-
181
-
182
PoolRunner: An Extensible Performance Testing Simulation Tool for Thread-Pool Middleware
Published 2025-01-01“…Thus, in this paper, we present the PoolRunner, a client-server-based extensible performance testing simulation tool for TPS, developed in JAVA. The PoolRunner is required not only by the practitioners in the industry in early performance testing when architectural choices are made for multithreaded servers, but also by researchers in the academia to assess and compare the performance of their new TPS with existing state-of-the-art TPSs. …”
Get full text
Article -
183
Enhancing sustainable residential energy practices through the implementation of an energy-efficient labelling system for domestic consumers in Sri Lanka
Published 2025-06-01“…The country faces challenges related to energy dependencies, high energy costs for primary and secondary sources, and lower per capita electricity consumption compared to neighboring countries. …”
Get full text
Article -
184
The Development of the Open Machine-Learning-Based Anti-Spam (Open-MaLBAS)
Published 2021-01-01“…Open-MaLBAS is implemented in Java language, under free software license, for free use. …”
Get full text
Article -
185
-
186
Utilising GIS-based spatial land resource analysis for subsidised fertiliser allocation in Jombang Regency, Indonesia
Published 2024-11-01“…A subsidised fertiliser policy is a clear option to increase rice production and maintain farmer benefits. It has proven to be costly and hence needs to be effectively calculated. …”
Get full text
Article -
187
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Published 2025-01-01“…Traditional static and dynamic analysis techniques, although widely used, often exhibit high false-positive rates, elevated costs, and limited interpretability. Machine Learning (ML)-based approaches aim to overcome these limitations but encounter challenges related to scalability and adaptability due to their reliance on large labeled datasets and their limited alignment with the requirements of secure development teams. …”
Get full text
Article