Results 101 to 110 of about 19,566 (235)

Effects of a Self‐Regulated Cooperative Programming Approach on Elementary Students' Programming Knowledge, Metacognitive Awareness, and Self‐Efficacy

open access: yesJournal of Computer Assisted Learning, Volume 42, Issue 1, February 2026.
ABSTRACT Background Programming is a vital digital skill that can equip students with the necessary competencies for future employment opportunities. However, due to inadequate metacognitive awareness, self‐regulation abilities, and a lack of prior programming knowledge, elementary school students may struggle with completing complex programming tasks.
Chengye Liu, Zhihao Cui, Xiaojing Weng
wiley   +1 more source

Applying Ada to Beech Starship avionics [PDF]

open access: yes
As Ada solidified in its development, it became evident that it offered advantages for avionics systems because of it support for modern software engineering principles and real time applications.
Funk, David W.
core   +1 more source

New Generation Debuggers

open access: yes, 2020
Debugging is a painful and costly practice, due to the nature of bugs, of the debugged programs, or to tools limitations. We describe several difficulties of debugging that present scientific challenges (i.e., we don't know how to do it) or technological challenges (i.e., we can't do it).
Costiou, Steven   +2 more
openaire   +1 more source

An Artificial Intelligence‐Based Computer Vision Model for Human Sperm Concentration, Motility, and Kinematics Analysis

open access: yesSmart Medicine, Volume 5, Issue 1, February 2026.
A computer‐vision method measures sperm concentration and motility from recorded videos, benchmarked and calibrated against manual tracking to ensure consistency. It can potentially support routine fertility assessments with high accuracy. ABSTRACT Accurate assessment of sperm concentration and motility is critical for the diagnosis and management of ...
Sahar Shahali   +8 more
wiley   +1 more source

Generative AI for Requirements Engineering: A Systematic Literature Review

open access: yesSoftware: Practice and Experience, Volume 56, Issue 2, Page 141-170, February 2026.
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng   +6 more
wiley   +1 more source

The Importance of an Ensemble Approach for Modeling Aerosol‐Convection Interactions

open access: yesGeophysical Research Letters, Volume 53, Issue 1, 16 January 2026.
Abstract Aerosol‐convection interactions modulate cloud microphysics, thermodynamics, and updraft intensity, contributing to climate‐scale aerosol‐radiative forcing. However, quantifying aerosol indirect effects in mixed‐phase deep convection remains challenging due to uncertainties in parameterized physics and initial conditions driving nonlinear ...
Milind Sharma   +4 more
wiley   +1 more source

Bypassing Heaven's Gate Technique Using Black-Box Testing. [PDF]

open access: yesSensors (Basel), 2023
Hwang SJ, Utaliyeva A, Kim JS, Choi YH.
europepmc   +1 more source

DNA Origami and Its Applications in Synthetic Biology

open access: yesAdvanced Science, Volume 13, Issue 2, 9 January 2026.
This review provides a comprehensive summary of recent advancements in DNA origami for synthetic biology, emphasizing two key areas: the precise construction and dynamic regulation of extracellular‐to‐intracellular, and the synergistic integration with cell‐free systems.
Yaning Fang   +4 more
wiley   +1 more source

MAJOR: AN ASPECT WEAVER WITH FULL COVERAGE SUPPORT

open access: yesInvestigación & Desarrollo, 2011
Prevailing Aspect-Oriented Programming (AOP) frameworks for Java, such as AspectJ, use bytecode instrumentation techniques to weave aspects into application code. Unfortunately, those frameworks do not support weaving in the Java class library.
Alex Villazón   +2 more
doaj  

Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks

open access: yesApplied Sciences
(1) Background: Side-channel attacks (SCAs) exploit unintended information leakage to compromise cryptographic security. In cyber-physical systems (CPSs), embedded systems are inherently constrained by limited resources, restricting the implementation of
Seungun Park   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy