To see the other types of publications on this topic, follow the link: COCOMO IN WEB APPLICATION.

Journal articles on the topic 'COCOMO IN WEB APPLICATION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'COCOMO IN WEB APPLICATION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bhawana Verma, Satish Kumar Alaria. "Design & Analysis of Cost Estimation for New Mobile-COCOMO Tool for Mobile Application." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 1 (January 31, 2019): 27–34. http://dx.doi.org/10.17762/ijritcc.v7i1.5222.

Full text
Abstract:
Software cost estimation is a resource forecasting method, which is required by the software development process. However, estimating the workload, schedule and cost of a software project is a complex task because it involves predicting the future using historical project data and extrapolating to see future values. For cost estimates for software projects, several methods are used. Among the various software cost estimation methods available, the most commonly used technology is the COCOMO method. Similarly, to calculate software costs, there are several cost estimating tools available for software developers to use. But these released cost estimation tools can only provide parameters (i.e. cost, development time, average personnel) for large software with multiple lines of code. However, if a software developer wants to estimate the cost of a small project that is usually a mobile application, the available tools will not give the right results. Therefore, to calculate the cost of the mobile application, the available cost estimation method COCOMO II is improved to a new model called New Mobile COCOMO Tool. The New Mobile COCOMO tool developed specifically for mobile applications is a boon for software developers working in small software applications because it only includes important multipliers that play a vital role in estimating the cost of developing mobile applications. Therefore, the objective of this paper is to propose a cost estimation model with a special case of COCOMO II, especially for mobile applications, which calculates the person-month, the programmed time and the average personnel involved in the development of any mobile app.
APA, Harvard, Vancouver, ISO, and other styles
2

Koo, Heung-Seo. "A Development Tool for Web Applications based on Cocoon Framework." Journal of Korean Institute of Intelligent Systems 15, no. 6 (December 1, 2005): 742–47. http://dx.doi.org/10.5391/jkiis.2005.15.6.742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goyal, Somya, and ANUBHA Parashar. "Machine Learning Application to Improve COCOMO Model using Neural Networks." International Journal of Information Technology and Computer Science 10, no. 3 (March 8, 2018): 35–51. http://dx.doi.org/10.5815/ijitcs.2018.03.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nátz, Katalin, Szergej Vinogradov, and Zsigmond Gábor Szalay. "COCOMO Method for Planning Human Resources in Software Development." Acta Carolus Robertus 13, no. 1 (June 30, 2023): 145–56. http://dx.doi.org/10.33032/acr.4425.

Full text
Abstract:
Over the past decades, software development has been a priority project for business leaders. Compared to the production or purchase of a productive asset, IT development could be carried out at a lower cost, and controlling always found a hidden reserve that could be used for this purpose. But this process is in transition at the beginning of the 21st century. IT projects should be examined early in the development phase to determine the functional size of a software application and to determine the business value and expenditure that the application represents for a particular segment of the business. However, process analysis and productivity and cost analysis of these developments are more challenging than average for business analysts. Enterprise information systems are evolving very rapidly, and their user base is growing. These applications handle so much data and are so complex that it is difficult for the average user to understand how they work. New coding tools are now enabling software developers to meet growing and increasingly complex customer needs more efficiently and quickly. A comprehensible, comparable, and clear method for interpreting, estimating, and verifying projects is needed.
APA, Harvard, Vancouver, ISO, and other styles
5

Puspaningrum, Alifia, Fachrul Pralienka Bani Muhammad, and Esti Mulyani. "Flower Pollination Algorithm for Software Effort Coefficients Optimization to Improve Effort Estimation Accuracy." JUITA: Jurnal Informatika 9, no. 2 (November 30, 2021): 139. http://dx.doi.org/10.30595/juita.v9i2.10511.

