-
241
DesignEye : a tool for design teams to analyze and address visual clutter
Published 2009Get full text
Thesis -
242
Precise semantic history slicing through dynamic delta refinement
Published 2021“…Semantic history slicing solves the problem of extracting changes related to a particular high-level functionality from software version histories. State-of-the-art techniques combine static program analysis and dynamic execution tracing to infer an over-approximated set of changes that can preserve the functional behaviors captured by a test suite. …”
Get full text
Journal Article -
243
Generating UML class diagram from source codes using multi-threading technique
Published 2015“…Class diagram extraction can be done either from software’s source code, or from the executable file. …”
Get full text
Get full text
Get full text
Thesis -
244
Strategic Environmental Assessment in the Application of Preventive Protection for Wind Farm Noise—Case Study: Maestrale Ring Wind Farm
Published 2021-09-01“…The results of the research indicate how it is possible to achieve the principle of objectivity in the process of multicriteria expert evaluation by including the results of a partial impact assessment of the noise from wind farms, using results obtained from software modeling of the spatial dispersion of wind turbine noise in the SoundPlan 8.1 software package in the SEA process. …”
Get full text
Article -
245
GrimoireLab: A toolset for software development analytics
Published 2021-07-01“…Goal To produce a reusable toolset supporting the most common tasks when retrieving, curating and visualizing data from software repositories, allowing for the easy reproduction of data sets ready for more complex analytics, and sparing the researcher or the analyst of most of the tasks that can be automated. …”
Get full text
Article -
246
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
Published 2023-06-01“…These threats may come from software or hardware. There has been a lot of research on managing malware, and there are many mature commercial products, such as antivirus software, firewalls, etc. …”
Get full text
Article -
247
Credibility, Replicability, and Reproducibility in Simulation for Biomedicine and Clinical Applications in Neuroscience
Published 2018-04-01“…In doing this for neuroscience, we can learn lessons from long-standing practices in other areas of simulation (aircraft, computer chips), from software engineering, and from other biomedical disciplines. …”
Get full text
Article -
248
Agile Development of Polymer Power Transmission Systems for e-Mobility—A Novel Methodology Based on an e-Bike Drive Case Study
Published 2022-12-01“…The article highlights and discusses individual special features that distinguish agile development of physical products from software development.…”
Get full text
Article -
249
Wideband, High-Gain, and Compact Four-Port MIMO Antenna for Future 5G Devices Operating over Ka-Band Spectrum
Published 2023-03-01“…The antenna hardware prototype is fabricated to validate the performance of the suggested design of the antenna achieved from software tools, and good correlation between measured and simulated results is observed. …”
Get full text
Article -
250
Vision for unified micromagnetic modeling (UMM) with Ubermag
Published 2024-01-01“…This language varies from software to software. If the researchers need to use another package, they need to learn a new language to re-express their (unchanged) micromagnetic problem for the next software. …”
Get full text
Article -
251
Assessment of Automated Flow Cytometry Data Analysis Tools within Cell and Gene Therapy Manufacturing
Published 2022-03-01“…We found that outputs from software analysing the same reference synthetic dataset vary considerably and accuracy deteriorates as the cluster separation index falls below zero. …”
Get full text
Article -
252
-
253
-
254
PERILAKU MEKANIKA SAMBUNGAN BAMBU MENGGUNAKAN BAUT DENGAN PENGISI RESIN
Published 2012“…There is some conclusions from test result, such as: the lowest connection strength happened in 900 connection with maximum load at 1945,67 kg and the highest connection strength happened in 00 connection with maximum load at 2117,67 kg. From software design, given that maximum load (mean) which caused by moment is 1285 kg and gave stiffness value for object 1, 2 and 3 are 16,484 kNm, 24,66 kNm and 29,439 kNm.…”
Thesis -
255
A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
Published 2015“…There were also works done previously on source code-based taxonomies but they were too broad with ambiguous classes and failed to describe clearly from software developers point of view. Currently, there is no source code-based taxonomy constructed with criteria of well-defined taxonomy resulting in difficulty to apply taxonomy as foundation and references in writing secure codes. …”
Get full text
Thesis -
256
Prematurity and Epilepsy: A Bibliometric Analysis
Published 2024-04-01“…The data extracted from Software R(V.4.3.0) in R format was analysed in the Bibliometrix program (http://www.bibliometrix.org (accessed 20/06/2023)), and the outcome was organised by sources, authors, affiliations, countries, keywords and the evolution of the research along time. …”
Get full text
Article -
257
A Novel Systolic Parallel Hardware Architecture for the FPGA Acceleration of Feedforward Neural Networks
Published 2019-01-01“…However, the computational demands of deep neural networks require flexible and efficient hardware architectures able to fit different applications, neural network types, number of inputs, outputs, layers, and units in each layer, making the migration from software to hardware easy. This paper describes novel hardware implementing any feedforward neural network (FFNN): multilayer perceptron, autoencoder, and logistic regression. …”
Get full text
Article -
258
Desenvolvimento da orientação empreendedora em empresas de software: proposições preliminares Development of entrepreneurial orientation in software companies: preliminary proposit...
Published 2011-08-01“…The researching method is constituted by an exploratory and qualitative study carried out in 2 stages: the first one involves interviews in depth with 3 specialists of the sector of IT in the state of the Rio Grande do Sul, that aims at searching perceptions about EO in the sector; the second step conveys interviews in depth with 2 entrepreneurs from software firms in order to search better understanding on how EO in these organizations occurs. …”
Get full text
Article -
259
Towards Agility in Breast Cancer Treatment Principles as Adopted from Agile Software Engineering
Published 2024-03-01“…The incorporation of agile principles from software engineering offers a promising avenue for enhancing patient care. …”
Get full text
Article -
260
Evaluation of facial soft tissue thickness in asymmetric mandibular deformities after orthognathic surgery
Published 2021-10-01“…Measurements were taken from software-generated multiplanar reconstructions. …”
Get full text
Article