Search
Search Results
-
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...
-
VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier
A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...
-
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...
-
Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling
The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Intelligent Personality Assessment and Verification from Handwriting using Machine Learning
It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges
Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...
-
Signal processing implementation of low-cost target speed detection of CW radar using FPGA
The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...
-
A robust method for malware analysis using stacking classifiers and dendrogram visualization
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...
-
iDOCEM
In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...
-
Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions
There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...
-
Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method
The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...
-
Requirements for modelling tools for teaching
Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...
-
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring
Predictive monitoring is a subfield of process mining that aims to predict how a running case will unfold in the future. One of its main challenges...
-
What you see is what you trace: a two-stage interview study on traceability practices and eye tracking potential
The benefits of traceability have widely been discussed in research. However, studies have also shown that traceability practices are still not...
-
Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism
Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...
-
A splash of color: a dual dive into the effects of EVO on decision-making with goal models
Recent approaches have investigated assisting users in making early trade-off decisions when the future evolution of project elements is uncertain....