-
201
Test Suite Prioritization Based on Optimization Approach Using Reinforcement Learning
Published 2022-07-01“…Lastly, the fault seeding approach is used to validate the results from software engineering experts. The proposed reinforcement learning-based test suite optimization model is evaluated through five case study applications. …”
Get full text
Article -
202
Development of a DC Microgrid with Decentralized Production and Storage: From the Lab to Field Deployment in Rural Africa
Published 2022-09-01“…The design of the proposed microgrid as well as its control algorithm are thoroughly addressed and tested from software simulations and experimental testing to field deployment in Madagascar. …”
Get full text
Article -
203
An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense
Published 2021-01-01“…Experimental results from software simulations and real experiments show that the OSSSA has better real-time defense performance than the current mainstream scheduling strategy algorithms, and can adapt to different practical application scenarios, which is helpful to the further development of the CMD.…”
Get full text
Article -
204
Editorial: Humanitarian Open Source (December 2010)
Published 2010-11-01“…It should come as no surprise that the humanitarian open source domain attracts a great deal of attention from software developers, engineers, and others who find that they are able to both solve intense technical challenges while helping to improve the lives of others. …”
Get full text
Article -
205
Requirements and Operational Guidelines for Secure and Sustainable Digital Phenotyping: Design and Development Study
Published 2021-04-01“…Novel initiatives, ranging from software prototypes to user-ready research platforms, are innovating the field of biomedical research and health care apps. …”
Get full text
Article -
206
Developing a strategy for computational lab skills training through Software and Data Carpentry: Experiences from the ELIXIR Pilot action [version 1; referees: 3 approved]
Published 2017-07-01“…A pan-European bioinformatics programme, ELIXIR, has adopted a well-established and progressive programme of computational lab and data skills training from Software and Data Carpentry, aimed at increasing the number of skilled life scientists and building a sustainable training community in this field. …”
Get full text
Article -
207
SOFTWARE EFFORT ESTIMATION FRAMEWORK TO IMPROVE ORGANIZATION PRODUCTIVITY USING EMOTION RECOGNITION OF SOFTWARE ENGINEERS IN SPONTANEOUS SPEECH
Published 2015-10-01“…Each line of code should be delivered from software engineer. Tools and techniques may helpful and act as aid or supplementary. …”
Get full text
Article -
208
Identifying Important Packages of Object-Oriented Software Using Weighted k-Core Decomposition
Published 2014-12-01“…Complex network research opens new opportunities for identifying important entities from software networks. However, the existing methods only focus on identifying important classes. …”
Get full text
Article -
209
Vulnerable Code Detection Using Software Metrics and Machine Learning
Published 2020-01-01“…To this end, we use several machine learning algorithms (Random Forest, Extreme Boosting, Decision Tree, SVM Linear, and SVM Radial) to extract vulnerability-related knowledge from software metrics collected from the source code of several representative software projects developed in C/C++ (Mozilla Firefox, Linux Kernel, Apache HTTPd, Xen, and Glibc). …”
Get full text
Article -
210
Suggested Prototype Software to Extract Data from Social Media
Published 2020-12-01“…Criteria "Automatically delete archives at specified time", "Reset deleted records", "Open archive for public access", "Obtain credentials from public and private entities", "Automatically delete archives at defined time", "Get Version" Complete After Payments "and" Demo Version "can be removed from software capabilities. However, when looking at current data mining software from social networks, some of these capabilities are of great importance. …”
Get full text
Article -
211
Software development process evolution and paradigm shift - a case study of Malaysian companies
Published 2022-04-01“…The agile methods got overwhelming response from software development companies due to their obvious support to GSD. …”
Get full text
Article -
212
Opportunistic Screening of Vitamin B12 Deficiency in IT Professionals Presenting for Routine Health Check-up
Published 2015-12-01“…Our aim was to study the prevalence of Vit B12 deficiency in IT professionals (Information Technology Professionals from Software industry) who presented for routine health screening and to correlate the deficiency to various parameters. …”
Get full text
Article -
213
Detection of Vulnerabilities by Incorrect Use of Variable Using Machine Learning
Published 2023-03-01“…Common Weakness Enumeration (CWE) refers to a list of faults caused from software or hardware. The CWE includes the faults related to programming language and security. …”
Get full text
Article -
214
Feasibility of AmbulanCe-Based Telemedicine (FACT) study: safety, feasibility and reliability of third generation in-ambulance telemedicine.
Published 2014-01-01“…Failures resulted mainly from limited mobile connectivity and to a lesser extent from software, hardware or human error. The user acceptance was high.Ambulance-based telemedicine of the third generation is safe, feasible and reliable but further research and development, especially with regard to high speed broadband access, is needed before this approach can be implemented in daily practice.…”
Get full text
Article -
215
Software and services export, IT investment and GDP nexus in India
Published 2019-07-01“…Similarly, vector error correction mechanism Granger causality results hold that there is uni-directional long-run causality running from software and services export and investment in IT to GDP, implying that software and services export is an important determinant of economic growth in India. …”
Get full text
Article -
216
Calculation of One-dimensional Forward Modelling of Helicopter-borne Electromagnetic Data and a Sensitivity Matrix Using Fast Hankel Transforms
Published 2014-06-01“…Furthermore, the comparison of the results for the sensitivity matrix for a two-layer model with those obtained from software is being used by the BGR Centre in Germany, showing that the proposed algorithm enjoys a high degree of accuracy in calculating this matrix.…”
Get full text
Article -
217
A Novel Approach towards the Design and Implementation of Virtual Network Based on Controller in Future IoT Applications
Published 2020-04-01“…We derived the concept from Software Defined Network (SDN) and separated the control plane and data plane in the virtual IoT network. …”
Get full text
Article -
218
AttenSy-SNER: software knowledge entity extraction with syntactic features and semantic augmentation information
Published 2022-06-01“…It is significant to recognize and extract software knowledge entity from software knowledge community, as it has great impact on entity-centric tasks such as software knowledge graph construction, software document generation and expert recommendation. …”
Get full text
Article -
219
Using Application-Level Thread Progress Information to Manage Power and Performance
Published 2021“…Instead, we propose to gather progress information directly from software itself. We present ThreadBeats, a simple application-level annotation framework that directly and accurately conveys thread progress information to hardware. …”
Get full text
Article -
220
Mining Software Artifacts for use in Automated Machine Learning
Published 2022“…Inspired by the success of software mining in areas such as code search, program synthesis, and program repair, we investigate the hypothesis that information mined from software artifacts can be used to build, improve interactions with, and address missing use cases of AutoML. …”
Get full text
Thesis