Journal articles on the topic 'SDLC Phases'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SDLC Phases.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alzayed, A., and Abdulwahed Khalfan. "Understanding Top Management Involvement in SDLC Phases." International Journal of Computer Applications 183, no. 37 (2021): 30–49. http://dx.doi.org/10.5120/ijca2021921759.
Full textSisodia, Jyoti, and Dr Suraj V. Pote. "Discussing Phases and Models of Software Development Life Cycle." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28176.
Full textSawarkar, Gurudev, and Dipesh Rajput. "Comparative Analysis of Various Software Development Life Cycle." International Journal of Computer Science and Mobile Computing 11, no. 8 (2022): 1–8. http://dx.doi.org/10.47760/ijcsmc.2022.v11i08.001.
Full textShankar, Sahana P., and Shilpa Shashikant Chaudhari. "Framework for the Automation of SDLC Phases using Artificial Intelligence and Machine Learning Techniques." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6s (2023): 379–90. http://dx.doi.org/10.17762/ijritcc.v11i6s.6944.
Full textrof. Dr. S.D. Joshi, Prof Y. C. Kulkarni, P. "Incorporating Security into SDLC Phases Using Security Analysis." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 07 (2015): 6423–31. http://dx.doi.org/10.15680/ijircce.2015.0307010.
Full textBalocon, Owen Harvey. "PRIORITIZING INFORMATION SECURITY: ANALYSIS OF SOFTWARE DEVELOPMENT LIFE CYCLE METHODOLOGIES USING THE NIST CYBERSECURITY FRAMEWORK." Ignatian International Journal for Multidisciplinary Research 2, no. 4 (2024): 1495–508. https://doi.org/10.5281/zenodo.11069707.
Full textShuford, Jeff. "An Expedited Examination of Responsible AI Frameworks: Directing Ethical AI Development." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 241–51. http://dx.doi.org/10.60087/jaigs.v4i1.138.
Full textChurch, Kimberly S., Pamela J. Schmidt, and Georgia Smedley. "Casey's Collections: A Strategic Decision-Making Case Using the Systems Development Lifecycle—Planning and Analysis Phases." Journal of Emerging Technologies in Accounting 13, no. 2 (2016): 231–45. http://dx.doi.org/10.2308/jeta-51472.
Full textGoyal, Shanky, Navleen Kaur, and Sachin Majithia. "Software Security: Role in SDLC." CGC International Journal of Contemporary Technology and Research 3, no. 2 (2021): 205–10. http://dx.doi.org/10.46860/cgcijctr.2021.06.31.205.
Full textJimoh, Rasheed Gbenga, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, and Cheng-Chi Lee. "Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases." Future Internet 14, no. 11 (2022): 305. http://dx.doi.org/10.3390/fi14110305.
Full textGutierrez, Amelie Anne. "SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)." International Journal of Computer Science and Information Technology 13, no. 6 (2021): 39–57. http://dx.doi.org/10.5121/ijcsit.2021.13604.
Full textMahmud, Mahmudul Hoque, Md Tanzirul Haque Nayan, Dewan Md Nur Anjum Ashir, and Md Alamgir Kabir. "Software Risk Prediction: Systematic Literature Review on Machine Learning Techniques." Applied Sciences 12, no. 22 (2022): 11694. http://dx.doi.org/10.3390/app122211694.
Full textMudita and Deepali Gupta. "The Aspects of Artificial Intelligence in Software Engineering." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4635–42. http://dx.doi.org/10.1166/jctn.2020.9291.
Full textHussain, Shariq, Haris Anwaar, Kashif Sultan, et al. "Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model." Journal of Engineering 2024 (February 21, 2024): 1–15. http://dx.doi.org/10.1155/2024/9962691.
Full textKhan, Shinwari and Zaidullah. "Testability as a Measure for Improving Software Quality in System Analysis and Design." Kardan Journal of Engineering and Technology 1, no. 1 (2022): 48–57. https://doi.org/10.31841/KJET.2021.5.
Full textNaisargi, Oza, and Punit Bhope Divya. "GENERATIVE AI IN THE SOFTWARE DEVELOPMENT LIFECYCLE (SDLC): OPPORTUNITIES, CHALLENGES, AND FUTURE DIRECTIONS." International Educational Applied Research Journal 09, no. 03 (2025): 183–95. https://doi.org/10.5281/zenodo.15231434.
Full textRodriguez-Martinez, Laura, Hector Duran-Limon, Ricardo Mendoza-González, and Jaime Muñoz. "Identifying common activities in the graphical user interface development process and their integration into the software-system development life cycle." Computer Science and Information Systems 12, no. 1 (2015): 323–48. http://dx.doi.org/10.2298/csis140301002r.
Full textAhmed, Ahmed, Haba K. Aslan, and Khaled M. Fouad. "Effective Integration of Database Security Tools into SDLC Phases: A Structured Framework." Journal of Cybersecurity and Information Management 16, no. 1 (2025): 176–207. https://doi.org/10.54216/jcim.160114.
