{"results":[{"id":"ss_1c3c531fc0fbe79f97f367ed3648de8467caeeaa","title":"SWE-agent: Agent-Computer Interfaces Enable Automated Software Engineering","authors":[{"name":"John Yang"},{"name":"Carlos E. Jimenez"},{"name":"Alexander Wettig"},{"name":"Kilian Adriano Lieret"},{"name":"Shunyu Yao"},{"name":"Karthik Narasimhan"},{"name":"Ofir Press"}],"abstract":"Language model (LM) agents are increasingly being used to automate complicated tasks in digital environments. Just as humans benefit from powerful software applications, such as integrated development environments, for complex tasks like software engineering, we posit that LM agents represent a new category of end users with their own needs and abilities, and would benefit from specially-built interfaces to the software they use. We investigate how interface design affects the performance of language model agents. As a result of this exploration, we introduce SWE-agent: a system that facilitates LM agents to autonomously use computers to solve software engineering tasks. SWE-agent's custom agent-computer interface (ACI) significantly enhances an agent's ability to create and edit code files, navigate entire repositories, and execute tests and other programs. We evaluate SWE-agent on SWE-bench and HumanEvalFix, achieving state-of-the-art performance on both with a pass@1 rate of 12.5% and 87.7%, respectively, far exceeding the previous state-of-the-art achieved with non-interactive LMs. Finally, we provide insight on how the design of the ACI can impact agents' behavior and performance.","source":"Semantic Scholar","year":2024,"language":"en","subjects":["Computer Science"],"doi":"10.48550/arXiv.2405.15793","url":"https://www.semanticscholar.org/paper/1c3c531fc0fbe79f97f367ed3648de8467caeeaa","is_open_access":true,"citations":850,"published_at":"","score":93.5},{"id":"ss_a6a1d89c7ce9757d90d2f7be74a92514476931d6","title":"Recent Developments and Applications of the HYDRUS Computer Software Packages","authors":[{"name":"J. Šimůnek"},{"name":"M. Genuchten"},{"name":"M. Šejna"}],"abstract":"Review of selected capabilities of HYDRUS implemented since 2008 New standard and nonstandard specialized add‐on modules significantly expanded capabilities of the software Review of selected applications of the HYDRUS models published in VZJ and elsewhere in recent years","source":"Semantic Scholar","year":2016,"language":"en","subjects":["Engineering"],"doi":"10.2136/vzj2016.04.0033","url":"https://www.semanticscholar.org/paper/a6a1d89c7ce9757d90d2f7be74a92514476931d6","pdf_url":"https://dl.sciencesocieties.org/publications/vzj/pdfs/15/7/vzj2016.04.0033","is_open_access":true,"citations":961,"published_at":"","score":88.83},{"id":"ss_edea882e8294537c76e16339ce32c2dd96753025","title":"Software survey: VOSviewer, a computer program for bibliometric mapping","authors":[{"name":"Nees Jan van Eck"},{"name":"L. Waltman"}],"abstract":"We present VOSviewer, a freely available computer program that we have developed for constructing and viewing bibliometric maps. Unlike most computer programs that are used for bibliometric mapping, VOSviewer pays special attention to the graphical representation of bibliometric maps. The functionality of VOSviewer is especially useful for displaying large bibliometric maps in an easy-to-interpret way. The paper consists of three parts. In the first part, an overview of VOSviewer’s functionality for displaying bibliometric maps is provided. In the second part, the technical implementation of specific parts of the program is discussed. Finally, in the third part, VOSviewer’s ability to handle large maps is demonstrated by using the program to construct and display a co-citation map of 5,000 major scientific journals.","source":"Semantic Scholar","year":2009,"language":"en","subjects":["Computer Science","Medicine"],"doi":"10.1007/s11192-009-0146-3","url":"https://www.semanticscholar.org/paper/edea882e8294537c76e16339ce32c2dd96753025","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11192-009-0146-3.pdf","is_open_access":true,"citations":17088,"published_at":"","score":83},{"id":"ss_7fae7eb289138204e8a60d1c18b831627df233f1","title":"Introducing mothur: Open-Source, Platform-Independent, Community-Supported Software for Describing and Comparing Microbial Communities","authors":[{"name":"P. Schloss"},{"name":"Sarah L. Westcott"},{"name":"Thomas Ryabin"},{"name":"J. Hall"},{"name":"M. Hartmann"},{"name":"E. Hollister"},{"name":"Ryan A. Lesniewski"},{"name":"B. Oakley"},{"name":"Donovan H. Parks"},{"name":"Courtney J. Robinson"},{"name":"J. Sahl"},{"name":"B. Stres"},{"name":"G. Thallinger"},{"name":"David J. Van Horn"},{"name":"C. Weber"}],"abstract":"","source":"Semantic Scholar","year":2009,"language":"en","subjects":["Medicine","Computer Science"],"doi":"10.1128/AEM.01541-09","url":"https://www.semanticscholar.org/paper/7fae7eb289138204e8a60d1c18b831627df233f1","pdf_url":"https://europepmc.org/articles/pmc2786419?pdf=render","is_open_access":true,"citations":19386,"published_at":"","score":83},{"id":"ss_c5b1324b388e12d6c856460b955b3124d075e386","title":"QUANTUM ESPRESSO: a modular and open-source software project for quantum simulations of materials","authors":[{"name":"P. Giannozzi"},{"name":"S. Baroni"},{"name":"N. Bonini"},{"name":"M. Calandra"},{"name":"R. Car"},{"name":"C. Cavazzoni"},{"name":"D. Ceresoli"},{"name":"G. Chiarotti"},{"name":"M. Cococcioni"},{"name":"I. Dabo"},{"name":"A. Dal Corso"},{"name":"Stefano de Gironcoli"},{"name":"S. Fabris"},{"name":"G. Fratesi"},{"name":"R. Gebauer"},{"name":"U. Gerstmann"},{"name":"C. Gougoussis"},{"name":"A. Kokalj"},{"name":"M. Lazzeri"},{"name":"L. Martin-Samos"},{"name":"N. Marzari"},{"name":"F. Mauri"},{"name":"R. Mazzarello"},{"name":"S. Paolini"},{"name":"Alfredo Pasquarello"},{"name":"L. Paulatto"},{"name":"C. Sbraccia"},{"name":"S. Scandolo"},{"name":"G. Sclauzero"},{"name":"A. Seitsonen"},{"name":"A. Smogunov"},{"name":"P. Umari"},{"name":"R. Wentzcovitch"}],"abstract":"QUANTUM ESPRESSO is an integrated suite of computer codes for electronic-structure calculations and materials modeling, based on density-functional theory, plane waves, and pseudopotentials (norm-conserving, ultrasoft, and projector-augmented wave). The acronym ESPRESSO stands for opEn Source Package for Research in Electronic Structure, Simulation, and Optimization. It is freely available to researchers around the world under the terms of the GNU General Public License. QUANTUM ESPRESSO builds upon newly-restructured electronic-structure codes that have been developed and tested by some of the original authors of novel electronic-structure algorithms and applied in the last twenty years by some of the leading materials modeling groups worldwide. Innovation and efficiency are still its main focus, with special attention paid to massively parallel architectures, and a great effort being devoted to user friendliness. QUANTUM ESPRESSO is evolving towards a distribution of independent and interoperable codes in the spirit of an open-source project, where researchers active in the field of electronic-structure calculations are encouraged to participate in the project by contributing their own codes or by implementing their own ideas into existing codes.","source":"Semantic Scholar","year":2009,"language":"en","subjects":["Physics","Medicine"],"doi":"10.1088/0953-8984/21/39/395502","url":"https://www.semanticscholar.org/paper/c5b1324b388e12d6c856460b955b3124d075e386","pdf_url":"https://infoscience.epfl.ch/record/141807/files/quantum_espresso.pdf","is_open_access":true,"citations":25138,"published_at":"","score":83},{"id":"ss_5445003918d9799f461811254e8bb45dce3f318d","title":"OLINDA/EXM: the second-generation personal computer software for internal dose assessment in nuclear medicine.","authors":[{"name":"M. Stabin"},{"name":"R. Sparks"},{"name":"E. Crowe"}],"abstract":"","source":"Semantic Scholar","year":2005,"language":"en","subjects":["Medicine"],"url":"https://www.semanticscholar.org/paper/5445003918d9799f461811254e8bb45dce3f318d","is_open_access":true,"citations":1428,"published_at":"","score":80},{"id":"ss_80935b370bac09ce615a002caabc30fbb26f029b","title":"MEGA3: Integrated software for Molecular Evolutionary Genetics Analysis and sequence alignment","authors":[{"name":"Sudhir Kumar"},{"name":"K. Tamura"},{"name":"M. Nei"}],"abstract":"","source":"Semantic Scholar","year":2004,"language":"en","subjects":["Medicine","Biology","Computer