Showing 1,141 - 1,160 results of 10,931 for search '"software"', query time: 0.10s Refine Results
  1. 1141

    Recent Developments to the ANSWERS® Monte Carlo Codes MONK® and MCBEND® by Fildes Jessica, Richards Simon, Bird Adam, Cox Andrew, Fry Timothy, Hanlon David, Jones Brian, Long David, Tantillo Francesco, Wright George, Hiles Richard

    Published 2024-01-01
    “…MONK® and MCBEND® are two advanced Monte Carlo codes developed by the ANSWERS® Software Service, which have been used in over 30 countries worldwide for a range of applications, and have been well-established in the UK criticality and shielding communities respectively over the course of several decades. …”
    Get full text
    Article
  2. 1142
  3. 1143

    Writing UX requirements in acceptance criteria: extended version of a case study in startups by Jonathan Souza, Luciana Zaina

    Published 2025-02-01
    “… User experience (UX) is a topic widely discussed in the software industry. The elaboration of UX requirements is an activity that practitioners face difficulties during the software specification. …”
    Get full text
    Article
  4. 1144

    Review of malware detection and classification visualization techniques by Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA

    Published 2023-10-01
    “…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
    Get full text
    Article
  5. 1145
  6. 1146

    COMPLEX STRUCTURE LIFE CALCULATION PLATFORM BASED ON SECONDARY DEVELOPMENT OF ABAQUS by JIANG RenJie, YANG XiaoGuang, SHI DuoQi, DONG ChengLi, GUO GuangPing

    Published 2024-02-01
    “…To overcome this shortcoming, Python language was used for the secondary development of Abaqus software. The developed software can calculate the creep-fatigue life of the structure by using the critical distance method. …”
    Get full text
    Article
  7. 1147
  8. 1148
  9. 1149
  10. 1150

    Process Correlation Analysis Model for Process Improvement Identification by Su-jin Choi, Dae-Kyoo Kim, Sooyong Park

    Published 2014-01-01
    “…Software process improvement aims at improving the development process of software systems. …”
    Get full text
    Article
  11. 1151
  12. 1152

    Managing Requirement Volatility in an Ontology-Driven Clinical LIMS Using Category Theory by Arash Shaban-Nejad, Olga Ormandjieva, Mohamad Kassab, Volker Haarslev

    Published 2009-01-01
    “…Requirement volatility is an issue in software engineering in general, and in Web-based clinical applications in particular, which often originates from an incomplete knowledge of the domain of interest. …”
    Get full text
    Article
  13. 1153
  14. 1154

    Constructing method of opaque predicate based on type conversion and operation of floating point numbers by Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE

    Published 2023-10-01
    “…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
    Get full text
    Article
  15. 1155
  16. 1156
  17. 1157

    Feasibility of YOLOX computer model-based assessment of knee function compared with manual assessment for people with severe knee osteoarthritis by Tao Yang, Jie Zhao, Ben Wang, Li Wang, Hengzhe Bao, Bing Li, Wen Luo, Huiwen Zhao, Jun Liu

    Published 2025-01-01
    “…By comparing the results obtained by orthopedic doctors and the software system, the feasibility of this software system was validated in the clinic.…”
    Get full text
    Article
  18. 1158
  19. 1159
  20. 1160

    THE OPPORTUNITY OF USING CLOUD-BASED COMPUTING IN NUMERICAL SIMULATIONS ON STRUCTURAL ANALYSIS - CASE STUDY by VLAD ANDREI CIUBOTARIU, COSMIN GRIGORAS, CRINA MARIA RADU, CATALIN NICOLAE TAMPU, VALENTIN ZICHIL

    Published 2022-06-01
    “… To make the most accurate behavioral assessments of mechanical parts, engineers rely heavily on numerous software solutions. These software solutions are able to solve more or less complex problems with a fairly high degree of accuracy and similarity to physical experiments. …”
    Get full text
    Article