-
221
The Research of Sequence Shadowing Property and Regularly Recurrent Point on the Double Inverse Limit Space
Published 2022-01-01Get full text
Article -
222
A Graph Embedding Method Based on Sparse Representation for Wireless Sensor Network Localization
Published 2014-07-01Get full text
Article -
223
-
224
Cloud and IoT based smart agent-driven simulation of human gait for detecting muscles disorder
Published 2025-01-01“…Existing analysis applications, designed for other purposes, often lack essential software engineering features such as a user-friendly interface, infrastructure independence, usability and learning ability, cloud computing capabilities, and AI-based assistance. …”
Get full text
Article -
225
IC-GraF: An Improved Clustering with Graph-Embedding-Based Features for Software Defect Prediction
Published 2024-01-01“…Software defect prediction (SDP) has been a prominent area of research in software engineering. Previous SDP methods often struggled in industrial applications, primarily due to the need for sufficient historical data. …”
Get full text
Article -
226
EXPERIENCES OF CONDUCTING ONLINE EXAM PROCTORING IN LOW-RESOURCE SETTINGS: A SRI LANKAN CASE STUDY
Published 2023-02-01“…In this work, an in-class assignment for a Software Engineering course at a higher education institution in Sri Lanka was manually proctored using video conferencing software in a completely remote context. …”
Get full text
Article -
227
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
Published 2024-12-01“…The most popular data sources that were detected in selected studies are the Metric Data Programme from NASA, Predictor Models in Software Engineering, and iTrust Electronic Health Care System.…”
Get full text
Article -
228
-
229
Digital-based emergency prevention and control system: enhancing infection control in psychiatric hospitals
Published 2025-01-01Get full text
Article -
230
Agent-Based Adaptive Dynamic Round Robin (AADRR) Scheduling Algorithm
Published 2025-01-01Get full text
Article -
231
-
232
-
233
Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks
Published 2022-01-01Get full text
Article -
234
Stability Analysis and Design of Time-Varying Nonlinear Systems Based on Impulsive Fuzzy Model
Published 2012-01-01Get full text
Article -
235
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01Get full text
Article -
236
AppCraft: Model-Driven Development Framework for Mobile Applications
Published 2025-01-01“…Implementing any changes across these variants requires manual effort, demanding a significant amount of time and resources. In response, software engineering has focused on improving the development process to create high-quality mobile applications. …”
Get full text
Article -
237
Princípios de funcionamento de diferentes métodos de dessalinização de água do mar e análise paramétrica de um dessalinizador de múltiplo efeito (MED)
Published 2022-01-01“…Na sequência, foi realizado um estudo de caso, envolvendo a modelagem matemática e a simulação numérica de uma instalação de dessalinização MED, utilizando-se o software Engineering Equation Solver (EES). Por fim, realizou-se uma análise paramétrica, que mostrou que o modelo utilizado para estudo de caso apresenta um bom desempenho, além de ser adaptável para a implementação em uma série de possibilidades. …”
Get full text
Article -
238
NoFumo+: Mobile Health App to Quit Smoking Using Cognitive-Behavioral Therapy
Published 2024-01-01“…To technical development, a multidisciplinary team was formed (healthcare, research, and software engineers) that made theoretical decisions on both technical issues and the incorporation of therapeutic techniques. …”
Get full text
Article -
239
Analysis of ChatGPT-Generated Codes Across Multiple Programming Languages
Published 2025-01-01“…By comparing performance between Python and Java, the study seeks to shed light on AI’s capabilities and limitations in code generation, addressing not only functional correctness but also broader software engineering concerns such as memory usage, runtime efficiency, and maintainability. …”
Get full text
Article -
240
Perceptual Mapping-Based Image Tamper Detection and Recovery Algorithm
Published 2022-01-01Get full text
Article