Software tools
-
The paper generalizes one practical tool for analyzing the structural dynamics for the high-speed railway bridge based on Cast3M open-source. Compared with the classical approach with the analytical formulation, KD-Railway developed by the finite element method allows defining the structure with complex geometry and considering a different type of structure (truss, cable, hybrid composite) or the structure-soil interaction.
10p viengfa 28-10-2024 3 2 Download
-
This article proposes a solution by advocating for the integration of multimedia technology into educational software, offering interactive simulations, virtual reality experiences, and mulmedia presentaons to bring national defense and security concepts to life.
8p viling 11-10-2024 1 1 Download
-
Internal combustion engines (ICEs), especially diesel engines, continue to play a huge role in the development of the global economy. The research trends to improve combustion is still the main research direction in recent years with the help of 3D simulation tools. In this study, a 3D-model of a four-stroke, single-cylinder diesel engine was built using AVL Fire software to evaluate the influence of injector geometry parameters on engine characteristics.
14p vibecca 01-10-2024 2 1 Download
-
3D animation software is extensively used to create graphics for special effects sequences in live-action films, in animated feature film production and for the generation of computer games and virtual reality content. It is a commonly held view within the computer graphics community that 3D animation software is ―just another tool‖ for self-expression. This research questions that view by examining the inherent nature of the tool itself. In doing so, some of the philosophical assumptions embedded in the design of the new digital tool are revealed.
99p runthenight05 01-03-2023 6 2 Download
-
This search resulted in the development of a practical software tool based on animated Venn diagrams (Dvenn) that attempted to exploit the inherent human ability to perceive quantities visually, a faculty described herein as visual numeracy. The exploitation of this faculty is considered here to be a valuable aid for group understanding of business presentation data. The development of the tool was an essential part of the research that was undertaken and the resulting software forms a significant portion of this practise based research.
237p runthenight04 02-02-2023 5 1 Download
-
Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!
39p hoabingan205 12-12-2022 22 6 Download
-
The research methods involved participatory action research during the projects, followed by semi-structured interviews with key decision makers after project completion. The analysis was conducted by a combination of manual processes and NVivo software. The analysis revealed decision makers perceived two specific tools, being personas and Journey maps, as having influenced their ‘felt’ accountability.
166p runordie3 06-07-2022 12 4 Download
-
Lecture Software Project Management describes the tools to efficiently coordinate and automate the various project management component processes. Project management software generally offers extensive reporting features, such as dayto-day status updates of project progress, scheduling and dependency trees, and system-generated alerts when schedules slip beyond pre-set tolerances.
419p bachkhinhdaluu 03-12-2021 17 2 Download
-
In this study, we tested more than 170 surveys of nine different types. The software tool correctly detected all the valid answers. It was also able to detect all questions with no or multiple marks.
8p chauchaungayxua12 09-07-2021 13 2 Download
-
The research provides answers to the above questions with probabilistic approaches and tools to assess the impacts of risk factors on software project scheduling; proposing list of common risk factors and Bayesian Network model of these risk factors; and proposing advanced scheduling methods based on incorporating Bayesian Networks into popular scheduling techniques such as CPM, PERT or agile iteration scheduling etc. Bayesian Networks help quantify the factors, and hence help better manage them as well as enhancing the predictability of things happen in the project.
132p nguaconbaynhay12 18-06-2021 16 3 Download
-
Tài liệu này cung cấp đến các bạn sinh viên cái nhìn tổng quát về học phần Công cụ và môi trường phát triển phần mềm (Tools and Enviroments for software development) bao gồm thời gian đào tạo, phân bố chương trình, tóm tắt nội dung, kỹ năng để có thể học tập hiệu quả hơn.
12p hoangcanhminh_111191 23-12-2020 37 4 Download
-
The following will be discussed in this chapter: Background, Architecture, object models, software tool requirements, status and future, distributed configuration in fieldbus systems (physical view), resource architecture,...
25p kexauxi4 01-10-2019 10 2 Download
-
Bài giảng Kiểm thử phần mềm Bài 5 cung cấp cho người học các kiến thức: Ôn tập 1 số câu hỏi hay phỏng vấn, hướng dẫn test GUI thực hành log bug trên Redmine tool. Đây là tài liệu học tập và giảng dạy dành cho sinh viên ngành tham khảo.
26p sangbanmai_0906 17-01-2018 116 19 Download
-
This study corrected and supplemented the broken segments, then use the corrected and supplemented curves to calculate porosity. The porosity calculated in this study for 9 wells has been used by JVPC to build the mining production technology diagrams, whle the existing softwares can not calculate this parameter. The testing result proves that the Artificial Neural Network model (ANN) of this study is great tool for correction and supplementing of the well log curves.
10p nguyenvanhoangvnu 12-06-2017 36 1 Download
-
XBee/XBee-PRO Code Development, Software Development Tools, Using the MaxStream Bootloader, XBee/XBee-PRO Hardware Components, Freescale SMAC,.... As the main contents of the document "XBee/XBee‐PRO Code Development". Invite you to refer to the lecture content more learning materials and research.
17p grintokyro 11-01-2016 69 4 Download
-
Formal methods mathematical languages, techniques and tools, used to specify and verify systems, goal is help engineers construct more reliable systems. Introduction to Formal Methodspresents about introduction; formal specification; formalformal verificationverification; model checking; theorem proving.
29p ngkhacvu 22-05-2015 71 6 Download
-
A versatile software tool,virtualmslab, is presented that can perform advanced complex virtual proteomic experiments with mass spectrometric analyses to assist in the characterization of proteins. The virtual experimen-tal results allow rapid, flexible and convenient exploration of sample prepar-ation strategies and are used to generate MS reference databases that can be matched with the real MS data obtained from the equivalent real experi-ments.
11p dell39 27-03-2013 35 3 Download
-
An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Managament agent Management information base Network Management protocol Get, Set and Notify
20p muathu_102 28-01-2013 71 3 Download
-
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack...
0p doilan 25-01-2013 46 3 Download
-
SQL injection is a technique often used to attack data driven applications [1]. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens
0p doilan 25-01-2013 73 8 Download