Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
1321
KEY INFORMATION AND COMMUNICATION TECHNOLOGIES AS AN IMPORTANT FACTOR IN IMPROVING THE EFFICIENCY OF SUPPLY CHAINS IN THE FASHION INDUSTRY
Published 2021-02-01“…The author performs a review of key software products and technologies that improve the efficiency of business process management in the supply chains of the fashion industry, including CAD and CAM systems, ERP systems on the example of SAP AFS, SAP Fashion Management and some other software resources and technologies.…”
Get full text
Article -
1322
Experimental Research and Finite Element Analysis on Mechanical Property of SFRC T-Beam
Published 2017-01-01“…It was also proved that it is reliable to simulate SFRC T-beam by ANSYS software.…”
Get full text
Article -
1323
IoT-based river water quality monitoring
Published 2023-12-01“…As part of this, we have made the things to collect the data and transfer the data to the software that we have made. Then, the data we collect using various equipment will be analyzed using the software we have designed. …”
Get full text
Article -
1324
RAEF: An Imputation Framework Based on a Gated Regulator Autoencoder for Incomplete IIoT Time-Series Data
Published 2021-01-01Get full text
Article -
1325
Research on P2P security overlay network model
Published 2009-01-01“…To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. …”
Get full text
Article -
1326
The Discrete-Time Bulk-Service Geo/Geo/1 Queue with Multiple Working Vacations
Published 2013-01-01Get full text
Article -
1327
Author Correction: Sentiment analysis of the Hamas-Israel war on YouTube comments using deep learning
Published 2025-02-01Get full text
Article -
1328
Microscopic stress-constrained two-scale topology optimisation for additive manufacturing
Published 2025-12-01Get full text
Article -
1329
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
1330
Does management support drive sustained agile usage? a serial mediation model and cIPMA perspective.
Published 2025-01-01“…Agile software development is immensely popular in the industry, but most teams struggle to sustain its use. …”
Get full text
Article -
1331
In house virtual surgery and 3D complex head and neck reconstruction
Published 2018-12-01“…Methods Software was written to automate the preoperative planning and surgical guide creation process. …”
Get full text
Article -
1332
-
1333
Kuantifikasi Pengaruh Understandability dan Maintainability pada Evolusi Perangkat Lunak
Published 2019-05-01“…From the conducted experiment on three types of software in software evolution process shows that spearman’s rank correlation of 0,95 which means understandability has a very strong correlation with maintainability. …”
Get full text
Article -
1334
SCOLIOSIS ASSESSMENT VIA TELEHEALTH USING PHOTOGRAMMETRY: DEVELOPMENT AND ACCURACY
Published 2025-02-01“…The DIPA© Capture app and Analysis software for image acquisition and measurement was developed and is ready for testing with patients. …”
Get full text
Article -
1335
Quand l’écran masque l’expérience des opérateurs vieillissants : changement de logiciel et activité de travail dans un organisme de services
Published 2000-11-01“…It analyses the process of introduction of a new software, in a French firm from the service industries where many middle-aged white collars are being employed. …”
Get full text
Article -
1336
Estimation of aeroelastic stability of a tower spire
Published 2023-11-01“…Dynamic and stiffness characteristics of the object, used in engineering assessment of the possibility of aeroelastic phenomena, were determined using the ANSYS Mechanical software package. Modelling of the flow around the object under study was carried out using the ANSYS Fluent software package. …”
Get full text
Article -
1337
PaySwitch: Smart Contract-Based Payment Switch for Off-Chain Payment Channel Networks
Published 2025-01-01Get full text
Article -
1338
ON THE SIMULATION OF MODES ОF ELECTRIC POWER SYSTEMS WITH FACTS
Published 2017-07-01“…The software makes it possible to obtain practically acceptable solutions in three outer iterations. …”
Get full text
Article -
1339
Design of Hydraulic Bulging Die for Automobile Torsion Beam and Optimization of Forming Process Parameters
Published 2021-01-01“…Mathematical control model is established and verified in Simulink software. DYNAFORM software is applied to conduct numerical simulation of hydraulic expansion. …”
Get full text
Article -
1340