-
121
Efficient preconditioning strategies for accelerating GMRES in block-structured nonlinear systems for image deblurring.
Published 2025-01-01“…The preconditioned matrices' eigenvalues cluster around 1, indicating a beneficial spectral distribution. The source code is available at https://github.com/shahbaz1982/Precondition-Matrix.…”
Get full text
Article -
122
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01“…Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack signature generation method based on an innovative traceable dynamic taint analysis framework was proposed.By monitoring the vulnerable process execution,the executing trace and the constrain conditions exactly related to input data exploiting the vulnerability was extracted.Finally,by restoring the execution context and supplementing the determinant statements an executable Turing machine signature was attained.A prototype system was implemented and evaluated with different attack samples,which proved that the proposed method was able to generate accurate attack signature fast.…”
Get full text
Article -
123
Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy
Published 2025-07-01“…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
Get full text
Article -
124
An architecture as a code framework to manage documentation of IT projects
Published 2025-01-01“…Design/methodology/approach – They provide a simple tool based on five complementary views, which should be detailed by the project team using a classic source code management platform. Findings – The proposed tool is open source and may be reused by any IT team in various project contexts and heterogeneous development methods. …”
Get full text
Article -
125
Measurement of schizophrenia symptoms through speech analysis from PANSS interview recordings
Published 2025-06-01“…Speech collection for digital phenotyping is often dependent on platforms built using closed-source code and associated with patient and clinician burden. …”
Get full text
Article -
126
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
Published 2024-12-01“…For real-world attacks, the source code is typically unavailable, which poses a challenge for locating the COs thus reducing the effectiveness of many methods. …”
Get full text
Article -
127
Runtime Instrumentation of SystemC/TLM2 Interfaces for Fault Tolerance Requirements Verification in Software Cosimulation
Published 2014-01-01“…This technique can be applied after the elaboration phase and needs neither source code modifications nor recompilation of the top level SystemC modules. …”
Get full text
Article -
128
Designing and Interpreting a Mathematical Programming Language
Published 2019-12-01“…In this article, a programming language that supports the use of mathematical function structures is designed and an interpreter, which can evaluate the source code written in this language, is developed. …”
Get full text
Article -
129
Selecting a Monitoring Technology for a Control System of Distributed Oil Production Facilities
Published 2024-06-01“…The important factors that determined the choice of this platform were the availability of the open source code and a large library of ready-made templates for displaying the well parameters in real time. …”
Get full text
Article -
130
Enhancing Constitutive Models for Soils: Adding the Capability to Model Nonlinear Small Strain in Shear
Published 2019-01-01“…The validation simulations of the undrained triaxial tests on London Clay and Ham River sand with the upgraded constitutive models replicate the experiments clearly better than the base models, without any changes to existing model parameters and the core source code associated with the base model.…”
Get full text
Article -
131
Problems in Determining the Consumer Value of a Software Product
Published 2018-12-01“…Five stages of creating a software product are considered: pre-design planning, software design (architecture), writing the source code, building the executable program itself, and drafting software documentation for the final product. …”
Get full text
Article -
132
Exploring Gender Differences in Fatwa through Machine Learning
Published 2024-06-01“…We intend to share both the dataset and the source code openly with the research community.…”
Get full text
Article -
133
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
Published 2021-07-01“…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
Get full text
Article -
134
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
135
Uji Plagiarism pada Tugas Mahasiswa Menggunakan Algoritma Winnowing
Published 2021-12-01“…In this study the authors used the winnowing algorithm to detect plagiarism in student assignments, namely programming source code, from the results of research conducted on 10 student assignments using the winnowing algorithm produced various similarity values as a percentage of similarity between two students tasks compared. …”
Get full text
Article -
136
eminus — Pythonic electronic structure theory
Published 2025-02-01“…The open-source idea offers the advantage of having a source code base that can be reviewed and modified by the community. …”
Get full text
Article -
137
Design of an open-source software system for water temperature monitoring
Published 2025-09-01“…This article details the Arduino and the computer source code programs, and the satisfactory system results have motivated the work presentation.…”
Get full text
Article -
138
Hybrid Obfuscation Using Signals and Encryption
Published 2018-01-01“…In this study, a new dispatcher was added to the source code to reconstruct the original control flow graph from the hidden one to solve the problem of the signal method. …”
Get full text
Article -
139
Numerical simulation of the flow rate effect on the evolution of a negatively buoyant water jet
Published 2020-12-01“…A finite volume discretization method using Open Source code given in Open Foam 2.3.0. was used to solve these equations. …”
Get full text
Article -
140
Using d2d for Writing XML
Published 2025-01-01“…All source texts are in the public domain; a publication on an open-source code repository is in preparation.…”
Get full text
Article