Full text
Abstract:
Software effort estimation is one of important area in project management which used to predict effort for each person to develop an application. Besides, Constructive Cost Model (COCOMO) II is a common model used to estimate effort estimation. There are two coefficients in estimating effort of COCOMO II which highly affect the estimation accuracy. Several methods have been conducted to estimate those coefficients which can predict a closer value between actual effort and predicted value. In this paper, a new metaheuristic algorithm which is known as Flower Pollination Algorithm (FPA) is proposed in several scenario of iteration. Besides, FPA is also compared to several metaheuristic algorithm, namely Cuckoo Search Algorithm and Particle Swarm Optimization. After evaluated by using Mean Magnitude of Relative Error (MMRE), experimental results show that FPA obtains the best result in estimating effort compared to other algorithms by reached 52.48% of MMRE in 500 iterations.
APA, Harvard, Vancouver, ISO, and other styles
6

Saadi, Maryam Hassani, Vahid Khatibi Bardsiri, and Fahimeh Ziaaddini. "The Application of Meta-Heuristic Algorithms to Improve the Performance of Software Development Effort Estimation Models." International Journal of Applied Evolutionary Computation 6, no. 4 (October 2015): 39–68. http://dx.doi.org/10.4018/ijaec.2015100104.

Full text
Abstract:
One of the major activities in effective and efficient production of software projects is the precise estimation of software development effort. Estimation of the effort in primary steps of software development is one of the most important challenges in managing software projects. Some reasons for these challenges such as: discordant software projects, the complexity of the manufacturing process, special role of human and high level of obscure and unusual features of software projects can be noted. Predicting the necessary efforts to develop software using meta-heuristic optimization algorithms has made significant progressions in this field. These algorithms have the potent to be used in estimation of the effort of the software. The necessity to increase estimation precision urged the authors to survey the efficiency of some meta-heuristic optimization algorithms and their effects on the software projects. To do so, in this paper, they investigated the effect of combining various optimization algorithms such as genetic algorithm, particle swarm optimization algorithm and ant colony algorithm on different models such as COCOMO, estimation based on analogy, machine learning methods and standard estimation models. These models have employed various data sets to evaluate the results such as COCOMO, Desharnais, NASA, Kemerer, CF, DPS, ISBSG and Koten & Gary. The results of this survey can be used by researchers as a primary reference.
APA, Harvard, Vancouver, ISO, and other styles
7

Mall, Abhyas, Shoibam Amritraj, Nitish Hans, and J. Rakesh. "Semantic Web Application: Tourist Assisting Web Application." International Journal for Research in Applied Science and Engineering Technology 10, no. 10 (October 31, 2022): 1449–56. http://dx.doi.org/10.22214/ijraset.2022.47222.

Full text
Abstract:
Abstract: In addition to traditional web technologies, semantic web technology allows the implementation of the "web of things" and "web of linked data," enabling both machines and humans to access the web. The ultimate objective is to allow machines to do increasingly complex tasks and to design systems that can support network interactions. This goal may be realized by merging several linked data technologies, such as RDF, SPARQL, OWL, and SKOS (W3C Org, 2014). In this project, the authors integrated semantic web technologies into the software to illustrate their use. This study describes in detail the design and functionality of the apps, as well as how the semantic web technology principles were implemented. The authors followed the principles and best practices outlined in W3C documents and directed by the first author. The authors exerted a great deal of work to evaluate the acquired data and have begun the project by locating suitable datasets from various data sources (heterogeneous data sources). Following this, more attempts were made to cleanse and verify the data. This generated dataset was subsequently pushed to the selected triple store on application start-up. The ontology design and project architecture are described in full in this study. The project's stack and implementation has been discussed in this report.
APA, Harvard, Vancouver, ISO, and other styles
8

Helm, J. E. "The viability of using COCOMO in the special application software bidding and estimating process." IEEE Transactions on Engineering Management 39, no. 1 (1992): 42–58. http://dx.doi.org/10.1109/17.119662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Yu Qiang, Mei Weng, Cheng Xian Shi, Jing You, and Qi Wei He. "A Validity Analysis of Estimate Improvement Model of Software Cost." Advanced Materials Research 317-319 (August 2011): 1725–28. http://dx.doi.org/10.4028/www.scientific.net/amr.317-319.1725.

