To see the other types of publications on this topic, follow the link: Abstract syntax tree (AST).

Journal articles on the topic 'Abstract syntax tree (AST)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Abstract syntax tree (AST).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shen, Victor R. L. "Novel Code Plagiarism Detection Based on Abstract Syntax Tree and Fuzzy Petri Nets." International Journal of Engineering Education 1, no. 1 (2019): 46–56. http://dx.doi.org/10.14710/ijee.1.1.46-56.

Full text
Abstract:
Those students who major in computer science and/or engineering are required to design program codes in a variety of programming languages. However, many students submit their source codes they get from the Internet or friends with no or few modifications. Detecting the code plagiarisms done by students is very time-consuming and leads to the problems of unfair learning performance evaluation. This paper proposes a novel method to detect the source code plagiarisms by using a high-level fuzzy Petri net (HLFPN) based on abstract syntax tree (AST). First, the AST of each source code is generated
APA, Harvard, Vancouver, ISO, and other styles
2

Kaur, Amandeep, and Munish Saini. "Enhancing the Software Clone Detection in BigCloneBench." International Journal of Open Source Software and Processes 12, no. 3 (2021): 17–31. http://dx.doi.org/10.4018/ijossp.2021070102.

Full text
Abstract:
In the software system, the code snippets that are copied and pasted in the same software or another software result in cloning. The basic cause of cloning is either a programmer‘s constraint or language constraints. An increase in the maintenance cost of software is the major drawback of code clones. So, clone detection techniques are required to remove or refactor the code clone. Recent studies exhibit the abstract syntax tree (AST) captures the structural information of source code appropriately. Many researchers used tree-based convolution for identifying the clone, but this technique has
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.

Full text
Abstract:
Reverse Engineering has been an extremely important field in software engineering, it helps us to better understand and analyze the internal architecture and interrealtions of executables. Classical Java reverse engineering task includes disassembly and decompilation. Traditional Abstract Syntax Tree (AST) based disassemblers and decompilers are strictly rule defined and thus highly fault intolerant when bytecode obfuscation were introduced for safety concern. In this work, we view decompilation as a statistical machine translation task and propose a decompilation framework which is fully base
APA, Harvard, Vancouver, ISO, and other styles
4

Ponomarenko, G. S., and P. G. Klyucharev. "Detection of Obfuscated Javascript Code Based on Abstract Syntax Trees Coloring." Mathematics and Mathematical Modeling, no. 2 (June 9, 2020): 1–24. http://dx.doi.org/10.24108/mathm.0220.0000218.

Full text
Abstract:
The paper deals with a problem of the obfuscated JavaScript code detection and classification based on Abstract Syntax Trees (AST) coloring. Colors of the AST vertexes and edges are assigned with regard to the types of the AST vertexes specified by the program lexical and syntax structure and the programming language standard. Research involved a few stages. First of the all, a non-obfuscated JavaScript programs dataset was collected by the public repositories evaluation. Secondly, obfuscated samples were created using eight open-source obfuscators. Classifier models were built using an algori
APA, Harvard, Vancouver, ISO, and other styles
5

Hosseinpour, Sahereh, Mir Mohammad Reza Alavi Milani, and Hüseyin Pehlivan. "A Step-by-Step Solution Methodology for Mathematical Expressions." Symmetry 10, no. 7 (2018): 285. http://dx.doi.org/10.3390/sym10070285.

Full text
Abstract:
In this paper, we propose a methodology for the step-by-step solution of problems, which can be incorporated into a computer algebra system. Our main aim is to show all the intermediate evaluation steps of mathematical expressions from the start to the end of the solution. The first stage of the methodology covers the development of a formal grammar that describes the syntax and semantics of mathematical expressions. Using a compiler generation tool, the second stage produces a parser from the grammar description. The parser is used to convert a particular mathematical expression into an Abstr
APA, Harvard, Vancouver, ISO, and other styles
6

Han, KyungHyun, and Seong Oun Hwang. "Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens." Applied Sciences 10, no. 17 (2020): 6116. http://dx.doi.org/10.3390/app10176116.

