Search
Search Results
-
Improving requirements elicitation in large-scale software projects with reduced customer engagement: a proposed cost-effective model
Effective requirements elicitation is crucial for the success of large-scale software projects. However, challenges arise when customers are...
-
Exploring the dynamics of ICT and globalization on human development in India: asymmetric analysis and policy implications
The present study examines the asymmetrical relationship among globalization (GLB), information communication and technology (ICT), and human...
-
Application of neural networks to predict indoor air temperature in a building with artificial ventilation: impact of early stop**
Indoor air temperature prediction can facilitate energy-saving actions without compromising the indoor thermal comfort of occupants. The aim of this...
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
A network intrusion detection system based on deep learning in the IoT
As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...
-
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...
-
A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification
IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...
-
VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier
A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...
-
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...
-
Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling
The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Research on satellite link allocation algorithm for Earth-Moon space information network
With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...
-
Intelligent Personality Assessment and Verification from Handwriting using Machine Learning
It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as...
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Machine learning-driven performance assessment of network-on-chip architectures
System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...
-
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges
Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...
-
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...
-
A new integrated steganography scheme for quantum color images
In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...