We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. 50 Jahre ICT an der TU Wien – 20 Jahre Forschungsgruppe Embedded Systems an der FH Technikum Wien

    In Austria, Universities of Applied Sciences (UAS) are a relatively new type of education when compared to other countries. Research and development...

    Martin Horauer, Peter Rössler in e+i Elektrotechnik und Informationstechnik
    Article 15 July 2024
  2. Improving requirements elicitation in large-scale software projects with reduced customer engagement: a proposed cost-effective model

    Effective requirements elicitation is crucial for the success of large-scale software projects. However, challenges arise when customers are...

    Tauqeer ul Amin, Basit Shahzad in Requirements Engineering
    Article 15 July 2024
  3. Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications

    The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...

    Jancy Phore, Deepa, ... A. K. Saini in International Journal of Information Technology
    Article 14 July 2024
  4. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  5. Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**

    Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...

    Cathy Beljorelle Nguimatio Tsague, Jean Calvin Ndize Seutche, ... René Tchinda in International Journal of Information Technology
    Article 14 July 2024
  6. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  7. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  8. When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data

    Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...

    Edmond Awad, Sydney Levine, ... Max Kleiman-Weiner in Autonomous Agents and Multi-Agent Systems
    Article Open access 13 July 2024
  9. VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier

    A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...

    A. V. S. S. Varma, Kasiprasad Manepalli in International Journal of Information Technology
    Article 13 July 2024
  10. Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling

    The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...

    N S Koti Mani Kumar Tirumanadham, Thaiyalnayaki S, Sriram M in International Journal of Information Technology
    Article 13 July 2024
  11. Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory

    The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...

    Faouzi Sebbak, Mustapha Reda Senouci, ... Walid Cherifi in KI - Künstliche Intelligenz
    Article 13 July 2024
  12. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  13. Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application

    Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...

    Subhash Kamble, J. S. Arunalatha, K. R. Venugopal in International Journal of Information Technology
    Article 13 July 2024
  14. Rethinking AI code generation: a one-shot correction approach based on user feedback

    Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...

    Kim Tuyen Le, Artur Andrzejak in Automated Software Engineering
    Article Open access 12 July 2024
  15. Software verification challenges in the blockchain ecosystem

    Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...

    Article Open access 12 July 2024
  16. Intelligent Personality Assessment and Verification from Handwriting using Machine Learning

    It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...

    Pradeep Kumar Mishra, Gouri Sankar Mishra, ... Tarun Maini in International Journal of Information Technology
    Article 12 July 2024
  17. Progress on half a century of process modelling research in steelmaking: a review

    Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....

    Dipak Mazumdar in CSI Transactions on ICT
    Article 12 July 2024
  18. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  19. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
Did you find what you were looking for? Share feedback.