Showing 201 - 220 results of 281 for search '"FromSoftware"', query time: 0.47s Refine Results
  1. 201

    Test Suite Prioritization Based on Optimization Approach Using Reinforcement Learning by Muhammad Waqar, Imran, Muhammad Atif Zaman, Muhammad Muzammal, Jungsuk Kim

    Published 2022-07-01
    “…Lastly, the fault seeding approach is used to validate the results from software engineering experts. The proposed reinforcement learning-based test suite optimization model is evaluated through five case study applications. …”
    Get full text
    Article
  2. 202

    Development of a DC Microgrid with Decentralized Production and Storage: From the Lab to Field Deployment in Rural Africa by Lucas Richard, Cédric Boudinet, Sanda A. Ranaivoson, Jean Origio Rabarivao, Archille Elia Befeno, David Frey, Marie-Cécile Alvarez-Hérault, Bertrand Raison, Nicolas Saincy

    Published 2022-09-01
    “…The design of the proposed microgrid as well as its control algorithm are thoroughly addressed and tested from software simulations and experimental testing to field deployment in Madagascar. …”
    Get full text
    Article
  3. 203

    An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense by Zhuoxing Chen, Yiqin Lu, Jiancheng Qin, Zhe Cheng

    Published 2021-01-01
    “…Experimental results from software simulations and real experiments show that the OSSSA has better real-time defense performance than the current mainstream scheduling strategy algorithms, and can adapt to different practical application scenarios, which is helpful to the further development of the CMD.…”
    Get full text
    Article
  4. 204

    Editorial: Humanitarian Open Source (December 2010) by Leslie Hawthorn, Chris McPhee

    Published 2010-11-01
    “…It should come as no surprise that the humanitarian open source domain attracts a great deal of attention from software developers, engineers, and others who find that they are able to both solve intense technical challenges while helping to improve the lives of others. …”
    Get full text
    Article
  5. 205

    Requirements and Operational Guidelines for Secure and Sustainable Digital Phenotyping: Design and Development Study by Jagesar, Raj R, Vorstman, Jacob A, Kas, Martien J

    Published 2021-04-01
    “…Novel initiatives, ranging from software prototypes to user-ready research platforms, are innovating the field of biomedical research and health care apps. …”
    Get full text
    Article
  6. 206

    Developing a strategy for computational lab skills training through Software and Data Carpentry: Experiences from the ELIXIR Pilot action [version 1; referees: 3 approved] by Aleksandra Pawlik, Celia W.G. van Gelder, Aleksandra Nenadic, Patricia M. Palagi, Eija Korpelainen, Philip Lijnzaad, Diana Marek, Susanna-Assunta Sansone, John Hancock, Carole Goble

    Published 2017-07-01
    “…A pan-European bioinformatics programme, ELIXIR, has adopted a well-established and progressive programme of computational lab and data skills training from Software and Data Carpentry, aimed at increasing the number of skilled life scientists and building a sustainable training community in this field. …”
    Get full text
    Article
  7. 207

    SOFTWARE EFFORT ESTIMATION FRAMEWORK TO IMPROVE ORGANIZATION PRODUCTIVITY USING EMOTION RECOGNITION OF SOFTWARE ENGINEERS IN SPONTANEOUS SPEECH by B.V.A.N.S.S. Prabhakar Rao, P. Seetha Ramaiah

    Published 2015-10-01
    “…Each line of code should be delivered from software engineer. Tools and techniques may helpful and act as aid or supplementary. …”
    Get full text
    Article
  8. 208

    Identifying Important Packages of Object-Oriented Software Using Weighted k-Core Decomposition by Pan Weifeng, Hu Bo, Jiang Bo, Xie Bo

    Published 2014-12-01
    “…Complex network research opens new opportunities for identifying important entities from software networks. However, the existing methods only focus on identifying important classes. …”
    Get full text
    Article
  9. 209

    Vulnerable Code Detection Using Software Metrics and Machine Learning by Nadia Medeiros, Naghmeh Ivaki, Pedro Costa, Marco Vieira

    Published 2020-01-01
    “…To this end, we use several machine learning algorithms (Random Forest, Extreme Boosting, Decision Tree, SVM Linear, and SVM Radial) to extract vulnerability-related knowledge from software metrics collected from the source code of several representative software projects developed in C/C++ (Mozilla Firefox, Linux Kernel, Apache HTTPd, Xen, and Glibc). …”
    Get full text
    Article
  10. 210

    Suggested Prototype Software to Extract Data from Social Media by Amirreza Asnafi, Maryam Pakdaman Naeini, Samaneh Borji

