Results for ' Software'

455 found
Order:
  1. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  2. The Software of Existence – The Infinity of Information.Peter Newzella - 2025 - Medium.
    Key Statements -/- A new definition of consciousness. Consciousness is the minimal capacity to detect = feel (a) difference(s), whether in environmental conditions or internal states. -/- Reality is posited as an infinite, one-dimensional sequence of informational states, fraying into fractal complexity. This continuum has no origin in time, no final endpoint, and no external boundary. -/- Localized “Islands of Meaning”: Not all configurations appear comprehensible to us. Certain stable pockets yield phenomena that we interpret as consistent physical laws, living (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  4. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Werner Ceusters, Barry Smith & James Matthew Fielding, Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  6.  41
    Securing Software-Defined Networks: Threat Detection and Mitigation Strategies in Programmable Infrastructure.Parsons Nate - 2019 - International Journal of Advanced Research in Education and Technology 6 (1):31-34.
    As Software-Defined Networking (SDN) gained traction in 2018, its separation of the control and data planes introduced both architectural flexibility and new security challenges. This research investigates the attack vectors specific to SDN environments—such as controller hijacking, flow rule manipulation, and DoS targeting centralized control. The study evaluates threat detection techniques including flow anomaly analysis, policy validation, and controller redundancy. It also proposes a hybrid intrusion prevention model that combines machine learning with rule-based policies for real-time mitigation. Using a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Can’t Software Malfunction?Jeroen de Haas & Wybo Houkes - 2025 - Metaphysics 9 (1):1-15.
    Digital artifacts often fail to perform as expected. It has recently been argued that this should not be analyzed as software malfunctioning. Rather, every case that is not the result of hardware failures would be due to design errors. This claim, which hinges on the notion of ‘implementation’, highlights a potential fundamental difference between software and other technical artifacts. It also implies that software engineers have more extensive responsibilities than creators of other artifacts. After reconstructing the argument, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder, Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. A Dynamic Software Certification and Verification Procedure.Julio Michael Stern & Carlos Alberto de Braganca Pereira - 1998 - SCI’99 Proceedings 2:426-435.
    in Oct-14-1998 ordinance INDESP-IO4 established the federal software certification and verification requirements for gaming machines in Brazil. The authors present the rationale behind these criteria, whose basic principles can find applications in several other software authentication applications.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Tableau Software: Vizualizarea și analiza datelor.Nicolae Sfetcu - 2023 - It and C 2 (3):36-42.
    În prezent, datele sunt generate peste tot, precum YouTube, Tumblr, Reddit, Facebook, WhatsApp FacebookNS, Twitter, Instagram, Gmail, LinkedIn și Academia. Înțelegerea acestor date este foarte importantă, deoarece aceasta este o entitate crucială și foarte importantă a unei organizații, națiuni și instituții. Analiza și vizualizările seturilor de date pot oferi noi tendințe în afaceri, politică, sau intelligence, pot preveni bolile și pot modela pentru a prognoza paradigmele viitoare și a combate criminalitatea, și așa mai departe. În acest moment, cel mai utilizat (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Using Argument Diagramming Software in the Classroom.Maralee Harrell - 2005 - Teaching Philosophy 28 (2):163-177.
    Many undergraduates, philosophy majors included, read philosophical texts similar to the way they read stories. One method for teaching students how to discern the argumentative structure of a philosophy text is through argument diagrams (text boxes used to represent claims with arrows and lines used to represent connections between these claims). This paper provides criteria for an ideal argument diagramming software and then reviews the strengths and weaknesses of such software currently available, e.g. Araucaria, Argutect, Athena Standard, Inspiration, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  13. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  82
    Advancing Software Quality: The Power of Predictive Metrics and Data-Driven QA Strategies.Pareek Chandra Shekhar - 2020 - International Journal of Innovative Research and Creative Technology 6 (6):1-12.
    In the dynamic landscape of modern software development, the integration of Quality Assurance (QA) with advanced analytics and metrics is redefining the paradigms of software quality engineering. This paper delves into the strategic role of QA metrics and analytics in enabling data driven decisions, which foster a proactive and predictive approach to quality management. Traditional QA processes, often plagued by subjective assessments and reactive defect handling, are being replaced by evidence-based frameworks that utilize cutting-edge technologies such as machine (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Plagiarism Software is a Creator or Destroyer for Effective Writing.A. Subaveerapandiyan - 2022 - DESIDOC Journal of Library and Information Technology 42 (2): 114-118.
    Plagiarism is malpractice, the fabrication of others’ “ideas or work” published without the proper permission or citation of the original contributors. Plagiarism is detected through different software, i.e., Turnitin, before publishing any research data. The present survey study assesses whether academicians, researchers, and scholars around the world perceive this software as a creator or destroyer of new thoughts and ideas. A survey of this research data was conducted with academicians, researchers, and scholars around the globe. The number of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  55
    Software Behaviour Prediction Utilizing MultiLabel Classification and Long Short-Term Memory Networks.R. Swetha Palla Siva, Sanapathi Sai Sameera, Kalagarla Dileep Kumar, Madagala Nava Bulli Sai Ganesh, Mittireddi Dhananjaya Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    Program behaviour prediction is essential for confirming program attributes and guaranteeing system dependability. The interleaving of execution pathways caused by features like concurrency and resource restrictions makes it especially difficult to understand the behaviour of large software systems. As a result, it might be quite difficult to predict how such software would behave. We provide a Software Behaviour Prediction (SBP) model that fully captures and precisely forecasts software behaviour to overcome this difficulty. The SBP model increases (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Download  
     
