-
121
Cross-Project Defect Prediction Using Transfer Learning with Long Short-Term Memory Networks
Published 2024-01-01“…First, the abstract syntax trees (AST) are generated based on the source codes. Second, the AST node contents are converted into integer vectors as inputs to the TLSTM model. …”
Get full text
Article -
122
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
123
Evolution Process and Supply Chain Adaptation of Smart Contracts in Blockchain
Published 2022-01-01“…Because of its unique decentralization, encryption, reliability, and tamper-proof, the block chain system makes smart contracts break through the shackles of the lack of trusted environment, and its application field keeps expanding. We read the source code and official documents of Bitcoin, Ethereum, and Hyperledger to explore the operation principle and implementation mode of smart contract. …”
Get full text
Article -
124
Investigation of parameters influencing erosive wear using DEM
Published 2019-03-01“…The Finnie model was implemented using an open-source code. Regarding the time integration, the Gear algorithm was used, and to ensure the accuracy of the DEM results, a time-step sensitivity analysis was performed. …”
Get full text
Article -
125
Structural properties and static robustness of Linux software network
Published 2019-11-01“…The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.…”
Get full text
Article -
126
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01“…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
Get full text
Article -
127
Numerical simulation of the crack 2D by the finite element incorporated the discontinuity
Published 2008-07-01“…The elements employ discontinuous functions and the facture mechanics two dimensional asymptotic crack tip displacement fields. The Fortran source code of Cast3M applies these elements to a set of examples. …”
Get full text
Article -
128
Measurement of schizophrenia symptoms through speech analysis from PANSS interview recordings
Published 2025-06-01“…Speech collection for digital phenotyping is often dependent on platforms built using closed-source code and associated with patient and clinician burden. …”
Get full text
Article -
129
A Holistic Solution for Supporting the Diagnosis of Historic Constructions from 3D Point Clouds
Published 2025-06-01“…The Seg4D installer and source code are are publicly available in a GitHub repository.…”
Get full text
Article -
130
Error-Mask-Adaptive Dynamic Filtering for Image Inpainting
Published 2025-01-01“…Experimental results on diverse datasets show that the proposed EMDF algorithm outperforms existing inpainting algorithms significantly. The source codes are available at <uri>https://github.com/keunsoo-ko/EMDF</uri>.…”
Get full text
Article -
131
Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem
Published 2013-07-01“…In this research, the experimental show is very speed to obtain the goal. The source code is written in MATLAB language to simulate these two algorithms. …”
Get full text
Article -
132
Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy
Published 2025-07-01“…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
Get full text
Article -
133
Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy
Published 2025-07-01“…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
Get full text
Article -
134
Detached Circumstellar Matter as an Explanation for Slowly-Rising Interacting Type Ibc Supernovae
Published 2024-12-01“…Some hydrogen-poor (Type Ibc) supernovae (SNe) are known to have massive circumstellar matter (CSM) that are well detached from the star. Using the open-source code \texttt{CHIPS}, we construct a grid of models of SN Ibc interacting with detached CSM, inspired by a recently proposed scenario of such CSM generated by a mass eruption and feedback process from the leftover star. …”
Get full text
Article -
135
Joint source-channel coding for image transmission based on best wavelet packet
Published 2012-10-01“…A novel joint source/channel image coding algorithm was proposed based on the best wavelet packet in a rate-distortion sense.Different from other wavelet packet image coding,the channel and the channel code information were introduced to the source coding,so the proposed algorithm was a joint source-channel coding.The coding of wavelet packet sub-band was bit plane,accorolingly,the bit streams could be good match to UEP.And a WICP-LDPC code was using as a channel code.The simulation results in BSC channel show that,the proposed algorithm is better than the EEP image transmission system.And the proposed algorithm is also better than several other image transmission algorithms,which proposed recently.…”
Get full text
Article -
136
Research on compatibility of high-performance network stack
Published 2019-05-01“…The massive data processing in artificial intelligence system requires the support of high-throughput network.As a bridge between the upper artificial intelligence applications and the underlying high-speed hardware network adapter,the network stack plays a crucial role in the performance of the whole network system.Through detailed analysis and comparison of the compatibility of mainstream network stacks,it is found that the compatibility of various network stacks is generally low,which leads to difficulties in transplantation of artificial intelligence applications.The idea of achieving both high-compatibility and high-performance of user-level network stack were proposed.In this way,legacy applications could directly attain the improvement of performance without modification of the source code.Path for the subsequent development of network stack was lit up.…”
Get full text
Article -
137
Research on compatibility of high-performance network stack
Published 2019-05-01“…The massive data processing in artificial intelligence system requires the support of high-throughput network.As a bridge between the upper artificial intelligence applications and the underlying high-speed hardware network adapter,the network stack plays a crucial role in the performance of the whole network system.Through detailed analysis and comparison of the compatibility of mainstream network stacks,it is found that the compatibility of various network stacks is generally low,which leads to difficulties in transplantation of artificial intelligence applications.The idea of achieving both high-compatibility and high-performance of user-level network stack were proposed.In this way,legacy applications could directly attain the improvement of performance without modification of the source code.Path for the subsequent development of network stack was lit up.…”
Get full text
Article -
138
THE TEST PROGRAMME CONCERNING AIRCRAFT POSITIONING AND TRAFFIC MONITORING – PART II
Published 2016-12-01“…Computations were executed in the “PPP_KINEMTIC” software, whose source code was written using the Scilab 5.3.2 platform. …”
Get full text
Article -
139
Specx: a C++ task-based runtime system for heterogeneous distributed architectures
Published 2025-07-01“…Not only does it allow efficient parallelization across distributed heterogeneous computing nodes, but it also allows for elegant source code structuring by describing hardware-independent algorithms. …”
Get full text
Article -
140
Inference of monosynaptic connections from parallel spike trains: A review
Published 2025-06-01“…Finally, we describe available source codes for connectivity inference and future challenges. …”
Get full text
Article