Full text
Abstract:
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection systems. In this paper, we propose a lightweight detection system based on static analysis to classify the obfuscation type and to promptly detect the obfuscated redirection JavaScript. The proposed model detects the obfuscated redirection JavaScript by converting the JavaScript into an abstract syntax tree (AST). Then, the structure and token
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Yingjie, Gengran Hu, Lin You, and Chengtang Cao. "A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability." Security and Communication Networks 2021 (August 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5798033.

Full text
Abstract:
In recent years, a lot of vulnerabilities of smart contracts have been found. Hackers used these vulnerabilities to attack the corresponding contracts developed in the blockchain system such as Ethereum, and it has caused lots of economic losses. Therefore, it is very important to find out the potential problems of the smart contracts and develop more secure smart contracts. As blockchain security events have raised more important issues, more and more smart contract security analysis methods have been developed. Most of these methods are based on traditional static analysis or dynamic analysi
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Kang, Huiqun Yu, Guisheng Fan, and Xingguang Yang. "Graph embedding code prediction model integrating semantic features." Computer Science and Information Systems 17, no. 3 (2020): 907–26. http://dx.doi.org/10.2298/csis190908027y.

Full text
Abstract:
With the advent of Big Code, code prediction has received widespread attention. However, the state-of-the-art code prediction techniques are inadequate in terms of accuracy, interpretability and efficiency. Therefore, in this paper, we propose a graph embedding model that integrates code semantic features. The model extracts the structural paths between the nodes in source code file?s Abstract Syntax Tree(AST). Then, we convert paths into training graph and extracted interdependent semantic structural features from the context of AST. Semantic structure features can filter predicted candidate
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Zhimin, and Zhongwen Chen. "Split Attention Pointer Network for Source Code Language Modeling." International Journal of Software Engineering and Knowledge Engineering 30, no. 09 (2020): 1221–44. http://dx.doi.org/10.1142/s0218194020500321.

Full text
Abstract:
There is a growing interest in leveraging Deep Learning (DL) for automating Software Engineering tasks such as program completion. In this paper, we leverage Recurrent Neural Networks (RNNs) for Abstract Syntax Tree (AST)-based code completion. Our approach converts source code into AST nodes and a language model predicts the type and value attributes of next tokens. Our work demonstrates that the attention augmented RNN-based language models are able to understand local context and copy from recent past tokens which have never appeared in the training data set. We observed a drop of performan
APA, Harvard, Vancouver, ISO, and other styles
10

Ji, Xiujuan, Lei Liu, and Jingwen Zhu. "Code Clone Detection with Hierarchical Attentive Graph Embedding." International Journal of Software Engineering and Knowledge Engineering 31, no. 06 (2021): 837–61. http://dx.doi.org/10.1142/s021819402150025x.

Full text
Abstract:
Code clone serves as a typical programming manner that reuses the existing code to solve similar programming problems, which greatly facilitates software development but recurs program bugs and maintenance costs. Recently, deep learning-based detection approaches gradually present their effectiveness on feature representation and detection performance. Among them, deep learning approaches based on abstract syntax tree (AST) construct models relying on the node embedding technique. In AST, the semantic of nodes is obviously hierarchical, and the importance of nodes is quite different to determi
APA, Harvard, Vancouver, ISO, and other styles
11

Dauber, Edwin, Robert Erbacher, Gregory Shearer, Michael Weisman, Frederica Nelson, and Rachel Greenstadt. "Supervised Authorship Segmentation of Open Source Code Projects." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 464–79. http://dx.doi.org/10.2478/popets-2021-0080.

Full text
Abstract:
Abstract Source code authorship attribution can be used for many types of intelligence on binaries and executables, including forensics, but introduces a threat to the privacy of anonymous programmers. Previous work has shown how to attribute individually authored code files and code segments. In this work, we examine authorship segmentation, in which we determine authorship of arbitrary parts of a program. While previous work has performed segmentation at the textual level, we attempt to attribute subtrees of the abstract syntax tree (AST). We focus on two primary problems: identifying the pr
APA, Harvard, Vancouver, ISO, and other styles
12

Zaher, Mahmoud, Abdulaziz Shehab, Mohamed Elhoseny, and Farahat Farag Farahat. "Unsupervised Model for Detecting Plagiarism in Internet-based Handwritten Arabic Documents." Journal of Organizational and End User Computing 32, no. 2 (2020): 42–66. http://dx.doi.org/10.4018/joeuc.2020040103.

