scholarly journals Generations of Software Engineering

Author(s):  
Archit Gupta

Abstract: Software Engineering has grown and developed from the 1960’s till now a lot as our knowledge and understanding of software is increasing day-by-day due to which software is becoming increasingly reliable and cost effective. Previous research was not able to express clearly how software engineering transitioned, how new technologies and services for software came to be known and were started using in the world of software engineering, decade or year wise. I use data from different websites and research papers to tell how software engineering has evolved along with the years with details about what happened in particular years, with respect to the corresponding decades. There are also details about manifestos and the developers of computer languages. The findings indicate that the software engineering field is vast and is still far from being fully developed, in a world where we have hands on every technology possible and hence new software’s and services are coming out on a regular basis now.

2017 ◽  
Vol 5 (1) ◽  
Author(s):  
Ruchi Garg ◽  
Babita Prusty

Juvenile crime is a burning issue all over the world. The cases of juvenile offenders are increasing day by day this has made law and psychologist to critically look at the leading causes of these crimes. This paper discusses the role of psychological and social factors that influence juvenile delinquency. 35 pieces of literature have been reviewed which includes research papers, abstracts, articles, and reviews. It also focuses on how some studies contradict regarding the issue of juvenile crimes. Lastly, the review of the researches and abstracts, are explored and summarized here.


2018 ◽  
Vol 42 (3) ◽  
pp. 516-520
Author(s):  
Gabriela Aprigia Monteferrante ◽  
Maysa Mariana Cruz ◽  
Guilherme Mogadouro ◽  
Victoria de Oliveira Fantini ◽  
Patrícia Oliveira Castro ◽  
...  

Physiology teaching resources have advanced to include innovative pedagogical approaches that meet the learning expectations of the current generation of students, while at the same time ensuring content delivery is accurate and the use of technologies is appropriate. We developed a quick experimental assay protocol to introduce the basic concepts of cardiac rhythms, and to demonstrate simultaneously that smartphone applications are a reliable and cost-effective tool for data collection in teaching the scientific method and performing physiology activities. The cardiac rhythm dance (CRD) protocol engages students in dancing a cardiac cyclelike movement to the rhythm of classical, pop, and samba music, and measuring their own cardiac frequency. Students collected their own data using the app Instant Heart Rate (Azumio). The CRD protocol allowed students to conclude that cardiac cycle-like movements paced by a pop song could represent the normal cardiac rhythm, whereas a classical song induced a significant reduction of heart rate, and the samba song significantly increased heart rate compared with the pop song. After group discussion, students considered that the pop rhythm is more realistic of day-by-day movement rhythms and is equivalent to the steady state of daily cardiac rhythms. Students considered the bradycardic and tachycardic movements to the dancing performed to the classical and samba rhythms, respectively. Thus the CRD protocol provides a multiple sensory-based and active learning resource that can engage students in learning cardiovascular physiology and recognizes smartphones as scientific instruments for collecting data during hands-on activities.


2018 ◽  
Vol 42 (2) ◽  
pp. 340-342 ◽  
Author(s):  
Camilo Lellis-Santos ◽  
Patricia A. Halpin

Cost-effective student engagement poses a challenge for instructors, especially those who may not be familiar with new technologies and mobile devices. In this workshop, participants, experienced and discussed two ways of using smartphones in physiology classes: to engage in an online learning environment for discussions, and to make physiological measurements. Participants signed up for individual Twitter accounts and learned how to tweet, retweet, message, use a URL shortener, and use hashtags. They then went on to locate articles on an assigned topic from the Twitter accounts of credible science sources ( American Journal of Physiology, The Scientist, CDC.gov, WHO.int) and applied their Twitter skills to discuss the science topic of current interest. Additionally, participants shared their knowledge about the use of smartphones as a tool for teaching; they discussed the foundations of smartphone-assisted learning and the concept of mobile-learning laboratories, which we refer to as MobLeLabs. Participants also performed an experiment that used an Axé dance video and smartphone applications to measure changes in heart rate and reaction time. Our report describes this international hands-on teaching workshop and highlights its outcomes.


