Results for 'Software testing'

982 found
Order:
  1.  17
    Model-based abductive reasoning in automated software testing.N. Angius - 2013 - Logic Journal of the IGPL 21 (6):931-942.
    Automated Software Testing (AST) using Model Checking is in this article epistemologically analysed in order to argue in favour of a model-based reasoning paradigm in computer science. Preliminarily, it is shown how both deductive and inductive reasoning are insufficient to determine whether a given piece of software is correct with respect to specified behavioural properties. Models algorithmically checked in Model Checking to select executions to be observed in Software Testing are acknowledged as analogical models which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  56
    The Problem of Justification of Empirical Hypotheses in Software Testing.Nicola Angius - 2014 - Philosophy and Technology 27 (3):423-439.
    This paper takes part in the methodological debate concerning the nature and the justification of hypotheses about computational systems in software engineering by providing an epistemological analysis of Software Testing, the practice of observing the programs’ executions to examine whether they fulfil software requirements. Property specifications articulating such requirements are shown to involve falsifiable hypotheses about software systems that are evaluated by means of tests which are likely to falsify those hypotheses. Software Reliability metrics, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  3. The ethics of software testing.Dale Hites - 1999 - Journal of Information Ethics 8 (1):63-71.
     
    Export citation  
     
    Bookmark  
  4. Real-Life Applications Based on Knowledge Technology-Attribute Reduction Based Expected Outputs Generation for Statistical Software Testing.Mao Ye, Boqin Feng, Li Zhu & Yao Lin - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 786-791.
     
    Export citation  
     
    Bookmark  
  5.  5
    Being Nice to Software Animals and Babies.Anders Sandberg - 2014-08-11 - In Russell Blackford & Damien Broderick (eds.), Intelligence Unbound. Wiley. pp. 279–297.
    A brain emulation would be a one‐to‐one simulation where every causal process in the brain is represented, behaving in the same way as the original. Opponents of animal testing often argue that much of it is unnecessary and could be replaced with simulations. Personal identity is going to be a major issue with brain emulations, both because of the transition from an original unproblematic single human identity to successor identity/identities that might or might not be the same, and because (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  99
    Software piracy: Is it related to level of moral judgment?Jeanne M. Logsdon, Judith Kenner Thompson & Richard A. Reid - 1994 - Journal of Business Ethics 13 (11):849 - 857.
    The possible relationship between widespread unauthorized copying of microcomputer software (also known as software piracy) and level of moral judgment is examined through analysis of over 350 survey questionnaires that included the Defining Issues Test as a measure of moral development. It is hypothesized that the higher one''s level of moral judgment, the less likely that one will approve of or engage in unauthorized copying. Analysis of the data indicate a high level of tolerance toward unauthorized copying and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  7.  9
    Tests and Proofs: 17th International Conference, TAP 2023, Leicester, UK, July 18–19, 2023, Proceedings.Virgile Prevosto & Cristina Seceleanu (eds.) - 2023 - Springer Nature Switzerland.
    This book constitutes the proceedings of the 17th International Conference, TAP 2023, as part of STAF 2023, a federation of conferences on Software Technologies, Applications and Foundations, which includes two more conferences besides TAP: ICGT (International Conference on Graph Transformations), and ECMFA (European Conference on Modelling Foundations and Applications) in Leicester, UK, in July 2023. The 8 full papers together with 2 short papers included in this volume were carefully reviewed and selected from 14 submissions. They were organized in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  42
    Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  9. Tools for Program Development and Analysis in Computational Science-A Performance Profile and Test Tool for Development of Embedded Software Using Various Report Views.Yongyun Cho & Chae-Woo Yoo - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3992--510.
  10.  33
    Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  13
    Automated Test Data Generation Using Cuckoo Search and Tabu Search (CSTS) Algorithm.Suhas Santebennur Ranganatha, Sanjay Kumar, Shobhit Khandelwal, Rahul Khandelwal & Praveen Ranjan Srivastava - 2012 - Journal of Intelligent Systems 21 (2):195-224.
    . Software testing is a very important phase in the development of software. Testing includes the generation of test cases which, if done manually, is time consuming. To automate this process and generate optimal test cases, several meta-heuristic techniques have been developed. These approaches include genetic algorithm, cuckoo search, tabu search, intelligent water drop, etc. This paper presents an effective approach for test data generation using the cuckoo search and tabu search algorithms. It combines the cuckoo (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Software Immortals—Science or Faith?Diane Proudfoot - 2012 - In A. Eden, J. Søraker, J. Moor & E. Steinhart (eds.), The Singularity Hypothesis: A Scientific and Philosophical Assessment. Springer. pp. 367-389.
