We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Performance Improvement of Optical Multiple Access CDMA Network Using a New Three-Dimensional (Spectral/Time/Spatial) Code

    In this paper, a novel code named three dimensional single weight zero cross correlation (3D-SWZCC) code has been developed for spectral/time/spatial...

    Mohanad Alayedi, Abdelhamid Cherifi, ... Syed Alwee Aljunid in Wireless Personal Communications
    Article 15 February 2021
  2. Combining Image Caption and Aesthetic Description Using Siamese Network

    In recent decades, the confluence of CV and NLP technologies has grown in popularity. Many researchers have focused their attention on Image caption...
    Conference paper 2024
  3. Static code metrics-based deep learning architecture for software fault prediction

    Software fault prediction (SFP) refers to the early prediction of fault-prone modules in software development which are susceptible to faults and can...

    Somya Goyal in Soft Computing
    Article 11 August 2022
  4. Development of a Program Code Review System Using Machine Learning Methods

    The paper presents a description of the developed approach and service for analyzing source code in Python. The service reduces the time for code...
    Conference paper 2023
  5. Enhancing Code Understandability Through a Heuristic Rules Analysis for Small Software Vendors

    Small and Medium-Sized Enterprises (SMEs), which are recognized as having a significant impact on the economies of develo** countries, require...
    Chapter 2024
  6. Software Design of VerilogHDL Code Generation for Ladder Diagram and Data Acquisition Using LABVIEW

    Powerful advantages of programmable logic controller (PLC) dominate process industries. Scan time of PLC increases with the number of inputs, rungs...

    G. Dhanabalan, S. Tamil Selvi in Wireless Personal Communications
    Article 13 September 2022
  7. A Review of Code Vulnerability Detection Techniques Based on Static Analysis

    Blockchain-based applications, such as web3.0, play an increasingly important role in the future internet, but security issues pose a significant...
    Yixiao Xu, Man Zhang, ... Chencong Zhen in Computational and Experimental Simulations in Engineering
    Conference paper 2024
  8. Educational Code-Review Tool: A First Glimpse

    Code review is a common part of a programmer’s job and is considered a best practice when develo** software projects. Recently, this technique has...
    Conference paper 2023
  9. A Qualitative Assessment of ChatGPT Generated Code in the Computer Science Curriculum

    The emergence of Large Language Models and their deployment in systems such as ChatGPT are poised to have a major impact on STEM education,...
    Conference paper 2024
  10. MATLAB implementations of velocity field level set method for topology optimization: an 80-line code for 2D and a 100-line code for 3D problems

    This paper presents MATLAB implementations of the velocity field level set method for topology optimization. An 80-line code and a 100-line code are...

    Article 08 September 2021
  11. Simplifying the Code Editor Using MEAN Stack Technologies

    The online coding platform lies on the remote server which can be accessed through browsers. As we know that online code editors are efficient and...
    S. NagaMallik Raj, M. Jyothsna, ... Debnath Bhattacharyya in Smart Technologies in Data Science and Communication
    Conference paper 2023
  12. Architecture Description Languages

    Designing a processor is an arduous task. It involves not only defining the instruction-set architecture but also the various processor development...
    Anupam Chattopadhyay, Zheng Wang, Grant Martin in Handbook of Computer Architecture
    Living reference work entry 2022
  13. QR Code-Based Digital Payment System Using Visual Cryptography

    Quick response code (QR code) is employed due to its benefits, especially in the area of mobile payments. In the transaction process, however, there...
    Surajit Goon, Debdutta Pal, ... Subham Roy in Innovations in Data Analytics
    Conference paper 2023
  14. NL2Code: Harnessing Transformers for Automatic Code Generation from Natural Language Descriptions

    In an era where there's a lot of information and a big demand for things to be done automatically, combining the power of understanding human...
    N. Pavitha, Alimurtuza Patrawala, ... Shubham Dahiya in Smart Trends in Computing and Communications
    Conference paper 2024
  15. Code Smells: A Comprehensive Online Catalog and Taxonomy

    Context: Code Smells—a concept not fully understood among programmers, crucial to the code quality, and yet unstandardized in the scientific...
    Chapter 2023
  16. Karamelo: A Multi-CPU/GPU C++ Parallel MPM Code

    The Matlab code presented in the previous chapter is best suited for people new to the MPM who want to learn the method. This code is flexible, but...
    Vinh Phu Nguyen, Alban de Vaucorbeil, Stephane Bordas in The Material Point Method
    Chapter 2023
  17. On Flexible Trajectory Description for Effective Rigid Body Motion Reproduction and Recognition

    Recognizing and reproducing spatiotemporal motions are necessary when analyzing behaviors and movements during human-robot interaction. Rigid body...

    Article 20 April 2023
  18. Design and Implementation of a Low-Code and No-Code Platform Applied in Meteorological Monitoring Service

    With the development of technology, workers’ demand for software is increasing sharply, and the problem of software development platform has become...
    Conference paper 2023
  19. A Contemporary Systematic Review on Meta-heuristic Optimization Algorithms with Their MATLAB and Python Code Reference

    Optimization is a method which is used in every field, such as engineering, space, finance, fashion market, mass communication, travelling, and also...

    Rohit Salgotra, Pankaj Sharma, ... Amir H. gandomi in Archives of Computational Methods in Engineering
    Article Open access 11 December 2023
  20. Construction of Substitution Box from Nordstrom–Robinson \((\mathcal N_{16})\) Code

    Cryptography is promising primitive for secure communication. Substitution permutation networks (SPN) is one cryptographic scheme which uses...
    Deepak Agrawal in Data Science and Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.