2018 ◽  
Vol 7 (4) ◽  
pp. 2241
Author(s):  
Yogesh Madhukar Ghorpade ◽  
Prof. Dr. R. Kamatchi

By in 2021, more than half of global enterprises already using cloud today adopt an all in cloud strategy [6]. Is today the world of modern infrastructure using digital transformation results cost effective approach? If yes, than how it has to be transformed and if No, than what are the differences between approaches applied. The cost effective methodology and its implementation is primary approach towards cost computing to bring effectiveness with the proper requirements and provides proper solution.The productive learning with different approach is the vital requirement for today’s Cloud infrastructure building from student’s perspective needs to be understood [13 - 15]. The paper aims in building and implementing the Lab infrastructure using developed model for cost effective approach by comparing On-premise vendors with cloud vendors. The technology that is used for the experiment are open-source and Proprietary. The paper results with the best approach used in cost computing methodology providing best solution for the given requirement in academic environment. 


2018 ◽  
Vol 7 (2.7) ◽  
pp. 820
Author(s):  
Sai Sudha Gadde ◽  
Rama Krishna Srinivas Ganta ◽  
ASALG Gopala Gupta ◽  
Raghava Rao K ◽  
KRR Mohan Rao

In today’s everlasting technological world, information and data communication create more devices stay connected to the internet. This lead to achieving development for building different software and internet connection very inexpensive this affected privacy and security. Security today became of the most important issue because day-by-day new technologies are put forward for different purposes of study while these come with a lot of vulnerabilities which makes the exploitation of the data. IoT is also such kind technology which is available for exploiting. For preserving information from such type of attacks we use honeypot which serves as a decoy based technology in a network and these are cost effective and works as a deception model which entice attackers with low vulnerabilities and security. Here are how honeypots used to defend IoT devices from being attacked and gather information about the attackers’ device. 


Author(s):  
Khaleel Ahmad ◽  
Masroor Ansari ◽  
Afsar Kamal

Xen is an open source virtualization framework in distributed system based on rapid elasticity on broad network access. It is a cost-effective platform for resource pooling and allows easy access to run any code any time from everywhere by any user. It is a hypervisor using a microkernel design, provides services that allow multiple operating systems to execute on the same computer concurrently. In other words, the hypervisor was made accessible to the world directly from any location, anticipating a fully virtualized cloud base environment, which is turned into cloud computing.


Author(s):  
Djelloul Bouchiha

This chapter presents all the concepts, techniques, and analyses in relation to the problem of reengineering existing (legacy) systems towards new technologies. Reengineering is a sub-problem of software engineering. It is the study and analysis of an existing system for purposes of understanding, maintenance, or migration towards new technologies that arise from day to day, without rewriting the software from scratch. This will save us time and money in the software development process. Author's objective is not to create new terms, but to introduce the terms already in use with new perspectives. So in this chapter, definitions and techniques are introduced, taxonomies and models are proposed, relevant questions are answered, some specialized conferences and journals are listed and compared; all this to highlight the ways to authors who are interested in writing research papers or surveys in the software reengineering field.


Author(s):  
Prarthana Dutta ◽  
Naresh Babu Muppalaneni ◽  
Ripon Patgiri

The world has been evolving with new technologies and advances day-by-day. With the advent of various learning technologies in every field, the research community is able to provide solution in every aspect of life with the applications of Artificial Intelligence, Machine Learning, Deep Learning, Computer Vision, etc. However, with such high achievements, it is found to lag behind the ability to provide explanation against its prediction. The current situation is such that these modern technologies are able to predict and decide upon various cases more accurately and speedily than a human, but failed to provide an answer when the question of why to trust its prediction is put forward. In order to attain a deeper understanding into this rising trend, we explore a very recent and talked-about novel contribution which provides rich insight on a prediction being made -- ``Explainability.'' The main premise of this survey is to provide an overview for researches explored in the domain and obtain an idea of the current scenario along with the advancements published to-date in this field. This survey is intended to provide a comprehensive background of the broad spectrum of Explainability.


In the present scenario it is observed that 66.60 percent population of the world has a mobile device (cell phones, tablets and other mobile devices). Billions of users are using the social media across various platforms like Facebook, Whatsapp, Twitter, Instagram etc. But simultaneously, the Internet crimes and frauds are increasing rapidly day by day across the world in which the social media platforms are playing a vital role. Criminals use mobile phones as a partner in their crimes. They use social media platforms for criminal motive. To hold-up and to trace the criminals, the investigation agencies try to find out the locations of the criminals by tracing their mobile numbers using CDR analysis, IP address analysis and other methods. But the criminal have been intelligent now and using the new technologies to hide themselves. The criminals use social media accounts for calling and chatting so that police or other investigation agencies cannot trace them easily. In such conditions, it was felt necessary to develop such a tool that can facilitate the investigating agencies and police personnel to trace the criminals easily. Therefore, a tool named SNUFF is developed by the authors that can help the police and other agencies to trace and find out the exact location of the person or the criminal who has been using the social media sites for his ill intentions.


2017 ◽  
Vol 4 (2) ◽  
pp. 227-245
Author(s):  
Cahit Kahraman ◽  
İlhan Güneş ◽  
Nanae Kahraman

1989 göçü öncesi, dünyada eşzamanlı olarak gittikçe gelişen ve zenginleşen mutfak kültürü, Bulgaristan Türklerini de etkilemiştir. Pazardaki çeşitlilik arttıkça, yemek alışkanlıkları da değişime uğramıştır. Büyük göçten sadece 30-40 sene evvel kısıtlı imkânlar ile sınırlı sayıda yemek çeşidi üretilirken, alım gücünün artmasıyla yemek kültüründe de hızlı gelişmeler olmuştur. Artan ürün çeşitliliği yemeklere de yansımış, farklı lezzetler mutfaklara girmiştir. Göçmen yemekleri denilince hamur işleri, börek ve pideler akla gelir. Ayrıca, göçmenlerin çok zengin turşu, komposto ve konserve kültürüne sahip oldukları da bilinir. Bu çalışma, 1989 öncesi Bulgaristan’ın farklı bölgelerinde yaşayan Türklerin yemek alışkanlıklarına ışık tutmakla birlikte, göç sonrasında göçmen mutfak kültüründe bir değişiklik oluşup oluşmadığını konu almaktadır. Bu amaçla, 1989 yılında Türkiye’ye göç etmiş 50 kişiye 8 sorudan oluşan anket düzenlenmiştir. Bu verilerden yola çıkarak oluşan bulgular derlenmiş ve yeni tespitler yapılmıştır. Ayrıca, Türkiye’nin farklı bölgelerine yerleşen göçmenler, kendi göçmen pazarlarını kurmuşlardır. Bulgaristan’dan getirilen ürünlerin bu pazarlarda satılması böyle bir arz talebin hala devam ettiğine işaret etmektedir.ABSTRACT IN ENGLISHThe Diversity in Cuisine Culture of the Immigrants from Bulgaria After 1989 MigrationThe Cuisine culture that has been developing and getting rich day by day contemporaneously in the world before 1989 migration has also had an impact on Bulgarian Turks. By the increase in diversity in the market, eating habits have changed. While producing a limited number of food types with limited opportunities just some 30 or 40 years before the ‘Big Migration’, there has been a rapid progress in food culture by the help of the increase in purchase power. Enhancing product range has been reflected in food, and different tastes have entered the cuisines. When we say immigrant, the first things that come to our mind are pastry, flan and pitta bread. Moreover, it is also known that immigrants have a very rich cuisine culture of pickle, stewed fruit, and canned food. This study aims both to disclose the eating habits of Turks living in different regions of Bulgaria before 1989 and to determine whether there has been a difference in immigrant cuisine culture before and after the migration. For this purpose, a questionnaire consisting of 8 questions has been administered to 50 people who migrated to Turkey in 1989. The results gathered from these data have been compiled and new determinations have been made. In addition, immigrants that settled in different regions of Turkey have set their own immigrant markets. The fact that the products brought from Bulgaria are being sold in these markets shows that this kind of supply and demand still continues.


Sign in / Sign up

Export Citation Format

Share Document