    According to the early futurist Julian Huxley, human life as we know it is ‘a wretched makeshift, rooted in ignorance’. With modern science, however, ‘the present limitations and miserable frustrations of our existence could be in large measure surmounted’ and human life could be ‘transcended by a state of existence based on the illumination of knowledge’ (1957b, p. 16).
    No categories
     
    Export citation  
     
    Bookmark   5 citations  
  13.  26
    Software-realized inquiry support for cultivatig a disciplinary stance.Iris Tabak & Brian Reiser - 2008 - Pragmatics and Cognition 16 (2):307-355.
    What role can technology play in cultivating a disciplinary stance — raising questions, planning investigations, interpreting data and constructing explanations in a way that reflects disciplinary values and principles? How can overt and tacit expert scientific knowledge be captured, represented and used to design software that enables novices to assume a disciplinary stance in their investigations? We present The Galapagos Finches software designed to foster a biological and evolutionary stance. Our approach, Discipline-Specific Strategic Support , translates the main (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14. The mind as the software of the brain.Ned Block - 1995 - In Daniel N. Osherson, Lila Gleitman, Stephen M. Kosslyn, S. Smith & Saadya Sternberg (eds.), An Invitation to Cognitive Science, Second Edition, Volume 3. Cambridge MA: MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   59 citations  
  15.  38
    Computational Idealizations in Software Intensive Science: a Comment on Symons’ and Horner’s paper.Nicola Angius - 2014 - Philosophy and Technology 27 (3):479-484.
    This commentary on John Symons’ and Jack Horner’s paper, besides sharing its main argument, challenges the authors’ statement that there is no effective method to evaluate software-intensive systems as a distinguishing feature of software intensive science. It is underlined here how analogous methodological limitations characterise the evaluations of empirical systems in non-software intensive sciences. The authors’ claim that formal methods establish the correctness of computational models rather than of the represented programme is here compared with the empirical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  40
    Trade Liberalization, Corruption, and Software Piracy.Christopher Robertson, K. M. Gilley & William F. Crittenden - 2008 - Journal of Business Ethics 78 (4):623-634.
    As multinational firms explore new and promising national markets two of the most crucial elements in the strategic decision regarding market-entry are the level of corruption and existing trade barriers. One form of corruption that is crucially important to firms is the theft of intellectual property. In particular, software piracy has become a hotly debated topic due to the deep costs and vast levels of piracy around the world. The purpose of this paper is to assess how laissez-faire trade (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17.  80
    Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  18.  5
    Comparing Text-Matching Software Systems Using the Document Set in the Latvian Language.Laima Kamzola & Alla Anohina-Naumeca - 2020 - Journal of Academic Ethics 18 (2):129-141.
    There are many internationally developed text-matching software systems that help successfully identify potentially plagiarized content in English texts using both their internal databases and web resources. However, many other languages are not so widely spread but they are used daily to communicate, conduct research and acquire education. Each language has its peculiarities, so, in the context of finding content similarities, it is necessary to determine what systems are more suitable for a document set written in a specific language. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  10
    Research on computer static software defect detection system based on big data technology.Rahul Neware, Jyoti Bhola, K. Arumugam, Jianxing Zhu & Zhaoxia Li - 2022 - Journal of Intelligent Systems 31 (1):1055-1064.
    To study the static software defect detection system, based on the traditional static software defect detection system design, a new static software defect detection system design based on big data technology is proposed. The proposed method can optimize the distribution of test resources and improve the quality of software products by predicting the potential defect program modules and design the software and hardware of the static software defect detection system of big data technology. It (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  97
    Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  21. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22. A Test of the Principle of Optimality.John D. Hey & Enrica Carbone - 2001 - Theory and Decision 50 (3):263-281.
    This paper reports on an experimental test of the Principle of Optimality in dynamic decision problems. This Principle, which states that the decision-maker should always choose the optimal decision at each stage of the decision problem, conditional on behaving optimally thereafter, underlies many theories of optimal dynamic decision making, but is normally difficult to test empirically without knowledge of the decision-maker's preference function. In the experiment reported here we use a new experimental procedure to get round this difficulty, which also (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  19
    Testing the Efficacy of Training Basic Numerical Cognition and Transfer Effects to Improvement in Children’s Math Ability.Narae Kim, Selim Jang & Soohyun Cho - 2018 - Frontiers in Psychology 9.