Full text
Abstract:
Due to the rapid increase of internet-based data, there is urgent need for a robust intelligent documents security mechanism. Although there are many attempts to build a plagiarism detection system in natural language documents, the unlimited variation and different writing styles of each character in Arabic documents make building such systems challenging. Based on its position in a word, the same Arabic letter can be written three different ways, which makes the handwritten character recognition a cumbersome process. This article proposes an intelligent unsupervised model to detect plagiaris
APA, Harvard, Vancouver, ISO, and other styles
13

Meqdadi, Omar, and Shadi Aljawarneh. "A study of code change patterns for adaptive maintenance with AST analysis." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2719. http://dx.doi.org/10.11591/ijece.v10i3.pp2719-2733.

Full text
Abstract:
Example-based transformational approaches to automate adaptive maintenance changes plays an important role in software research. One primary concern of those approaches is that a set of good qualified real examples of adaptive changes previously made in the history must be identified, or otherwise the adoption of such approaches will be put in question. Unfortunately, there is rarely enough detail to clearly direct transformation rule developers to overcome the barrier of finding qualified examples for adaptive changes. This work explores the histories of several open source systems to study t
APA, Harvard, Vancouver, ISO, and other styles
14

Munir, Hafiz Shahbaz, Shengbing Ren, Mubashar Mustafa, Chaudry Naeem Siddique, and Shazib Qayyum. "Attention based GRU-LSTM for software defect prediction." PLOS ONE 16, no. 3 (2021): e0247444. http://dx.doi.org/10.1371/journal.pone.0247444.

Full text
Abstract:
Software defect prediction (SDP) can be used to produce reliable, high-quality software. The current SDP is practiced on program granular components (such as file level, class level, or function level), which cannot accurately predict failures. To solve this problem, we propose a new framework called DP-AGL, which uses attention-based GRU-LSTM for statement-level defect prediction. By using clang to build an abstract syntax tree (AST), we define a set of 32 statement-level metrics. We label each statement, then make a three-dimensional vector and apply it as an automatic learning model, and th
APA, Harvard, Vancouver, ISO, and other styles
15

Kubiuk, Yevhenii, and Gennadiy Kyselov. "Comparative analysis of approaches to source code vulnerability detection based on deep learning methods." Technology audit and production reserves 3, no. 2(59) (2021): 19–23. http://dx.doi.org/10.15587/2706-5448.2021.233534.

Full text
Abstract:
The object of research of this work is the methods of deep learning for source code vulnerability detection. One of the most problematic areas is the use of only one approach in the code analysis process: the approach based on the AST (abstract syntax tree) or the approach based on the program dependence graph (PDG). In this paper, a comparative analysis of two approaches for source code vulnerability detection was conducted: approaches based on AST and approaches based on the PDG. In this paper, various topologies of neural networks were analyzed. They are used in approaches based on the AST
APA, Harvard, Vancouver, ISO, and other styles
16

Marashdih, Abdalla Wasef, Zarul Fitri Zaaba, and Khaled Suwais. "An Approach for Detecting Feasible Paths Based on Minimal SSA Representation and Symbolic Execution." Applied Sciences 11, no. 12 (2021): 5384. http://dx.doi.org/10.3390/app11125384.

Full text
Abstract:
Static analysis is one of the techniques used today to analyze source codes and minimize the issue of software vulnerability. Static analysis has the ability to observe all possible software paths in an application through the scrutiny of a web application’s source code. Among those paths, some may be considered feasible paths, which refer to any paths that the test cases can execute. The detection of feasible paths in the results of a static analysis helps to minimize the false positive rate. However, the detection of feasible paths can be challenging, especially for programs that have multip
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Seung-Hyung, and Young-Jae Song. "Aspect Mining Process Design Using Abstract Syntax Tree." Journal of the Korea Contents Association 11, no. 5 (2011): 75–83. http://dx.doi.org/10.5392/jkca.2011.11.5.075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kalibera, Tomas, Petr Maj, Floreal Morandat, and Jan Vitek. "A fast abstract syntax tree interpreter for R." ACM SIGPLAN Notices 49, no. 7 (2014): 89–102. http://dx.doi.org/10.1145/2674025.2576205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Fu, Deqiang, Yanyan Xu, Haoran Yu, and Boyang Yang. "WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/7809047.

