Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms
SQL injection is one of the important security issues in web applications because it allows
an attacker to interact with the application's database. SQL injection attacks can be detected …
an attacker to interact with the application's database. SQL injection attacks can be detected …
Program source-code re-modularization using a discretized and modified sand cat swarm optimization algorithm
One of expensive stages of the software lifecycle is its maintenance. Software maintenance
will be much simpler if its structural models are available. Software module clustering is …
will be much simpler if its structural models are available. Software module clustering is …
[HTML][HTML] A bioinspired discrete heuristic algorithm to generate the effective structural model of a program source code
When the source code of a software is the only product available, program understanding
has a substantial influence on software maintenance costs. The main goal in code …
has a substantial influence on software maintenance costs. The main goal in code …
A novel metaheuristic based method for software mutation test using the discretized and modified forrest optimization algorithm
The number of detected bugs by software test data determines the efficacy of the test data.
One of the most important topics in software engineering is software mutation testing, which …
One of the most important topics in software engineering is software mutation testing, which …
Blockchain technology as an enabler for digital trust in supply chain: evolution, issues and opportunities
Blockchain has gained the attention of scholars and industry practitioners due to its
immutability, transparency, and operational features, which can improve overall supply …
immutability, transparency, and operational features, which can improve overall supply …
A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing
The quality of software test data is assessed through mutation testing. This technique
involves introducing various modifications (mutants) to the original code of the program. The …
involves introducing various modifications (mutants) to the original code of the program. The …
Efficient software mutation test by clustering the single-line redundant mutants
Purpose Reducing the number of generated mutants by clustering redundant mutants,
reducing the execution time by decreasing the number of generated mutants and reducing …
reducing the execution time by decreasing the number of generated mutants and reducing …
A divide and conquer based development of gray wolf optimizer and its application in data replication problem in distributed systems
One of the main problems of big distributed systems, like IoT, is the high access time to data
objects. Replicating the data objects on various servers is a traditional strategy. Replica …
objects. Replicating the data objects on various servers is a traditional strategy. Replica …
A discrete heuristic algorithm with swarm and evolutionary features for data replication problem in distributed systems
Availability and accessibility of data objects in a reasonable time is a main issue in
distributed systems like cloud computing services. As a result, the reduction of data-related …
distributed systems like cloud computing services. As a result, the reduction of data-related …
LDSFI: A lightweight dynamic software-based fault injection
Recently, numerous safety-critical systems have employed a variety of fault tolerance
techniques, which are considered an essential requirement to keep the system fault-tolerant …
techniques, which are considered an essential requirement to keep the system fault-tolerant …