Showing 1 - 15 results of 15 for search '"program analysis"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Program state optimal method based on variable symbolic relation analysis by Xi GUO, Pan WANG

    Published 2018-06-01
    Subjects: “…program analysis…”
    Get full text
    Article
  3. 3

    Program semantic analysis model for code reuse detection by GUO Xi, WANG Pan

    Published 2024-12-01
    Subjects: “…program analysis…”
    Get full text
    Article
  4. 4

    Malware prediction technique based on program gene by Da XIAO, Bohan LIU, Baojiang CUI, Xiaochen WANG, Suoxing ZHANG

    Published 2018-08-01
    “…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
    Get full text
    Article
  5. 5

    Research on data encryption system and technology for cloud storage by Peiyi HAN, Chuanyi LIU, Jiahui WANG, Shaoming DUAN, Hezhong PAN, Binxing FANG

    Published 2020-08-01
    “…To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic program analysis technique was adopted based on JavaScript API function hooking for automatically extending to various cloud applications.And a novel proxy executed searchable encryption solution was presented so that it could achieve data encryption while maintaining the original functions of cloud applications.Experimental results show that the system can support a variety of typical cloud services,effectively protect sensitive data,and bring a relatively low overhead.…”
    Get full text
    Article
  6. 6

    FATIGUE LIFE ANALYSIS OF CYLINDRICAL HELICAL COMPRESSION SPRING BASED ON WEIBULL DISTRIBUTION by FU Tao, WANG DeCheng, CHENG Peng

    Published 2020-01-01
    “…Using the developed software program analysis of Weibull reliability with different sample sizes spring fatigue data. …”
    Get full text
    Article
  7. 7

    The Evaluation of Impact of Cable Power Lines on the Environment by M. A. Korotkevich, S. N. Azarov

    Published 2019-10-01
    “…A quantitative evaluation of the thermal impact of electrical cables with cross-linked polyethylene insulation on the environment was carried out using the Elcut program. Analysis of the temperature field near the loaded cable line of 10 kV demonstrated high values of soil temperature that negatively affects its redox potential and living organisms. …”
    Get full text
    Article
  8. 8

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
    Get full text
    Article
  9. 9

    Pasithea-1: An Energy-Efficient Sequential Reconfigurable Array With CPU-Like Programmability by Tobias Kaiser, Esther Gottschalk, Kai Biethahn, Friedel Gerfers

    Published 2025-01-01
    “…Program-dependent factors underlying variations in energy efficiency are identified using dynamic program analysis. To reduce operand transfer energy, seven interconnect topologies are evaluated: a flat bus, five crossbar variants and a logarithmic network. …”
    Get full text
    Article
  10. 10
  11. 11

    Keefektifan program konseling singkat berfokus solusi dalam LMS Schoology untuk meningkatkan perilaku hidup sehat siswa di masa pandemi Covid-19 by Kadek Suranata, Ifdil Ifdil

    Published 2021-06-01
    “…The scale of acceptability, accessibility, feasibility (AAF) measured student responses to the acceptability and usefulness of the program. Analysis of research data related to the effect of an intervention on students’ healthy living behavior using a one-sample t-test. …”
    Get full text
    Article
  12. 12

    Analysis on Dynamic Decision-Making Model of the Enterprise Technological Innovation Investment under Uncertain Environment by Yong Long, Hongwei Wu, Ke Qiucheng Zhou

    Published 2012-01-01
    “…Under the environment of fuzzy factors including the return of market, performance of product, and the demanding level of market, we use the method of dynamic programming and establish the model of investment decision, in technology innovation project of enterprise, based on the dynamic programming. Analysis of the influence caused by the changes of fuzzy uncertainty factors to technological innovation project investment of enterprise.…”
    Get full text
    Article
  13. 13

    Review of path branch obfuscation by Pu GENG, Yuefei ZHU

    Published 2020-04-01
    “…Code obfuscation is a convenient and effective technique of software protection,which can combat MATE attacks based on reverse engineering.With the development of automatic programming analysis technology,a new code obfuscation technique which named path branch obfuscation was proposed to defeat symbolic execution.With the composition of branch information and how does the branch composition effect in execution technique,the branch obfuscation was classified into three types.Then,a detailed research and development situation of each branch obfuscation class was exhaustively described.At last,the prospects of branch obfuscation were discussed.…”
    Get full text
    Article
  14. 14

    Problem nutrients in diet of under-five children and district food security status: Linear programming analyses of 37 stunting priority districts in Indonesia. by Umi Fahmida, Indriya Laras Pramesthi, Sari Kusuma, Arienta R P Sudibya, Rahmawati Rahmawati, Dini Suciyanti, Gusnedi Gusnedi, Aly Diana

    Published 2024-01-01
    “…<h4>Methods</h4>Linear programming analysis (LP) using Optifood was done using single 24-hour dietary recall data Ministry of Health 2016 Food Consumption Survey. …”
    Get full text
    Article
  15. 15

    Earth–lunar thermal effect on the temperature stability of TianQin telescope and the suppression methods by Wenbo Chang, Yuxiang Wang, Wenhai Tan, Guanhua Wu, Houyuan Chen, Wei Li, Zizheng Li, Fan Zhu, Zhu Li, Xuefeng Zhang, Shanqing Yang

    Published 2025-03-01
    “…A bunched entrance baffle is optimized by Linear Programming analysis based on the smallest laser aperture and baffle geometric size constraint and then achieved temperature stability of about 0.3 mK/Hz @0.1 mHz for the secondary mirror. …”
    Get full text
    Article