Full text
Abstract:
In this paper, we introduce a source code plagiarism detection method, named WASTK (Weighted Abstract Syntax Tree Kernel), for computer science education. Different from other plagiarism detection methods, WASTK takes some aspects other than the similarity between programs into account. WASTK firstly transfers the source code of a program to an abstract syntax tree and then gets the similarity by calculating the tree kernel of two abstract syntax trees. To avoid misjudgment caused by trivial code snippets or frameworks given by instructors, an idea similar to TF-IDF (Term Frequency-Inverse Doc
APA, Harvard, Vancouver, ISO, and other styles
20

Khatoon, Tahira. "Abstract Syntax Tree Based Clone Detection for Java Projects." IOSR Journal of Engineering 02, no. 12 (2012): 45–47. http://dx.doi.org/10.9790/3021-021234547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Neamtiu, Iulian, Jeffrey S. Foster, and Michael Hicks. "Understanding source code evolution using abstract syntax tree matching." ACM SIGSOFT Software Engineering Notes 30, no. 4 (2005): 1–5. http://dx.doi.org/10.1145/1082983.1083143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Söderberg, Emma, Torbjörn Ekman, Görel Hedin, and Eva Magnusson. "Extensible intraprocedural flow analysis at the abstract syntax tree level." Science of Computer Programming 78, no. 10 (2013): 1809–27. http://dx.doi.org/10.1016/j.scico.2012.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Patra. "JAVASCRIPT INTERPRETER USING NON RECURSIVE ABSTRACT SYNTAX TREE BASED STACK." American Journal of Applied Sciences 10, no. 4 (2013): 403–13. http://dx.doi.org/10.3844/ajassp.2013.403.413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Liang, Hongliang, Lu Sun, Meilin Wang, and Yuxing Yang. "Deep Learning With Customized Abstract Syntax Tree for Bug Localization." IEEE Access 7 (2019): 116309–20. http://dx.doi.org/10.1109/access.2019.2936948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Young-Chul, and Jaeyoung Choi. "A Program Similarity Evaluation using Keyword Extraction on Abstract Syntax Tree." KIPS Transactions:PartA 12A, no. 2 (2005): 109–16. http://dx.doi.org/10.3745/kipsta.2005.12a.2.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cai, Ziyi, Lu Lu, and Shaojian Qiu. "An Abstract Syntax Tree Encoding Method for Cross-Project Defect Prediction." IEEE Access 7 (2019): 170844–53. http://dx.doi.org/10.1109/access.2019.2953696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Son, Hyun Seung, and R. Young Chul Kim. "A Visualization of Secure Vulnerability in Code using Abstract Syntax Tree Metamodel." Journal of Security Engineering 14, no. 1 (2017): 21–32. http://dx.doi.org/10.14257/jse.2017.02.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Pogodalla, Sylvain. "A syntax-semantics interface for Tree-Adjoining Grammars through Abstract Categorial Grammars." Journal of Language Modelling 5, no. 3 (2018): 527. http://dx.doi.org/10.15398/jlm.v5i3.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Duracik, Michal, Patrik Hrkut, Emil Krsak, and Stefan Toth. "Abstract Syntax Tree Based Source Code Antiplagiarism System for Large Projects Set." IEEE Access 8 (2020): 175347–59. http://dx.doi.org/10.1109/access.2020.3026422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kim, Jaehyun, and Yangsun Lee. "A Study on Abstract Syntax Tree for Development of a JavaScript Compiler." International Journal of Grid and Distributed Computing 11, no. 6 (2018): 37–48. http://dx.doi.org/10.14257/ijgdc.2018.11.6.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zhuo, Z., T. Cai, X. Zhang, and F. Lv. "Long short‐term memory on abstract syntax tree for SQL injection detection." IET Software 15, no. 2 (2021): 188–97. http://dx.doi.org/10.1049/sfw2.12018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Saeed, A., and T. Amin. "Effects of location, gender and indole butyric acid on rooting of Laurus nobilis L. semi-hardwood stem cuttings." Agricultural Science and Technology 12, no. 3 (2020): 260–63. http://dx.doi.org/10.15547/ast.2020.03.041.