Full textBipin Gajbhiye, Shalu Jain, and Akshun Chhapola. "Secure SDLC: Incorporating Blockchain for Enhanced Security." Scientific Journal of Metaverse and Blockchain Technologies 2, no. 2 (2024): 97–110. http://dx.doi.org/10.36676/sjmbt.v2.i2.40.
Full textAl-Ahmad, Bilal I., Ala’ A. Al-Zoubi, Md Faisal Kabir, Marwan Al-Tawil, and Ibrahim Aljarah. "Swarm intelligence-based model for improving prediction performance of low-expectation teams in educational software engineering projects." PeerJ Computer Science 8 (January 19, 2022): e857. http://dx.doi.org/10.7717/peerj-cs.857.
Full textThejasvi, N., and B. R. Shubhamangala. "Detection of Vulnerability Injection Point in Software Development Lifecycle for Effective Countermeasures." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2715–21. https://doi.org/10.35940/ijeat.C6045.029320.
Full textKandukuri, Prabhakar, Dasari N. V. Syma Kumar, G. Ramesh, and Prathima Kativarapu. "Sustainability-centric integration software requirements validation." MATEC Web of Conferences 392 (2024): 01160. http://dx.doi.org/10.1051/matecconf/202439201160.
Full textDongmo, Cyrille. "Analyzing Non-Functional Requirements (NFRs) beyond Requirements Engineering." Engineering, Technology & Applied Science Research 15, no. 3 (2025): 23790–98. https://doi.org/10.48084/etasr.9800.
Full textShaurya Jain. "Evaluating the Role of Data Privacy Regulations in Secure Software Development Life Cycles (SDLC)." Communications on Applied Nonlinear Analysis 32, no. 1s (2024): 483–94. http://dx.doi.org/10.52783/cana.v32.2240.
Full textBarcelo, Lincoln M., Cherry Mae P. Bairan, Rhovie Ann M. Semillano, et al. "CLAYmb: The Development and Assessment of an Interactive Learning Application for Pottery Making." European Journal of Theoretical and Applied Sciences 1, no. 4 (2023): 3–14. http://dx.doi.org/10.59324/ejtas.2023.1(4).01.
Full textLincoln, M. Barcelo, Mae P. Bairan Cherry, Ann M. Semillano Rhovie, et al. "CLAYmb: The Development and Assessment of an Interactive Learning Application for Pottery Making." European Journal of Theoretical and Applied Sciences 1, no. 4 (2023): 3–14. https://doi.org/10.59324/ejtas.2023.1(4).01.
Full textBeasley, Robert E. "Instructional Multimedia Software Development: Implications for the Analysis & Design Phases of the SDLC." Journal of Computer Information Systems 40, no. 2 (1999): 2–6. http://dx.doi.org/10.1080/08874417.1999.11647432.
Full textAsaad, Jameleh, and Elena Аvksentieva. "Review of ways to apply machine learning methods in software engineering." E3S Web of Conferences 449 (2023): 07018. http://dx.doi.org/10.1051/e3sconf/202344907018.
Full textVinay, T. R., E. G. Satish, and J. Megha. "Design and Programming for Multicore machines: An Empirical study on time and effort required by programmer." ITM Web of Conferences 57 (2023): 01016. http://dx.doi.org/10.1051/itmconf/20235701016.
Full textE., R. Aruna, Rama Mohan Reddy A., and V. N. Sunitha K. "Development of IoT Health Monitor System using Security Patterns." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 1573–80. https://doi.org/10.35940/ijeat.C4679.029320.
Full textDongmo, Cyrille. "A Review of Non-Functional Requirements Analysis Throughout the SDLC." Computers 13, no. 12 (2024): 308. http://dx.doi.org/10.3390/computers13120308.
Full textBudimansyah Purba, Arif, Ahmad Mubarok, Jajang Mulyana, and Wawan Kusdiawan. "Pengembangan Sistem Informasi Manajemen Kegiatan Masjid Berbasis Website pada Masjid Al Hikmah." Indonesia Bergerak : Jurnal Hasil Kegiatan Pengabdian Masyarakat 2, no. 3 (2024): 104–15. http://dx.doi.org/10.61132/inber.v2i3.508.
Full textYeen, Lai Khong, Santhini a/p Appannan Jeya, and Nair a/p G. Narayana Nair Malathi. "E-Queue Mobile Application: Empirical Study in Malaysia UTAR University." Journal of Research in Business, Economics and Management 8, no. 3 (2017): 1429–33. https://doi.org/10.5281/zenodo.3958611.
Full textVandana, Kumari. "Agile Transformation: Analyzing the Path to Organizational Agility." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 1 (2020): 1–4. https://doi.org/10.5281/zenodo.14684750.
Full textSandeep, Kaur*. "COMPARATIVE ANALYSIS OF SOFTWARE DEVELOPMENT MODELS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 10 (2017): 611–17. https://doi.org/10.5281/zenodo.1036644.
