{"title":"Crowd Wisdom vs in-House Expertise: A Comprehensive Analysis of Quality Assurance Approaches","authors":"Akash Puranik","doi":"10.55529/ijitc.31.36.47","DOIUrl":"https://doi.org/10.55529/ijitc.31.36.47","url":null,"abstract":"In the dynamic landscape of software quality assurance, this research paper conducts an insightful comparative analysis of the contrasting methodologies: crowd-sourced testing and in-house testing. By closely examining their individual merits, limitations, and adaptability across diverse project contexts, the study explores crucial metrics encompassing cost-effectiveness, comprehensive test coverage, and adept defect detection. Integrating quantitative data alongside real-world instances, the paper not only elucidates the intricate factors pivotal in making informed decisions between these methodologies but also provides practical, well-grounded recommendations for their efficacious implementation. The study serves as a compass, empowering software practitioners and decision-makers with a discerning outlook to deftly navigate and choose the testing strategy that impeccably aligns with their project requisites and overarching organizational goals.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125321196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use Chat GPT to Solve Programming Bugs","authors":"Nigar M. Shafiq Surameery, Mohammed Y. Shakor","doi":"10.55529/ijitc.31.17.22","DOIUrl":"https://doi.org/10.55529/ijitc.31.17.22","url":null,"abstract":"This research paper explores the use of Chat GPT in solving programming bugs. The paper examines the characteristics of Chat GPT and how they can be leveraged to provide debugging assistance, bug prediction, and bug explanation to help solve programming problems. The paper also explores the limitations of Chat GPT in solving programming bugs and the importance of using other debugging tools and techniques to validate its predictions and explanations. The paper concludes by highlighting the potential of Chat GPT as one part of a comprehensive debugging toolkit, and the benefits of combining its strengths with the strengths of other debugging tools to identify and fix bugs more effectively.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Networks in the Modern World","authors":"Shreya Chaudhary","doi":"10.55529/ijitc.31.9.16","DOIUrl":"https://doi.org/10.55529/ijitc.31.9.16","url":null,"abstract":"In today's world, social networks are crucial. Information sharing is one of the key tasks carried out by this contemporary service. When I think back to the Arab uprising, I can remember how Twitter and Facebook were used to coordinate protests, notify participants of the date, time, and location, and emphasize the rallies' intended results. I've uncovered a lot of evidence to back up my claims, and I can now understand how Twitter and Facebook usage had a significant role in the emergence of the so-called Arab Spring. I came across the following quote while reading Huang's article \"Facebook and Twitter vital to Arab Spring uprising: report\": \"Social networks played a critical role in mobilisation, empowering, sharing thoughts and influencing change”.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122099271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of Encarta Software in the Teaching and Learning of Vocabulary in Senior Secondary Schools in Port Harcourt City Local Government Area of Rivers State","authors":"Isiah Eme Chisom, Okah Tim Elegant Joy","doi":"10.55529/ijitc.31.1.8","DOIUrl":"https://doi.org/10.55529/ijitc.31.1.8","url":null,"abstract":"The study accessed the use of Encarta software in the teaching and learning of vocabulary in senior secondary schools in Port Harcourt Local Government Area of Rivers State. The study adopted the quasi-experimental research design, which consisted of two groups, the experimental group and the control group. The population of the study comprised of 100 students from two schools which were divided into 50 for the experimental group and 50 for the control group. Students in the two schools were administered the EVAT as a pretest before the commencement of the treatment. The students in the experimental group were taught vocabulary using Microsoft Encarta software while instruction was given to the control group using the normal traditional method of teaching. At the end of the lesson, the post test was administered to both groups and data was collected after it was marked. The mean and standard deviations were used to analyze the research questions while Analysis of Variance (ANCOVA) was used to analyze the hypotheses. All the hypotheses were tested at 0.05 alpha level of significance. Recommendations were made that trainings/ workshops should be organized for English language teachers in secondary schools on the use of Microsoft Encarta software.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Raja, Dr. S. Selva Kumar, D. Yadav, Dr. Taresh Singh