Full text
Abstract:
Abstract. The research was conducted in 2018 in order to investigate the effect of location, tree gender and indole butyric acid (IBA) 4000ppm on rooting of semi-hardwood stem cuttings. Two locations (Al-Samrah and Al-Nabaeen) in Latakia province, Syria, different in latitude and above sea level (500 m and 827 m, respectively) were studied. The results showed significant effect (p<0.05) of the location and tree gender on rooting capacity. No rooting was observed in control (without IBA treatment). Location also affected the number of roots/cuttings. No effect of location or tree gender on r
APA, Harvard, Vancouver, ISO, and other styles
33

Kikuchi, Hiroshi, Takaaki Goto, Mitsuo Wakatsuki, and Tetsuro Nishino. "A Source Code Plagiarism Detecting Method Using Sequence Alignment with Abstract Syntax Tree Elements." International Journal of Software Innovation 3, no. 3 (2015): 41–56. http://dx.doi.org/10.4018/ijsi.2015070104.

Full text
Abstract:
Learning to program is an important subject in computer science courses. During programming exercises, plagiarism by copying and pasting can lead to problems for fair evaluation. Some methods of plagiarism detection are currently available, such as sim. However, because sim is easily influenced by changing the identifier or program statement order, it fails to do enough to support plagiarism detection. In this paper, the authors propose a plagiarism detection method which is not influenced by changing the identifier or program statement order. The authors also explain our method's capabilities
APA, Harvard, Vancouver, ISO, and other styles
34

Ullah, Farhan, Sohail Jabbar, and Fadi Al-Turjman. "Programmers' de-anonymization using a hybrid approach of abstract syntax tree and deep learning." Technological Forecasting and Social Change 159 (October 2020): 120186. http://dx.doi.org/10.1016/j.techfore.2020.120186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yu, Hang, Huiquan Gong, and Yawen Wang. "Design and implementation of fault injection based on abstract syntax tree of C Program." IOP Conference Series: Materials Science and Engineering 715 (January 3, 2020): 012034. http://dx.doi.org/10.1088/1757-899x/715/1/012034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Singh, Pavitdeep, Satwinder Singh, and Jatinder Kaur. "Tool for generating code metrics for C# source code using abstract syntax tree technique." ACM SIGSOFT Software Engineering Notes 38, no. 5 (2013): 1–6. http://dx.doi.org/10.1145/2507288.2507312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Roberts, Mark D. "Ultrametric Distance in Syntax." Prague Bulletin of Mathematical Linguistics 103, no. 1 (2015): 111–30. http://dx.doi.org/10.1515/pralin-2015-0006.

Full text
Abstract:
Abstract Phrase structure trees have a hierarchical structure. In many subjects, most notably in taxonomy such tree structures have been studied using ultrametrics. Here syntactical hierarchical phrase trees are subject to a similar analysis, which is much simpler as the branching structure is more readily discernible and switched. The ambiguity of which branching height to choose, is resolved by postulating that branching occurs at the lowest height available. An ultrametric produces a measure of the complexity of sentences: presumably the complexity of sentences increases as a language is ac
APA, Harvard, Vancouver, ISO, and other styles
38

Ko, Jong Won. "Design of MDA Based Model Transformation Profile for Model Verification." Applied Mechanics and Materials 224 (November 2012): 69–72. http://dx.doi.org/10.4028/www.scientific.net/amm.224.69.

Full text
Abstract:
Validation of existing software design models and transformed target models for the study, mainly checking (Model Checking) with a code-based software designed to define in the abstract syntax tree or on the models generated using refactoring on design models for refinery operations and define how to perform. The problem with these traditional research methods, but the first model, design model for checking the information with the model by defining a formal representation in the form of an abstract syntax tree, as you've shown how to perform validation of UML design model. Additional steps ne
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Zhao, Yang Tian, and Haihua Yan. "An Approach of Conformance Verification between Design Models and Code Based on Abstract Syntax Tree." MATEC Web of Conferences 54 (2016): 07001. http://dx.doi.org/10.1051/matecconf/20165407001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Szőke, Gábor. "Automating the Refactoring Process." Acta Cybernetica 23, no. 2 (2017): 715–35. http://dx.doi.org/10.14232/actacyb.23.2.2017.16.