    The goals of the present study were to test whether (and which) basic numerical abilities can be improved with training and whether training effects transfer to improvement in children’s math achievement. The literature is mixed with evidence that does or does not substantiate the efficacy of training basic numerical ability. In the present study, we developed a child-friendly software named ‘123 Bakery’ which includes four training modules; non-symbolic numerosity comparison, non-symbolic numerosity estimation, approximate arithmetic and symbol-to-numerosity mapping. Fifty-six first (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  17
    Automatic Generation and Optimization of Test case using Hybrid Cuckoo Search and Bee Colony Algorithm.T. V. SureshKumar & P. Lakshminarayana - 2020 - Journal of Intelligent Systems 30 (1):59-72.
    Software testing is a very important technique to design the faultless software and takes approximately 60% of resources for the software development. It is the process of executing a program or application to detect the software bugs. In software development life cycle, the testing phase takes around 60% of cost and time. Test case generation is a method to identify the test data and satisfy the software testing criteria. Test case generation (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  85
    Considerations in ethical decision-making and software piracy.Suzanne C. Wagner & G. Lawrence Sanders - 2001 - Journal of Business Ethics 29 (1-2):161 - 167.
    Individuals are faced with the many opportunities to pirate. The decision to pirate or not may be related to an individual''s attitudes toward other ethical issues. A person''s ethical and moral predispositions and the judgments that they use to make decisions may be consistent across various ethical dilemmas and may indicate their likelihood to pirate software. This paper investigates the relationship between religion and a theoretical ethical decision making process that an individual uses when evaluating ethical or unethical situations. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  26.  9
    An Open-Source Cognitive Test Battery to Assess Human Attention and Memory.Maxime Adolphe, Masataka Sawayama, Denis Maurel, Alexandra Delmas, Pierre-Yves Oudeyer & Hélène Sauzéon - 2022 - Frontiers in Psychology 13.
    Cognitive test batteries are widely used in diverse research fields, such as cognitive training, cognitive disorder assessment, or brain mechanism understanding. Although they need flexibility according to their usage objectives, most test batteries are not available as open-source software and are not be tuned by researchers in detail. The present study introduces an open-source cognitive test battery to assess attention and memory, using a javascript library, p5.js. Because of the ubiquitous nature of dynamic attention in our daily lives, it (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  28
    Forgetting of Foreign‐Language Skills: A Corpus‐Based Analysis of Online Tutoring Software.Ridgeway Karl, C. Mozer Michael & R. Bowles Anita - 2017 - Cognitive Science 41 (4):924-949.
    We explore the nature of forgetting in a corpus of 125,000 students learning Spanish using the Rosetta Stone® foreign-language instruction software across 48 lessons. Students are tested on a lesson after its initial study and are then retested after a variable time lag. We observe forgetting consistent with power function decay at a rate that varies across lessons but not across students. We find that lessons which are better learned initially are forgotten more slowly, a correlation which likely reflects (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  28.  36
    Privacy, deontic epistemic action logic and software agents.V. Wiegel, M. J. Van den Hoven & G. J. C. Lokhorst - 2005 - Ethics and Information Technology 7 (4):251-264.
    In this paper we present an executable approach to model interactions between agents that involve sensitive, privacy-related information. The approach is formal and based on deontic, epistemic and action logic. It is conceptually related to the Belief-Desire-Intention model of Bratman. Our approach uses the concept of sphere as developed by Waltzer to capture the notion that information is provided mostly with restrictions regarding its application. We use software agent technology to create an executable approach. Our agents hold beliefs about (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  7
    Development and Validity Test of Social Attachment Multidimensional Scale.Maosheng Yang, Kwanrat Suanpong, Athapol Ruangkanjanases, Wei Yu & Hongyu Xu - 2022 - Frontiers in Psychology 12.
    Social attachment can explain well the bond between users and social media, but existing research lacks measures of social attachment scales. To this end, this study takes attachment theory as the basis for scale development. On the basis of the development of multidimensional scales for adult, brand, and local attachment, it combines existing relevant studies on social attachment, selects three representative social media such as TikTok, WeChat, and MicroBlog as theoretical samples, explores the concept and structure of social attachment, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  10
    Physician thoughts on unnecessary noninvasive imaging and decision support software: A qualitative study.David E. Winchester, Ivette M. Freytes, Magda Schmitzberger, Kimberly Findley & Rebecca J. Beyth - 2020 - Clinical Ethics 15 (3):141-147.