Full text
Abstract:
In virtue of fuzzy matrix and fuzzy linear transformation, not only the fuzzy comprehensive ability’s quantitative value is got, but also single fuzzy ability’s quantitative value is got. The type of software personnel can be distinguished by comparing the fuzzy integrated ability assessing value of software personnel with pre-set threshold, pointed out statistic improvement for project in the process of confirming factors, in order to enhancing the accuracy of the estimate results. And an analysis of specific application instance of improved COCOMO model verified the validity of the improved model.
APA, Harvard, Vancouver, ISO, and other styles
10

Andhale, Prajakta, Sonali Ghadigaonkar, Kushal Lahoti, Kiran Patil, and Prof Sunayana Jadhav. "Web-based Application." IJARCCE 6, no. 5 (May 30, 2017): 685–88. http://dx.doi.org/10.17148/ijarcce.2017.65131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Singh, Himanshu, Tanmay Srivastava, and Dr Kirti Shukla. "Angular Web Application." YMER Digital 21, no. 05 (May 13, 2022): 604–9. http://dx.doi.org/10.37896/ymer21.05/68.

Full text
Abstract:
Web development is like building a house. Just as we need a system, city building permit and license, web development also requires documentation, proper server, structure and programming language. From ever-changing web design levels to the complexity of technology required, frameworks have become an integral part of developing web websites or applications. It does not make sense to rename a wheel, thus designing rich and attractive websites, it makes more sense to use frames authorized by developers around the world. Django, Angular, Spring, React, Vue, Express are some of the most popular web development frames. In my project I used Angular
APA, Harvard, Vancouver, ISO, and other styles
12

Erşahin, Buket, and Mustafa Erşahin. "Web application security." South Florida Journal of Development 3, no. 4 (July 4, 2022): 4194–203. http://dx.doi.org/10.46932/sfjdv3n4-002.

Full text
Abstract:
This study aims to show how security flaws of web applications can threat information security. Web Application Security is a branch of Information Security which focuses on web application level security flaws and their solutions. Evolution of Web continues with a big momentum. Amount of information shared over Web increases every day, various business domains continue to integrate their operations to digital world. This brings its own risks and makes Information Security of Web Applications more important than ever. Most common and serious Web vulnerabilities have been analyzed along with their solutions. This study focuses on how web developers can already prevent security problems during the development life cycle. What are the best practices to follow before/during the development and post-development phases? Which security tools can be used to support developers? Building totally secure web applications is not an easy job. Following security standards and development cycles with security concerns can already prevent most of the potential problems. A security checklist for web developers came out at the end of the study. Evolving web technologies and new security threats force us to keep this checklist up to date. We are working on a mechanism which will keep this checklist up to date.
APA, Harvard, Vancouver, ISO, and other styles
13

Hughes, Todd C., Tina Coleman, David Benjamin Hellar, Laurian C. Vega, and Emily S. Patterson. "Web Application Dashboards." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 3, no. 1 (June 2014): 186–90. http://dx.doi.org/10.1177/2327857914031030.

Full text
Abstract:
The Ozone Widget Framework (OWF) is a dashboard environment that enables users to select and arrange web applications in a highly customized way. OWF is available as Free Open Source Software and has been deployed in a variety of defense and intelligence analysis environments ranging from real-time analytics, cyber-situational awareness, to strategic and operational planning. These environments share characteristics with the information analysis and workflow needs of health care. This paper discusses those similarities and the current and future possibilities for OWF usage in health care.
APA, Harvard, Vancouver, ISO, and other styles
14