Full text
Abstract:
To decrease software maintenance cost, software development companies use static source code analysis techniques. Static analysis tools are capable of finding potential bugs, anti-patterns, coding rule violations, and they can also enforce coding style standards. Although there are several available static analyzers to choose from, they only support issue detection. The elimination of the issues is still performed manually by developers. Here, we propose a process that supports the automatic elimination of coding issues in Java. We introduce a tool that uses a third-party static analyzer as in
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Tiantian, Djoko Budi Santoso, Kechao Wang, and Xiaohong Su. "Automatic Grading for Complex Multifile Programs." Complexity 2020 (June 13, 2020): 1–15. http://dx.doi.org/10.1155/2020/3279053.

Full text
Abstract:
This paper presents an automatic grading method DGRADER, which handles complex multifile programs. Both the dynamic and the static grading support multifile program analysis. So, it can be an advantage to handle complex programming problem which requires more than one program file. Dynamic analysis takes advantage of object file linker in compilation to link complex multifile program. The static grading module consists of the following steps. Firstly, the program is parsed into abstract syntax tree, which is mapped into abstract syntax tree data map. Then, the information of preprocessor is us
APA, Harvard, Vancouver, ISO, and other styles
42

Ko, Jong Won, and Young Jae Song. "A Study on Model Transformation Mechanism Using Graph Comparison Algorithm, Abstract Factory Pattern and Bridge Pattern." Applied Mechanics and Materials 121-126 (October 2011): 2476–81. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.2476.

Full text
Abstract:
In order to easily port mobile applications suitable for each platform, that have been developed under diverse development environment for individual wireless communication service providers, or redevelop them on a specific platform, it is required to reuse them at software model level that is a software development paradigm for MDA (Model Driven Architecture). Verification of existing design models and test models for the study, mainly checking (Model Checking) with a code-based software designed to define in the abstract syntax tree or on the models generated using refactoring on design mode
APA, Harvard, Vancouver, ISO, and other styles
43

Xu, Shuangbin, Zehan Dai, Pingfan Guo, et al. "ggtreeExtra: Compact Visualization of Richly Annotated Phylogenetic Data." Molecular Biology and Evolution 38, no. 9 (2021): 4039–42. http://dx.doi.org/10.1093/molbev/msab166.

Full text
Abstract:
Abstract We present the ggtreeExtra package for visualizing heterogeneous data with a phylogenetic tree in a circular or rectangular layout (https://www.bioconductor.org/packages/ggtreeExtra). The package supports more data types and visualization methods than other tools. It supports using the grammar of graphics syntax to present data on a tree with richly annotated layers and allows evolutionary statistics inferred by commonly used software to be integrated and visualized with external data. GgtreeExtra is a universal tool for tree data visualization. It extends the applications of the phyl
APA, Harvard, Vancouver, ISO, and other styles
44

Ahukaemere, C. M., D. N. Osujieke, V. O. Ugwa, and A. O. Ogwuche. "Bulk density and organic carbon contents of soil pedons influenced by different tree species." Agricultural Science and Technology 11, no. 2 (2019): 148–53. http://dx.doi.org/10.15547/ast.2019.02.024.

Full text
Abstract:
Abstract. Bulk density and organic matter content of soil are important soil attributes used in predicting the productivity potentials of soil and overall soil quality. The distribution of soils bulk density and organic carbon in horizons of soil pedons under different three tree species (Hevea brasiliensis – rubber, Pentaclethra macrophylla – oil bean and Irvingia gabonensis – ogbono) in Owerri, Southeastern Nigeria were investigated. A random survey method was used in field sampling. In all, three profile pits were dug, one in each site. A total of 36 soil samples were collected and analyzed
APA, Harvard, Vancouver, ISO, and other styles
45

Jada, M. Y., M. Y. Adamu, M. B. Aji, and G. Abdullahi. "Plant-parasitic nematodes associated with Moringa tree (Moringa oleifera Lam.) in Adamawa, North Eastern Nigeria." Agricultural Science and Technology 13, Volume 13, Issue 2 (2021): 185–96. http://dx.doi.org/10.15547/ast.2021.02.031.

