-
161
Understanding Open Source Software Evolution Using Fuzzy Data Mining Algorithm for Time Series Data
Published 2016-01-01“…Source code management systems (such as Concurrent Versions System (CVS), Subversion, and git) record changes to code repositories of open source software projects. …”
Get full text
Article -
162
Enhancing Fast Network Recovery in LoRaWAN: Implementing Bidirectional Forwarding Detection in OMNeT++
Published 2025-01-01“…The implementation is done by modifying and supplementing the source code for the FLoRa simulation framework. BFD accelerates network failure detection in LoRaWAN and reduces packet loss by redirecting to a backup route.…”
Get full text
Article -
163
A quantum multiplier based on the quantum Fourier transform algorithm
Published 2022-03-01“…The experimental results show that the quantum multiplier achieves higher accuracy and lower computational complexity with less qubits. The open source code of the quantum multiplier is publicly available.…”
Get full text
Article -
164
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
Published 2024-12-01“…For real-world attacks, the source code is typically unavailable, which poses a challenge for locating the COs thus reducing the effectiveness of many methods. …”
Get full text
Article -
165
Designing and Interpreting a Mathematical Programming Language
Published 2019-12-01“…In this article, a programming language that supports the use of mathematical function structures is designed and an interpreter, which can evaluate the source code written in this language, is developed. …”
Get full text
Article -
166
Selecting a Monitoring Technology for a Control System of Distributed Oil Production Facilities
Published 2024-06-01“…The important factors that determined the choice of this platform were the availability of the open source code and a large library of ready-made templates for displaying the well parameters in real time. …”
Get full text
Article -
167
Enhancing Constitutive Models for Soils: Adding the Capability to Model Nonlinear Small Strain in Shear
Published 2019-01-01“…The validation simulations of the undrained triaxial tests on London Clay and Ham River sand with the upgraded constitutive models replicate the experiments clearly better than the base models, without any changes to existing model parameters and the core source code associated with the base model.…”
Get full text
Article -
168
Exploring Gender Differences in Fatwa through Machine Learning
Published 2024-06-01“…We intend to share both the dataset and the source code openly with the research community.…”
Get full text
Article -
169
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
Published 2021-07-01“…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
Get full text
Article -
170
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
171
Uji Plagiarism pada Tugas Mahasiswa Menggunakan Algoritma Winnowing
Published 2021-12-01“…In this study the authors used the winnowing algorithm to detect plagiarism in student assignments, namely programming source code, from the results of research conducted on 10 student assignments using the winnowing algorithm produced various similarity values as a percentage of similarity between two students tasks compared. …”
Get full text
Article -
172
Hybrid Obfuscation Using Signals and Encryption
Published 2018-01-01“…In this study, a new dispatcher was added to the source code to reconstruct the original control flow graph from the hidden one to solve the problem of the signal method. …”
Get full text
Article -
173
Using d2d for Writing XML
Published 2025-01-01“…All source texts are in the public domain; a publication on an open-source code repository is in preparation.…”
Get full text
Article -
174
A divide-and-conquer approach based on deep learning for long RNA secondary structure prediction: Focus on pseudoknots identification.
Published 2025-01-01“…We show that our approach exhibits superior performance compared to state-of-the-art methods for pseudoknot prediction and secondary structure prediction including pseudoknots for long RNAs. The source code of DivideFold, along with all the datasets used in this study, is accessible at https://evryrna.ibisc.univ-evry.fr/evryrna/dividefold/home.…”
Get full text
Article -
175
GELSTATS: A Computer Program for Population Genetics Analyses Using VNTR Multilocus Probe Data
Published 1996-12-01“…GELSTATS, a computer program for population genetics analyses utilizing genetic markers revealed with variable number tandem repeat (VNTR) multilocus probes, is described and made available (both as C++ source code and as an executable DOS program). The program calculates several population genetics parameters, including: (i) individual and population band numbers; (ii) population bands exhibiting complete linkage (redundant examples of such bands can be removed in subsequent analyses); (iii) similarity (fraction of bands shared) between individuals and average similarity within and between designated groups; (iv) estimated probability that two individuals chosen at random will have identical band profiles; (v) heterozygosity estimates for designated groups; and (vi) Fst estimates. …”
Get full text
Article -
176
PoPoolation: a toolbox for population genetic analysis of next generation sequencing data from pooled individuals.
Published 2011-01-01“…PoPoolation is written in Perl and R and it builds on commonly used data formats. Its source code can be downloaded from http://code.google.com/p/popoolation/. …”
Get full text
Article -
177
Automatic Documentation of Java Programs
Published 2014-12-01“…The work concerns with constructing an automated tool ADT(Auto Documentation Tool) used for documenting source code for programs written in java programming languages in legacy systems particularly and for programs in general which does not have any documentation at all or it were documented poorly in order to make them, and producing as a result of the document process either the class diagrams using UML (Unified Modeling Language( or producing easy understandable textual output using XML (Extensible Markup Language).…”
Get full text
Article -
178
RNAtango: Analysing and comparing RNA 3D structures via torsional angles.
Published 2024-10-01“…Compatible with all modern web browsers, RNAtango is accessible freely along with the source code. It supports researchers in accurately assessing structural similarities, which contributes to the precision and efficiency of RNA modeling.…”
Get full text
Article -
179
Jolie Static Type Checker: a Prototype
Published 2017-12-01“…Static verification of a program source code correctness is an important element of software reliability. …”
Get full text
Article -
180
MFPSP: Identification of fungal species-specific phosphorylation site using offspring competition-based genetic algorithm.
Published 2024-11-01“…We anticipate MFPSP to serve as a valuable bioinformatics tool and benefiting practical experiments by pre-screening potential phosphorylation sites and enhancing our functional understanding of phosphorylation modifications in fungi. The source code and datasets are accessible at https://github.com/AI4HKB/MFPSP/.…”
Get full text
Article