{"title":"Integrating IOT and AI: Enhancing System Efficiency and User Experience","authors":"P. Raja, Dr. S. Selva Kumar, D. Yadav, Dr. Taresh Singh","doi":"10.55529/ijitc.26.39.50","DOIUrl":"https://doi.org/10.55529/ijitc.26.39.50","url":null,"abstract":"The manner in which we engage with technology has been fundamentally altered as a result of the convergence of the Internet of Things (IoT) and artificial intelligence (AI). This article investigates the advantages and disadvantages of merging IoT with AI, as well as the ways in which such integration might improve both the efficiency of the system and the user experience. This article includes a literature analysis on the integration of AI with IoT, as well as examples of applications in a variety of business sectors. It also covers the difficulties that are connected with integrating IoT with AI and offers some potential solutions to these difficulties. The last part of the article discusses the possibilities for this integration to improve both the user experience and the overall efficiency of the system.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuktha H J, G. Kulkarni, Athmaja Shetty, P. M. Paarakh
{"title":"Technologies in the Pharmaceutical Industries and Medical Health Care","authors":"Yuktha H J, G. Kulkarni, Athmaja Shetty, P. M. Paarakh","doi":"10.55529/ijitc.26.26.38","DOIUrl":"https://doi.org/10.55529/ijitc.26.26.38","url":null,"abstract":"This review aims to illustrate upcoming technological developments in the pharmaceutical industries and healthcare facilities may look in the near future. In order to achieve this, we examine recent technologies and advanced medical developments in healthcare as well as in the pharma industries. Such as Artificial intelligence which provides an understanding between process parameters and different formulations. Blockchain is a sophisticated database that stores data in a way that makes it impossible to alter or hack the system. Clouding Technology enhances the drug discovery process. In the Future hospitals will need room for scanning and 3D printing since they can create virtually anything, including medical devices and human body components, and also produce drugs for every individual. Robotics is widely used in surgery as well as in chemical handling in laboratories. IT (Information Technology) is a database that helps in gathering information in surgery departments, hospitals, labs, and clinics.\u0000Our geriatric populations' quality of life can be maintained with the aid of new, technologies and innovations in health care. To overcome these obstacles, medical technology, as well as pharma industries, as well as pharma industries must unite and promote, high-quality methods while incorporating them into many related fields.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Waghmare Maithali Mahadev, Utage Vaishnavi Sidram, Mandavkar Bhakti Lahanu, Dr. Kazi Kutubuddin Sayyad Liyakat
{"title":"Smart Watch System","authors":"Waghmare Maithali Mahadev, Utage Vaishnavi Sidram, Mandavkar Bhakti Lahanu, Dr. Kazi Kutubuddin Sayyad Liyakat","doi":"10.55529/ijitc.26.1.9","DOIUrl":"https://doi.org/10.55529/ijitc.26.1.9","url":null,"abstract":"Wearable technology used in daily life is the smartwatch (SW). It has features akin to those of a smartphone and is comparable to a traditional wristwatch. Access to the internet, calling, weather updates, text or video communications, GPS navigation, health and fitness data, etc. are some of these functions. The market for wearable technology and SWs is expanding daily. Smartwatches have a variety of advantages and disadvantages in medical settings. Reviewing the literature on smart watch applications in the biomedical field is the goal of this essay. This document gathers all the data about SW technology in the biomedical industry, as well as relevant journal papers, conference proceedings, web materials, market survey reports, and historical information, in one location. The analysis demonstrates that India has lower SW demand than other nations. Although it is growing over time, the total rate of demand is not what was anticipated. depending on the user's preference. The index keywords and the crucial author keyword have already been supplied. Vosviewer 1.6.16 software is also used to examine the terms in the abstract and title. The characteristics/criteria related to SWs are also included, which aids in the purchase of them. The essay also discusses the issues and flaws that need to be fixed in the current circumstance and various potential solutions for future research projects.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126822701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mrunal M. Kapse, Nilofar R. Patel, Shruti K. Narayankar, Prof. Sachin A. Malvekar, Dr. Kazi Kutubuddin Sayyad Liyakat
