Showing 1 - 20 results of 22 for search '(((( element cscap algorithm ) OR ( alignment network algorithm ))) OR ( source code algorithm ))', query time: 0.11s Refine Results
  1. 1

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…Until now, a number of network alignment algorithms have been proposed based on different formulations and approaches, many of them focusing on pairwise alignment. …”
  2. 2

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…”
  3. 3
  4. 4

    An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications by Abu Zitar, Raed

    Published 2021
    “…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …”
    Get full text
  5. 5
  6. 6
  7. 7

    Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application by Aram Rostami (22045274)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">BEAMnrc codes simulate radiation sources and model radiation transport for 6 MV and 15 MV photon beams. …”
  8. 8
  9. 9
  10. 10
  11. 11

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. …”
    Get full text
    Get full text
    Get full text
    article
  12. 12
  13. 13

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…</p><p dir="ltr">This paper sets out the principles devised at that meeting, which cover the need for improvement in efficiency of SR tasks, automation across the spectrum of SR tasks, continuous improvement, adherence to high quality standards, flexibility of use and combining components, the need for a collaboration and varied skills, the desire for open source, shared code and evaluation, and a requirement for replicability through rigorous and open evaluation.…”
  14. 14

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…Findings support the generalizability of the best model, as the platform-specific results from Twitter and Wikipedia are comparable to their respective source papers. We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…”
  16. 16

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…All created data and source codes are openly available.</p><h2>Other Information</h2><p dir="ltr">Published in: Advances in Engineering Software<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.advengsoft.2022.103392" target="_blank">https://dx.doi.org/10.1016/j.advengsoft.2022.103392</a></p>…”
  17. 17

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
  18. 18

    An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication by Syed Muhammad Amrr (16855557)

    Published 2019
    “…Aligned with these design objectives, a robust event-triggered attitude control algorithm is proposed to regulate the orientation of a flexible spacecraft subjected to parametric uncertainties, external disturbances, and vibrations due to flexible appendages. …”
  19. 19
  20. 20