Full textSateesh, Nayani, S. V. Suryanarayana, Rella Usha Rani, and S. Sunanda. "Empowering Software Development with Machine Learning." E3S Web of Conferences 616 (2025): 02023. https://doi.org/10.1051/e3sconf/202561602023.
Full textSumardiono and Mus Mulyadi Maulana. "PERANCANGAN APLIKASI PESAN TANDING FUTSAL DENGAN METODE WATERFALL." INFOTECH : Jurnal Informatika & Teknologi 2, no. 1 (2021): 25–32. http://dx.doi.org/10.37373/infotech.v2i1.107.
Full textSakti, Rizki Hardian, and Elfi Tasrif. "PERANCANGAN SISTEM INFORMASI AKADEMIK JURUSAN ELEKTORNIKA." Voteteknika (Vocational Teknik Elektronika dan Informatika) 7, no. 2 (2019): 86. http://dx.doi.org/10.24036/voteteknika.v7i2.104330.
Full textKumar, Prasanna, and Dr Kamdeo Prasad Yadav. "Analysis of ERP Based Framework Expert Opinion in Early Software Defect Prediction." International Journal for Research in Applied Science and Engineering Technology 12, no. 9 (2024): 484–91. http://dx.doi.org/10.22214/ijraset.2024.64189.
Full textTabrez Khan, Et al. "Risk Prioritization using A FUZZY BASED Approach in Software Development Design Phase." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1674–87. http://dx.doi.org/10.17762/ijritcc.v11i9.9153.
Full textShulga, Tatiana Erikovna, and Dmitrii Eduardovich Khramov. "Life cycle ontology of software engineering." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2023, no. 2 (2023): 66–74. http://dx.doi.org/10.24143/2072-9502-2023-2-66-74.
Full textSari, Dawila, Muji Burrohman, Ajeng Dewi Kartika, et al. "Pendampingan Penyusunan Laporan Penerimaan dan Pengeluaran Kas melalui Aplikasi Berbasis VBA Excel pada Masjid Agung Jami Sulthan Muhammad Tsafiuddin II Sambas." Jurnal Abdi Masyarakat Indonesia 5, no. 3 (2025): 725–38. https://doi.org/10.54082/jamsi.1663.
Full textP S, Rakshith. "Autonomous Road way Alert System." International Journal of Innovative Research in Information Security 10, no. 03 (2024): 416–21. http://dx.doi.org/10.26562/ijiris.2024.v1003.46.
Full textKudo, Taciana Novo, Renato De Freitas Bulcão Neto, Auri Marcelo Rizzo Vincenzi, and Alessandra Alaniz Macedo. "A revisited systematic literature mapping on the support of requirement patterns for the software development life cycle." Journal of Software Engineering Research and Development 7 (December 21, 2019): 9. http://dx.doi.org/10.5753/jserd.2019.458.
Full textMajeed, Bismal, and Nosheen Sabahat. "REQUIREMENTS CHANGE MANAGEMENT (RCM) TOOL FOR PAKISTAN SOFTWARE INDUSTRY." Pakistan Journal of Scientific Research 3, no. 2 (2024): 190–200. http://dx.doi.org/10.57041/pjosr.v3i2.1018.
Full textHerlinda, Herlinda, Randi Ramliyana, and Erlin Windia Ambarsari. "Pengejawantahan Pendekatan Storytelling dalam Pemahaman Membangun Diagram Alir Data." Edumatic: Jurnal Pendidikan Informatika 5, no. 2 (2021): 223–32. http://dx.doi.org/10.29408/edumatic.v5i2.4060.
Full textSafitri, Aila Gema, and Firas Atqiya. "Automatic model transformation on multi-platform system development with model driven architecture approach." Computer Science and Information Technologies 3, no. 3 (2022): 157–68. http://dx.doi.org/10.11591/csit.v3i3.p157-168.
Full textAila Gema Safitri and Firas Atqiya. "Automatic model transformation on multi-platform system development with model driven architecture approach." Computer Science and Information Technologies 3, no. 3 (2022): 157–68. http://dx.doi.org/10.11591/csit.v3i3.pp157-168.
Full textAila, Gema Safitri, and Atqiya Firas. "Automatic model transformation on multi-platform system development with model driven architecture approach." Computer Science and Information Technologies 3, no. 3 (2022): 157–68. https://doi.org/10.11591/csit.v3i3.pp157-168.
Full textAliffandi, Imam, Dadan Mulyana, and Maulana Sidiq. "APLIKASI PENDAFTARAN PPDB (PENERIMAAN PESERTA DIDIK BARU) PROGRAM BABY SITTER BERBASIS WEB DI LEMBAGA KURSUS DAN PELATIHAN TIARA MEDICA CIAMIS DENGAN METODE AGILE." Jurnal Mahasiswa Sistem Informasi Galuh 1, no. 2 (2025): 97–107. https://doi.org/10.25157/jmsig.v1i2.4193.
Full text