{"title":"Smart Grid Technology","authors":"Mrunal M. Kapse, Nilofar R. Patel, Shruti K. Narayankar, Prof. Sachin A. Malvekar, Dr. Kazi Kutubuddin Sayyad Liyakat","doi":"10.55529/ijitc.26.10.17","DOIUrl":"https://doi.org/10.55529/ijitc.26.10.17","url":null,"abstract":"Right a vertically integrated utility is one that has been managed by a centralised body since the commencement of the production of electrical energy. In order to address the needs of electricity consumers in the twenty-first century, a new technology known as \"Smart Grid\" has been devised. Decentralization of industries has been expanding day by day. In this essay, we will examine the meaning of the term \"smart grid,\" its advantages, as well as the various technologies used in it. The traditional electrical power system has been replaced by the smart grid thanks to its different technologies. In the past, when smart grid technology wasn't available, we had to deal with a lot of power outage issues, such as substation or generating unit failure. In order to achieve energy efficiency, the smart grid employs smart pricing strategies and renewable energy sources. Today's globe has seen the effective emergence of smart grid as a means of delivering electricity at the lowest cost and highest quality. We'll talk more about the specifics of smart grid technologies later.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shreya Kalmkar, Afrin Mujawar, Dr. Kazi Kutubuddin Sayyad Liyakat
{"title":"3D E-Commers using AR","authors":"Shreya Kalmkar, Afrin Mujawar, Dr. Kazi Kutubuddin Sayyad Liyakat","doi":"10.55529/ijitc.26.18.27","DOIUrl":"https://doi.org/10.55529/ijitc.26.18.27","url":null,"abstract":"The goal of this thesis was to look at the use and AR of 3D product in e-commerce. The goal was to investigate how 3D models were utilised in ecommerce and assess their effect and advantages to both customers and merchant’s .The theoretical framework provides an overview of 3D product and, more broadly, e-commerce. The goal of this part is to provide the reader with enough information to comprehend the research. Ecommerce is the purchasing and selling of goods through the internet. Unlike in conventional commerce, when buyers may check their product, consumers must rely on visuals to make a purchasing choice in e-commerce. Consumers may check things from all angles and distances thanks to the usage of 3D models in e-commerce. This allows the consumer to get additional information about a product .The purpose of this research is to extensively examine the usage of 3D product in e-commerce in order to describe its merits and drawbacks .The quantitative research approach used comprises of interviews with experts in the field. This research strategy was chosen in order to obtain the most latest and dependable information in a timely manner. area that is continually developing and moving, causing the relevance of research to dwindle quickly with the information gathered from these interviews, I will draw conclusions on the advantages and disadvantages of 3D models in e-commerce.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation the Challenges of Cloud Storage Security Using Hybrid Algorithms","authors":"Sokiyna Mohammad Glilat","doi":"10.55529/ijitc.25.41.54","DOIUrl":"https://doi.org/10.55529/ijitc.25.41.54","url":null,"abstract":"Security of the cloud computing is one of the most challenge which limit the idea of adopting the technology of clouding if the level of the security is not significant to protect the stored data, many researches had implemented several algorithms for this purpose. This paper implemented a hybrid algorithm based on AES and ECC to give high level of security. A theoretical study is presented in the first part of this search to explain the basic concepts of clouding as well as the security of this technique. After that the performance of the proposed scheme had been evaluated. The result showed that the AES combined with ECC offer extra feature which ensure high level of protection for the data.","PeriodicalId":180021,"journal":{"name":"International Journal of Information technology and Computer Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131943135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}