    Export citation  
     
    Bookmark   41 citations  
  20. A Comprehensive Review of Software Design Patterns: Applications and Future Direction.Srinivas Chippagiri - 2025 - The Review of Contemporary Scientific and Academic Studies 5 (02):1-12.
    Software design patterns have become integral to modern software engineering, offering reusable solutions to common design challenges. These patterns simplify development, promote scalability, and improve system maintainability by providing established frameworks for solving recurring problems. This paper presents a comprehensive review of recent advancements in software design patterns, covering research published between 2018 and 2024. It examines the classification of design patterns into creational, structural, and behavioral categories, highlighting their applications in emerging technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  39
    Software Development Strategies for Multi-Regional Applications.Baladari Venkata - 2022 - European Journal of Advances in Engineering and Technology 9 (3):193-200.
    Deploying applications across multiple cloud regions boosts availability, disaster recovery, and user experience but raises complexities including data synchronization, network optimization, security, and cost management. This research examines the responsibilities of software developers in designing and overseeing multi-region cloud-based applications. The main goal is to identify and examine the essential factors and most effective methods that developers should adhere to when constructing reliable, expandable, and high-performance cloud-based applications, approaches to tackle these complexities, such as Infrastructure as Code (IaC) for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  6
    Software Development Strategies for Multi-Regional Applications.Baladari Venkata - 2022 - European Journal of Advances in Engineering and Technology 9 (3):193-200.
    Deploying applications across multiple cloud regions boosts availability, disaster recovery, and user experience but raises complexities including data synchronization, network optimization, security, and cost management. This research examines the responsibilities of software developers in designing and overseeing multi-region cloud-based applications. The main goal is to identify and examine the essential factors and most effective methods that developers should adhere to when constructing reliable, expandable, and high-performance cloud-based applications, approaches to tackle these complexities, such as Infrastructure as Code (IaC) for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The mind as the software of the brain.Ned Block - 1990 - In Daniel N. Osherson & Edward E. Smith, An Invitation to Cognitive Science: Visual cognition. 2. MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Download  
     
