Showing 1 - 20 results of 34 for search 'API verification', query time: 0.08s Refine Results
  1. 1
  2. 2

    Study of verification and validation of standard welding procedure specifications guidelines for API 5L X-70 grade line pipe welding by Qazi H. A. A.

    Published 2017-12-01
    “…Verification and validation of welding procedure specifications for X-70 grade line pipe welding was performed as per clause 8.2, Annexure B and D of API 5L, 45th Edition to check weld integrity in its future application conditions. …”
    Get full text
    Article
  3. 3
  4. 4

    Account hijacking threat attack detection for OAuth2.0 authorization API by Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU

    Published 2019-06-01
    “…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
    Get full text
    Article
  5. 5

    Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters by Aditya Sissodiya, Eric Chiquito, Ulf Bodin, Johan Kristiansson

    Published 2025-01-01
    “…Every action in those environments funnels through the API server, so a single access-control slip can jeopardise an entire fleet. …”
    Get full text
    Article
  6. 6

    Object-Oriented Software for Fitness-For-Service Assessment of Cracked Cylinder Based on API RP 579 by Jirapong Kasivitamnuay, Pairod Singhatanadgid

    Published 2020-03-01
    “…The software development process included identifying the software specifications, designing the software structure, manipulating the information from the standard for programming, the graphical user interface design, and finally verification of the software. The assessment procedure employed in this study was the third edition of the standard API RP 579. …”
    Get full text
    Article
  7. 7

    B<sc>ambda</sc>: A Real-Time Verification Framework for Serverless Computing by Changhee Shin, Bom Kim, Seungsoo Lee

    Published 2025-01-01
    “…Specifically, we introduce a multi-step verification process that distinguishes between direct calls, event-driven calls, and API calls, effectively preventing unauthorized attacks without requiring additional security configurations from developers. …”
    Get full text
    Article
  8. 8

    A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System by Juan Alamrio Berrios Moya, John Ayoade, Md Ashraf Uddin

    Published 2025-05-01
    “…In this paper, we introduce ZKBAR-V, a Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System. This system is designed to provide a privacy-preserving, immutable, and secure framework for managing academic credentials. …”
    Get full text
    Article
  9. 9
  10. 10

    Copyright Verification and Traceability for Remote Sensing Object Detection Models via Dual Model Watermarking by Weitong Chen, Xin Xu, Na Ren, Changqing Zhu, Jie Cai

    Published 2025-01-01
    “…Then, fingerprint information is embedded into a small subset of the model’s critical weights, using a fine-tuning and loss-guided approach. At the copyright verification stage, the presence of a black-box watermark can be confirmed through using the suspect model’s API to make predictions on the trigger samples, thereby determining whether the model is infringing. …”
    Get full text
    Article
  11. 11
  12. 12

    Application of Revit Secondary Development in Sluice Seepage Calculation by NIU Lijun, LI Yihao

    Published 2023-01-01
    “…Based on the concept of forward design,this paper uses C# language to abstract and package the traditional seepage calculation method (improved resistance coefficient method) and redevelops AutoRevit through Revit API interface programming.As a result,the visual interactive analysis process of sluice seepage calculation is achieved so that the design of sluice anti-seepage measures can realize forward design based on a three-dimensional model.In this paper,a regulating sluice is taken as an example for verification,and the results are compared with those calculated by AutoBank software.The results show that the plug-in has high accuracy and efficiency and realizes the highly visual sluice seepage calculation and low-difficulty human-computer interaction.At the same time,it has the function of instantly judging the results according to the specification.The plug-in not only expands the function of BIM technology but also facilitates designers in the water conservancy industry.In addition,it provides certain technical references for further expanding the deep application of BIM technology in water conservancy design.…”
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Automated Testing for Service-Oriented Architecture: Leveraging Large Language Models for Enhanced Service Composition by Mahsun Altin, Behcet Mutlu, Deniz Kilinc, Altan Cakir

    Published 2025-01-01
    “…This article explores the application of Large Language Models (LLMs), including proprietary models such as OpenAI&#x2019;s ChatGPT 4o and ChatGPT 4o-mini, Anthropic&#x2019;s Claude 3.5 Sonnet and Claude 3.7 Sonnet, and Google&#x2019;s Gemini 1.5 Pro, Gemini 2.0 Flash, and Gemini 2.0 Flash-Lite, as well as open-source alternatives including Qwen2.5-14B-Instruct-1M, and commercially accessed models such as DeepSeek R1 and DeepSeek V3, which were tested via APIs despite having open-source variants, to automate validation and verification in Application Programming Interface (API) testing within a Service-Oriented Architecture (SOA). …”
    Get full text
    Article
  16. 16

    An AI-Based Open-Source Software for <i>Varroa</i> Mite Fall Analysis in Honeybee Colonies by Jesús Yániz, Matías Casalongue, Francisco Javier Martinez-de-Pison, Miguel Angel Silvestre, Beeguards Consortium, Pilar Santolaria, Jose Divasón

    Published 2025-04-01
    “…Infestation by <i>Varroa destructor</i> is responsible for high mortality rates in <i>Apis mellifera</i> colonies worldwide. This study was designed to develop and test under field conditions a new free software (VarroDetector) based on a deep learning approach for the automated detection and counting of <i>Varroa</i> mites using smartphone images of sticky boards collected in honeybee colonies. …”
    Get full text
    Article
  17. 17

    Modeling the clustering strength of connected autonomous vehicles and its impact on mixed traffic capacity by Peilin Zhao, Yiik Diew Wong, Feng Zhu

    Published 2024-12-01
    “…This study then moves on to formulate the capacity of mixed traffic, taking into account CAV penetration rate, API, and stochastic headway. Numerical verification of the estimated mixed traffic capacity reveals a negligible error (less than 1%) compared to simulated capacity. …”
    Get full text
    Article
  18. 18

    Fatigue life prediction of casing welded pipes by using the extended finite element method by Ljubica Lazi? Vuli?evi?, Aleksandar Raji?, Aleksandar Grbovi?, Aleksandar Sedmak, Živ?e Šarko?evi?

    Published 2016-03-01
    “…The extended finite element (XFEM) method has been used to simulate fatigue crack growth in casing pipe, made of API J55 steel by high-frequency welding, in order estimate its structural integrity and life. …”
    Get full text
    Article
  19. 19

    Fatigue life prediction of casing welded pipes by using the extended finite element method by Ljubica Lazić Vulićević, Aleksandar Rajić, Aleksandar Grbović, Aleksandar Sedmak, Živče Šarkočević

    Published 2016-03-01
    “…The extended finite element (XFEM) method has been used to simulate fatigue crack growth in casing pipe, made of API J55 steel by high-frequency welding, in order estimate its structural integrity and life. …”
    Get full text
    Article
  20. 20

    Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems by Li-li Zhang, Qi Zhao, Li Wang, Ling-yu Zhang

    Published 2020-01-01
    “…Finally, considering China, the system designs a general control strategy API to separate data from control strategy. Most of the popular communication protocols between signal controllers and detectors are private protocols. …”
    Get full text
    Article