Science"],"doi":"10.1093/BIB/5.2.150","url":"https://www.semanticscholar.org/paper/80935b370bac09ce615a002caabc30fbb26f029b","pdf_url":"https://academic.oup.com/bib/article-pdf/5/2/150/9731818/150.pdf","is_open_access":true,"citations":12304,"published_at":"","score":80},{"id":"ss_df783bdaa82537b5260f9400a3213a2174159049","title":"Spglib: a software library for crystal symmetry search","authors":[{"name":"A. Togo"},{"name":"Kohei Shinohara"},{"name":"Isao Tanaka"}],"abstract":"ABSTRACT A computer algorithm to search the symmetries of crystal structures, as implemented in the spglib code, is described. An iterative algorithm is employed to robustly identify space group types, tolerating a certain amount of distortion in the crystal structures. The source code is distributed under the 3-Clause BSD License, a permissive open-source software license. This paper focuses on the algorithm for identifying the space group symmetry of crystal structures. GRAPHICAL ABSTRACT IMPACT STATEMENT This paper presents a detailed description of the computer algorithm utilized in the spglib code, which is a computer software library for determining crystal symmetry and space group type classifications.","source":"Semantic Scholar","year":2024,"language":"en","subjects":null,"doi":"10.1080/27660400.2024.2384822","url":"https://www.semanticscholar.org/paper/df783bdaa82537b5260f9400a3213a2174159049","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/27660400.2024.2384822?needAccess=true","is_open_access":true,"citations":201,"published_at":"","score":74.03},{"id":"ss_0394864f253fd69284462664d5725ad6ba7aa6e1","title":"Teaching CS50 with AI: Leveraging Generative Artificial Intelligence in Computer Science Education","authors":[{"name":"Rong Liu"},{"name":"Carter Zenke"},{"name":"Charlie Liu"},{"name":"A. Holmes"},{"name":"Patrick Thornton"},{"name":"David J. Malan"}],"abstract":"In Summer 2023, we developed and integrated a suite of AI-based software tools into CS50 at Harvard University. These tools were initially available to approximately 70 summer students, then to thousands of students online, and finally to several hundred on campus during Fall 2023. Per the course's own policy, we encouraged students to use these course-specific tools and limited the use of commercial AI software such as ChatGPT, GitHub Copilot, and the new Bing. Our goal was to approximate a 1:1 teacher-to-student ratio through software, thereby equipping students with a pedagogically-minded subject-matter expert by their side at all times, designed to guide students toward solutions rather than offer them outright. The tools were received positively by students, who noted that they felt like they had \"a personal tutor.'' Our findings suggest that integrating AI thoughtfully into educational settings enhances the learning experience by providing continuous, customized support and enabling human educators to address more complex pedagogical issues. In this paper, we detail how AI tools have augmented teaching and learning in CS50, specifically in explaining code snippets, improving code style, and accurately responding to curricular and administrative queries on the course's discussion forum. Additionally, we present our methodological approach, implementation details, and guidance for those considering using these tools or AI generally in education.","source":"Semantic Scholar","year":2024,"language":"en","subjects":["Computer Science"],"doi":"10.1145/3626252.3630938","url":"https://www.semanticscholar.org/paper/0394864f253fd69284462664d5725ad6ba7aa6e1","is_open_access":true,"citations":187,"published_at":"","score":73.61},{"id":"doaj_10.1038/s41598-025-15011-x","title":"Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction","authors":[{"name":"Zaid Ameen Abduljabbar"},{"name":"Vincent Omollo Nyangaresi"},{"name":"Ahmed Ali Ahmed"},{"name":"Junchao Ma"},{"name":"Mustafa A. Al Sibahee"},{"name":"Mohammed Abdulridha Hussain"},{"name":"Zaid Alaa Hussien"},{"name":"Ali Hasan Ali"},{"name":"Abdulla J. Y. Aldarwish"},{"name":"Husam A. Neamah"}],"abstract":"Abstract Vehicular Ad-Hoc Networks (VANETs) have facilitated the massive exchange of real-time traffic and weather conditions, which have helped prevent collisions, reduce accidents, and road congestions. This can effectively enhance driving safety and efficiency in technology-driven transportation systems. However, the transmission of massive and sensitive information across