Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Nguyen Ngoc Binh"'
Autor:
Dinh Thai Hoang, Nguyen Van Toan, Nguyen Ngoc Binh, Dang Van Thu, Vu Ngoc Thang, Tran Xuan Hoang
Publikováno v:
Vietnam Journal of Agricultural Sciences. 4:997-1006
Mineral nutrients are essential to plant growth and development. The present study aimed to evaluate the effects of mineral fertilizer doses and N:P:K ratio on growth, yield, and raw material quality of the tea variety PH10 to improve the production
Publikováno v:
The Computer Journal. 64:599-609
Control flow-based feature extraction method has the ability to detect malicious code with higher accuracy than traditional text-based methods. Unfortunately, this method has been encountered with the NP-hard problem, which is infeasible for the larg
Publikováno v:
PROCEEDINGS OF THE 14TH NATIONAL CONFERENCE ON FUNDAMENTAL AND APPLIED INFORMATION TECHNOLOGY RESEARCH.
Publikováno v:
International Journal of Software Engineering and Knowledge Engineering. 29:1313-1345
This paper proposes a transformation-based method to automatically generate functional test cases from use cases named USLTG (Use case Specification Language (USL)-based Test Generation). We first focus on developing a modeling language named Test Ca
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IOSR Journal of Sports and Physical Education. :05-12
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ISCIT
Static characteristic extraction method Control flow-based features proposed by Ding has the ability to detect malicious code with higher accuracy than traditional Text-based methods. However, this method resolved NP-hard problem in a graph, therefor
Publikováno v:
SoICT
The widespread adoption of Internet of Things (IoT) devices built on different architectures gave rise to the creation and development of multi-architecture malware for mass compromise. Cross-architecture malware detection plays an important role in
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
Malware on devices connected to the Internet via the Internet of Things (IoT) is evolving and is a core component of the fourth industrial revolution. IoT devices use the MIPS architecture with a large proportion running on embedded Linux operating s