Results for 'Plagiarism software subscription'

404 found
Order:
  1. A Study of Obstacles in Plagiarism Software Subscribing by Colleges in Tamil Nadu.A. Subaveerapandiyan & N. Sakthivel - 2022 - DESIDOC Journal of Library and Information Technology 42 (5):318-324.
    This article attempts to comprehend the current issues and hurdles that Indian colleges affiliated with Tamil Nadu State Universities encounter when trying to subscribe to a software that detects plagiarism. The study’s goals are to determine whether colleges employ anti-plagiarism software, whether they ensure that their student-given assignments are free of copyright infringement, whether tutors teach about academic misconduct, and what people seem to think of anti-plagiarism software. We surveyed for this study and distributed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Plagiarism Software is a Creator or Destroyer for Effective Writing.A. Subaveerapandiyan - 2022 - DESIDOC Journal of Library and Information Technology 42 (2): 114-118.
    Plagiarism is malpractice, the fabrication of others’ “ideas or work” published without the proper permission or citation of the original contributors. Plagiarism is detected through different software, i.e., Turnitin, before publishing any research data. The present survey study assesses whether academicians, researchers, and scholars around the world perceive this software as a creator or destroyer of new thoughts and ideas. A survey of this research data was conducted with academicians, researchers, and scholars around the globe. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Plagiarism in the age of massive Generative Pre-trained Transformers (GPT-3).Nassim Dehouche - 2021 - Ethics in Science and Environmental Politics 21:17-23.
    As if 2020 were not a peculiar enough year, its fifth month has seen the relatively quiet publication of a preprint describing the most powerful Natural Language Processing (NLP) system to date, GPT-3 (Generative Pre-trained Transformer-3), by Silicon Valley research firm OpenAI. Though the software implementation of GPT-3 is still in its initial Beta release phase, and its full capabilities are still unknown as of the time of this writing, it has been shown that this Artificial Intelligence can comprehend (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Awareness of Plagiarism among Student Teachers of Indian Teacher Educational Institutions.Subaveerapandiyan A. & R. Nandhakumar - 2023 - Indian Journal of Educational Technology 5 (2):44-54.
    Today, the Internet is a rich source of study materials, and Google Scholar offers free access to a large number of scientific articles. There are excellent research publications available in many more databases. Students have the option of easily copying the material. Reusing, paraphrasing, patchwriting, and ghostwriting without citing the original documents are plagiarism. Plagiarism is increasing in academics, particularly in research. This study aims to study the awareness of plagiarism and to analyze the reasons for (...). The study samples are the student teachers in India. For this study, we used a survey method, and the author prepared a questionnaire to collect data from the student teachers. Study respondents are the student teachers of the Regional Institute of Education Mysore; Purposive sampling was used to select samples. The total number of study respondents is 207. The findings of the study revealed that over 70 per cent of respondents mentioned reasons for plagiarism as lack of relevant literature studying, lack of preparation and time, difficulty checking every piece of work, do not know the manual citation style, lack of knowledge about bibliographic management software and also they stated that getting easily available materials on the internet is also a reason for plagiarism. The study recommends that teachers teach or conduct awareness programs on plagiarism, avoiding plagiarism, citation style, and software. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  6. CONTRACT CHEATING IN ISRAEL DURING THE COVID-19 PANDEMIC.Yovav Eshet - 2022 - European Conference on Academic Integrity and Plagiarism 2022.
    Academic integrity is an essential pillar of any educational system. It is defined as acting in a manner consistent with the values and accepted standards of ethical practices in teaching, learning, and scholarship (Fishman, 2015). Contract cheating, or ghostwriting, is currently one of the most severe violations of academic integrity. It involves students engaging a third party, usually an online essay writing service, to complete their academic works on their behalf (Draper et al., 2021). Some of these services offer pre-written (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. The Effect of Total Quality Management in Achieving the Requirements of Quality of Career among University Colleges Employees.Abdalqader A. Msallam, Amal A. Al Hila, Samy S. Abu Naser & Mazen J. Al Shobaki - 2020 - International Journal of Academic Management Science Research (IJAMSR) 4 (10):45-65.
