Visualizing software refactoring using radar charts

AR Al-Ghuwairi, D Al-Fraihat, Y Sharrab, H Alrashidi… - Scientific Reports, 2023 - nature.com
Refactoring tools have advanced greatly and are being used in many large projects. As a
result, a great deal of information is now available about past refactoring and its effects on …

[PDF][PDF] Handling of man-in-the-middle attack in wsn through intrusion detection system

H Mohapatra, S Rath, S Panda, R Kumar - International journal, 2020 - researchgate.net
The wireless sensor network (WSN) is one the most convenient and easily adoptable ad-hoc
technique for data transmission. With many flexibilities of WSN there are many loop holes …

Externalities of lean implementation in medical laboratories. Process optimization vs. adaptation and flexibility for the future

SA Apostu, V Vasile, C Veres - International Journal of Environmental …, 2021 - mdpi.com
Important in testing services in medical laboratories is the creation of a flexible balance
between quality-response time and minimizing the cost of the service. Beyond the different …

Smart phone based monitoring of agricultural activities

J Fang - Computational algorithms and numerical dimensions, 2022 - journal-cand.com
This review also looks at the various environmental characteristics that can be used to
achieve precision agriculture, such as irrigation, monitoring, soil qualities, and temp …

Content based movie recommendation system

N Pradeep, KK Rao Mangalore, B Rajpal… - International journal of …, 2020 - riejournal.com
Recommendation based systems can be used for recommending different web page, books,
restaurants, tv shows, movies etc. The aim of movie recommendation system is to …

Utilizing machine learning algorithms for task allocation in distributed agile software development

D Al-Fraihat, Y Sharrab, AR Al-Ghuwairi, H Alzabut… - Heliyon, 2024 - cell.com
Distributed agile software development (DASD) has become a prominent software
development approach. Proper task allocation is crucial in DASD to avoid undesirable …

Frontal and non-frontal face detection using deep neural networks (DNN)

N Prasad, B Rajpal, KK R Mangalore… - International Journal of …, 2021 - riejournal.com
Face recognition has always been one of the most searched and popular applications of
object detection, starting from the early seventies. Facial recognition is used for access …

PassionNet: An Innovative Framework for Duplicate and Conflicting Requirements Identification

S Saleem, MN Asim, A Dengel - arXiv preprint arXiv:2412.01657, 2024 - arxiv.org
Early detection and resolution of duplicate and conflicting requirements can significantly
enhance project efficiency and overall software quality. Researchers have developed …

Smart bus ticketing system through IoT enabled technology

A Kumar, ACF Thomaz - Big data and computing visions, 2022 - bidacv.com
This project is concerned with using a digital rather than a manual approach to providing
bus passes. The major goal of this technology is to digitally manufacture bus passes and …

Role of wireless sensor network in precision agriculture

H Alqahtani - Computational algorithms and numerical …, 2022 - journal-cand.com
In Agricultural Fields there are different climate conditions, greenhouses parameters are
important to monitored regulate the crop production, and we would like to make a …