Results 31 to 40 of about 2,796,496 (275)

The Influence of Code Retrieval from the Web on Programmer’s Skills, Meth-odologies, and Coding Behaviors

open access: yesمجلة المختار للعلوم, 2021
The development of software projects consists of several stages, such as analysis and design. It also requires a set of skills that the software developer can use to work on the project, such as specifying the requirements and writing code.
Alfaroq O.M. Mohammed   +2 more
doaj   +1 more source

Vulnerability Prediction From Source Code Using Machine Learning

open access: yesIEEE Access, 2020
As the role of information and communication technologies gradually increases in our lives, software security becomes a major issue to provide protection against malicious attempts and to avoid ending up with noncompensable damages to the system.
Zeki Bilgin   +5 more
doaj   +1 more source

Scalable Source Code Similarity Detection in Large Code Repositories [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj   +1 more source

Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]

open access: yesИкономика и компютърни науки, 2021
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev   +4 more
doaj  

Sequence-to-Sequence Learning-Based Conversion of Pseudo-Code to Source Code Using Neural Translation Approach

open access: yesIEEE Access, 2022
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee   +5 more
doaj   +1 more source

Source code

open access: green, 2016
Pawel Sobkowicz
openalex   +3 more sources

Decomposing Monolithic to Microservices: Keyword Extraction and BFS Combination Method to Cluster Monolithic’s Classes

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
Microservices architecture is widely used because of the ease of maintaining its microservices, as opposed to encapsulating functionality in a monolithic, which may negatively impact the development process when the application continues to grow.
Siti Rochimah, Bintang Nuralamsyah
doaj   +1 more source

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks

open access: yesIEEE Access, 2019
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li   +3 more
doaj   +1 more source

Lossy joint source-channel coding in the finite blocklength regime [PDF]

open access: yes, 2012
This paper finds new tight finite-blocklength bounds for the best achievable lossy joint source-channel code rate, and demonstrates that joint source-channel code design brings considerable performance advantage over a separate one in the non-asymptotic ...
Kostina, Victoria, Verdú, Sergio
core   +6 more sources

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy