Zobrazeno 1 - 10
of 144
pro vyhledávání: '"Nguyen Truong Giang"'
Autor:
Nguyen Truong Giang, Pham Son Minh, Tran Anh Son, Van-Thuc Nguyen, Tran Minh The Uyen, Thanh Trung Do, Van Thanh Tien Nguyen
Publikováno v:
PLoS ONE, Vol 19, Iss 8, p e0307485 (2024)
In this study, we present a novel approach to injection molding, focusing on the strength of weld lines in polyamide 6 (PA6) composite samples. By implementing a mold temperature significantly higher than the typical molding practice, which rarely ex
Externí odkaz:
https://doaj.org/article/9b643774c9c94036804c99e146d99008
Autor:
Ngo Truong Giang, Hoang Van Tong, Trinh Huu Nghia, Hoang Vu Hung, Do Tuan Anh, Le Van Nam, Can Van Mao, Nguyen Truong Giang, Le Dinh Thanh, Ho Anh Son, Thirumalaisamy P. Velavan, Quyet Do, Nguyen Linh Toan
Publikováno v:
International Journal of Infectious Diseases, Vol 95, Iss , Pp 253-261 (2020)
Background and objective: The human ficolin-2, encoded by FCN2, recognizes pathogen-associated acetylated residues on their cell surfaces and activates the lectin complement cascade. This study aimed to investigate the contribution of human ficolin-2
Externí odkaz:
https://doaj.org/article/dac0ee5def1c4af6a96c99c995265230
Autor:
Nguyen Truong Giang, Le Tien Dung, Nguyen Thanh Hien, Truong Thanh Thiet, Phan Sy Hiep, Nguyen The Vu, Dinh Cong Pho, Nguyen Van Nam, Pham Ngoc Hung
Publikováno v:
BMC Surgery, Vol 19, Iss 1, Pp 1-8 (2019)
Abstract Background In high-risk patients with complex pulmonary aspergilloma but unable for lung resection, cavernostomy and thoracoplasty could be performed. This study aimed to evaluate this surgery compared two compressing materials. Methods A to
Externí odkaz:
https://doaj.org/article/fd05f60b17134c1b934130bbfd19ad85
Fault localization is a critical process that involves identifying specific program elements responsible for program failures. Manually pinpointing these elements, such as classes, methods, or statements, which are associated with a fault is laboriou
Externí odkaz:
http://arxiv.org/abs/2403.10507
Autor:
Nguyen, Truong Giang, Le-Cong, Thanh, Kang, Hong Jin, Widyasari, Ratnadira, Yang, Chengran, Zhao, Zhipeng, Xu, Bowen, Zhou, Jiayuan, Xia, Xin, Hassan, Ahmed E., Le, Xuan-Bach D., Lo, David
Publikováno v:
IEEE Transactions on Software Engineering, 2023
With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vul
Externí odkaz:
http://arxiv.org/abs/2305.13884
Autor:
Kang, Hong Jin, Rattanukul, Pattarakrit, Haryono, Stefanus Agus, Nguyen, Truong Giang, Ragkhitwetsagul, Chaiyong, Pasareanu, Corina, Lo, David
Many modern software systems are enabled by deep learning libraries such as TensorFlow and PyTorch. As deep learning is now prevalent, the security of deep learning libraries is a key concern. Fuzzing deep learning libraries presents two challenges.
Externí odkaz:
http://arxiv.org/abs/2212.04038
Autor:
Nguyen Truong Giang, Jean-Michaël Muller, Ewelina Rupnik, Christian Thom, Marc Pierrot-Deseilligny
Publikováno v:
Sensors, Vol 18, Iss 7, p 2150 (2018)
Photogrammetric processing is available in various software solutions and can easily deliver 3D pointclouds as accurate as 1 pixel. Certain applications, e.g., very accurate shape reconstruction in industrial metrology or change detection for deforma
Externí odkaz:
https://doaj.org/article/c8fd6e784a4b4614a00f49c6e4110968
Open-source software (OSS) vulnerability management process is important nowadays, as the number of discovered OSS vulnerabilities is increasing over time. Monitoring vulnerability-fixing commits is a part of the standard process to prevent vulnerabi
Externí odkaz:
http://arxiv.org/abs/2209.03260
Autor:
Le-Cong, Thanh, Kang, Hong Jin, Nguyen, Truong Giang, Haryono, Stefanus Agus, Lo, David, Le, Xuan-Bach D., Thang, Huynh Quyet
Constructing a static call graph requires trade-offs between soundness and precision. Program analysis techniques for constructing call graphs are unfortunately usually imprecise. To address this problem, researchers have recently proposed call graph
Externí odkaz:
http://arxiv.org/abs/2209.03230
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.