Watson, David. "Web application attacks." Network Security 2007, no. 10 (October 2007): 10–14. http://dx.doi.org/10.1016/s1353-4858(07)70094-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yadav, Kavita, Babita Kumari, and Mohini Yadav. "Web Application Security." International Journal of Applied Research on Information Technology and Computing 5, no. 2 (2014): 131. http://dx.doi.org/10.5958/0975-8089.2014.00005.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sinz, Elmar J., Bernd Knobloch, and Stephan Mantel. "Web-Application-Server." Wirtschaftsinformatik 42, no. 6 (December 2000): 550–52. http://dx.doi.org/10.1007/bf03250773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Горелик, В. Ю., and Д. С. Скоморохов. "Networked web application security." Informacionno-technologicheskij vestnik, no. 1(23) (March 11, 2020): 104–9. http://dx.doi.org/10.21499/2409-1650-2020-23-1-104-109.

Full text
Abstract:
В статье рассматриваются вопросы обеспечения защиты веб-приложений от сетевых угроз. Проведен анализ методов обеспечения сетевой безопасности и безопасности веб-приложений, рассмотрены особенности их осуществления и реализации. Описан процесс комбинирования указанных средств при проектировании и реализации системы защиты для обеспечения безопасности информационной среды предприятий и используемых веб-приложений. This article discusses the issues of protecting web applications from network threats. The analysis of methods for ensuring network security and web application security is carried out, the features of their implementation and implementation are considered. The process of combining these tools in the design and implementation of a security system to ensure the security of the information environment of enterprises and used web applications is described.
APA, Harvard, Vancouver, ISO, and other styles
18

Saranya, N., P. Sakthi Ananthi, S. Suveetha, and M. Vishnuprabha. "Galdera – A Web Application." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 4 (April 30, 2017): 298–301. http://dx.doi.org/10.23956/ijarcsse/v7i3/0182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Malik, Harshit, Arindam Singh, Rajat Gupta, and Aditya Gupta. "E-Commerce Web Application." International Journal of Computer Sciences and Engineering 6, no. 4 (April 30, 2018): 404–8. http://dx.doi.org/10.26438/ijcse/v6i4.404408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pevnev, Volodymyr, Oksana Popovichenko, and Yaroslav Tsokota. "WEB APPLICATION PROTECTION TECHNOLOGIES." Advanced Information Systems 4, no. 1 (March 14, 2020): 119–23. http://dx.doi.org/10.20998/2522-9052.2020.1.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Chopra, Rajiv. "Rediscover Web Application Testing." IOSR Journal of Computer Engineering 19, no. 02 (March 2017): 48–52. http://dx.doi.org/10.9790/0661-1902014852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hagemann, Stephan, and Gottfried Vossen. "Web-Wide Application Customization." International Journal of Information System Modeling and Design 3, no. 1 (January 2012): 23–47. http://dx.doi.org/10.4018/jismd.2012010102.

Full text
Abstract:
Mashups have become popular in recent years in the context of Web 2.0 developments. They represent a way of allowing an application to grow beyond the capabilities of its original developers through an incorporation of external functionality. This paper first introduces several approaches to integrating mashups into the Web pages or services, which commonly implement ways to determine which mashups are potentially relevant for display in a certain Web page context. It then describes in detail a novel approach called ActiveTags, which enables users to create reliable mashups based on tags and hence customized views of Web pages with tagged content. A scenario that demonstrates the potential benefits of this approach is presented. Moreover, a formalization is presented which suitably combines previous work on modeling the Web with relational meta-programming, thereby showing that ActiveTags (as well as related approaches) can conceptually be described in terms of the relational model of data.
APA, Harvard, Vancouver, ISO, and other styles
23