public wireless communication channels exposes the transmitted data to a myriad of privacy as well as security threats. Although past researches has developed many vehicular ad-hoc networks security preservation schemes, several of them are inefficient or susceptible to attacks. This work, introduces an approach that leverages reverse fuzzy extraction, bilinear pairing, and Physically Unclonable Function (PUF) to design an efficient and anonymity-preserving authentication scheme. We conduct an elaborate formal security analysis to demonstrate that the derived session key is secure. The semantic security analyses also demonstrate its resilience against typical VANET attacks such as impersonations, denial of service, and de-synchronization, instilling confidence in its effectiveness. Moreover, our approach incurs the lowest computational overheads at relatively low communication costs. Specifically, our protocol attains a 66.696% reduction in computation costs, and a 70% increment in the supported security functionalities.","source":"DOAJ","year":2025,"language":"","subjects":["Medicine","Science"],"doi":"10.1038/s41598-025-15011-x","url":"https://doi.org/10.1038/s41598-025-15011-x","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.1109/ACCESS.2025.3530431","title":"Research on Personalized Recommendation Algorithm Integrating Cross-Grained Sentiment and Rating Interaction Features","authors":[{"name":"Bing Li"},{"name":"Jiangtao Dong"},{"name":"Xile Wang"},{"name":"Yuqi Hou"},{"name":"Biao Yang"}],"abstract":"To investigate the impact of cross-grained sentiments on user feature representation and address the issue of data sparsity, this paper proposes a Personalized Recommendation Algorithm Integrating Cross-Grained Sentiment and Rating Interaction Features (ICSR). The algorithm begins by employing a pre-trained BERT (Bidirectional Encoder Representations from Transformers) model and a Bi-GRU (Bidirectional Gated Recurrent Units) network to derive feature vectors from user and item reviews. Sentiment dictionaries and attention mechanisms are then applied to assign appropriate weights to the review features of users and items, respectively. To capture a richer set of sentiment features, a cross-grained sentiment feature fusion module is introduced. This module leverages an LDA (Latent Dirichlet Allocation) model and dependency syntactic analysis techniques to extract fine-grained sentiment features, while a word2vec pre-trained model and sentiment dictionaries are used to capture coarse-grained sentiment features. These features are then fused to form comprehensive cross-grained sentiment representations. Finally, rating interaction features are extracted using matrix factorization techniques, and all features are integrated and fed into a DeepFM model for rating prediction. Experimental results on Amazon datasets demonstrate that the proposed ICSR algorithm significantly outperforms baseline algorithms in terms of recommendation performance.","source":"DOAJ","year":2025,"language":"","subjects":["Electrical engineering. Electronics. Nuclear engineering"],"doi":"10.1109/ACCESS.2025.3530431","url":"https://ieeexplore.ieee.org/document/10843697/","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.1007/s43926-025-00100-0","title":"Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks","authors":[{"name":"Urslla Uchechi Izuazu"},{"name":"Cosmas Ifeanyi Nwakanma"},{"name":"Dong-Seong Kim"},{"name":"Jae Min Lee"}],"abstract":"Abstract Deep learning-based intrusion detection systems (DL-IDS) have proven effective in detecting cyber threats. However, their vulnerability to adversarial attacks and environmental noise, particularly in industrial settings, limits practical application. Current IDS models often assume ideal conditions, overlooking noise and adversarial manipulations, leading to degraded performance when deployed in real-world environments. Additionally, the black-box nature of DL model complicates decision-making, especially in industrial control systems (ICS) network, where understanding model behavior is crucial. This paper introduces the eXplainable Cyber-Threat Detection Framework (XC-TDF), a novel solution designed to overcome these challenges. XC-TDF enhances robustness against noise and adversarial attacks using