    Objective Gather information from physicians about factors contributing to unnecessary noninvasive imaging and impact of possible solutions. Methods Qualitative study of 14 physicians using a phenomenological approach and the Theoretical Domains Framework. Results Most participants self-reported that >10% of the imaging tests they order are unnecessary. External sources of pressure included: peer-review, patient demands, nursing expectations, specialist requests, as well as prior experience with patient advocates, and the compensation and pension system. Internal sources of pressure included reliance on anecdote, self-doubt (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  24
    On the Mutual Dependence Between Formal Methods and Empirical Testing in Program Verification.Nicola Angius - 2020 - Philosophy and Technology 33 (2):349-355.
    This paper provides a review of Raymond Turner’s book Computational Artefacts. Towards a Philosophy of Computer Science. Focus is made on the definition of program correctness as the twofold problem of evaluating whether both the symbolic program and the physical implementation satisfy a set of specifications. The review stresses how these are not two separate problems. First, it is highlighted how formal proofs of correctness need to rely on the analysis of physical computational processes. Secondly, it is underlined how (...) testing requires considering the formal relations holding between the specifications and the symbolic program. Such a mutual dependency between formal and empirical program verification methods is finally shown to influence the debate on the epistemological status of computer science. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  46
    Hypothesis formation and testing in the acquisition of representationally simple concepts.Iris Oved - 2015 - Philosophical Studies 172 (1):227-247.
    Observations from philosophy and psychology heavily favor the Empiricist tenet that many lexical concepts are learned. However, many observations also heavily favor the Nativist tenet that such concepts are representationally atomic. Fodor Representations: Philosophical essays on the foundations of cognitive science, 1981, LOT2: The language of thought revisited, 2008) has famously argued that representationally atomic concepts cannot be learned, at least not learned by hypothesis formation and testing. Concept theorists who want to preserve observations about concept learning have developed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  25
    Hypothesis formation and testing in the acquisition of representationally simple concepts.Iris Oved - 2015 - Philosophical Studies 172 (1):227-247.
    Observations from philosophy and psychology heavily favor the Empiricist tenet that many lexical concepts are learned. However, many observations also heavily favor the Nativist tenet that such concepts are representationally atomic. Fodor Representations: Philosophical essays on the foundations of cognitive science, 1981, LOT2: The language of thought revisited, 2008) has famously argued that representationally atomic concepts cannot be learned, at least not learned by hypothesis formation and testing. Concept theorists who want to preserve observations about concept learning have developed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  5
    An Adaptable, Open-Access Test Battery to Study the Fractionation of Executive-Functions in Diverse Populations.Gislaine A. V. Zanini, Monica C. Miranda, Hugo Cogo-Moreira, Ali Nouri, Alberto L. Fernández & Sabine Pompéia - 2021 - Frontiers in Psychology 12.
    The umbrella-term ‘executive functions’ includes various domain-general, goal-directed cognitive abilities responsible for behavioral self-regulation. The influential unity and diversity model of EF posits the existence of three correlated yet separable executive domains: inhibition, shifting and updating. These domains may be influenced by factors such as socioeconomic status and culture, possibly due to the way EF tasks are devised and to biased choice of stimuli, focusing on first-world testees. Here, we propose a FREE test battery that includes two open-access tasks for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  12
    Privacy, Deontic Epistemic Action Logic and Software Agents: An Executable Approach to Modeling Moral Constraints in Complex Informational Relationships.V. Wiegel, M. Hoven & G. Lokhorst - 2005 - Ethics and Information Technology 7 (4):251-264.
    In this paper we present an executable approach to model interactions between agents that involve sensitive, privacy-related information. The approach is formal and based on deontic, epistemic and action logic. It is conceptually related to the Belief-Desire-Intention model of Bratman. Our approach uses the concept of sphere as developed by Waltzer to capture the notion that information is provided mostly with restrictions regarding its application. We use software agent technology to create an executable approach. Our agents hold beliefs about (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  20
    How actions and words come to make sense in a continuously changing world of work: A case study from software development.Josh Tenenberg, David Socha & Wolff-Michael Roth - 2021 - Semiotica 2021 (238):211-238.