    Export citation  
     
    Bookmark   62 citations  
  28. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  44
    AI in Software Development: Enhancing Efficiency with Intelligent Automation.Santosh Panendra Bandaru - 2022 - International Journal of Scientific Research in Science, Engineering and Technology 9 (2).
    The integration of Artificial Intelligence (AI) into software development has transformed traditional methodologies, making development cycles more efficient and reducing manual intervention. AI-driven tools and techniques enhance various stages of the Software Development Lifecycle (SDLC), from requirement analysis to deployment and maintenance. This paper explores the role of AI in automating software engineering tasks, discusses the impact of intelligent automation on efficiency, and presents real-world applications and future research directions.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Introduction to Develop Some Software Programs for Dealing with Neutrosophic Sets.A. Salama, Haitham A. El-Ghareeb, Ayman M. Manie & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 3:51-52.
    In this paper, we have developed an Excel package to be utilized for calculating neutrosophic data and analyze them. The use of object oriented programming techniques and concepts as they may apply to the design and development a new framework to implement neutrosophic data operations, the c# programming language, NET Framework and Microsoft Visual Studio are used to implement the neutrosophic classes. We have used Excel as it is a powerful tool that is widely accepted and used for statistical analysis. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Ciencia de la computación y filosofía: unidades de análisis del software.Juan Manuel Durán - 2018 - Principia 22 (2):203-227.
    Una imagen muy generalizada a la hora de entender el software de computador es la que lo representa como una “caja negra”: no importa realmente saber qué partes lo componen internamente, sino qué resultados se obtienen de él según ciertos valores de entrada. Al hacer esto, muchos problemas filosóficos son ocultados, negados o simplemente mal entendidos. Este artículo discute tres unidades de análisis del software de computador, esto es, las especificaciones, los algoritmos y los procesos computacionales. El objetivo (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  72
    Software Testing Automation: Tools, Techniques, and Best Practices.Mohammed Nguyen Van An Tra, Al-Fulan Saeed Ibrahim - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    Generative AI has revolutionized the field of artificial intelligence by enabling machines to create new, original content across various modalities, including text, images, and audio. Two prominent architectures driving this transformation are Transformer-based models and Diffusion models. Transformers, introduced in the 2017 paper "Attention Is All You Need," leverage self-attention mechanisms to process sequential data efficiently, leading to significant advancements in natural language processing tasks. Diffusion models, on the other hand, employ a probabilistic approach to generate data by gradually denoising (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Preconceptual Modeling in Software Engineering: Metaphysics of Diagrammatic Representations.Sabah Al-Fedaghi - manuscript
    Conceptual modeling of a portion of the world is a necessary prerequisite to set the stage and define software system boundaries. In this context, one of the challenges is to provide a unified framework to create a comprehensive representation of the targeted domain. According to many researchers, conceptual model (CM) development is a hard task, and system requirements are difficult to collect, causing many miscommunication problems. Accordingly, CMs require more than modeling ability alone: they first require an understanding of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed using manual (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  54
    Model-Driven Engineering: Enhancing Software Design and Code Generation.Gharat Tejas Nitin - 2025 - International Journal of Computer Technology and Electronics Communication 8 (1).
    Model-Driven Engineering (MDE) is a modern approach to software development that emphasizes the use of models as primary artifacts in the software design and development process. In MDE, models represent abstract versions of systems, serving as blueprints that can be automatically transformed into working code. This approach seeks to enhance software design, reduce the complexity of code generation, and improve maintainability. By focusing on high-level abstractions, MDE enables developers to design software systems more efficiently, automate repetitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Analysis on GenAI for Source Code Scanning and Automated Software Testing.Girish Wali Praveen Sivathapandi - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):631-638.
    The fundamental purpose of software testing is to develop new test case sets that demonstrate the software product's deficiencies. Upon preparation of the test cases, the Test Oracle delineates the expected program behavior for each scenario. The application's correct functioning and its properties will be assessed by prioritizing test cases and running its components, which delineate inputs, actions, and outputs. The prioritization methods include initial ordering, random ordering, and reverse ranking based on fault detection capabilities. software application (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  41
    ETHICS IN AI DEVELOPMENT: SOFTWARE ENGINEERS AS GATEKEEPERS OF AI DECISION-MAKING THROUGH RULES AND DATA.Baladari Venkata - 2025 - INTERNATIONAL JOURNAL OF CORE ENGINEERING and MANAGEMENT 8 (1):63-79.
    Artificial Intelligence (AI) systems are heavily dependent on the knowledge of software developers for creating rules, managing data, and organizing algorithms. This paper examines the crucial impact that software engineers have on the development of AI decision-making processes through the creation of rules, pre-processing of training data, and implementation of frameworks that ultimately affect model behavior. This research focuses on the effects of human-designed logic on the performance, fairness, and understandability of artificial intelligence, highlighting the interaction between automated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  83
    Advancements in Cloud-Based Software Testing: Trends and Tools.Robinson Xander Noah - 2024 - International Journal of Computer Technology and Electronics Communication 7 (2).
    The rapid adoption of cloud computing has transformed how software development and testing are conducted, leading to the emergence of cloud-based software testing as a vital area in software engineering. Cloudbased testing enables scalable, flexible, and cost-efficient testing environments without the need for extensive physical infrastructure. This paper explores the recent advancements in cloud-based software testing, highlighting emerging trends, innovative tools, and best practices. We analyze how cloud services support various types of testing, including functional, performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  42
    SMART PAYMENT SECURITY: A SOFTWARE DEVELOPER's ROLE IN PREVENTING FRAUD AND DATA BREACHES.Baladari Venkata - 2020 - INTERNATIONAL JOURNAL OF CORE ENGINEERING and MANAGEMENT 6 (9):165-175.
    Smart payment systems are increasingly vulnerable to security threats such as fraud and data breaches, necessitating effective protection measures. This study proposes a framework for software developers to boost transaction security via encryption, multi-factor authentication (MFA), secure API practices, and fraud prevention methods. The system also ensures adherence to requirements such as PCI DSS, GDPR, and PSD2, incorporating secure coding practices, DevSecOps, and real-time monitoring to mitigate potential risks. Through real-world examples and applied solutions, the research assesses the security (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Good and Evil as Softwares of the Brain: On Psychological ‘Immediates’ Underlying the Metaphysical ‘Ultimates’. A contribution from Cognitive Social Psychology and Semantic Differential Research.Guido Peeters - 1986 - Ultimate Reality and Meaning 9 (3):210-231.
    Download  
     
