Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
1141
Recent Developments to the ANSWERS® Monte Carlo Codes MONK® and MCBEND®
Published 2024-01-01“…MONK® and MCBEND® are two advanced Monte Carlo codes developed by the ANSWERS® Software Service, which have been used in over 30 countries worldwide for a range of applications, and have been well-established in the UK criticality and shielding communities respectively over the course of several decades. …”
Get full text
Article -
1142
-
1143
Writing UX requirements in acceptance criteria: extended version of a case study in startups
Published 2025-02-01“… User experience (UX) is a topic widely discussed in the software industry. The elaboration of UX requirements is an activity that practitioners face difficulties during the software specification. …”
Get full text
Article -
1144
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
1145
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01Get full text
Article -
1146
COMPLEX STRUCTURE LIFE CALCULATION PLATFORM BASED ON SECONDARY DEVELOPMENT OF ABAQUS
Published 2024-02-01“…To overcome this shortcoming, Python language was used for the secondary development of Abaqus software. The developed software can calculate the creep-fatigue life of the structure by using the critical distance method. …”
Get full text
Article -
1147
A Method for Improving the Accuracy of Link Prediction Algorithms
Published 2021-01-01Get full text
Article -
1148
Mining functional gene modules by multi-view NMF of phenome-genome association
Published 2025-01-01Get full text
Article -
1149
Redesigning elastic full‐waveform inversion on the new Sunway architecture
Published 2025-01-01Get full text
Article -
1150
Process Correlation Analysis Model for Process Improvement Identification
Published 2014-01-01“…Software process improvement aims at improving the development process of software systems. …”
Get full text
Article -
1151
-
1152
Managing Requirement Volatility in an Ontology-Driven Clinical LIMS Using Category Theory
Published 2009-01-01“…Requirement volatility is an issue in software engineering in general, and in Web-based clinical applications in particular, which often originates from an incomplete knowledge of the domain of interest. …”
Get full text
Article -
1153
On Stability of Multi-Valued Nonlinear Feedback Shift Registers
Published 2019-01-01Get full text
Article -
1154
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
Get full text
Article -
1155
Enhancing Countries’ Fitness with Recommender Systems on the International Trade Network
Published 2018-01-01Get full text
Article -
1156
Refactoring BZIP2 on the new‐generation sunway supercomputer
Published 2025-01-01Get full text
Article -
1157
Feasibility of YOLOX computer model-based assessment of knee function compared with manual assessment for people with severe knee osteoarthritis
Published 2025-01-01“…By comparing the results obtained by orthopedic doctors and the software system, the feasibility of this software system was validated in the clinic.…”
Get full text
Article -
1158
Dynamic Multiobjective Optimization with Multiple Response Strategies Based on Linear Environment Detection
Published 2020-01-01Get full text
Article -
1159
GPU Acceleration of Melody Accurate Matching in Query-by-Humming
Published 2014-01-01Get full text
Article -
1160
THE OPPORTUNITY OF USING CLOUD-BASED COMPUTING IN NUMERICAL SIMULATIONS ON STRUCTURAL ANALYSIS - CASE STUDY
Published 2022-06-01“… To make the most accurate behavioral assessments of mechanical parts, engineers rely heavily on numerous software solutions. These software solutions are able to solve more or less complex problems with a fairly high degree of accuracy and similarity to physical experiments. …”
Get full text
Article