    To be successful, collaboration at work requires its participants to have a common sense about what is happening and where things are heading. But how can collaborators have such a sense in common if what is going on continuously changes? This study investigates the joint communicative work participants in collaborative activity do to remain aligned on how things are going and where things are at for the purpose of maintaining a ground in common. Our test case for illustrating this joint (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  7
    Patriarchy, couple counselling and testing in preventing mother-to-child transmission of HIV in Zimbabwe.Vimbai Chibango & Cheryl Potgieter - 2022 - HTS Theological Studies 78 (1):9.
    The World Health Organization (WHO) recommends couple human immunodeficiency virus (HIV) counselling and testing (CHCT) as one of the beneficial and cost-effective means for the prevention of mother-to-child transmission (PMTCT) of HIV within couple’s relationships. However, CHCT within the PMTCT of HIV settings in Zimbabwe remains low. This study explored adult men and women’s views from a rural district of Zimbabwe regarding the possible factors that facilitate or inhibit the uptake of CHCT for the PMTCT of HIV. The study (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  1
    Patriarchy, couple counselling and testing in preventing mother-to-child transmission of HIV in Zimbabwe.Vimbai Chibango & Cheryl Potgieter - 2023 - HTS Theological Studies 79 (1):9.
    The World Health Organization (WHO) recommends couple human immunodeficiency virus (HIV) counselling and testing (CHCT) as one of the beneficial and cost-effective means for the prevention of mother-to-child transmission (PMTCT) of HIV within couple’s relationships. However, CHCT within the PMTCT of HIV settings in Zimbabwe remains low. This study explored adult men and women’s views from a rural district of Zimbabwe regarding the possible factors that facilitate or inhibit the uptake of CHCT for the PMTCT of HIV. The study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  4
    Matching Subsequence Music Retrieval in a Software Integration Environment.Zhencong Li, Qin Yao & Wanzhi Ma - 2021 - Complexity 2021:1-12.
    This paper firstly introduces the basic knowledge of music, proposes the detailed design of a music retrieval system based on the knowledge of music, and analyzes the feature extraction algorithm and matching algorithm by using the features of music. Feature extraction of audio data is the important research of this paper. In this paper, the main melody features, MFCC features, GFCC features, and rhythm features, are extracted from audio data and a feature fusion algorithm is proposed to achieve the fusion (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  6
    Computational challenges to test and revitalize Claude Lévi-Strauss transformational methodology.Jean-François Santucci, Laurent Capocchi & Albert Doja - 2021 - Big Data and Society 8 (2).
    The ambition and proposal for data modeling of myths presented in this paper is to link contemporary technical affordances to some canonical projects developed in structural anthropology. To articulate the theoretical promise and innovation of this proposal, we present a discrete-event system specification modeling and simulation approach in order to perform a generative analysis and a dynamic visualization of selected narratives, aimed at validating and revitalizing the transformational and morphodynamic theory and methodology proposed by Claude Lévi-Strauss in his structural analysis (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  20
    Model-Based Design, HIL Testing, and Rapid Control Prototyping of a Low-Cost POC Quadcopter with Stability Analysis and Control.Abdullah Irfan, Muhammad Gufran Khan, Arslan Ahmed Amin, Syed Ali Mohsin, Muhammad Adnan & Adil Zulfiqar - 2022 - Complexity 2022:1-16.
    Unmanned aerial vehicles, particularly quadcopters, have several medical, agriculture, surveillance, and security applications. However, the use of this innovative technology for civilian applications is still very limited in low-income countries due to the high cost, whereas low-cost controllers available in the market are often tuned using the hit and trial approach and are limited for specific applications. This paper addresses this issue and presents a novel proof of concept low-cost quadcopter UAV design approach using a systematic Model-Based Design method for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  5
    Failure Analysis of Static Analysis Software Module Based on Big Data Tendency Prediction.Jian Zhu, Qian Li & Shi Ying - 2021 - Complexity 2021:1-12.
    With the continuous development of software, it is inevitable that there will be various unpredictable problems in computer software or programs that will damage the normal operation of the software. In the paper, static analysis software is taken as the research object, the errors or failures caused by the potential defects of the software modules are analyzed, and a software analysis method based on big data tendency prediction is proposed to use the software (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43. Methodology in Practice: Statistical Misspecification Testing.Deborah G. Mayo & Aris Spanos - 2004 - Philosophy of Science 71 (5):1007-1025.
