In this paper, the design of fixed-wing autonomous UAVs is aimed. The goal is to lock onto rival UAVs during the competition, avoid these locks with aggressive maneuvers, and perform the designated tasks autonomously....
详细信息
The primary goal of software repositories is to store the source code of software during its development. Developers constantly store small parts (i.e. software modifications) of code into the repository and share tho...
详细信息
Assuring quality IT solutions demands assuring quality in all aspects of software development process. For this we need well-formed methods with suitable metrics with which we can verify if a process, software product...
详细信息
ISBN:
(纸本)9789537138097
Assuring quality IT solutions demands assuring quality in all aspects of software development process. For this we need well-formed methods with suitable metrics with which we can verify if a process, software product, software component, software artifact or other part of possible solution meets defined quality characteristics. XML Schemas and corresponding XML documents are becoming the most important software artifacts. Today we can find large number of software metrics which are mostly used for software products. Very little has been done in field of metrics for XML Schema specification, especially metrics for evaluating XML Schemas quality. In this paper we will analyze existing XML metrics and their usage and try to hand out preliminary proposal for XML Schema quality framework.
In software projects, bug reports remain open and get updates from team members during the related bug's lifetime. It is an important task to predict when a bug would be resolved so that managers plan timeline and...
详细信息
Development of intelligent systems with the pursuit of detecting abnormal events in real world and in real time is challenging due to difficult environmental conditions, hardware limitations, and computational algorit...
详细信息
Bioinformatics is the biological study which applies programming techniques for more understanding and analysis of living objects such as the study of genome structure. The genome structure could be represented in the...
详细信息
We present OpenThaiGPT 1.6 and R1 (OTG-1.6 and OTG-R1), Thai-centric Large Language Models (LLMs) developed through distinct methodologies to enhance generalization and reasoning capabilities. OTG-1.6 employs Task Ari...
详细信息
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical *** this system,service providers consider user authentication as a critical *** ...
详细信息
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical *** this system,service providers consider user authentication as a critical *** address this crucial requirement,various types of validation and key agreement protocols have been *** main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has *** paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement *** secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS ***,it is simulated and formally analyzed using Scyther *** results indicate the protocol’s robustness,both in perfect forward security and against various *** addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication *** time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other *** results of the comparison point to a superior performance by the proposed protocol.
Global anxiety and depression have become 25% more prevalent, with teenagers and women being the most affected. Approximately 280 million people suffer from depression. Doctors and psychologists are able to diagnose d...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced environment of manufacturing of networks and other products which used different networks,no dependable assessment has been embraced to choose,how much these invariants are connected with a network graph or molecular *** this paper,it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science,chemistry,physics,drug industry,informatics,and mathematics in setting with physical and synthetic constructions and networks,since K-Banhatti invariants are newly introduced and have various forecast characteristics for various variations of bridge graphs or *** review settled the topology of bridge graph/networks of three unique sorts with three types of K-Banhatti *** concluded outcomes can be utilized for the modeling of interconnection networks of Personal computers(PC),networks like Local area network(LAN),Metropolitan area network(MAN)and Wide area network(WAN),the spine of internet and different networks/designs of PCs,power generation interconnection,bio-informatics and chemical structures.
暂无评论