    The study aimed to identify the effect of Total Quality Management in achieving the requirements of the quality of job life among university college employees, and the researchers used the descriptive and analytical approach, and used a main tool to collect information, which is: the questionnaire. The study population reached (596) academic and administrative employees distributed among (5) University colleges in Gaza Strip, and a stratified random sample of (240) employees was selected, approximately (40.3%) of the study population. SPSS (...) was used to analyze the data. The study concluded that the application of the requirements of total quality management in university colleges in Gaza Strip is appropriate in general in terms of: (the commitment of the top management to total quality management, organizational structure, management with facts, focus on beneficiaries, staff empowerment, and continuous improvement). The sample on the dimensions of total quality management with a relative weight is (69.93%). And that the elements of job quality in university colleges in Gaza Strip are generally adequate in terms of: (moral working conditions, wages and rewards, participation in decision-making, handling of complaints and grievances, benefits provided to employees), where the response of the sample respondents was about the dimensions of job quality with a relative weight (63.30%), and the existence of a strong positive relationship between Total Quality Management in university colleges in Gaza Strip. And that there is a statistically significant effect of the variables of comprehensive quality management and quality of career in university colleges in Gaza Strip at a significance level (α = 0.05). And that the dimensions of total quality management most influencing the dimensions of job quality are: (empowering employees; continuous improvement; focusing on beneficiaries; managing with facts). The absence of differences between the answers of the sample members about the impact of Total Quality Management in achieving the requirements of the quality of the job life of the employees in university colleges due to the variable (academic qualification, years of service). And the existence of differences attributed to a variable (gender in favor of the male category, the college in favor of the university college of applied sciences category, and the nature of work attributed to an academic category with an administrative position). Among the most important recommendations of the study is the necessity for university colleges to be keen on: (achieving job satisfaction, employee participation when setting regulations and policies and making important decisions, adhering to scientific research requirements and encouraging scientific achievements and career creativity among employees, while providing material and moral facilities for scientific research and development, developing mechanisms and patterns of electronic work). University colleges must provide benefits to employees such as: (providing health care, organizing leisure trips, contributing to solving economic problems, providing club subscriptions). And the necessity for university colleges to pay attention to handling complaints and grievances through: (Assigning an efficient and competent committee to handle complaints and grievances in all fairness and transparency, adopting and following up the results of the application of handling complaints and grievances, protecting complainants from any arbitrary action against them). And the need for the Ministry of Education and Higher Education to develop the evaluation role of the National Authority for Accreditation, Quality and Quality of Higher Education Institutions to evaluate the performance of university colleges, to ensure the application of academic and administrative quality standards in colleges, and to seek the help of quality and excellence experts in evaluating the application of Total Quality Management in the academic and administrative f ield in accordance with regional performance standards And global. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Subscript View: A Distinct View of Distinct Selves.Hannah Tierney - 2020 - In Joshua Knobe & Shaun Nichols (eds.), The Oxford Studies in Experimental Philosophy. Oxford University Press. pp. 126-323.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  11. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Plagiarism in the Sacred Sciences.Michael V. Dougherty - 2020 - Philosophy and Theology 32 (1-2):27-61.
    This article diagnoses the problem of plagiarism in academic books and articles in the disciplines of philosophy and theology. It identifies three impediments to institutional reform. They are: (1) a misplaced desire to preserve personal and institutional reputations; (2) a failure to recognize that attribution in academic writing admits of degrees; and (3) a disproportionate emphasis on the socalled “intention to plagiarize.” A detailed case study provides an illustration of the need for institutional reform in the post-publication processes in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  49
    Avoiding Plagiarism In Academic Genres.Zukhra Turayeva - 2024 - American Journal of Language, Literacy and Learning in Stem Education 2 (2):92-93.
    EAP course teaches how the program concerns and provides us with a valuable way of organizing our thinking about conceptual disciplinary within the particular community. The area of EAP is referred with genres. The process of writing academically requires creating a text where the writer takes it for granted the reader is about to recognize. To group texts together, writers utilize language in order to respond to recurring situations and this case is +represented with the term genre.
    Download  
     
    Export citation  
     
    Bookmark  
  14. Ctrl C + Ctrl V: Plagiarism and Knowledge on Referencing and Citation among Pre-service Teachers.Jupeth Pentang & Ronalyn M. Bautista - 2022 - International Journal of Multidisciplinary: Applied Business and Education Research 3 (2):245-257.