    Published 2020-12-01
    “…Criteria "Automatically delete archives at specified time", "Reset deleted records", "Open archive for public access", "Obtain credentials from public and private entities", "Automatically delete archives at defined time", "Get Version" Complete After Payments "and" Demo Version "can be removed from software capabilities. However, when looking at current data mining software from social networks, some of these capabilities are of great importance. …”
    Get full text
    Article
  11. 211

    Software development process evolution and paradigm shift - a case study of Malaysian companies by Asif Riaz Khan, Rehan Akbar

    Published 2022-04-01
    “…The agile methods got overwhelming response from software development companies due to their obvious support to GSD. …”
    Get full text
    Article
  12. 212

    Opportunistic Screening of Vitamin B12 Deficiency in IT Professionals Presenting for Routine Health Check-up by Jitendra Rajendra Ingole, Rishi Devilal Patel, Sonali Jitendra Ingole, Harshal Tukaram Pandave

    Published 2015-12-01
    “…Our aim was to study the prevalence of Vit B12 deficiency in IT professionals (Information Technology Professionals from Software industry) who presented for routine health screening and to correlate the deficiency to various parameters. …”
    Get full text
    Article
  13. 213

    Detection of Vulnerabilities by Incorrect Use of Variable Using Machine Learning by Jihyun Park, Jaeyoung Shin, Byoungju Choi

    Published 2023-03-01
    “…Common Weakness Enumeration (CWE) refers to a list of faults caused from software or hardware. The CWE includes the faults related to programming language and security. …”
    Get full text
    Article
  14. 214

    Feasibility of AmbulanCe-Based Telemedicine (FACT) study: safety, feasibility and reliability of third generation in-ambulance telemedicine. by Laetitia Yperzeele, Robbert-Jan Van Hooff, Ann De Smedt, Alexis Valenzuela Espinoza, Rita Van Dyck, Rohny Van de Casseye, Andre Convents, Ives Hubloue, Door Lauwaert, Jacques De Keyser, Raf Brouns

    Published 2014-01-01
    “…Failures resulted mainly from limited mobile connectivity and to a lesser extent from software, hardware or human error. The user acceptance was high.Ambulance-based telemedicine of the third generation is safe, feasible and reliable but further research and development, especially with regard to high speed broadband access, is needed before this approach can be implemented in daily practice.…”
    Get full text
    Article
  15. 215

    Software and services export, IT investment and GDP nexus in India by Manzoor Hassan Malik, Nirmala Velan

    Published 2019-07-01
    “…Similarly, vector error correction mechanism Granger causality results hold that there is uni-directional long-run causality running from software and services export and investment in IT to GDP, implying that software and services export is an important determinant of economic growth in India. …”
    Get full text
    Article
  16. 216

    Calculation of One-dimensional Forward Modelling of Helicopter-borne Electromagnetic Data and a Sensitivity Matrix Using Fast Hankel Transforms by Abolfazl Asadian, Ali Moradzadeh, Alireza Arab-Amiri, Ali Nejati kalateh, Davood Rajabi

    Published 2014-06-01
    “…Furthermore, the comparison of the results for the sensitivity matrix for a two-layer model with those obtained from software is being used by the BGR Centre in Germany, showing that the proposed algorithm enjoys a high degree of accuracy in calculating this matrix.…”
    Get full text
    Article
  17. 217

    A Novel Approach towards the Design and Implementation of Virtual Network Based on Controller in Future IoT Applications by Faisal Mehmood, Israr Ullah, Shabir Ahmad, Do-Hyeun Kim

    Published 2020-04-01
    “…We derived the concept from Software Defined Network (SDN) and separated the control plane and data plane in the virtual IoT network. …”
    Get full text
    Article
  18. 218

    AttenSy-SNER: software knowledge entity extraction with syntactic features and semantic augmentation information by Mingjing Tang, Tong Li, Wei Gao, Yu Xia

    Published 2022-06-01
    “…It is significant to recognize and extract software knowledge entity from software knowledge community, as it has great impact on entity-centric tasks such as software knowledge graph construction, software document generation and expert recommendation. …”
    Get full text
    Article
  19. 219

    Using Application-Level Thread Progress Information to Manage Power and Performance by Neuman, Sabrina M, Miller, Jason E, Sanchez, Daniel, Devadas, Srinivas

    Published 2021
    “…Instead, we propose to gather progress information directly from software itself. We present ThreadBeats, a simple application-level annotation framework that directly and accurately conveys thread progress information to hardware. …”
    Get full text
    Article
  20. 220

    Mining Software Artifacts for use in Automated Machine Learning by Cambronero Sánchez, José Pablo

    Published 2022
    “…Inspired by the success of software mining in areas such as code search, program synthesis, and program repair, we investigate the hypothesis that information mined from software artifacts can be used to build, improve interactions with, and address missing use cases of AutoML. …”
    Get full text
    Thesis