-
221
Development of modular real-time software for the TALARIS lunar hopper testbed
Published 2011Get full text
Thesis -
222
Stakeholder analysis using fuzzy logic operations for integrated user story prioritisation approach in Agile-Scrum method
Published 2024“…Feedback was gathered from software experts well-versed in practising the Agile methodology within their respective organisations. …”
Get full text
Article -
223
A knowledge audit model for requirement elicitation: a case study to assess knowledge in requirement elicitation
Published 2017“…Research findings are based on responses of 40 respondents from software development organizations. The results of case study confirmed the effectiveness of KA model for REP with respect to completeness, correctness, and understandability. …”
Get full text
Article -
224
Overview of the application of geospatial technology to groundwater potential mapping in Nigeria
Published 2018“…Most models are produced from software packages that do not allow weighting of thematic layers hence cannot incorporate expert judgements. …”
Get full text
Article -
225
Adaptive and dynamic characteristics in hybrid agile management model for software development project success
Published 2019“…An empirical method with a quantitative approach is adopted to collect data with questionnaires from software development focus groups involved in industry projects. …”
Get full text
Conference or Workshop Item -
226
Automating specification to implementation software development using model driven architecture
Published 2011“…E2EDE is a novel approach to software engineering, where the notion of variability is utilized from Software Product Line and used to model design decisions in PSM. …”
Get full text
Thesis -
227
Performance Analysis of Feature Selection Methods in Software Defect Prediction: A Search Method Approach
Published 2019-07-01“…Software Defect Prediction (SDP) models are built using software metrics derived from software systems. The quality of SDP models depends largely on the quality of software metrics (dataset) used to build the SDP models. …”
Get full text
Article -
228
Muscle volume imbalance may be associated with static posterior humeral head subluxation
Published 2021-03-01“…The imaging data (CT) of 9 patients/10 shoulders of the full scapula and shoulder were analyzed, and the muscle volumes of the subscapularis (SSC), infraspinatus (ISP) and teres minor muscles (TMM) were measured by manually marking the muscle contours on transverse slices and calculating the volume from software. Furthermore, the glenoid retroversion and glenohumeral distance were measured. …”
Get full text
Article -
229
Apropriação tecnológica na economia do conhecimento: inovação e propriedade intelectual de software na América Latina Technology appropriation in knowledge economy: innovation and...
Published 2009-12-01“…This article discusses the conflicts arising from software patent protection, an area in which the assets are intangible and replicable at almost no cost. …”
Get full text
Article -
230
Design Patterns and Electric Vehicle Charging Software
Published 2020-12-01“…The paper demonstrates the design patterns applicability from software level to cloud resources plan and advocates for a high-quality solution in every segment of project development. …”
Get full text
Article -
231
How well do software assistants for minimally invasive partial nephrectomy meet surgeon information needs? A cognitive task analysis and literature review study.
Published 2019-01-01“…During the subsequent interview study, we identified three challenging phases of the procedure, which may particularly benefit from software assistance. These phases are I. Hilar and vascular management, II. …”
Get full text
Article -
232
Feature Selection Using Golden Jackal Optimization for Software Fault Prediction
Published 2023-05-01“…Combining this algorithm with four classifiers, namely K-Nearest Neighbor, Decision Tree, Quadrative Discriminant Analysis, and Naive Bayes, will aid in selecting a subset of relevant features from software fault prediction datasets. To evaluate the accuracy of this algorithm, we will compare its performance with other feature selection methods such as FSDE (Differential Evolution), FSPSO (Particle Swarm Optimization), FSGA (Genetic Algorithm), and FSACO (Ant Colony Optimization). …”
Get full text
Article -
233
Fourier analysis of the traffic flow intensity
Published 2021-09-01“…The processing of data obtained from software and hardware complexes allowed us to determine dependences of the car flow intensity on the road of the Perm city at different averaging intervals, to describe the features of the motor transport movement on the road under consideration. …”
Get full text
Article -
234
Cloud-enabled Biodepot workflow builder integrates image processing using Fiji with reproducible data analysis using Jupyter notebooks
Published 2022-09-01“…We present the containerized and cloud-enabled Biodepot-workflow-builder platform that supports graphics from software containers and has been extended for image analyses. …”
Get full text
Article -
235
Modos y estéticas de la espera en los videojuegos
Published 2022-07-01“…Los principales casos de estudio serán Dark Souls (From Software 2011), The Sims (Maxis 2000), The Legend of Zelda: Majora’s Mask (Nintendo EAD 2000) y The Longing (Studio Seufd 2020); también se mencionarán otros títulos como apoyo secundario. …”
Get full text
Article -
236
Perceptions of ICT Practitioners Regarding Software Privacy
Published 2020-04-01“…In order to gain a better understanding on how industry ICT practitioners perceive the practical relevance of software privacy and privacy requirements and how these professionals are implementing data privacy concepts, we conducted a survey with ICT practitioners from software development organizations to get an overview of how these professionals are implementing data privacy concepts during software design. …”
Get full text
Article -
237
THE APPLICATION OF DIGITAL LINE GRAPHS AND MAP IN THE NETWORK ENVIRONMENT
Published 2012-07-01“…Due to the manufacture and management of DLGM data that are independent from software and platform, its data can be used in many fields. …”
Get full text
Article -
238
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views
Published 2020-01-01“…Virtual machine monitor (VMM), playing a critical role in a virtualized system, is software and hence it suffers from software aging after a long continuous running as well as software crashes due to elusive faults. …”
Get full text
Article -
239
Adaptive digital twins for energy-intensive industries and their local communities
Published 2024-03-01“…Here, we introduce the Adaptive Digital Twins (ADT) concept, anchored in five attributes inspired by the self-adaptive systems field from software engineering. These attributes are self-learning, self-optimizing, self-evolving, self-monitoring, and self-protection. …”
Get full text
Article -
240
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
Published 2024-01-01“…A comprehensive security strategy aiming to mitigate IoT firmware vulnerabilities would entail auditing the IoT device firmware environment, from software components, storage, and configuration, to delivery, maintenance, and updating, as well as understanding the efficacy of tools and techniques available for this purpose. …”
Get full text
Article