Mahajan, Vijay Bhagwan. "Web Application Vulnerability Scanner." International Journal for Research in Applied Science and Engineering Technology 7, no. 6 (June 30, 2019): 386–90. http://dx.doi.org/10.22214/ijraset.2019.6066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zammataro, Luca, Rita DeMolfetta, Gabriele Bucci, Arnaud Ceol, and Heiko Muller. "AnnotateGenomicRegions: a web application." BMC Bioinformatics 15, Suppl 1 (2014): S8. http://dx.doi.org/10.1186/1471-2105-15-s1-s8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hurlbut, B. T. "Improving Web application speed." IEEE Potentials 21, no. 2 (2002): 20–24. http://dx.doi.org/10.1109/45.997972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zammataro, L., G. Bucci, and H. Muller. "AnnotateGenomicRegions: a Web application." EMBnet.journal 18, A (April 29, 2012): 106. http://dx.doi.org/10.14806/ej.18.a.437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Muller, Heiko, Luca Zammataro, and Gabriele Bucci. "AnnotateGenomicRegions: a web application." EMBnet.journal 18, B (November 9, 2012): 135. http://dx.doi.org/10.14806/ej.18.b.579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hadjerrouit, Said. "Web-based application development." ACM SIGCSE Bulletin 33, no. 2 (June 2001): 31–34. http://dx.doi.org/10.1145/571922.571949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Meier, J. D. "Web application security engineering." IEEE Security & Privacy Magazine 4, no. 4 (July 2006): 16–24. http://dx.doi.org/10.1109/msp.2006.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Saha, Goutam Kumar. "Web Application Testing Challenges." International Journal of Applied Research on Information Technology and Computing 9, no. 3 (2018): 287. http://dx.doi.org/10.5958/0975-8089.2018.00028.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jawale, Sakshi, Pranit Londhe, Rushikesh Kolekar, Sarika Jadhav, and Prajwali Kadam. "Data Summarization Web Application." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 883–95. http://dx.doi.org/10.22214/ijraset.2023.51650.

Full text
Abstract:
Abstract: As there is an increase in the usage of digital applications, the availability of data generated has increased to a tremendous scale. Data is an important component in almost every domain where research and analysis are required to solve problems. It is available in a structured or unstructured format. Therefore, to get corresponding data as per the application purpose, easily and quickly from different sources of data on the internet, an online content summarizer is desired. Summarizers make it easier for users to understand the content without reading it completely. Abstractive Text Summarizer helps in defining the content by considering the important words and helps in creating summaries that are in a human-readable format. The main aim is to make summaries in such a way that they should not lose their context. Various Neural Network models are employed along with other machine translation models to bring about a concise summary generation. This paper aims to highlight and study the existing contemporary models for abstractive text summarization and also to explore areas for further research
APA, Harvard, Vancouver, ISO, and other styles
32

Jung, Won-Chi, Jinsu Kim, and Namje Park. "Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application." Symmetry 13, no. 8 (August 23, 2021): 1550. http://dx.doi.org/10.3390/sym13081550.

Full text
Abstract:
Attackers’ intrusion into the Enterprise LAN is increasing every year, and the method is becoming more intelligent and crafty. Various security measures against external network intrusions, such as firewalls, are being studied and applied to protect against external attacks, but it is difficult to respond to increasing attacks. Most institutions block access from the external network for the safety of the internal network and allow access from the internal network to the external network through some restricted ports. In particular, restricted ports in subject to a variety of security techniques to block intrusion into the internal network, but in the process, access to the internal network is only applied by restricted ports, making it inefficient to handle internal requests. Although various studies have been conducted on network isolation to address these challenges, it is difficult to perform tasks efficiently as security functions, such as detecting whether request data is attacked or not, during actual application. The proposed technique is a network-blocking-based network separation technique that converts data from the external network connected to the Internet into symmetry data from which malicious code is removed through an agent and delivers it to the client of the internal network. We propose a technique to provide access.
APA, Harvard, Vancouver, ISO, and other styles
33

