with reasonable diligence and promptness when representing a client); Colo. RPC 1.4(a)(2) (a lawyer shall reasonably consult with the client about the means by which the client’s objectives are to be accomplished); and Colo. RPC 8.1(b) (a lawyer involved in a disciplinary matter shall not knowingly fail to respond to a lawful demand for information from a disciplinary authority). The case file is public per C.R.C.P.
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • Not the Same Old Story: Dante's Re-Telling of the Odyssey
    religions Article Not the Same Old Story: Dante’s Re-Telling of The Odyssey David W. Chapman English Department, Samford University, Birmingham, AL 35209, USA; [email protected] Received: 10 January 2019; Accepted: 6 March 2019; Published: 8 March 2019 Abstract: Dante’s Divine Comedy is frequently taught in core curriculum programs, but the mixture of classical and Christian symbols can be confusing to contemporary students. In teaching Dante, it is helpful for students to understand the concept of noumenal truth that underlies the symbol. In re-telling the Ulysses’ myth in Canto XXVI of The Inferno, Dante reveals that the details of the narrative are secondary to the spiritual truth he wishes to convey. Dante changes Ulysses’ quest for home and reunification with family in the Homeric account to a failed quest for knowledge without divine guidance that results in Ulysses’ destruction. Keywords: Dante Alighieri; The Divine Comedy; Homer; The Odyssey; Ulysses; core curriculum; noumena; symbolism; higher education; pedagogy When I began teaching Dante’s Divine Comedy in the 1990s as part of our new Cornerstone Curriculum, I had little experience in teaching classical texts. My graduate preparation had been primarily in rhetoric and modern British literature, neither of which included a study of Dante. Over the years, my appreciation of Dante has grown as I have guided, Vergil-like, our students through a reading of the text. And they, Dante-like, have sometimes found themselves lost in a strange wood of symbols and allegories that are remote from their educational background. What seems particularly inexplicable to them is the intermingling of actual historical characters and mythological figures.
    [Show full text]
  • Nature Challenge Provider Orientation Packet March2021 V1.5-Compressed.Pdf
    2 0 2 1 Challenge PROVIDER ORIENTATION PACKET TABLE OF CONTENTS QUICK LINKS ...................................................3 A MESSAGE TO PROVIDERS.................................4 WELCOME TO NATURE CHALLENGE......................... What is Nature Challenge?............................5 Mission Statement.......................................6 Nature Challenge Administrators...................6 Design & Development..................................7 Partners & Contributing Organizations...........8 Challenge Definition.....................................9 Audiences...................................................9 Types of Challenges....................................10 Who Makes Challenges?..............................10 BENEFITS TO PROVIDERS....................................11 HOW IT WORKS.................................................. For Participants.........................................12 For Providers.............................................13 INFORMATION FOR PROVIDERS........................14 SUBMITTING CHALLENGES.................................... Using a desktop computer............................17 Using a mobile browser...............................18 Using the survey 123 app.............................19 Saving survey drafts..................................20 Broken survey links...................................22 EDITING EXISTING CHALLENGES.........................23 CREATING CHALLENGES 101...............................25 CHALLENGE BADGES........................................32 ANALYTICS DASHBOARD...................................33
    [Show full text]
  • What Is UNIX? the Directory Structure Basic Commands Find
    What is UNIX? UNIX is an operating system like Windows on our computers. By operating system, we mean the suite of programs which make the computer work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. The Directory Structure All the files are grouped together in the directory structure. The file-system is arranged in a hierarchical structure, like an inverted tree. The top of the hierarchy is traditionally called root (written as a slash / ) Basic commands When you first login, your current working directory is your home directory. In UNIX (.) means the current directory and (..) means the parent of the current directory. find command The find command is used to locate files on a Unix or Linux system. find will search any set of directories you specify for files that match the supplied search criteria. The syntax looks like this: find where-to-look criteria what-to-do All arguments to find are optional, and there are defaults for all parts. where-to-look defaults to . (that is, the current working directory), criteria defaults to none (that is, select all files), and what-to-do (known as the find action) defaults to ‑print (that is, display the names of found files to standard output). Examples: find . –name *.txt (finds all the files ending with txt in current directory and subdirectories) find . -mtime 1 (find all the files modified exact 1 day) find . -mtime -1 (find all the files modified less than 1 day) find . -mtime +1 (find all the files modified more than 1 day) find .
    [Show full text]
  • Application of a Convolutional Neural Network for Predicting The
    www.nature.com/scientificreports OPEN Application of a convolutional neural network for predicting the occurrence of ventricular tachyarrhythmia using heart rate variability features Getu Tadele Taye1, Han-Jeong Hwang2 ✉ & Ki Moo Lim3 ✉ Predicting the occurrence of ventricular tachyarrhythmia (VTA) in advance is a matter of utmost importance for saving the lives of cardiac arrhythmia patients. Machine learning algorithms have been used to predict the occurrence of imminent VTA. In this study, we used a one-dimensional convolutional neural network (1-D CNN) to extract features from heart rate variability (HRV), thereby to predict the onset of VTA. We also compared the prediction performance of our CNN with other machine leaning (ML) algorithms such as an artifcial neural network (ANN), a support vector machine (SVM), and a k-nearest neighbor (KNN), which used 11 HRV features extracted using traditional methods. The proposed CNN achieved relatively higher prediction accuracy of 84.6%, while the ANN, SVM, and KNN algorithms obtained prediction accuracies of 73.5%, 67.9%, and 65.9% using 11 HRV features, respectively. Our result showed that the proposed 1-D CNN could improve VTA prediction accuracy by integrating the data cleaning, preprocessing, feature extraction, and prediction. Heartbeat is regulated by electrical signals conducted across the four chambers of the heart: two atria and two ventricles. When electrical activity is normal, the heart beats approximately 60 to 100 times per minute. However, abnormal electrical signals in the heart lead to disorganized electrical activities such as ventricular tachyarrhyth- mia (VTA), which causes fast heart rate1. Tus, early VTA prediction helps physicians to take immediate medical procedure to reduce the risk.
    [Show full text]
  • Install and Login: Download the Nature's Notebook (NN) App From
    Nature’s Notebook Mobile Application Reporting observations on mobile devices Install and Login: Download the Nature’s Notebook (NN) app from the Google Play Store or Apple App Store1. Install and open the app, log in using your account credentials2, agree to the perms- 1 2 sions to grant the app access to your online account3. If you are a new observer to Nature’s Notebook, follow the prompts to make a 3 new account4. Exisiting NN users will have their accounts synced on login. Depending on the size of your account, the app may take a few moments to sync. Progress can be seen by following along with the blue bar5. Navigation: The NN app is organized into catergory menus appearing at the top of each screen. They include: Groups—if you are observing with an Local Phenology Program (LPP); Sites—for observation loca- 4 5 tions; Plants & Animals —for reviewing The USA National Phenology Network Education Program | National Coordinating Office 1311 E. 4th St, Tucson, AZ 85721 | Phone: 520-621-1803 [email protected] | www.usanpn.org/education Nature’s Notebook Mobile Application Reporting observations on mobile devices species you will observe; Observe—for entering observational data; Review—for reviewing the data you have submitted; and Settings— for managing Wi-Fi upload and account information6. You can toggle between the catergories at any time. 6 7 Select Your Observation Site: When loaded, the main screen will appear. From the list, select either your personal sites(s) or your LPP to begin observing7. Personal sites will be revealed when you select My Sites from the pick list.
    [Show full text]