


default search action
International Journal of Software Innovation, Volume 9
Volume 9, Number 1, 2021
- Yoki Karl

:
Big Data Management System for U-Healthcare. 1-11 - Alankrita Aggarwal

, Kanwalvir Singh Dhindsa
, P. K. Suri:
Performance-Aware Approach for Software Risk Management Using Random Forest Algorithm. 12-19 - Mostefai Abdelkader

:
Using Dynamic Time Warping to Detect Clones in Software Systems. 20-36 - Ankita Gupta

, Chetna Gupta:
A Collaborative Effort-Benefit-Value Analysis Model to Support Requirements Reuse for Software Requirements Prioritization. 37-51 - Lipika Goel

, Mayank Sharma
, Sunil Kumar Khatri
, D. Damodaran:
A Framework for Homogeneous Cross-Project Defect Prediction. 52-68 - Shailesh Kumar Shivakumar:

A Survey and Taxonomy of Intent-Based Code Search. 69-110
Volume 9, Number 2, 2021
- Djamila Baroudi, Safia Nait Bahloul

:
Observer Patterns for Timed Properties. 1-17 - Abhishek Pandey

, Soumya Banerjee:
Test Data Generation and Selection Using Levy Flight-Based Firefly Algorithm. 18-34 - Khalid Alemerien

:
Usable Security and Privacy on Online Social Networks: Tools, Approaches, Studies, and Future Trends. 35-68 - Govindan Raja, U. Srinivasulu Reddy

:
DNA Fragment Assembly Using Hybridized Catfish PSO. 69-80 - Prerna Dewan, Nivedita Nahar

, Rakesh Kumar:
A Novel Approach for Detection of Moving Objects in Complex Scenes Using Fuzzy Colour Difference Histogram. 81-101 - Justice Kwame Appati

, Kennedy Yaw Lodonu
, Richmond Chris-Koka
:
A Review of Image Analysis Techniques for Adult Content Detection: Child Protection. 102-121 - Abdallah Qusef, Abdallah Ayasrah, Adnan Shaout

:
Comprehensive Approach to Implement E-Government Backend in Jordan Using Service-Oriented Architecture. 122-135 - Jasleen Kaur

, S. R. N. Reddy:
Design and Development of Lightweight Operating System Framework for Smart Devices. 136-149
Volume 9, Number 3, 2021
- Akram Abdel Qader

:
A New Novel Hybrid Dynamic Color Segmentation Model for Road Signs in Noisy Conditions. 1-22 - Nesar Ahmad

, Aijaz Ahmad, Sheikh Umar Farooq:
An Assessment of Incorporating Log-Logistic Testing Effort Into Imperfect Debugging Delayed S-Shaped Software Reliability Growth Model. 23-41 - Mohammed Tuays Almuqati:

Challenges in the Cloud Computing Model of Resource Management Issues Such as Service Level Agreements and Services Models. 42-51 - Dukjin Kim, Wooyoung Lee, Dohyung Kim

, Gwangyong Gim:
An Empirical Study on Filter Bubbles in the YouTube Comments Network: Using Social Network Analysis. 52-65 - Jun-Hyuk Jo, Jihyun Lee, Aman Jaffari, Eunmi Kim:

Fault Localization With Data Flow Information and an Artificial Neural Network. 66-78 - Jeonghoon Shin, Dongjun Lee:

A Study of Optimized EEG Signal Induction/Extraction Techniques for Basic Motion Control of Personal Robots for Physically Impaired Users. 79-90 - Sharon Andrews:

Innovation Process for Problem Conceptualization. 91-103
Volume 9, Number 4, 2021
- Hong Anh Le

, Van-Khanh To
, Ninh-Thuan Truong:
Formal Analysis of Database Trigger Systems Using Event-B. 1-16 - Hien Phan:

Selecting Suitable Students for Jobs Based on Their Capacity. 1-9 - D. Mohana Priya:

Multi-Object Tracking Using Gradient-Based Learning Model in Video Surveillance. 1-17 - Ngo Tan Vu Khanh, Truong Viet Phuong, Truong-Xuan Do:

The Influences of Technology on Digital Economy Development in Vietnam. 10-18 - Ishaya Peni Gambo

, Rhoda Ikono
, Olaronke Ganiat Iroju, Theresa Olubukola Omodunbi, Oswaldo Kenan Zohoun:
Hybridized Ranking Model for Prioritizing Functional Software Requirements: Case Study Approach. 67-87 - Ajay K. Gupta

, Udai Shanker
:
Mobility Markov Chain and Matrix-Based Location-Aware Cache Replacement Policy in Mobile Environment. 107-123 - Ram Gouda

, V. Chandraprakash
:
Multi-Objective Crow Search and Fruit Fly Optimization for Combinatorial Test Case Prioritization. 124-142 - Symphorien Karl Yoki Donzia

, Haeng-Kon Kim, Young Pil Geum:
A Study on Deep Learning Model Autonomous Driving Based on Big Data. 143-157 - Ihssene Menhour, M'hamed Bilal Abidine

, Belkacem Fergani, Hakim Lounis:
KDA-Based WKNN-SVM Method for Activity Recognition System From Smartphone Data. 67-87 - Shailendra Mishra

:
Network Traffic Analysis Using Machine Learning Techniques in IoT Networks. 107-123

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