    Issues on plagiarism among pre-service teachers (PSTs) have increased in modular and online learning. To confirm this, the study determined the PSTs’ level of awareness on plagiarism; their knowledge on referencing and citation; and the correlation between their level of awareness on plagiarism and knowledge on referencing and citation, with their academic performance. The study employed a descriptive-correlational research design participated by 235 PSTs randomly sampled through strata. The data were gathered through a web-based survey. Results showed (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  16. LinkSuite™: Software Tools for Formally Robust Ontology-Based Data and Information Integration.Werner Ceusters, Barry Smith & James Matthew Fielding - 2004 - In Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics, 2994). Springer. pp. 1-16.
    The integration of information resources in the life sciences is one of the most challenging problems facing bioinformatics today. We describe how Language and Computing nv, originally a developer of ontology-based natural language understanding systems for the healthcare domain, is developing a framework for the integration of structured data with unstructured information contained in natural language texts. L&C’s LinkSuite™ combines the flexibility of a modular software architecture with an ontology based on rigorous philosophical and logical principles that is designed (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. A Dynamic Software Certification and Verification Procedure.Julio Michael Stern & Carlos Alberto de Braganca Pereira - 1998 - SCI’99 Proceedings 2:426-435.
    in Oct-14-1998 ordinance INDESP-IO4 established the federal software certification and verification requirements for gaming machines in Brazil. The authors present the rationale behind these criteria, whose basic principles can find applications in several other software authentication applications.
    Download  
     
    Export citation  
     
    Bookmark  
  19. From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. The Use and Plagiarism of Descartes’s Traité de l’homme by Henricus Regius: A Reassessment.Andrea Strazzoni - 2023 - Perspectives on Science 31 (5):627-683.
    In this article I discuss a particular aspect of the Dutch reception of the ideas of René Descartes, namely the use of his Traité de l’homme by Henricus Regius. I analyze the use that Regius made of the theory of the movement of muscles, passions, hunger, and more generally of the neurophysiology expounded by Descartes in his book (not printed until 1662–1664). In my analysis, I reconstruct the internal evolution of Regius’s neurophysiology, I illustrate its sources beyond Descartes (i.e., Jean (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  96
    Retribution of Plagiarism Founded on Reason-based Actions.Ignace Haaz - 2021 - In Ike Obiora F., Mbae Justus, Onyia Chidiebere & Makinda Herbert (eds.), Mainstreaming Ethics in Higher Education The Teacher: Between Knowledge Transmission and Human Formation Vol. 2, Obiora Ike / Justus Mbae / Chidiebere Onyia / Herbert Makinda (Eds.). Globethics. pp. 135-162.
    This chapter as the whole book are a result of a Globethics conference in March 2018 at the Catholic University of East Africa (CUEA) in Kenya, focused on the integration of Ethics in Higher Education. The book captures the potential for sharing of knowledge, and triggering interdisciplinary collaboration and research across a wide variety of issues ranging from research practice, religion, entrepreneurship, leadership, fundraising and corruption. While some of the chapters focus on the understanding of ethics and its relationship with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  99
    Introduction to Develop Some Software Programs for Dealing with Neutrosophic Sets.A. Salama, Haitham A. El-Ghareeb, Ayman M. Manie & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 3:51-52.
    In this paper, we have developed an Excel package to be utilized for calculating neutrosophic data and analyze them. The use of object oriented programming techniques and concepts as they may apply to the design and development a new framework to implement neutrosophic data operations, the c# programming language, NET Framework and Microsoft Visual Studio are used to implement the neutrosophic classes. We have used Excel as it is a powerful tool that is widely accepted and used for statistical analysis. (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  24. Using Argument Diagramming Software in the Classroom.Maralee Harrell - 2005 - Teaching Philosophy 28 (2):163-177.
    Many undergraduates, philosophy majors included, read philosophical texts similar to the way they read stories. One method for teaching students how to discern the argumentative structure of a philosophy text is through argument diagrams (text boxes used to represent claims with arrows and lines used to represent connections between these claims). This paper provides criteria for an ideal argument diagramming software and then reviews the strengths and weaknesses of such software currently available, e.g. Araucaria, Argutect, Athena Standard, Inspiration, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  25. The mind as the software of the brain.Ned Block - 1995 - In Daniel N. Osherson, Lila Gleitman, Stephen M. Kosslyn, S. Smith & Saadya Sternberg (eds.), An Invitation to Cognitive Science, Second Edition, Volume 3. Cambridge MA: MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Download  
     
    Export citation  
     
    Bookmark   59 citations  
  26. “How did researchers get it so wrong?” The acute problem of plagiarism in Vietnamese social sciences and humanities.Quan-Hoang Vuong - 2018 - European Science Editing 44 (3):56-58.
