We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Improving requirements elicitation in large-scale software projects with reduced customer engagement: a proposed cost-effective model

    Effective requirements elicitation is crucial for the success of large-scale software projects. However, challenges arise when customers are...

    Tauqeer ul Amin, Basit Shahzad in Requirements Engineering
    Article 15 July 2024
  2. Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications

    The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...

    Jancy Phore, Deepa, ... A. K. Saini in International Journal of Information Technology
    Article 14 July 2024
  3. Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**

    Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...

    Cathy Beljorelle Nguimatio Tsague, Jean Calvin Ndize Seutche, ... René Tchinda in International Journal of Information Technology
    Article 14 July 2024
  4. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  5. A network intrusion detection system based on deep learning in the IoT

    As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...

    **ao Wang, Lie Dai, Guang Yang in The Journal of Supercomputing
    Article 13 July 2024
  6. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  7. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification

    IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...

    Furkh Zeshan, Zaineb dar, ... Tariq Malik in The Journal of Supercomputing
    Article 13 July 2024
  8. VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier

    A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...

    A. V. S. S. Varma, Kasiprasad Manepalli in International Journal of Information Technology
    Article 13 July 2024
  9. Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application

    Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...

    Subhash Kamble, J. S. Arunalatha, K. R. Venugopal in International Journal of Information Technology
    Article 13 July 2024
  10. Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling

    The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...

    N S Koti Mani Kumar Tirumanadham, Thaiyalnayaki S, Sriram M in International Journal of Information Technology
    Article 13 July 2024
  11. Software verification challenges in the blockchain ecosystem

    Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...

    Article Open access 12 July 2024
  12. Research on satellite link allocation algorithm for Earth-Moon space information network

    With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...

    Weiwu Ren, Yuan Gao, ... Hongbing Chen in The Journal of Supercomputing
    Article 12 July 2024
  13. Intelligent Personality Assessment and Verification from Handwriting using Machine Learning

    It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...

    Pradeep Kumar Mishra, Gouri Sankar Mishra, ... Tarun Maini in International Journal of Information Technology
    Article 12 July 2024
  14. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  15. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
  16. Machine learning-driven performance assessment of network-on-chip architectures

    System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...

    Ramapati Patra, Prasenjit Maji, ... Hemanta Kumar Mondal in The Journal of Supercomputing
    Article 11 July 2024
  17. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges

    Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...

    D. N. Sachin, B. Annappa, Sateesh Ambesange in Computing
    Article 10 July 2024
  18. Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements

    Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...

    Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi in Requirements Engineering
    Article Open access 10 July 2024
  19. A new integrated steganography scheme for quantum color images

    In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...

    Yumin Dong, Rui Yan in The Journal of Supercomputing
    Article 10 July 2024
  20. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
Did you find what you were looking for? Share feedback.