|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
Tao Peng, Kun She, Yimin Shen, Xiangliang Xu and Yue Yu
Requirement traceability links are an essential part of requirement management software and are a basic prerequisite for software artifact changes. The manual establishment of requirement traceability links is time-consuming. When faced with large projec...
ver más
|
|
|
|
|
|
Aftab Ur Rahman, Guangcheng Zhang, Salman A. AlQahtani, Hammad Tariq Janjuhah, Irshad Hussain, Habib Ur Rehman and Liaqat Ali Shah
The purpose of this study is to identify the leading causes of slope instability along a local highway in Anhui, People?s Republic of China. As part of the east expansion project, the mountain range will be excavated to create a two-way, nearly 30 m wide...
ver más
|
|
|
|
|
|
Hengtao Shi and Xianjun Yu
This paper proposes a stage flow parameter analytical model for rapid evaluation of a counter-rotating compressor?s performance for design optimization and its application in the design of a transonic counter-rotating fan. In the first part, the velocity...
ver más
|
|
|
|
|
|
Honggui Wang and Hao Zhou
In order to assess whether condensation will occur on the shipside of a bulk grain cargo hold during transportation at sea, this paper has established a ventilation model for the bulk cargo hold of the ship, and optimized the model according to the chara...
ver más
|
|
|