    This paper presents three cases of research ethics violations in the social sciences and humanities that involved major educational institutions in Vietnam. The violations share two common points: the use of sophistry by the accused perpetrators and their sympathisers, and the relative ease with which they succeeded unpunished. The strategies the violators used to avoid punishment could be summarised as: (i) relying on people not paying enough attention when asked to do something relatively quickly, (ii) asking for the benefit of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. An Attribution Theory Lens on Plagiarism: Examining the Beliefs of Preservice Teachers.Lauren Goegan & Lia Daniels - 2023 - Canadian Perspectives on Academic Integrity 6 (2):1-21.
    Academic misconduct is a prominent issue at postsecondary institutions. This issue includes the act of plagiarism, which has received considerable attention on campuses. There is a growing body of research examining why students engage in plagiarism, and what they know about plagiarism, but little of this research is guided by a theoretical framework. Although all students may be tempted to plagiarize, students in teacher education programs represent a unique population because they are concerned with developing their own (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  30. Intention Involvement in the Nature of Plagiarism.Hossein Atrak - 2019 - International Journal of Ethics and Society (IJES) 2 (1):1-7.
    Background: This article addressed one of the issues of research ethics that is called the nature of plagiarism coupled with involvement of intention. By definition, plagiarism is the attribution of others’ works to one’s own. This may be done intentionally and/or unintentionally. Some researchers believe that intention is not involved in the nature of plagiarism and an author who forgets to make references to the used sources has committed plagiarism since this forgetfulness has led to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Why are Software Patents so Elusive? A Platonic Approach.Odin Kroeger - 2011 - Masaryk University Journal of Law and Technology 5 (1):57-70.
    Software patents are commonly criticised for being fuzzy, context-sensitive, and often granted for trivial inventions. More often than not, these shortcomings are said to be caused by the abstract nature of software - with little further analysis offered. Drawing on Plato’s Parmenides, this paper will argue (1) that the reason why software patents seem to be elusive is that patent law suggests to think about algorithms as paradigmatic examples and (2) that Plato’s distinction between two modes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Epistemic issues in computational reproducibility: software as the elephant in the room.Alexandre Hocquet & Frédéric Wieber - 2021 - European Journal for Philosophy of Science 11 (2):1-20.
    Computational reproducibility possesses its own dynamics and narratives of crisis. Alongside the difficulties of computing as an ubiquitous yet complex scientific activity, computational reproducibility suffers from a naive expectancy of total reproducibility and a moral imperative to embrace the principles of free software as a non-negotiable epistemic virtue. We argue that the epistemic issues at stake in actual practices of computational reproducibility are best unveiled by focusing on software as a pivotal concept, one that is surprisingly often overlooked (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. SP2MN: a Software Process Meta-Modeling Language.Hisham Khdair - 2015 - International Review on Computers and Software 10 (7):726-734.
    In the last two decades, software process modeling has been an area of interest within both academia and industry. Software process modeling aims at defining and representing software processes in the form of models. A software process model represents the medium that allows better understanding, management and control of the software process. Software process metamodeling rather, provides standard metamodels which enable the defining of customized software process models for a specific project in hand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Logical thinking education to combat plagiarism.Wai Ling Lai & Chad Nilep - 2014 - Gengo bunka ronshu 36 (1):179-193.
    Plagiarism, which Indiana University’s Writing Tutorial Service defines as "using others' ideas and words without clearly acknowledging the source of that information", is often described as a major problem. However, standard definitions such as this one suggest only limited solutions to the problem: acknowledging sources or forbidding reuse. Since all scholarship involves engaging with the ideas of others and academic writing tends to reuse certain expressions, these solutions – though important – are of limited utility. This paper examines a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Ciencia de la computación y filosofía: unidades de análisis del software.Juan Manuel Durán - 2018 - Principia 22 (2):203-227.
    Una imagen muy generalizada a la hora de entender el software de computador es la que lo representa como una “caja negra”: no importa realmente saber qué partes lo componen internamente, sino qué resultados se obtienen de él según ciertos valores de entrada. Al hacer esto, muchos problemas filosóficos son ocultados, negados o simplemente mal entendidos. Este artículo discute tres unidades de análisis del software de computador, esto es, las especificaciones, los algoritmos y los procesos computacionales. El objetivo (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Academic Integrity: Understanding Essence of Undergraduates’ Plagiarism in Their Research Writing at a Southern Chinese University.Zhengyan Guo - 2022 - The 5Th World Conference on Research in Education.