ISMAIL, Anis, Abd El Salam AL HAJJAR, and Abdel Karim KASSEM. "Web Service Composition for E-Commerce Web Application." Review of Computer Engineering Research 3, no. 1 (2016): 13–24. http://dx.doi.org/10.18488/journal.76/2016.3.1/76.1.13.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kim, Su-Kyung, and Kee-Hong Ahn. "Web Ontology Building Methodology for Semantic Web Application." KIPS Transactions:PartD 15D, no. 1 (February 29, 2008): 47–60. http://dx.doi.org/10.3745/kipstd.2008.15-d.1.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zuo, J. M., and J. C. Mabon. "Web-Based Electron Microscopy Application Software: Web-EMAPS." Microscopy and Microanalysis 10, S02 (August 2004): 1000–1001. http://dx.doi.org/10.1017/s1431927604884319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Tynchenko, V. S., A. I. Andreev, Yu F. Kaizer, S. E. Zinner, N. N. Lysyannikova, and N. V. Kuzmin. "Application of the COCOMO II method to estimate the labor costs of developing software products for various platforms." Journal of Physics: Conference Series 2032, no. 1 (October 1, 2021): 012124. http://dx.doi.org/10.1088/1742-6596/2032/1/012124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Baumeister, Alexander, and Markus Ilg. "Activity Driven Budgeting of Software Projects." International Journal of Human Capital and Information Technology Professionals 1, no. 4 (October 2010): 14–30. http://dx.doi.org/10.4018/jhcitp.2010100102.

Full text
Abstract:
There are numerous forecast models of software development costs, however, various problems become apparent in context to practical application. Standardized methods, such as COCOMO II have to be calibrated at an individual operational level on the basis of the underlying database. This paper presents a new activity based approach that is based on business specific cost data that can be easily integrated into existing management accounting systems. This approach can be applied to software development projects based on the unified process in which activity driven budgeting promises several advantages compared to common tools in use. It supports enterprise specific cost forecasting and control and can be easily linked with risk analysis. In addition to the presentation of a conceptual design model, the authors present a framework for activity driven budgeting and cost management of software development projects combined with concrete implementation examples.
APA, Harvard, Vancouver, ISO, and other styles
38

INOUE, Takeru, Hiroshi ASAKURA, Yukio UEMATSU, Hiroshi SATO, and Noriyuki TAKAHASHI. "Web API Database Systems for Rapid Web Application Development." IEICE Transactions on Information and Systems E93-D, no. 12 (2010): 3181–93. http://dx.doi.org/10.1587/transinf.e93.d.3181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Elminir, Hamdy K., Mohamed Abu Elsoud, and A. M. El Halawany. "Uml-based Web Engineering Framework for Modeling Web Application." Journal of Software Engineering 5, no. 2 (March 15, 2011): 49–63. http://dx.doi.org/10.3923/jse.2011.49.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Et.al, Vishesh Kumar Sharma. "Focaltheorem – A portfolio Web Application." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 3809–14. http://dx.doi.org/10.17762/turcomat.v12i3.1667.

Full text
Abstract:
This project is used to upload photos and videos easily through one platform. We deployed this in cloud so it is very easy to use and accessible to others. In this we use the technology of web development. So this portfolio is very helpful for photographers for uploading any photographs. Platform gives clients free, limitless capacity for photographs up to 16 megapixels and recordings up to 1080p goal. The help consequently breaks down photographs, distinguishing different visual highlights and subjects. Clients can look for anything in photographs, with the assistance returning outcomes from three significant classifications: People, Places, and Things. Stage perceives faces, gathering comparative ones (this component is just accessible in specific places because of protection laws), geographic tourist spots, and subject matter, including college events in Galgotias University, Uni-Fests, Club Events, F1 Race, Food-Fest, and more.
APA, Harvard, Vancouver, ISO, and other styles
41

G, Subramaniam. "Survey on Web Application Development." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 2259–61. http://dx.doi.org/10.22214/ijraset.2018.3358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Golchin, Ahmad, and Ahmad Baraani. "Wing+ Web-Application Development Framework." International Journal of Distributed and Parallel systems 2, no. 6 (November 30, 2011): 179–90. http://dx.doi.org/10.5121/ijdps.2011.2616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Malcher, Viliam. "Decorator Pattern in Web Application." International journal of advanced Information technology 3, no. 4 (August 31, 2013): 13–18. http://dx.doi.org/10.5121/ijait.2013.3402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

G, Arvind. "Chatbot Web Application using DIET." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3826–32. http://dx.doi.org/10.22214/ijraset.2022.45891.

