Results 21 to 30 of about 1,784,727 (289)

Agile Development of PHP Websites: A Model-Aware Approach

open access: yesComplex Systems Informatics and Modeling Quarterly, 2020
The Design Science research method was hereby employed to develop an artifact that demonstrates the experimental “model-aware” software engineering methodology in the context of PHP Web development – a “low code” development approach with code templates ...
Carmen Ioana Gog
doaj   +1 more source

Enhancing software engineering education in higher education institutions through cloud-based learning tools: methodological and practical perspectives

open access: yesОсвітній вимір, 2023
Objective: This study aims to develop a comprehensive methodology for integrating cloud-based learning tools into software engineering education for students in higher education institutions (HEIs). Research tasks: The research encompasses exploring the
Andrii M. Striuk
doaj   +1 more source

Continuously Assessing and Improving Software Quality With Software Analytics Tools: A Case Study

open access: yesIEEE Access, 2019
In the last decade, modern data analytics technologies have enabled the creation of software analytics tools offering real-time visualization of various aspects related to software development and usage. These tools seem to be particularly attractive for
Silverio Martinez-Fernandez   +10 more
doaj   +1 more source

Framework for experimental evaluation of software solutions in a virtual environment

open access: yesРоссийский технологический журнал, 2022
Objectives. Ready-made information technology solutions used when developing software have various characteristics depending on the objectives to be experimentally obtained.
D. Ilin
doaj   +1 more source

A two-year Software Engineering M.Sc. degree designed under the Bologna Declaration Principles [PDF]

open access: yes, 2006
This paper presents and discusses the syllabus of a second cycle degree on Software Engineering in which any student that finishes any undergraduate Computing degree (Computer Engineering, Computer Science, Information Systems, Information Technology ...
Fernandes, João M., Machado, Ricardo J.
core   +1 more source

Feedback Control of arm movements using Neuro-Muscular Electrical Stimulation (NMES) combined with a lockable, passive exoskeleton for gravity compensation

open access: yesFrontiers in Neuroscience, 2014
Within the European project MUNDUS, an assistive framework was developed for the support of arm and hand functions during daily life activities in severely impaired people.
Christian eKlauer   +12 more
doaj   +1 more source

An Image Encryption Algorithm Based on Improved Lifting-Like Structure and Cross-Plane Zigzag Transform

open access: yesIEEE Access, 2022
With the increasing development of information technology, image information security has received more and more attention. Furthermore, image encryption is one of the most powerful methods to ensure image information security and plays a vital role in ...
Haixiao Li   +4 more
doaj   +1 more source

Development of Variant of Software Architecture Implementation for Low-power General Purpose Microcontrollers by Finite State Machines [PDF]

open access: yes, 2017
As a result of the research, two directions for development of software architecture for low-power general purpose microcontrollers (LPGPM) are identified. The first, classical approach is the development using standard State patterns.
Katin, P. (Pavlo)
core   +2 more sources

Preface to the CIbSE/ESELAW 2012 Special Issue

open access: yesCLEI Electronic Journal, 2013
This special issue of the CLEI Electronic Journal consists of extended and revised versions of articles presented at the XV Ibero-American Conference on Software Engineering (CIbSE 2012) and the IX Experimental Software Engineering Latin American ...
Luca Cernuzzi   +2 more
doaj   +1 more source

Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]

open access: yes, 2011
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core   +1 more source

Home - About - Disclaimer - Privacy