regularization and adversarial training respectively, and also improves transparency through an eXplainable Artificial Intelligence (XAI) module. Simulation results demonstrate its effectiveness, showing resilience to perturbation by achieving commendable accuracy of 100% and 99.4% on the Wustl-IIoT2021 and Edge-IIoT datasets, respectively.","source":"DOAJ","year":2025,"language":"","subjects":["Computer engineering. Computer hardware","Computer software"],"doi":"10.1007/s43926-025-00100-0","url":"https://doi.org/10.1007/s43926-025-00100-0","is_open_access":true,"published_at":"","score":69},{"id":"doaj_10.1016/j.softx.2023.101603","title":"SOQCS: A Stochastic Optical Quantum Circuit Simulator","authors":[{"name":"Javier Osca"},{"name":"Jiri Vala"}],"abstract":"Stochastic Optical Quantum Circuit Simulator (SOQCS) is a C++ and Python library which offers a framework to define, simulate and study quantum linear optical circuits in presence of various imperfections typically encountered in experiments. Quantum circuits can be defined from basic components, including emitters, linear optical elements, delays and detectors. The imperfections come from partial distinguishability of photons, lossy propagation media, unbalanced beamsplitters and non-ideal emitters and detectors for example. SOQCS also provides various simulator cores and tools to analyze the output. Furthermore, the configuration of detectors also includes postselection. SOQCS is developed using a modular approach in which different modules are applied in an automated easy to use manner. Furthermore, the modular approach allows for further extensions of the SOQCS capabilities in future.","source":"DOAJ","year":2024,"language":"","subjects":["Computer software"],"doi":"10.1016/j.softx.2023.101603","url":"http://www.sciencedirect.com/science/article/pii/S2352711023002996","is_open_access":true,"published_at":"","score":68},{"id":"doaj_10.11896/jsjkx.230100072","title":"Review of Public Opinion Dynamics Models","authors":[{"name":"LIU Shuxian, XU Huan, WANG Wei, DENG Le"}],"abstract":"Social network provides a medium for information dissemination,leading to the rapid development of public opinion.Controlling the development direction of public opinion is one of the core issues of public opinion dynamics.However,the public opinion dynamics model mainly studies the way of updating the opinions of the subject so as to deduce the law of public opinion evolution.This paper classifies the current public opinion dynamics models,analyzes their advantages and disadvantages,and their applications in different fields,and summarizes the future research direction of public opinion dynamics.It is helpful to understand the law of the evolution of public opinion,so as to provide better guidance for the government and other institutions to control the direction of public opinion.","source":"DOAJ","year":2024,"language":"","subjects":["Computer software","Technology (General)"],"doi":"10.11896/jsjkx.230100072","url":"https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2024-51-2-15.pdf","pdf_url":"https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2024-51-2-15.pdf","is_open_access":true,"published_at":"","score":68},{"id":"doaj_10.3390/axioms13040261","title":"Existence of Solutions: Investigating Fredholm Integral Equations via a Fixed-Point Theorem","authors":[{"name":"Faruk Özger"},{"name":"Merve Temizer Ersoy"},{"name":"Zeynep Ödemiş Özger"}],"abstract":"Integral equations, which are defined as “the equation containing an unknown function under the integral sign”, have many applications of real-world problems. The second type of Fredholm integral equations is generally used in radiation transfer theory, kinetic theory of gases, and neutron transfer theory. A special case of these equations, known as the quadratic Chandrasekhar integral equation, given by \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmrow\u003e\u003cmi\u003ex\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003es\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmo\u003e=\u003c/mo\u003e\u003cmn\u003e1\u003c/mn\u003e\u003cmo\u003e+\u003c/mo\u003e\u003cmi\u003eλ\u003c/mi\u003e\u003cmi\u003ex\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003es\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmsubsup\u003e\u003cmo\u003e∫\u003c/mo\u003e\u003cmrow\u003e\u003cmn\u003e0\u003c/mn\u003e\u003c/mrow\u003e\u003cmn\u003e1\u003c/mn\u003e\u003c/msubsup\u003e\u003cmfrac\u003e\u003cmi\u003es\u003c/mi\u003e\u003cmrow\u003e\u003cmi\u003et\u003c/mi\u003e\u003cmo\u003e+\u003c/mo\u003e\u003cmi\u003es\u003c/mi\u003e\u003c/mrow\u003e\u003c/mfrac\u003e\u003cmi\u003ex\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003et\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmi\u003ed\u003c/mi\u003e\u003cmi\u003et\u003c/mi\u003e\u003cmo\u003e,\u003c/mo\u003e\u003c/mrow\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e can be very often encountered in many applications, where \u003ci\u003ex\u003c/i\u003e is the function to be determined, \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmi\u003eλ\u003c/mi\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e is a parameter, and \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmrow\u003e\u003cmi\u003et\u003c/mi\u003e\u003cmo\u003e,\u003c/mo\u003e\u003cmi\u003es\u003c/mi\u003e\u003cmo\u003e∈\u003c/mo\u003e\u003cmo\u003e[\u003c/mo\u003e\u003cmn\u003e0\u003c/mn\u003e\u003cmo\u003e,\u003c/mo\u003e\u003cmn\u003e1\u003c/mn\u003e\u003cmo\u003e]\u003c/mo\u003e\u003c/mrow\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e. In this paper, using a fixed-point theorem, the existence conditions for the solution of Fredholm integral equations of the form \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmrow\u003e\u003cmi\u003eχ\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003el\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmo\u003e=\u003c/mo\u003e\u003cmi\u003eϱ\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003el\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmo\u003e+\u003c/mo\u003e\u003cmi\u003eχ\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003el\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmsubsup\u003e\u003cmo\u003e∫\u003c/mo\u003e\u003cmrow\u003e\u003cmi\u003ep\u003c/mi\u003e\u003c/mrow\u003e\u003cmi\u003eq\u003c/mi\u003e\u003c/msubsup\u003e\u003cmi\u003ek\u003c/mi\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003el\u003c/mi\u003e\u003cmo\u003e,\u003c/mo\u003e\u003cmi\u003ez\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003eV\u003c/mi\u003e\u003cmi\u003eχ\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmrow\u003e\u003cmo\u003e(\u003c/mo\u003e\u003cmi\u003ez\u003c/mi\u003e\u003cmo\u003e)\u003c/mo\u003e\u003c/mrow\u003e\u003cmi\u003ed\u003c/mi\u003e\u003cmi\u003ez\u003c/mi\u003e\u003c/mrow\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e are investigated in the space \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmrow\u003e\u003cmsub\u003e\u003cmi\u003eC\u003c/mi\u003e\u003cmi\u003eω\u003c/mi\u003e\u003c/msub\u003e\u003cmfenced separators=\"\" open=\"[\" close=\"]\"\u003e\u003cmi\u003ep\u003c/mi\u003e\u003cmo\u003e,\u003c/mo\u003e\u003cmi\u003eq\u003c/mi\u003e\u003c/mfenced\u003e\u003cmo\u003e,\u003c/mo\u003e\u003c/mrow\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e where \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmi\u003eχ\u003c/mi\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e is the unknown function to be determined, \u003ci\u003eV\u003c/i\u003e is a given operator, and \u003cinline-formula\u003e\u003cmath xmlns=\"http://www.w3.org/1998/Math/MathML\" display=\"inline\"\u003e\u003csemantics\u003e\u003cmrow\u003e\u003cmi\u003eϱ\u003c/mi\u003e\u003cmo\u003e,\u003c/mo\u003e\u003cmspace width=\"3.33333pt\"\u003e\u003c/mspace\u003e\u003cmspace width=\"3.33333pt\"\u003e\u003c/mspace\u003e\u003cmi\u003ek\u003c/mi\u003e\u003c/mrow\u003e\u003c/semantics\u003e\u003c/math\u003e\u003c/inline-formula\u003e are two given functions. Moreover, certain important applications demonstrating the applicability of the existence theorem presented in this paper are provided.","source":"DOAJ","year":2024,"language":"","subjects":["Mathematics"],"doi":"10.3390/axioms13040261","url":"https://www.mdpi.com/2075-1680/13/4/261","is_open_access":true,"published_at":"","score":68},{"id":"ss_1ecb6b66131a9d9b32b4c1c41318f455e6529651","title":"Research on the Application of Layered Architecture in Computer Software Development","authors":[{"name":"Zhenan Tu"}],"abstract":"The objective of this study is to examine the application of layered technologies in computer software development. As software scale and complexity continue to increase, the adoption of appropriate software architecture becomes crucial. Layered architecture, a commonly employed software design pattern, enables effective organization and management of software systems, enhancing their maintainability, scalability, and reusability. This paper explores the fundamental principles and advantages of layered architecture and presents its specific applications in computer software development, such as client-server architecture, MVC architecture, and microservices architecture. Through analysis and comparison of relevant case studies, the suitability and effectiveness of layered technologies in different contexts are evaluated. Lastly, the study concludes with an overview of the application prospects of layered technologies and suggests future research directions.","source":"Semantic Scholar","year":2023,"language":"en","subjects":null,"doi":"10.54097/jceim.v11i3.08","url":"https://www.semanticscholar.org/paper/1ecb6b66131a9d9b32b4c1c41318f455e6529651","pdf_url":"https://drpress.org/ojs/index.php/jceim/article/download/14398/13952","is_open_access":true,"citations":11,"published_at":"","score":67.33},{"id":"doaj_10.1051/e3sconf/202345403011","title":"Implementation of Synology NAS-Based Storage System Type DS220+ at LSP-SV IPB","authors":[{"name":"Widodo Bayu"},{"name":"Dewi Renanti Medhanita"},{"name":"Indriasari Sofiyanti"},{"name":"Sastrawan Uding"}],"abstract":"As the digital world evolves, safeguarding digital assets becomes crucial for organizations, particularly educational institutions. LSP SV-IPB, as a vocational certification body, manages student data, academic records, and other valuable information. Therefore, it is essential to implement an effective protection strategy. The research aims to develop and implement digital asset protection strategies at the LSP SV-IPB. The protection focuses on data storage management so that passive data is properly stored as the main backup and transactional data runs efficiently. The Synology Network Attached Storage (NAS) was proposed as the development model. NAS has proven efficient in managing data and providing reliable backups. Through NAS, passive data can be properly archived and protected, while transactional data can be accessed and processed at optimal speed. Hence, literature studies, software analysis, and experiments on the network environment were conducted. Model development was conducted using the design and implementation of NAS infrastructure at the LSP SV-IPB. Data collection covered the effective and efficient use of NAS in maintaining data integrity and mitigating the risk of losing important information. The results of this study are expected to contribute to the development of an efficient and reliable digital asset protection strategy within the LSP SV-IPB environment.","source":"DOAJ","year":2023,"language":"","subjects":["Environmental sciences"],"doi":"10.1051/e3sconf/202345403011","url":"https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/91/e3sconf_icas2023_03011.pdf","pdf_url":"https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/91/e3sconf_icas2023_03011.pdf","is_open_access":true,"published_at":"","score":67},{"id":"doaj_10.1051/shsconf/202214001016","title":"Research on recognizing required items based on opencv and machine learning","authors":[{"name":"Ma Qingyun"},{"name":"Huang Xubin"}],"abstract":"Starting from the background of the outbreak of New Coronavirus, in order to realize the function of automatically identifying the required items by machine, the support vector machine algorithm in the neural network and the traditional computer vision algorithm opencv were used. The software developed by pycharm and python programming language was used to compile automatically a software to identify whether the required items were filled out. And on the basis of completing the software, it is connected to the embedded device high-speed clapper. It is applied to Fuzhou Customs to help the customs staff review the health form and declaration card of inbound and outbound passengers, which not only saves the time of staff and passengers, but also contributes to the prevention and control of epidemic situation