Showing 121 - 140 results of 614 for search '"sources code"', query time: 0.07s Refine Results
  1. 121

    Cross-Project Defect Prediction Using Transfer Learning with Long Short-Term Memory Networks by Hongwei Tao, Lianyou Fu, Qiaoling Cao, Xiaoxu Niu, Haoran Chen, Songtao Shang, Yang Xian

    Published 2024-01-01
    “…First, the abstract syntax trees (AST) are generated based on the source codes. Second, the AST node contents are converted into integer vectors as inputs to the TLSTM model. …”
    Get full text
    Article
  2. 122

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    “…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
    Get full text
    Article
  3. 123

    Evolution Process and Supply Chain Adaptation of Smart Contracts in Blockchain by Yue Wu, Junxiang Li, Jiru Zhou, Shichang Luo, Liwei Song

    Published 2022-01-01
    “…Because of its unique decentralization, encryption, reliability, and tamper-proof, the block chain system makes smart contracts break through the shackles of the lack of trusted environment, and its application field keeps expanding. We read the source code and official documents of Bitcoin, Ethereum, and Hyperledger to explore the operation principle and implementation mode of smart contract. …”
    Get full text
    Article
  4. 124

    Investigation of parameters influencing erosive wear using DEM by Akbar Jafari, Reza Abbasi Hattani

    Published 2019-03-01
    “…The Finnie model was implemented using an open-source code. Regarding the time integration, the Gear algorithm was used, and to ensure the accuracy of the DEM results, a time-step sensitivity analysis was performed. …”
    Get full text
    Article
  5. 125

    Structural properties and static robustness of Linux software network by Ershen WANG, Yu LI, Chen HONG, Qinghua SUN, Chang LIU

    Published 2019-11-01
    “…The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.…”
    Get full text
    Article
  6. 126

    Analysis of DoS attacks on Docker inter-component stdio copy by Tianyu ZHOU, Wenbo SHEN, Nanzi YANG, Jinku LI, Chenggang QIN, Wang YU

    Published 2020-12-01
    “…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
    Get full text
    Article
  7. 127

    Numerical simulation of the crack 2D by the finite element incorporated the discontinuity by Nguyen Truong Giang

    Published 2008-07-01
    “…The elements employ discontinuous functions and the facture mechanics two dimensional asymptotic crack tip displacement fields. The Fortran source code of Cast3M applies these elements to a set of examples. …”
    Get full text
    Article
  8. 128

    Measurement of schizophrenia symptoms through speech analysis from PANSS interview recordings by Michelle Worthington, Michelle Worthington, Georgios Efstathiadis, Vijay Yadav, Vijay Yadav, Isaac Galatzer-Levy, Isaac Galatzer-Levy, Isaac Galatzer-Levy, Alan Kott, Emanuel Pintilii, Tejendra Patel, Colin Sauder, Inder Kaul, Stephen Brannan, Anzar Abbas

    Published 2025-06-01
    “…Speech collection for digital phenotyping is often dependent on platforms built using closed-source code and associated with patient and clinician burden. …”
    Get full text
    Article
  9. 129
  10. 130

    Error-Mask-Adaptive Dynamic Filtering for Image Inpainting by Keunsoo Ko, Seunggyun Woo, Chang-Su Kim

    Published 2025-01-01
    “…Experimental results on diverse datasets show that the proposed EMDF algorithm outperforms existing inpainting algorithms significantly. The source codes are available at <uri>https://github.com/keunsoo-ko/EMDF</uri>.…”
    Get full text
    Article
  11. 131

    Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem by Ruqaya Sha’ban

    Published 2013-07-01
    “…In this research, the experimental show is very speed to obtain the goal. The source code is written in MATLAB language to simulate these two algorithms.   …”
    Get full text
    Article
  12. 132

    Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy by Andrey Tumanov

    Published 2025-07-01
    “…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
    Get full text
    Article
  13. 133

    Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy by Andrey Tumanov

    Published 2025-07-01
    “…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
    Get full text
    Article
  14. 134

    Detached Circumstellar Matter as an Explanation for Slowly-Rising Interacting Type Ibc Supernovae by Yuki Takei, Daichi Tsuna

    Published 2024-12-01
    “…Some hydrogen-poor (Type Ibc) supernovae (SNe) are known to have massive circumstellar matter (CSM) that are well detached from the star. Using the open-source code \texttt{CHIPS}, we construct a grid of models of SN Ibc interacting with detached CSM, inspired by a recently proposed scenario of such CSM generated by a mass eruption and feedback process from the leftover star. …”
    Get full text
    Article
  15. 135

    Joint source-channel coding for image transmission based on best wavelet packet by Jun-hong CHEN, Qin-yu ZHANG

    Published 2012-10-01
    “…A novel joint source/channel image coding algorithm was proposed based on the best wavelet packet in a rate-distortion sense.Different from other wavelet packet image coding,the channel and the channel code information were introduced to the source coding,so the proposed algorithm was a joint source-channel coding.The coding of wavelet packet sub-band was bit plane,accorolingly,the bit streams could be good match to UEP.And a WICP-LDPC code was using as a channel code.The simulation results in BSC channel show that,the proposed algorithm is better than the EEP image transmission system.And the proposed algorithm is also better than several other image transmission algorithms,which proposed recently.…”
    Get full text
    Article
  16. 136

    Research on compatibility of high-performance network stack by Huiyou JIANG, Junfeng LI, Dan LI

    Published 2019-05-01
    “…The massive data processing in artificial intelligence system requires the support of high-throughput network.As a bridge between the upper artificial intelligence applications and the underlying high-speed hardware network adapter,the network stack plays a crucial role in the performance of the whole network system.Through detailed analysis and comparison of the compatibility of mainstream network stacks,it is found that the compatibility of various network stacks is generally low,which leads to difficulties in transplantation of artificial intelligence applications.The idea of achieving both high-compatibility and high-performance of user-level network stack were proposed.In this way,legacy applications could directly attain the improvement of performance without modification of the source code.Path for the subsequent development of network stack was lit up.…”
    Get full text
    Article
  17. 137

    Research on compatibility of high-performance network stack by Huiyou JIANG, Junfeng LI, Dan LI

    Published 2019-05-01
    “…The massive data processing in artificial intelligence system requires the support of high-throughput network.As a bridge between the upper artificial intelligence applications and the underlying high-speed hardware network adapter,the network stack plays a crucial role in the performance of the whole network system.Through detailed analysis and comparison of the compatibility of mainstream network stacks,it is found that the compatibility of various network stacks is generally low,which leads to difficulties in transplantation of artificial intelligence applications.The idea of achieving both high-compatibility and high-performance of user-level network stack were proposed.In this way,legacy applications could directly attain the improvement of performance without modification of the source code.Path for the subsequent development of network stack was lit up.…”
    Get full text
    Article
  18. 138

    THE TEST PROGRAMME CONCERNING AIRCRAFT POSITIONING AND TRAFFIC MONITORING – PART II by Henryk JAFERNIK

    Published 2016-12-01
    “…Computations were executed in the “PPP_KINEMTIC” software, whose source code was written using the Scilab 5.3.2 platform. …”
    Get full text
    Article
  19. 139

    Specx: a C++ task-based runtime system for heterogeneous distributed architectures by Paul Cardosi, Bérenger Bramas

    Published 2025-07-01
    “…Not only does it allow efficient parallelization across distributed heterogeneous computing nodes, but it also allows for elegant source code structuring by describing hardware-independent algorithms. …”
    Get full text
    Article
  20. 140

    Inference of monosynaptic connections from parallel spike trains: A review by Ryota Kobayashi, Shigeru Shinomoto

    Published 2025-06-01
    “…Finally, we describe available source codes for connectivity inference and future challenges. …”
    Get full text
    Article