    Export citation  
     
    Bookmark  
  41.  43
    The Role of Software Developers in Transitioning On-Premises Applications to Cloud Platforms.Baladari Venkata - 2021 - Journal of Scientific and Engineering Research 8 (1):270-278.
    The transition to cloud-based infrastructure from traditional on-site systems is now a vital component of contemporary software development, facilitating scalability, cost-effectiveness, and improved system dependability. In this migration process, software developers have a crucial part to play, necessitating a blend of technical expertise, strategic planning, and adherence to best practices to achieve a smooth transition. This research article examines the duties of software developers involved in cloud migration, encompassing application refactoring, security upgrades, performance improvement, and regulatory compliance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. A Study of Obstacles in Plagiarism Software Subscribing by Colleges in Tamil Nadu.A. Subaveerapandiyan & N. Sakthivel - 2022 - DESIDOC Journal of Library and Information Technology 42 (5):318-324.
    This article attempts to comprehend the current issues and hurdles that Indian colleges affiliated with Tamil Nadu State Universities encounter when trying to subscribe to a software that detects plagiarism. The study’s goals are to determine whether colleges employ anti-plagiarism software, whether they ensure that their student-given assignments are free of copyright infringement, whether tutors teach about academic misconduct, and what people seem to think of anti-plagiarism software. We surveyed for this study and distributed the questionnaires among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process forming (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector).Bogusław Plawgo, Anna Grabska, Magdalena Klimczuk-Kochańska, Andrzej Klimczuk, Jacek Kierklo & Justyna Żynel-Etel - 2011
    More Info: B. Plawgo, A. Grabska, M. Klimczuk-Kochańska, A. Klimczuk, J. Kierklo, J. Żynel-Etel, Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector), Wojewódzki Urząd Pracy w Białymstoku, Białystok 2011.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. Agile vs. Waterfall: A Comprehensive Analysis of Software Testing Methodo.Pareek Chandra Shekhar - 2019 - International Journal of Innovative Research and Creative Technology 5 (5):1-12.
    Software testing is an indispensable pillar in the software development lifecycle, guaranteeing the functionality, robustness, and security of applications. The two most predominant frameworks for executing software testing are the Traditional (Waterfall) model and the Agile paradigm. This paper delves into the core distinctions between these methodologies, focusing on their testing philosophies, workflows, and operational practices. By scrutinizing their defining characteristics, benefits, and constraints, this comparative analysis offers an in-depth exploration of how each methodology tackles quality assurance (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Improving Mathematics Achievement and Attitude of the Grade 10 Students Using Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS).Starr Clyde Sebial - 2017 - International Journal of Social Science and Humanities Research 5 (1):374-387.
    It has become a fact that fluency and competency in utilizing the advancement of technology, specifically the computer and the internet is one way that could help in facilitating learning in mathematics. This study investigated the effects of Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS) in teaching Mathematics. This was conducted in Zamboanga del Sur National High School (ZSNHS) during the third grading period of the school year 2015-2016. The study compared the achievement and attitude towards Mathematics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  44
    Enhancing Edge Network Efficiency through Software-Defined Networking and NFV Integration.Tran Kenny - 2020 - International Journal of Advanced Research in Education and Technology 7 (1):1606-1608.
    The proliferation of IoT devices and the emergence of latency-sensitive applications in 2019 accelerated the demand for edge computing architectures. To meet these demands, network infrastructure began shifting away from centralized data centers toward distributed, programmable edge nodes. This research explores how the integration of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) can optimize edge network performance. The paper analyzes architectural models that enable dynamic routing, load balancing, and traffic prioritization at the edge. It also evaluates security and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Digital Democracy: Episode IV—A New Hope*: How a Corporation for Public Software Could Transform Digital Engagement for Government and Civil Society.John Gastil & Todd Davies - 2020 - Digital Government: Research and Practice (DGOV) 1 (1):Article No. 6 (15 pages).
    Although successive generations of digital technology have become increasingly powerful in the past 20 years, digital democracy has yet to realize its potential for deliberative transformation. The undemocratic exploitation of massive social media systems continued this trend, but it only worsened an existing problem of modern democracies, which were already struggling to develop deliberative infrastructure independent of digital technologies. There have been many creative conceptions of civic tech, but implementation has lagged behind innovation. This article argues for implementing one such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller, Computing and philosophy: Selected papers from IACAP 2014. Cham: pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  97
    Exploring the Role of Large Language Models in Automated Code Review and Software Quality Enhancement.Kathiresan Gopinath - 2023 - International Journal of Innovative Research in Science Engineering and Technology 12 (9):11428-11438.
    As the newest, most savvy technology domain, Large Language Models (LLMs) are the technological force which is now revolutionizing Automated Code Review and Software Quality Assurance, making the context aware analysis, adaptive learning, and the intelligent recommendations. However, traditional code review methods are not only time consuming, but also prone to human error and are not scalable. The use of LLMs in software engineering allows for the detection of defects, optimization of performance and the maintenance of improve mental (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 455