to a certain extent.","source":"DOAJ","year":2022,"language":"","subjects":["Social Sciences"],"doi":"10.1051/shsconf/202214001016","url":"https://www.shs-conferences.org/articles/shsconf/pdf/2022/10/shsconf_iteme2022_01016.pdf","pdf_url":"https://www.shs-conferences.org/articles/shsconf/pdf/2022/10/shsconf_iteme2022_01016.pdf","is_open_access":true,"published_at":"","score":66},{"id":"doaj_10.19678/j.issn.1000-3428.0060237","title":"Group-Strategy-Proof Virtual Traffic Light under V2V Environment","authors":[{"name":"SONG Wei, ZHAO Huifen, CAI Wenqin, ZHOU Wanqiang"}],"abstract":"The Virtual Traffic Light (VTL) in a Vehicle-to-Vehicle (V2V) environment can negotiate the right-of-way allocation through the information directly exchanged between vehicles.When the equipment obtains relevant information, the vehicle can strategically provide information to obtain the priority right of way.To apply to a scene where unmeasurable factors affect the right of way, a virtual traffic light with group strategy protection characteristics is proposed.By abstracting the real information provided by vehicles into a cost allocation and cooperative game, a group strategy protection auction mechanism is designed, and the Shapley value is used to calculate the cost allocation of each vehicle as the payment of vehicles.On this basis, the green light signal is established according to the real evaluation value in the auction results, and the green light signal generated by multiple auctions is integrated through the signal merging algorithm to produce a reasonable right-of-way allocation.The experimental results show that the virtual traffic light has the characteristics of group strategy protection, which can prevent vehicles from forming an alliance of false information to obtain benefits and can also prevent vehicles from obtaining the right-of-way priority through false information.Compared with the virtual traffic light with a fixed threshold of the number of green lights, the virtual traffic lights protected by the group strategy show some improvement in the overall average driving time and the average driving time of high-value vehicles.","source":"DOAJ","year":2022,"language":"","subjects":["Computer engineering. Computer hardware","Computer software"],"doi":"10.19678/j.issn.1000-3428.0060237","url":"https://www.ecice06.com/fileup/1000-3428/PDF/20220437.pdf","pdf_url":"https://www.ecice06.com/fileup/1000-3428/PDF/20220437.pdf","is_open_access":true,"published_at":"","score":66},{"id":"doaj_10.11896/jsjkx.210300303","title":"Survey of Hybrid Cloud Workflow Scheduling","authors":[{"name":"LIU Peng, LIU Bo, ZHOU Na-qin, PENG Xin-yi, LIN Wei-wei"}],"abstract":"In the context of data explosion,traditional cloud computing is faced with the dilemma of insufficient local cloud resources and high expansion cost.However,the newly emerging hybrid cloud combining resource-rich public cloud and data-sensitive private cloud has become a research hotspot and application direction at present.As an attractive paradigm,workflow has been increasing in data scale and computing scale.Therefore,workflow scheduling is a key issue in the direction of hybrid cloud research.For this reason,this paper first makes an in-depth investigation and analysis of workflow scheduling technology in hybrid cloud environment,and then classifies and compares workflow scheduling in hybrid cloud environment:for deadline,for cost,for energy-efficient and for multi-objective constraints.On this basis,the future research directions of workflow scheduling in hybrid cloud environment are analyzed and summarized:workflow scheduling based on Serverless platform,workflow scheduling based on edge server network collaboration,cloud native workflow scheduling based on Argo integration,and workflow scheduling based on fog computing fusion.","source":"DOAJ","year":2022,"language":"","subjects":["Computer software","Technology (General)"],"doi":"10.11896/jsjkx.210300303","url":"https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-49-5-235.pdf","pdf_url":"https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2022-49-5-235.pdf","is_open_access":true,"published_at":"","score":66}],"total":8145364,"page":1,"page_size":20,"sources":["CrossRef","DOAJ","Semantic Scholar"],"query":"Computer software"}