Full text
Abstract:
Abstract. Moringa (Moringa oleifera Lam.) is becoming an economically important crop because of its nutritional value, therefore, more land area is currently being devoted to its cultivation particularly by vegetable farmers. But right now, little is known about plant-parasitic nematodes as one of its probable pest problems. A survey was, therefore, carried out to determine the plant-parasitic nematodes (PPN) associated with Moringa tree in Adamawa State, Nigeria. Nine of the 21 local government areas (LGAs) of the state were randomly selected; and 10 moringa farms, indicating at least two hou
APA, Harvard, Vancouver, ISO, and other styles
46

Koparkar, Chaitanya, Mike Rainey, Michael Vollmer, Milind Kulkarni, and Ryan R. Newton. "Efficient tree-traversals: reconciling parallelism and dense data representations." Proceedings of the ACM on Programming Languages 5, ICFP (2021): 1–29. http://dx.doi.org/10.1145/3473596.

Full text
Abstract:
Recent work showed that compiling functional programs to use dense, serialized memory representations for recursive algebraic datatypes can yield significant constant-factor speedups for sequential programs. But serializing data in a maximally dense format consequently serializes the processing of that data, yielding a tension between density and parallelism. This paper shows that a disciplined, practical compromise is possible. We present Parallel Gibbon, a compiler that obtains the benefits of dense data formats and parallelism. We formalize the semantics of the parallel location calculus un
APA, Harvard, Vancouver, ISO, and other styles
47

Darchuk, Nataliia. "AGAT-Syntax as component of computer-based Ukrainian grammar." Ukrainska mova, no. 4 (2020): 82–102. http://dx.doi.org/10.15407/ukrmova2020.04.089.

Full text
Abstract:
Abstract: The article describes functional features of the syntactic module of computer-based Ukrainian grammar AGAT. This is a linguistic type of computer-aided syntactic analysis, which provides full information about syntactic units and categories, in particular, predicativity, coordinate and subordinate clauses, the categories of subject and predicate etc. The developed linguistic software provides syntactic analysis of a whole sentence in the form of a dependency tree and indicates the types of syntactic relations and links. The AGAT-syntax task is to identify all varieties of compatibili
APA, Harvard, Vancouver, ISO, and other styles
48

Stefanova, D., and S. Malchev. "Preliminary assessment of selected sweet cherry hybrids regarding their resistance to black cherry aphid (Myzus cerasi Fabr.) in Bulgaria." Agricultural Science and Technology 12, no. 3 (2020): 288–91. http://dx.doi.org/10.15547/ast.2020.03.046.

Full text
Abstract:
Abstract. One of the main insect pests of the cherry trees in Bulgaria is Myzus cerasi (Homoptera, Aphididae). The black cherry aphids occur annually in orchards and cause yield loss or degraded quality. In 2018 and 2019, resistance to Myzus cerasi was assessed on 11 selected sweet cherry genotypes in a breeding orchard at the Fruit Growing Institute – Plovdiv. Susceptibility to aphid infestation was assessed through inspection of 100 leaf rosettes from individual tree hybrids. Some of the studied genotypes 6-132, 6-132 (1), 6-131, and 6-131 (1) were not infested by black cherry aphids in the
APA, Harvard, Vancouver, ISO, and other styles
49

Meng, Yao. "An Intelligent Code Search Approach Using Hybrid Encoders." Wireless Communications and Mobile Computing 2021 (July 1, 2021): 1–16. http://dx.doi.org/10.1155/2021/9990988.

Full text
Abstract:
The intelligent code search with natural language queries has become an important researching area in software engineering. In this paper, we propose a novel deep learning framework At-CodeSM for source code search. The powerful code encoder in At-CodeSM, which is implemented with an abstract syntax tree parsing algorithm (Tree-LSTM) and token-level encoders, maintains both the lexical and structural features of source code in the process of code vectorizing. Both the representative and discriminative models are implemented with deep neural networks. Our experiments on the CodeSearchNet datase
APA, Harvard, Vancouver, ISO, and other styles
50

Poongodi, D., and G. Tholkkappia Arasu. "Multi-Agent based Sequence Algorithm for Detecting Plagiarism and Clones in Java Source Code using Abstract Syntax Tree." International Journal of Computer Applications 90, no. 15 (2014): 19–24. http://dx.doi.org/10.5120/15796-4494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!