Search
Search Results
-
50 Jahre ICT an der TU Wien – 20 Jahre Forschungsgruppe Embedded Systems an der FH Technikum Wien
In Austria, Universities of Applied Sciences (UAS) are a relatively new type of education when compared to other countries. Research and development...
-
Improving requirements elicitation in large-scale software projects with reduced customer engagement: a proposed cost-effective model
Effective requirements elicitation is crucial for the success of large-scale software projects. However, challenges arise when customers are...
-
Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications
The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**
Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier
A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...
-
Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling
The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...
-
Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory
The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...
-
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...
-
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...
-
Rethinking AI code generation: a one-shot correction approach based on user feedback
Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Intelligent Personality Assessment and Verification from Handwriting using Machine Learning
It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...