    In China, plagiarism among undergraduate students has been a protuberant issue preventing the robust development of tertiary education. The purpose of this Interpretative Phenomenological Analysis (IPA) research was to acquire a profound understanding of the essence of the phenomenon through the process of students’ research writing at Shaoyang University (SYU), a southern Chinese University. Employing a step-wise combination of purposive and random sampling techniques, 11 participants were selected to partake in the study’s online, face-to-face, and one-on-one semi-structured interviews. On (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Good and evil as softwares of the brain, on psychological immediates underlying the metaphysical ultimates-a contribution from cognitive social-psychology and semantic differential research.Guido Peeters - 1986 - Ultimate Reality and Meaning 9 (3):210-231.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed using manual (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector).Bogusław Plawgo, Anna Grabska, Magdalena Klimczuk-Kochańska, Andrzej Klimczuk, Jacek Kierklo & Justyna Żynel-Etel - 2011 - Wojewódzki Urząd Pracy W Białymstoku.
    More Info: B. Plawgo, A. Grabska, M. Klimczuk-Kochańska, A. Klimczuk, J. Kierklo, J. Żynel-Etel, Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego (Podlasie economy starters. Analysis of economic growth and innovation areas of Podlaskie: software production sector), Wojewódzki Urząd Pracy w Białymstoku, Białystok 2011.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between physicality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping attacks in MANETs. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process forming (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Digital Democracy: Episode IV—A New Hope*: How a Corporation for Public Software Could Transform Digital Engagement for Government and Civil Society.John Gastil & Todd Davies - 2020 - Digital Government: Research and Practice (DGOV) 1 (1):Article No. 6 (15 pages).
    Although successive generations of digital technology have become increasingly powerful in the past 20 years, digital democracy has yet to realize its potential for deliberative transformation. The undemocratic exploitation of massive social media systems continued this trend, but it only worsened an existing problem of modern democracies, which were already struggling to develop deliberative infrastructure independent of digital technologies. There have been many creative conceptions of civic tech, but implementation has lagged behind innovation. This article argues for implementing one such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The need for a system view to regulate artificial intelligence/machine learning-based software as medical device.Sara Gerke, Boris Babic, Theodoros Evgeniou & I. Glenn Cohen - 2020 - Nature Digital Medicine 53 (3):1-4.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Improving Mathematics Achievement and Attitude of the Grade 10 Students Using Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS).Starr Clyde Sebial - 2017 - International Journal of Social Science and Humanities Research 5 (1):374-387.
    It has become a fact that fluency and competency in utilizing the advancement of technology, specifically the computer and the internet is one way that could help in facilitating learning in mathematics. This study investigated the effects of Dynamic Geometry Software (DGS) and Computer Algebra Systems (CAS) in teaching Mathematics. This was conducted in Zamboanga del Sur National High School (ZSNHS) during the third grading period of the school year 2015-2016. The study compared the achievement and attitude towards Mathematics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Halting problem proofs refuted on the basis of software engineering ?P. Olcott - manuscript
    This is an explanation of a possible new insight into the halting problem provided in the language of software engineering. Technical computer science terms are explained using software engineering terms. No knowledge of the halting problem is required. -/- It is based on fully operational software executed in the x86utm operating system. The x86utm operating system (based on an excellent open source x86 emulator) was created to study the details of the halting problem proof counter-examples at the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Startery Podlaskiej Gospodarki. Analiza Gospodarczych Obszarów Wzrostu I Innowacji Województwa Podlaskiego: Sektor Produkcji Oprogramowania Komputerowego (Podlasie Economy Starters. Analysis of Economic Growth and Innovation Areas of Podlaskie: Software P.Bogusław Plawgo, Anna Grabska, Magdalena Klimczuk-Kochańska, Andrzej Klimczuk, Jacek Kierklo & Justyna Żynel-Etel - 2011 - Wojewódzki Urz¸Ad Pracy W Białymstoku.
    B. Plawgo, A. Grabska, M. Klimczuk-Kochańska, A. Klimczuk, J. Kierklo, J. Żynel-Etel, Startery podlaskiej gospodarki. Analiza gospodarczych obszarów wzrostu i innowacji województwa podlaskiego: sektor produkcji oprogramowania komputerowego, Wojewódzki Urz¸ad Pracy w Białymstoku, Białystok 2011.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 404