    The growing availability of computer power and statistical software has greatly increased the ease with which practitioners apply statistical methods, but this has not been accompanied by attention to checking the assumptions on which these methods are based. At the same time, disagreements about inferences based on statistical research frequently revolve around whether the assumptions are actually met in the studies available, e.g., in psychology, ecology, biology, risk assessment. Philosophical scrutiny can help disentangle 'practical' problems of model validation, and (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   40 citations  
  44.  3
    Patient Perceptions on the Advancement of Noninvasive Prenatal Testing for Sickle Cell Disease among Black Women in the United States.Shameka P. Thomas, Faith E. Fletcher, Rachele Willard, Tiara Monet Ranson & Vence L. Bonham - forthcoming - AJOB Empirical Bioethics.
    Background Noninvasive prenatal testing (NIPT) designed to screen for fetal genetic conditions, is increasingly being implemented as a part of routine prenatal care screening in the United States (US). However, these advances in reproductive genetic technology necessitate empirical research on the ethical and social implications of NIPT among populations underrepresented in genetic research, particularly Black women with sickle cell disease (SCD).Methods Forty (N = 40) semi-structured interviews were conducted virtually with Black women in the US (19 participants with SCD; (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  53
    Passing loebner's Turing test: A case of conflicting discourse functions. [REVIEW]Sean Zdenek - 2001 - Minds and Machines 11 (1):53-76.
    This paper argues that the Turing test is based on a fixed and de-contextualized view of communicative competence. According to this view, a machine that passes the test will be able to communicate effectively in a variety of other situations. But the de-contextualized view ignores the relationship between language and social context, or, to put it another way, the extent to which speakers respond dynamically to variations in discourse function, formality level, social distance/solidarity among participants, and participants' relative degrees of (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  38
    Privacy and Equality in Diagnostic Genetic Testing.Tarja Nyrhinen, Marja Hietala, Pauli Puukka & Helena Leino-Kilpi - 2007 - Nursing Ethics 14 (3):295-308.
    This study aimed to determine the extent to which the principles of privacy and equality were observed during diagnostic genetic testing according to views held by patients or child patients' parents (n = 106) and by staff (n = 162) from three Finnish university hospitals. The data were collected through a structured questionnaire and analysed using the SAS 8.1 statistical software. In general, the two principles were observed relatively satisfactorily in clinical practice. According to patients/parents, equality in the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  28
    Speed Up the Conception of Logical Systems with Test-Driven Development.Mathieu Vidal - 2014 - Journal of Logic, Language and Information 23 (1):83-103.
    In this paper, I stress the utility of employing test-driven development (TDD) for conceiving logical systems. TDD, originally invented in the context of Extreme Programming, is a methodology widely used by software engineers to conceive and develop programs. Its main principle is to design the tests of the expected properties of the system before the development phase. I argue that this methodology is especially convenient in conceiving applied logics. Indeed, this technique is efficient with most decidable logics having a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  28
    Speed up the conception of logical systems with test-driven development,.Mathieu Vidal - 2014 - Journal of Logic, Language and Information 23 (1):83-103.
    In this paper, I stress the utility of employing test-driven development (TDD) for conceiving logical systems. TDD, originally invented in the context of Extreme Programming, is a methodology widely used by software engineers to conceive and develop programs. Its main principle is to design the tests of the expected properties of the system before the development phase. I argue that this methodology is especially convenient in conceiving applied logics. Indeed, this technique is efficient with most decidable logics having a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  64
    How relative absolute can be: SUMI and the impact of the nature of the task in measuring perceived software usability. [REVIEW]Humberto Cavallin, W. Mike Martin & Ann Heylighen - 2007 - AI and Society 22 (2):227-235.
    This paper addresses the possibility of measuring perceived usability in an absolute way. It studies the impact of the nature of the tasks performed in perceived software usability evaluation, using for this purpose the subjective evaluation of an application’s performance via the Software Usability Measurement Inventory (SUMI). The paper reports on the post-hoc analysis of data from a productivity study for testing the effect of changes in the graphical user interface (GUI) of a market leading drafting application. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  13
    Design of English hierarchical online test system based on machine learning.Chaman Verma, Shaweta Khanna, Sudeep Asthana, Abhinav Asthana, Dan Zhang & Xiahui Wang - 2021 - Journal of Intelligent Systems 30 (1):793-807.
    Large amount of data are exchanged and the internet is turning into twenty-first century Silk Road for data. Machine learning (ML) is the new area for the applications. The artificial intelligence (AI) is the field providing machines with intelligence. In the last decades, more developments have been made in the field of ML and deep learning. The technology and other advanced algorithms are implemented into more computational constrained devices. The online English test system based on ML breaks the shackles of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 982