Results 31 to 40 of about 3,402,194 (310)
Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev+4 more
doaj
Vulnerability Prediction From Source Code Using Machine Learning
As the role of information and communication technologies gradually increases in our lives, software security becomes a major issue to provide protection against malicious attempts and to avoid ending up with noncompensable damages to the system.
Zeki Bilgin+5 more
doaj +1 more source
Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu+3 more
doaj +1 more source
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee+5 more
doaj +1 more source
GraphBinMatch: Graph-based Similarity Learning for Cross-Language Binary and Source Code Matching [PDF]
Matching binary to source code and vice versa has various applications in different fields, such as computer security, software engineering, and reverse engineering. Even though there exist methods that try to match source code with binary code to accelerate the reverse engineering process, most of them are designed to focus on one programming language.
arxiv
Multiple Access Channel Resolvability Codes from Source Resolvability Codes [PDF]
We show that the problem of code construction for multiple access channel (MAC) resolvability can be reduced to the simpler problem of code construction for source resolvability. Specifically, we propose a MAC resolvability code construction that relies on a combination of multiple source resolvability codes, used in a black-box manner, and leverages ...
arxiv
PAC Codes for Source and Joint Source-Channel Coding [PDF]
Polarization-adjusted convolutional (PAC) codes, as a concatenated coding scheme based on polar codes, is able to approach the finite-length bound of binary-input AWGN channel at short blocklengths. In this paper, we extend PAC codes to the fields of source coding and joint source-channel coding and show that they can also approach the corresponding ...
arxiv
Microservices architecture is widely used because of the ease of maintaining its microservices, as opposed to encapsulating functionality in a monolithic, which may negatively impact the development process when the application continues to grow.
Siti Rochimah, Bintang Nuralamsyah
doaj +1 more source
Semantic Source Code Models Using Identifier Embeddings
The emergence of online open source repositories in the recent years has led to an explosion in the volume of openly available source code, coupled with metadata that relate to a variety of software development activities.
Efstathiou, Vasiliki+1 more
core +1 more source
Taurine promotes glucagon‐like peptide‐1 secretion in enteroendocrine L cells
Taurine, a sulfur‐containing amino acid, is likely taken up by enteroendocrine L cells via the taurine transporter. This process increases the levels of cytosolic ATP. The increase in intracellular Ca2+ concentrations and glucagon‐like peptide‐1 secretion through membrane depolarization is caused by the closure of ATP‐sensitive potassium channels ...
Yuri Osuga+6 more
wiley +1 more source