Full text
Abstract:
Abstract: A chatbot is a computer program that is capable of communicating with the user in natural language in order to understand and parse the technical query. Such a program is frequently employed by organizations in order to automate the task of customer care and services. We have focused on designing a chatbot for our college, the Bangalore Institute of Technology. The current chatbot that is present in the official website for BIT is only an interface connecting the user to a live agent and is therefore unavailable for use most of the time. This inspired us to design a much better alternative for the existing chatbot using the DIET algorithm, that is accessible all the time and provides accurate responses in the blink of an eye
APA, Harvard, Vancouver, ISO, and other styles
45

Yadav, Saurabh, and Pawan Singh. "Web Application and Penetration Testing." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 1, no. 2 (November 20, 2020): 1–11. http://dx.doi.org/10.54060/jieee/001.02.003.

Full text
Abstract:
In the present scenario, the usage of internet is enormous and is escalating day by day. Internet facilities are employed in almost every field of work and people are becoming depending on it, with the increasing dependency on the internet, concern regarding information security has been increased. Because most of the work, e-commerce, chatting, payment of the bill, etc. are work through over the internet. That is why security is most important for any website. Basically, such security concern is high in the field of organizations, institutions, and the financial sector. This paper aims to address the top most vulnerability concerns and how to overcome them. This paper addresses most of the popular vulnerabilities, which are amongst the top 10 according to OWASP and addresses the precautions to be taken to deal with these vulnerabilities. This paper provides a better understanding in a simple and easy way. When the entire world is behind new technologies and everything is moving towards the internet, the need for security increases. One has to be sure about the security of their website as well as the security and privacy of the end users. So, when the world is demanding for new technologies there will be an increase in demand for security testing. Every application or website is considered good only when it is secure and it can only be done by a web tester. This paper explores the vulnerabilities in a precise manner.
APA, Harvard, Vancouver, ISO, and other styles
46

Mahdi, M. Islam, and Agus Suryana. "Mobile Web-Based Learning Application." International Journal of Information technology and Computer Engineering, no. 22 (March 30, 2022): 22–33. http://dx.doi.org/10.55529/ijitc.22.22.33.

Full text
Abstract:
Teaching and Learning activities in gotong royong junior high schools are currently conventional only limited to meetings in schools. The time available for teachers and students to meet face to face in the classroom is very limited, in addition, the process of delivering the material is almost completely carried out in the classroom which causes the delivery of the material to be late, when a student does not enter school, the student will later find it difficult to follow the learning process. therefore, a Mobile Web-Based Learning Application was created at Gotong Royong Junior High School, using the Prototype model system development method, the results of this research are a mobile webbased learning application, it can be concluded that the learning application has been designed and implemented with facilities including downloading materials, assignments or online quiz and student scores.
APA, Harvard, Vancouver, ISO, and other styles
47

K, Jason, Jishnu V K, and Remya G. "Web Application for Disaster Management." IJARCCE 8, no. 2 (February 28, 2019): 293–96. http://dx.doi.org/10.17148/ijarcce.2019.8257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Arif Ulla, Sayyad. "Secure Development - Web Application Security." IOSR Journal of Computer Engineering 14, no. 6 (2013): 14–22. http://dx.doi.org/10.9790/0661-1461422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Pande, Rishikesh. "Cloud-based Compiler Web Application." International Journal for Research in Applied Science and Engineering Technology 9, no. 4 (April 30, 2021): 845–49. http://dx.doi.org/10.22214/ijraset.2021.33753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Susilana, Rudi, Gema Rullyana, Ardiansah Ardiansah, and Yayu Wulandari. "Pedagogia Dictionary: Web Application Development." International Journal of Instruction 15, no. 1 (January 1, 2022): 197–218. http://dx.doi.org/10.29333/iji.2022.15112a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography